Deloitte Cyber Risk Services Providing trust in a digital world



Similar documents
CYBER SECURITY TRAINING SAFE AND SECURE

Services. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure

CYBER SECURITY, A GROWING CIO PRIORITY

Simply Sophisticated. Information Security and Compliance

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

Cybersecurity The role of Internal Audit

Changing the Enterprise Security Landscape

Your asset is your business. The more challenging the economy, the more valuable the asset becomes. Decisions are magnified. Risk is amplified.

Security-as-a-Service (Sec-aaS) Framework. Service Introduction

Address C-level Cybersecurity issues to enable and secure Digital transformation

CONSULTING IMAGE PLACEHOLDER

Governance, Risk, and Compliance (GRC) White Paper

Cisco Unified Communications and Collaboration technology is changing the way we go about the business of the University.

U.S. Office of Personnel Management. Actions to Strengthen Cybersecurity and Protect Critical IT Systems

Intelligence Driven Security

HP ENTERPRISE SECURITY. Protecting the Instant-On Enterprise

Security Services. 30 years of experience in IT business

Into the cybersecurity breach

Defending against modern cyber threats

Cyber security. Cyber Security. Digital Employee Experience. Digital Customer Experience. Digital Insight. Payments. Internet of Things

How To Protect Your Network From Attack From A Network Security Threat

The Next Generation of Security Leaders

Professional Services Overview

The Protection Mission a constant endeavor

CORE INSIGHT ENTERPRISE: CSO USE CASES FOR ENTERPRISE SECURITY TESTING AND MEASUREMENT

RSA Archer Risk Intelligence

Certified Information Security Manager (CISM)

Agency for State Technology

Cyber Security and Privacy - Program 183

Accenture Intelligent Security for the Digital Enterprise. Archer s important role in solving today's pressing security challenges

Cybersecurity: Mission integration to protect your assets

Technical Testing. Network Testing DATA SHEET

Analytics Strategy Information Architecture Data Management Analytics Value and Governance Realization

HP and netforensics Security Information Management solutions. Business blueprint

CYBER SECURITY SERVICES PWNED

GEARS Cyber-Security Services

QRadar SIEM and Zscaler Nanolog Streaming Service

Security. Security consulting and Integration: Definition and Deliverables. Introduction

Enterprise Security Tactical Plan

QRadar SIEM and FireEye MPS Integration

IBM Cloud Security Draft for Discussion September 12, IBM Corporation

Best Practices in ICS Security for Device Manufacturers. A Wurldtech White Paper

Firewall Administration and Management

CyberSecurity Solutions. Delivering

Global Headquarters: 5 Speen Street Framingham, MA USA P F

THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS

IT Transformation for Health Care

BUSINESS PROCESS MANAGEMENT and IT. Helping Align IT with Business

Continuous Network Monitoring

Cyber Security: from threat to opportunity

Cybersecurity Strategic Consulting

The Changing IT Risk Landscape Understanding and managing existing and emerging risks

Cybersecurity in the States 2012: Priorities, Issues and Trends

Security & privacy in the cloud; an easy road?

ARCHITECTURE SERVICES. G-CLOUD SERVICE DEFINITION.

Corporate Overview. MindPoint Group, LLC 8078 Edinburgh Drive, Springfield, VA Office: Fax:

How we see malware introduced Phishing Targeted Phishing Water hole Download (software (+ free ), music, films, serialz)

BladeLogic Software-as-a- Service (SaaS) Solution. Help reduce operating cost, improve security compliance, strengthen cybersecurity posture

NERC Cyber Security. Compliance Consulting. Services. HCL Governance, Risk & Compliance Practice

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

TRIPWIRE NERC SOLUTION SUITE

Information Technology Consulting Services

Preemptive security solutions for healthcare

The Imperative for High Assurance Credentials: State Identity Credential and Access Management (SICAM) Guidance and Roadmap

Tuesday, August 19th Prevent, Detect, Respond: A Framework for Effective Cyber Defense Dr. Eric Cole, Fellow, SANS Institute

Experience the commitment WHITE PAPER. Information Security Continuous Monitoring. Charting the Right Course. cgi.com 2014 CGI GROUP INC.

A Privacy Officer s Guide to Providing Enterprise De-Identification Services. Phase I

Obtaining Enterprise Cybersituational

Logical Operations CyberSec First Responder: Threat Detection and Response (CFR) Exam CFR-110

Strengthen security with intelligent identity and access management

ISO27032 Guidelines for Cyber Security

End-user Security Analytics Strengthens Protection with ArcSight

Whitepaper: 7 Steps to Developing a Cloud Security Plan

WHAT ARE THE BENEFITS OF OUTSOURCING NETWORK SECURITY?

