Partnership for Cyber Resilience



Similar documents
Risk and responsibility in a hyperconnected world: Implications for enterprises

Risk & Responsibility in a Hyper-Connected World: Implications for Enterprises

Cybersecurity: Mission integration to protect your assets

CYBERSECURITY INDEX OF INDICES

National Cyber Security Policy -2013

(U) Appendix E: Case for Developing an International Cybersecurity Policy Framework

RE: Experience with the Framework for Improving Critical Infrastructure Cybersecurity

Accenture Intelligent Security for the Digital Enterprise. Archer s important role in solving today's pressing security challenges

FFIEC Cybersecurity Assessment Tool Overview for Chief Executive Officers and Boards of Directors

Cybersecurity and Corporate America: Finding Opportunities in the New Executive Order

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

Why you should adopt the NIST Cybersecurity Framework

CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES

Cybersecurity: Considerations for Internal Audit. IIA Atlanta Chapter Meeting January 9, 2015

ICBA Summary of FFIEC Cybersecurity Assessment Tool

2015 Michigan NASCIO Award Nomination. Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy

Actions and Recommendations (A/R) Summary

Why you should adopt the NIST Cybersecurity Framework

BEST PRACTICES IN CYBER SUPPLY CHAIN RISK MANAGEMENT

Cloud Cyber Incident Sharing Center (CISC) Jim Reavis CEO, Cloud Security Alliance

Dealer Member Cyber-security

Utility-Scale Applications of Microgrids: Moving Beyond Pilots Cyber Security

How To Write An Article On The European Cyberspace Policy And Security Strategy

Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28),

CYSPA - EC projects supporting NIS

Testimony of Dan Nutkis CEO of HITRUST Alliance. Before the Oversight and Government Reform Committee, Subcommittee on Information Technology

CYBER SECURITY, A GROWING CIO PRIORITY

FFIEC Cybersecurity Assessment Tool

Of Citadels And Sentinels: State. Tim Legrand and Jeff Malone

CYBERSECURITY RISK MANAGEMENT

Cybersecurity The role of Internal Audit

Connecting the dots: A proactive approach to cybersecurity oversight in the boardroom. kpmg.bm

Cybersecurity in the Utilities Sector Best Practices and Implementation 2014 Canadian Utilities IT & Telecom Conference September 24, 2014

Supplier Vigilance: A Critical Layer of Defense

Liability Management Evolving Cyber and Physical Security Standards and the SAFETY Act

Protecting against cyber threats and security breaches

The Policy Approaches to Strengthen Cyber Security in the Financial Sector (Summary) July 2, 2015 Financial Services Agency

Lessons from Defending Cyberspace

Cybersecurity Framework. Executive Order Improving Critical Infrastructure Cybersecurity

Cyber Security in EU: ENISA approach

AT&T Cybersecurity Policy Overview

CYSPA launch event - Turkey

2 Gabi Siboni, 1 Senior Research Fellow and Director,

Testimony of. Doug Johnson. New York Bankers Association. New York State Senate Joint Public Hearing:

Cybersecurity Framework: Current Status and Next Steps

PREPUBLICATION COPY. More Intelligent, More Effective Cybersecurity Protection

PROTECTING CRITICAL CONTROL AND SCADA SYSTEMS WITH A CYBER SECURITY MANAGEMENT SYSTEM

Docket No. DHS , Notice of Request for Public Comment Regarding Information Sharing and Analysis Organizations

Securing the Network: Cybersecurity Recommendations for Critical Infrastructure and the Global Supply Chain Telecommunications Industry Association

Cybersecurity in the Digital Economy Challenges and Threats to the Financial Services Sector

Solving the Security Puzzle

Cyber Security Evolved

CForum: A Community Driven Solution to Cybersecurity Challenges

Release of the Draft Cybersecurity Procurement Language for Energy Delivery Systems

CLOSING THE DOOR TO CYBER ATTACKS HOW ENTERPRISES CAN IMPLEMENT COMPREHENSIVE INFORMATION SECURITY

A GOOD PRACTICE GUIDE FOR EMPLOYERS

Sytorus Information Security Assessment Overview

The Growth of the European Cybersecurity Market and of a EU Cybersecurity Industry

The IT Strategic Plan

Legislative Language

aecert Roadmap Eng. Mohammed Gheyath Director, Technical Affairs TRA

RESPONSIBLE CARE SECURITY CODE OF MANAGEMENT PRACTICES

The PNC Financial Services Group, Inc. Business Continuity Program

GETTING REAL ABOUT SECURITY MANAGEMENT AND "BIG DATA"

Senate Committee on Commerce, Science, and Transportation March 19, 2015, Hearing Examining the Evolving Cyber Insurance Marketplace

