Cyber Security Evolved

Similar documents
ISO27032 Guidelines for Cyber Security

A NEW APPROACH TO CYBER SECURITY

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft

Treasury Advisory Services Stability through effective financial risk and liquidity management. Audit. Tax. Consulting. Financial Advisory.

Addressing Cyber Risk Building robust cyber governance

The Internal Audit fraud challenge Prevention, protection, detection

Cyber security Building confidence in your digital future

IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE

Keeping sight of your business Hot topics facing Financial Services organisations in IT Internal Audit

Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model

Into the cybersecurity breach

London Business Interruption Association Technology new risks and opportunities for the Insurance industry

BT Assure Threat Intelligence

REPORT. Next steps in cyber security

Security solutions White paper. Acquire a global view of your organization s security state: the importance of security assessments.

CIIA South West Analytics in Internal Audit - Tackling Fraud

CYBER SECURITY TRAINING SAFE AND SECURE

Address C-level Cybersecurity issues to enable and secure Digital transformation

The enemies ashore Vulnerabilities & hackers: A relationship that works

Cyber intelligence exchange in business environment : a battle for trust and data

Technology and Cyber Resilience Benchmarking Report December 2013

Cyber Security - What Would a Breach Really Mean for your Business?

Protecting your business interests through intelligent IT security services, consultancy and training

Cyber security: everybody s imperative. A guide for the C-suite and boards on guarding against cyber risks

Cyber security: Are consumer companies up to the challenge?

RUAG Cyber Security. More security for your data

Global Mobility for Professional Practices Managing a mobile workforce

Surviving Contact with Reality Crisis exercises as a key element of cyber incident and crisis management response.

The battle to contain fraud is as old as

Consultative report. Committee on Payment and Settlement Systems. Board of the International Organization of Securities Commissions

How To Assess A Critical Service Provider

Who s next after TalkTalk?

Be Prepared. For Anything. Cyber Security - Confronting Current & Future Threats The role of skilled professionals in maintaining cyber resilience

Cybersecurity The role of Internal Audit

Informing the audit risk assessment for West Midlands Integrated Transport Authority Pension Fund

Cybersecurity Strategic Consulting

Continuous Network Monitoring

IBM QRadar as a Service

Smart Security. Smart Compliance.

GUIDANCE NOTE FOR DEPOSIT-TAKERS. Operational Risk Management. March 2012

Unified Cyber Security Monitoring and Management Framework By Vijay Bharti Happiest Minds, Security Services Practice

Cyber threat intelligence and the lessons from law enforcement. kpmg.com.au

CBEST FAQ February 2015

Capital Requirements Directive Pillar 3 Disclosure. December 2015

Digital Forensics G-Cloud Service Definition

Product Life Cycle Management in Life Sciences Industry

Managing cyber risk the global banking perspective

National Occupational Standards. Compliance

Third party assurance services

Developmental assignments Enablers not solutions

The cyber security imperative. Protect your organization from cyber threats

Cyber Defence Capability Assessment Tool (CDCAT ) Improving cyber security preparedness through risk and vulnerability analysis

Committees Date: Subject: Public Report of: For Information Summary

THE NEW REALITY OF RISK CYBER RISK: TRENDS AND SOLUTIONS

Top 5 reasons incident response is failing. kpmg.com

The Changing IT Risk Landscape Understanding and managing existing and emerging risks

Information Technology

Cyber security Building confidence in your digital future

CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES

Cybernetic Global Intelligence. Service Information Package

MEMORANDUM. Date: October 28, Federally Regulated Financial Institutions. Subject: Cyber Security Self-Assessment Guidance

ESKISP Conduct security testing, under supervision

Seamless Mobile Security for Network Operators. Build a secure foundation for winning new wireless services revenue.