PCI Solution for Retail: Addressing Compliance and Security Best Practices

Microsoft Services Premier Support. Security Services Catalogue

FFIEC Cybersecurity Assessment Tool Overview for Chief Executive Officers and Boards of Directors

Middle Class Economics: Cybersecurity Updated August 7, 2015

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES

North American Electric Reliability Corporation (NERC) Cyber Security Standard

High End Information Security Services

Organizational IT Concepts and SAP Solution Manager. General IT operations and service concepts with SAP Solution Manager. Driving value with IT

SANS Top 20 Critical Controls for Effective Cyber Defense

1 Introduction Product Description Strengths and Challenges Copyright... 5

PwC s Advanced Threat and Vulnerability Management Services

Assessing the Effectiveness of a Cybersecurity Program

Improving Financial Advisor Productivity through Automation

BEST PRACTICES RESEARCH

Transcription:

Deloitte Cyber Risk Services Providing trust in a digital world June 2015

Deloitte Cyber Risk Services Providing trust in a digital world Our aim Your organization, whether functioning in the public or private sector, has benefited from a fabric of connectivity driving innovation, efficiency, and performance that were unthinkable a generation ago. You have likely used this connectivity to transform relationships with customers and constituents, build new revenue streams, or overcome geographic constraints. But the strategic things you do to grow your business are at the heart of the cyber risks your organization faces. When we consider this inherent link between business performance, innovation and cyber risk, it becomes clear that protecting everything while perhaps not impossible would be economically impractical and would likely impede some of your most important strategic initiatives. Cyber incidents will occur. Every organization must realistically assess its chang ing risk profile and determine what levels and types of cyber risk are acceptable. Managing your cyber risks has become an essential aspect of enabling optimal business performance. With this short brochure we are pleased to introduce our services to you delivered by our 100+ passionate cyber security professionals Contact us to learn more Marko van Zwam Partner, Deloitte Cyber Risk Services in The Netherlands MvanZwam@deloitte.nl Facilitating Cyberdawn, a project to assess the risk to Dutch critical infrastructure

Why Deloitte? Deloitte has extensive experience in the field of advising and assessing the information security within governments and business. Our team consists of more than 30 specialists that describe ethical hacking as their great passion. The knowledge, experience and passion is reaffirmed in the finals of the Global CyberLympics. The team of Deloitte Netherlands did win, in 2011 to 2013, three times in a row and in 2014 the second place in a contest which consisted of both offensive and defensive security challenges. According to the Forrester report, The Forrester Wave TM Information Security Consulting Services, Q1 2013, Deloitte continues as a leader, with exceptional feedback from its clients. Furthermore, according to the report, Deloitte earned the highest score when it came to executive power. Next to Forrester, also Gartner has named Deloitte a Leader, based on capabilities, in its 2014 Magic Quadrant for Global Risk Management Consulting Services. In short, Deloitte is your ideal partner to support you achieving your business goals by getting the maximum return on your online activities. Why Del Deloitte and asse governm than 30 s great pas reaffirme team of D three tim contest w security Accordin Informat Deloitte from its c Deloitte executive Participating in the CyberLympics

Our Service Lines Cyber Security Management Our Cyber Security Management team helps you to strengthen your information security organization. Key services range from helping you to develop and deliver your comprehensive information security roadmap, to supporting you in specialized activities such as streamlining your security policy framework, identity & access management or strengthening your crisis management organization. Our team is able to swiftly share best-practices and onboard professionals from our international offices to support you in every step from strategy to implementation. Our experienced consultants have been involved in the largest cyber security programs in The Netherlands and understand the challenges you face to deliver real impact and what it means to team with your business partners. Our team based in The Netherlands consists of 40 professionals who distinguish themselves by their client focus, can-do mentality and deep expertise. Hacking and Incident Response The Hacking and Incident Response (IR) team consist of 40 professionals fascinated by technology and security. We desire to understand how technology works inside out, and to find its edge to be able to look what's beyond. We support our clients in identifying and mitigating security vulnerabilities in both the digital and physical domain by performing security tests on IT infrastructure, web applications, physical locations or groups of employees. We are also known for working shoulder to shoulder with our clients in responding to various security incidents to minimize the impact of a breach and ensure a swift recovery to normal operations. Last but not least, the Deloitte NL s Hacking & IR team prides itself in being the three-time winner of the Global CyberLympics. Privacy The Privacy team is an enthusiastic dedicated group of people working with experience across all sectors. The team s signature strength is its multidisciplinary approach to privacy: enabling us to effectively address legal, organizational and technical aspects of your privacy challenges. The team is able to assist organizations in any privacy-related issues that may arise, irrespective of industry or sector. The team has experience in a large number of diverse organizations and is able to utilize its deep knowledge base to employ best practices in any environment. This can vary between creating a complete privacy program or a privacy strategy to the drafting and implementation of policies and doing regulation checks. The Deloitte Privacy Team is currently market leader in the privacy field and continues to grow every day. Security Operations The Security Operations team focuses on delivering end-to-end services in the operational security lifecycle: Strategy, advisory, design, architecture, implementation, operation and maintenance of your security technology. Our professionals bring broad and deep expertise to deliver cutting edge security services, such as operational security strategy and governance, SIEM, SOC and managed security services, threat intelligence, security technology engineering and maintenance, as well as staff augmentation. We strive for high-quality and fit-for-purpose solutions to enable active threat management. To this end, our professionals are highly qualified in both technical and non-technical domains, results driven, bring deep industry knowledge, strong business focus and the ability to work closely with your teams, building together cost effective operational solutions.