Middle Class Economics: Cybersecurity Updated August 7, 2015

POLICIES TO MITIGATE CYBER RISK

Nine Cyber Security Trends for 2016

National Security & Homeland Security Councils Review of National Cyber Security Policy. Submission of the Business Software Alliance March 19, 2009

Seamus Reilly Director EY Information Security Cyber Security

Cybersecurity and Privacy Hot Topics 2015

ITU National Cybersecurity/CIIP Self-Assessment Tool

Accenture Cyber Security Transformation. October 2015

How do you give cybersecurity the highest priority in your organization? Cyber Protection & Resilience Solutions from CGI

Making our Cyber Space Safe

The Changing IT Risk Landscape Understanding and managing existing and emerging risks

State of Minnesota. Enterprise Security Strategic Plan. Fiscal Years

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

PwC Cybersecurity Briefing

New York State Department of Financial Services. Report on Cyber Security in the Banking Sector

Transcription:

Partnership for Cyber Resilience

Principles for Cyber Resilience 1. Recognition of interdependence: All parties have a role in fostering a resilient shared digital space 2. Role of leadership: Encourage executive-level awareness and leadership of cyber risk management 3. Integrated risk management: Develop a practical and effective implementation program 4. Promote uptake: Where appropriate, encourage suppliers and customers to develop a similar level of awareness and commitment 2

Risk and Responsibility in a Hyperconnected World Final Report 2014 Key Outputs: Findings: understanding Cyber Risks and Response Readiness For most companies across sectors and regions, cyber resilience is a strategic risk Executives believe they are losing ground to attackers Large companies lack the facts and processes to make effective decisions about cyber resilience Concerns about cyberattacks are starting to have measurable negative business implications in some areas and could account for upwards of US$ 3 trillion by 2020 Substantial actions are required from all players in the cyber resilience ecosystem Future Scenarios Muddling into the future. Organizations move forward with status quo. Backlash decelerates digitization. The attacker get more sophistication and organizations do not keep pace Cyber Resilience Accelerates Digitization.. Organizations are able to adapt and make the change necessary to comb at the evolving threat. Conclusions and Roadmap for Collaborative Action Collaborative action is needed though a joint framework for global cooperation 3

Framework and Recommendations Select: Select Industry Select: Select Region Stage 1 Stage 2 Stage 3 Stage 4 Stage 5 Maturity curve from current Principles and Guidelines Institutional Readiness Governance Program Development Network Development Maturity levels: attributes and recommendations Governance: 1. Prioritize information assets based on business risks 2. Integrate cyber-resilience into enterprise-wide risk management and governance processes Program Development 1. Provide differentiated protection based on importance of assets 2. Develop deep integration of security into technology environment to drive scalability 3. Deploy active defenses to uncover attacks proactively 4. Continuous testing to improve incident response 5. Enlist front-line personnel helping them understand value of information assets Public and international Policy National strategy Criminal Justice (law enforcement) Regulatory policy Foreign policy Public goods Legal code Criminal Justice: 1. Disrupt supply chain for attack vectors Public Good: 1. Increase investments in cyber-security technical education 2. Fund a cyber-security research agenda 3. Create standards for federated identity Foreign Policy: 1. Create interoperability amongst cyber-security regulations globally Community Research Information sharing Knowledge transfer Community Selfgovernance Shared resources for capability building Mutual aid Research: 1. Increase investments in cyber-security technical education 2. Encourage research on economic impact of cyber security to prioritize and focus policies Information Sharing: 1. Private and public dialogue to develop appropriate legislation 2. Where legally feasible, institutions find venues for legal information sharing 3. Improve the quality of the ISACs/ CERTS/ CIERTs 4. Provide safe harbor protection for limited sharing of information across companies with government 5. Reporting standards to companies to inform of cyber-attacks Systemic Risk Markets Embedded security Risk Markets: 1. Expand reach and breadth of cyber-security insurance markets Embedded Security: 1. Build a secure internet without user anonymity 4

Final report Key Findings: 80% of businesses believe cyber security is a strategic risk for their businesses 69% of executives interviewed believe the sophistication or pace of attackers will increase somewhat more quickly than institutions ability to defend themselves Concerns about cyber-attacks are starting to have measurable business implications in some areas: slow value capture from cloud computing, mobile technologies and health care technologies 78% of companies said that security concerns delayed adoption of public cloud computing by a year or more 43% said such concerns delayed enterprise mobility capabilities by a year or more 50% of companies overall said that controls had at least a moderate impact on end use productivity Substantial actions are required from all the players in the cyber-security ecosystem: Most of the executives interviewed believe they need to improve on their own capabilities 5

Potential Impact of Cyberrisks to Global Economy