Cyber Security For not-for-profit organizations. Kevvie Fowler, GCFA, CISSP February, 2015



Similar documents
Big Data Security. Kevvie Fowler. kpmg.ca

Cyber Security Risks for Banking Institutions.

Nine recommendations for alternative funds battling cyber crime. kpmg.ca/cybersecurity

A NEW APPROACH TO CYBER SECURITY

Data Security: Fight Insider Threats & Protect Your Sensitive Data

Cyber security: Are consumer companies up to the challenge?

Controls over CIS. Ryan O Halloran, Senior Manager KPMG Hobart. TAO Client Information Session. May 2015

Central and Eastern European Data Theft Survey 2012

Access is power. Access management may be an untapped element in a hospital s cybersecurity plan. January kpmg.com

The Changing IT Risk Landscape Understanding and managing existing and emerging risks

Security and Privacy

How-To Guide: Cyber Security. Content Provided by

Cyber Security. John Leek Chief Strategist

Cybersecurity: Considerations for Internal Audit. IIA Atlanta Chapter Meeting January 9, 2015

HEALTH CARE AND CYBER SECURITY:

Health & Life sciences breach security program. David Houlding MSc CISSP CIPP Healthcare Privacy & Security Lead Intel Health and Life Sciences

Intel Cyber Security Briefing: Trends, Solutions, and Opportunities. Matthew Rosenquist, Cyber Security Strategist, Intel Corp

Trade Compliance Considerations. April 13, 2016

BOARD OF GOVERNORS MEETING JUNE 25, 2014

Cyber Security for audit committees

Information Risk Management

THE FIVE NEW PCI COMPLIANCE RULES YOU NEED TO KNOW

Certified PCI Compliant and Still Breached. 4 Cornerstones of Securing Payment Card Data

Top 5 reasons incident response is failing. kpmg.com

How To Protect Your Data From Theft

Cybersecurity and Cloud Briefing December 3, 2015

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft

Cyber Security. The changing landscape. Financial Sector. March 4-5, 2014

Reducing Cyber Risk in Your Organization

Verizon 2014 PCI Compliance Report

Pending and Developing Property Rental Tax Rates

Teradata and Protegrity High-Value Protection for High-Value Data

Encryption Doesn t Always Protect Your Data. Presented by: Joe Sturonas PKWARE

Fraud Risk Management

Cyber-Crime Protection

Cyber security: it s not just about technology

KSÖ-SICHERHEITSKONGRESS 2015

Nonprofit Organizations Committee Legal Quick Hit:

Whitepaper. PCI Compliance: Protect Your Business from Data Breach

NNIT Cybersecurity. A new threat landscape requires a new approach

Privacy / Network Security Liability Insurance Discussion. January 30, Kevin Violette RT ProExec

CSIS Academy Be Better

Impact of Data Breaches

Information Security Policy

VMware vcloud Air Security TECHNICAL WHITE PAPER

DATA LOSS BAROMETER. A global insight into lost and stolen information

THE NEW REALITY OF RISK CYBER RISK: TRENDS AND SOLUTIONS

Checklist for Breach Readiness. Ali Pabrai, MSEE, CISSP (ISSMP, ISSAP) For Daily Compliance & Security Tips, Follow

Cybernetic Global Intelligence. Service Information Package

Personal Information Threats & Risks: Responding to an Evolving Landscape with an Integrated Data Protection Approach

2014: A Year of Mega Breaches

Panel Title: Data Breaches: Industry and Law Enforcement Perspectives on Best Practices

Network Security & Privacy Landscape

Information Security Services

Aftermath of a Data Breach Study

Data Breach Lessons Learned. June 11, 2015

ADVISORY SERVICES. Risk management in an evolving world. Making the case for social media governance. kpmg.com

Cloud security with Sage Construction Anywhere

SECURITY CONSIDERATIONS FOR LAW FIRMS

Service Provider Performance and Satisfaction (SPPS) Survey, India, 2013

Data, Data Everywhere - What Are You Doing to Protect Yourself?

SMALL BUSINESS PRESENTATION

IFRS 16 Leases. A more transparent balance sheet. 13 January kpmg.com/ifrs

CYBER SECURITY DASHBOARD: MONITOR, ANALYSE AND TAKE CONTROL OF CYBER SECURITY

Cybersecurity Policies and Best Practices: Protecting small firms, large firms, and professional services from malware and other cyber-threats

Anatomy of a Privacy and Data Breach

Know the Risks. Protect Yourself. Protect Your Business.

Cybersecurity: Protecting Your Business. March 11, 2015

Services. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure

Belmont Savings Bank. Are there Hackers at the gate? 2013 Wolf & Company, P.C.

Whitepaper. PCI Compliance: Protect Your Business from Data Breach

An article on PCI Compliance for the Not-For-Profit Sector

Jefferson Glassie, FASAE Whiteford, Taylor & Preston

CyberArk Privileged Threat Analytics. Solution Brief

BAE Systems PCI Essentail. PCI Requirements Coverage Summary Table

RISKY BUSINESS SEMINAR CYBER LIABILITY DISCUSSION

Mobile security and your EMR. Presented by: Shawn Tester & Allen Cornwall

Beazley Group Beazley Breach Response. A data breach isn t always a disaster Mishandling it is.