Being protected Using data analytics to detect fraud

PwC s Advanced Threat and Vulnerability Management Services

Procuring Penetration Testing Services

On the horizon 2016 Hot topics for IT internal audit in financial services. An Internal Audit viewpoint

HR Business Partnering A Custom Approach

Risk Considerations for Internal Audit

Overview TECHIS Carry out security testing activities

CYBER SECURITY, A GROWING CIO PRIORITY

External Supplier Control Requirements

Cyber security. Cyber Security. Digital Employee Experience. Digital Customer Experience. Digital Insight. Payments. Internet of Things

How To Protect Your Network From Attack From A Network Security Threat

How To Manage Risk On A Scada System

A strategic approach to fraud

Cybersecurity. Considerations for the audit committee

Defending yesterday. Financial Services. Key findings from The Global State of Information Security Survey 2014

CGI Cyber Risk Advisory and Management Services for Insurers

CYBER & PRIVACY INSURANCE FOR FINANCIAL INSTITUTIONS

Market Watch. Trade volume advertising: Considerations for firms and individuals relating to risks of market abuse. Contents

developing your potential Cyber Security Training

Forensic Services. kpmg.hu

FFIEC Cybersecurity Assessment Tool Overview for Chief Executive Officers and Boards of Directors

Transcription:

Cyber Security Evolved

Aware Cyber threats are many, varied and always evolving Being aware is knowing what is going on so you can figure out what to do. The challenge is to know which cyber threats are relevant to your organisation and to anticipate what the next threats will be and where they will come from. Deloitte s cyber aware capability gives organisations situational awareness of the cyber threats facing them. Whether the threats come from insiders, from organised cyber criminals, from hacktivists or from sophisticated attackers using innovative techniques, our services help organisations to understand the threats, how they affect their business and how to deal with them. Cyber intelligence: Our cyber intelligence centre draws on real time security intelligence from our strategic partners in the security industry, from our own platforms and tools, and from our clients own systems. Our operational security experts analyse, contextualise and integrate these diverse feeds with our unparalleled understanding of business processes and risks to give our clients enriched situational awareness and pragmatic actionable information to address threats as they arise. Managed security assessments: Our dedicated team of security penetration testing experts can carry out a range of system security assessments. From light touch vulnerability assessment through to controlled yet relentless attacks on an entire organisation s systems and processes, we can identify where there are weaknesses, what impact they might have on business value and help you manage the risks in a pragmatic and business-focused way. We can help you to defend the greatest threats and mitigate the greatest risks by building a dynamic real time view of your threat profile. Understand the cyber threats that are relevant to your organisation. Assess your systems to uncover weaknesses and angles for attack. Anticipate what the next threats will be. Identify where the next threats will come from. Managed security services: Deloitte s cyber intelligence centre enables businesses to extend and enhance their own security operations capability by leveraging our and our strategic partners security experts.

Prepare Making sure you have the capability and skills Although the technical defences against a cyber attack must be built by IT, a breach of those defences can have far reaching business consequences. Identifying the business risks and deciding how and when cyber issues should be escalated are the starting points in developing an effective, coordinated business response. Protecting information assets in an always-on and always-connected world is of critical importance to the sustainability and competitiveness of businesses today. Effective security is the difference between success and failure; between understanding and ignorance; between compliance and non-compliance; between winning and losing. Deloitte s cyber prepare capability helps organisations to set and implement the right technology and cultural strategies to manage evolving cyber threats. Our tailored services range from understanding cyber risks and crisis management to cyber simulation and encouraging responsible behavioural change. Cyber preparedness: Our cyber preparedness capability helps businesses to understand their true cyber risks. We test cyber crisis management procedures in controlled but realistic scenarios rather than use hypothetical plans. We pressure test cyber incident management strategies so that hidden errors, false assumptions, gaps in plans and unrealistic expectations are exposed and resolved before live deployment. With a planned, coordinated and tested capability to respond against the persistent threat of attack, you can better protect your staff, assets, customers and value. We can help you minimise disruption by: Understanding your risks and developing mitigation plans. Defining the roles, responsibilities and procedures. Communicating clear escalation paths as well as devolved authority to respond. Undertaking simulations and training to support your staff. Cyber simulation: Our skilled practitioners have a track record of delivering strategic cyber simulations and crisis management exercises based on proven methodologies. Behavioural change: Our training programme educates and raises awareness on cyber risks across your organisation.