Cyber Security. Securing Your Mobile and Online Banking Transactions

How Multi-Pay Tokens Can Reduce Security Risks and the PCI Compliance Burden for ecommerce Merchants

THE FFIEC CHALLENGE A Call for Reliable Authentication

Nine Network Considerations in the New HIPAA Landscape

Cybersecurity. Shamoil T. Shipchandler Partner, Bracewell & Giuliani LLP

Cyber Liability Insurance:

Your Network Has Been Compromised. Is It Time To Reevaluate Your Traditional Cybersecurity Paradigms?

Symantec Managed Security Services The Power To Protect

2012 Endpoint Security Best Practices Survey

CYBER & PRIVACY INSURANCE FOR FINANCIAL INSTITUTIONS

Risk Management: Integrating AML and Anti-Fraud Efforts

Data Security Breach. How to Respond

Information Security Addressing Your Advanced Threats

Building an Effective Mobile Device Management Strategy for a User-centric Mobile Enterprise

Everything You Wanted to Know about DISA STIGs but were Afraid to Ask

October 24, Mitigating Legal and Business Risks of Cyber Breaches

Increase insight. Reduce risk. Feel confident.

Internet threats: steps to security for your small business

Discussion on Network Security & Privacy Liability Exposures and Insurance

PCI DSS READINESS AND RESPONSE

Решения HP по информационной безопасности

Data Centre Managed Services Market

Transcription:

Cyber Security For not-for-profit organizations Kevvie Fowler, GCFA, CISSP February, 2015

About me Kevvie Fowler, CISSP, GCFA Partner, Advisory Services KPMG LLP Toronto, ON Industry contributions SANS Lethal Forensicator K2 FKM2 1

Cyber security: The threat Cyber security is a serious threat to not-for-profit organizations: Theft of sensitive donor and staff information Personal information / Health Records Potential reputation as easier targets Small and Medium sized organizations and Not-for-Profits are targets as well 2

Cyber security: The cyber criminals Petty criminals / Motives: Financial gain Hacktivists / Motives: Political support Organized / Motives: Financial gain State / Motives: State agenda 3

Cyber security: The underground economy The price (USD) of stolen data within the underground economy: Health Record / SSN $47.62 Username / Passwords $5.60 Debit Card (#) $9.55 Credit Card (#) $.25 - $100 Loyalty Rewards $.50 for 50k points Social Media $.05 - $8.00 References: -http://blogs.wsj.com/corporate-intelligence/2015/03/28/whats-more-valuable-a-stolen-twitter-account-or-a-stolen-credit-card/ -http://blogs.wsj.com/riskandcompliance/2013/06/26/passwords-more-valuable-than-credit-card-data/ -http://www.tripwire.com/state-of-security/vulnerability-management/how-stolen-target-credit-cards-are-used-on-the-black-market/ -http://www.foxbusiness.com/technology/2015/01/15/e-bazaar-crooks-hawk-your-info-in-online-black-market/ -http://www.theregister.co.uk/2015/11/05/hilton_honor_cards_breached/ 4

Cyber security: Impact of a breach Impact of a breach: Financial Loss of business operations Brand reputation 60% of small organizations go out of business after a security breach Source: https://www2.fireeye.com/smb_five_reasons_wp.html Retail. Healthcare. Manufacturing 5

Cyber security: Key risks Key risks 1 Corporate infrastructure Secure your data and infrastructure Identify and restrict access to critical data Implement security protection Firewall Anti-malware Identify and close front-door vulnerabilities Encrypt mobile devices 6

Cyber security: Key risks Key risks 2 Mobile Applications Fundraising applications Donation applications Secure development of in-house developed applications Many COTS applications are not secure-by-default Mobile App 7

Cyber security: Key risks Key risks 3 Social Media Corporate information Users Secure password management Use complex passwords Rotate passwords every 60-90 days Monitor social media account activity 8

Cyber security: Key risks Key risks 4 Cloud Leverage cloud processing and payment solutions Manage your 3 rd parties Solution security Security roles and responsibilities Notification expectations 9

Cyber security: Accountability Cyber security accountability once with the back office now resides with the board of directors 10

Cyber security: Getting defensible Putting yourself in a defensible position: 1) Meet regularly to discuss cyber security 2) Maintain adequate access to cyber security expertise 3) Make the minutes count 11

Thank you @kevviefowler ca.linkedin.com/kevviefowler/ Kevvie Fowler, CISSP, GCFA Partner, Advisory Services Toronto (416) 777-3742 kevviefowler@kpmg.ca

The information contained herein is of a general nature and is not intended to address the circumstances of any particular individual or entity. Although we endeavor to provide accurate and timely information, there can be no guarantee that such information is accurate as of the date it is received or that it will continue to be accurate in the future. No one should act on such information without appropriate professional advice after a thorough examination of the particular situation. 2015 KPMG LLP, a Canadian limited liability partnership and a member firm of the KPMG network of independent member firms affiliated with KPMG International Cooperative ( KPMG International ), a Swiss entity. All rights reserved. The KPMG name, logo and cutting through complexity are registered trademarks or trademarks of KPMG International.