Respond Supporting you from network to boardroom When a breach occurs the response must be fast, thorough and decisive. Immediate action is required on several fronts. The nature of the breach must be established and the losses and damage understood. Further attacks must be prevented by urgent action while a longer-term solution is found. Management and security teams are judged on their ability to respond. Slow or ineffective response can mean reputational damage, decreases in share value and potentially lead to litigation costs or further attacks. Deloitte s cyber response services have been designed to provide organisations with access to the skills, experience and knowledge that are needed during times of crisis. We work to help manage your response, investigate and understand the root causes behind the incident and put remediation plans in place. Cyber incident response: Effective cyber incident response requires flexibility and the ability to make decisions, often with incomplete information to control the incident and manage the risk. Our approach blends deep technical skills, crisis management expertise and business intelligence to deliver a complete service, when and where organisations need it most. We are trusted to deliver scalable crisis management, incident response and forensic services to minimise the impact of cyber attacks. We can help: Deploy our specialist teams on the ground, fast, where you need them. Provide flexible support, integration or complete management of your response. Manage an incident in a proportionate and informed way. Prepare for the inevitable by developing and testing your incident response plans. Crisis Management: Our cyber crisis management team works with an organisation to quickly define roles and responsibilities, complete a risk and impact assessment and agree response work streams and strategies. Cyber Forensics: Specialist teams can assist you to conduct technical root cause assessment, breach analysis and forensic investigation.

The rapid pace of change in technology has provided huge opportunities for organisations to develop new models, services and products. But while the digital revolution has evolved the way we do business, it has also created a sophisticated and complex set of security issues. Assets that were once physically protected are accessible online; customer channels are vulnerable to disruption; criminals have new opportunities for theft and fraud. Business value is becoming more and more dependent on always-on, always-connected systems. Exposure to cyber threats increases as businesses embrace the digital world. The challenge is to understand what is going on in the digital landscape, what it means, and what to do about it. We recognise that every organisation is different. Our flexible, pragmatic and independent approach to managing cyber security means that we work with you, from network to boardroom, to address the constantly changing threats. Intelligent insight to monitor evolving threats and anticipate risks Aware Continual evolution and improvement in process, people and technology Understand the risks, build a resilient organisation Deloitte Cyber Security Evolved Protect investments reduce exposure and react in real time Prepare Setting and implementing the right technology and cultural strategy to manage evolving cyber threats The most resilient businesses are those that are always aware of the latest risks, have prepared their organisations to be robust and are able to respond swiftly and effectively to mitigate new risks. Respond In managing these critical elements of cyber security we can help ensure that our clients continue to take advantage of the benefits of digital business. Crisis management, diagnostics and solutions so clients can minimise the material impact of cyber attacks in real time at any time

Contacts Mark Carter Partner, Security & Resilience +41 (0)58 279 73 80 markjcarter@deloitte.ch Klaus Julisch Senior Manager, Security & Resilience +41 (0)58 279 62 31 kjulisch@deloitte.ch Lance McGrath Senior Manager, Security & Resilience +41 (0)58 279 64 67 lamcgrath@deloitte.ch Or to find out more visit http://www.deloitte.com/ch/security Deloitte refers to one or more of Deloitte Touche Tohmatsu Limited ( DTTL ), a UK private company limited by guarantee, and its network of member firms, each of which is a legally separate and independent entity. Please see www.deloitte.com/ch/about for a detailed description of the legal structure of DTTL and its member firms. Deloitte AG is a subsidiary of Deloitte LLP, the United Kingdom member firm of DTTL. Deloitte AG is recognised as auditor by the Federal Audit Oversight Authority and the Swiss Financial Market Supervisory Authority. This publication has been written in general terms and therefore cannot be relied on to cover specific situations; application of the principles set out will depend upon the particular circumstances involved and we recommend that you obtain professional advice before acting or refraining from acting on any of the contents of this publication. Deloitte AG would be pleased to advise readers on how to apply the principles set out in this publication to their specific circumstances. Deloitte AG accepts no duty of care or liability for any loss occasioned to any person acting or refraining from action as a result of any material in this publication. 2013 Deloitte AG. All rights reserved. Designed and produced by The Creative Studio at Deloitte, Zurich. 30450A