Examples of Recent Projects Large Dutch bank Being the security partner for 5 consecutive years Deloitte has supported one of the largest Dutch banks for over 5 years with information security challenges. We support our client in policy development, review of security baselines, vendor security control framework development and many more activities related to people, process and technology. When necessary, we augment our client s staff, for example to perform information security risk assessments, security monitoring, second line control reviews and to deliver vulnerability scans and conduct pentesting. Deloitte also provides managed security services like phishing as a service (to increase awareness) and cryptography services like key management support. Global high-tech company Supporting end-to-end, from incident management to security architecture Deloitte assists the client with a company wide security transformation. Initiated by the office of the CIO and with an original focus on IT, the program developed into an end-to-end security transformation consisting of 14 different projects. Categorized in either IT-infrastructure or security processes improvements, these projects cover security areas such as platform hardening and patching, malware, scanning & IOCs, security incident management, authentication and lifecycle management, and security architecture. Additionally, the program scope includes revising security policies, evaluating and improving security baselines, supporting and improving the offshore SOC services. Blue-chip technology company Transforming enterprise-wide cyber security capabilities end-to-end Deloitte is quoted by the CIO as being the client s strategic, tactical and operational partner for its company wide security transformation. Deloitte supports this client with a 50+mln information security transformation, consisting of over 30 projects. This is an end-to-end transformation led out of the Amsterdam office, where our teams are leading and supporting the Program Management Office and supporting both non-technical and technical work streams: from strengthening the security function and empowering risk management, to deploying up-to-date security monitoring and hardening its infrastructure and applications. International terminal operating company Defining the roadmap for a highly decentralized organization Deloitte developed a tailored roadmap to improve the client s information security maturity, with a focus on it s detect and response capabilities. The roadmap required Deloitte to think strategically on how to transform the client s security posture, taking into account the highly decentralized nature of the organization and the specific nature of the business, which was heavily reliant on legacy IT and Industrial Control Systems.

Our Services Cyber Security Management Security Strategy and Transformations Security Governance & Organization Security Risk Management Identity & Access Management Security Incident & Crisis Management Business Continuity Management Security Operations Security Operations Advisory In-house Deployments Managed Security Operations Captive Security Operations Security Engineering Operational Staff Augmentation Managed Cryptography Privacy Privacy Strategy and strategy on the use of personal data Privacy Optimization and Privacy Compliance Programs Privacy Gap Assessment/Privacy Quick Scan Privacy Audit Privacy Advice Desk Regulatory check and drafting of legal documents Privacy and Security by Design/ Privacy Enhancing Technologies (PET S) Privacy Impact Assessments (on complex systems) Hacking and Incident Response Security Testing Hacking as a Service SCADA Security Testing SAP Hacking Incident Response Covert Operations Mobile Hacking Secure by Design Delivering speakers and spokespersons to major security events

Deloitte Center for Cyber Innovation Most enterprise boardrooms are buzzing with the question, How do we deal with new cyber threats? At Deloitte we are constantly focusing on answers to this question. If we want to stay one step ahead of our adversaries we must make every effort to develop our expertise even further. The challenge therefore is to provide trust in a digital world in the years to come. Deloitte Cyber Risk Services accepts this challenge and that s why we created the Deloitte Center for Cyber Innovation. Cyber Risk Services is an extraordinary team. Exceptionally diverse and with a real passion for content. We are client focused, which has allowed us to grow rapidly. We have developed a variety of meaningful initiatives, such as our demos, cyber academy, research & development, innovation, charity activities and blogging. Within the Center for Cyber Innovation, corporate social responsibility, innovation and talent development gain a central spot in our organization. Moreover, Deloitte Cyber Risk Services positions itself as innovative and pioneering department within Deloitte and outside. The Center will work as facilitator for (young) professionals and students to come up with new ideas and solutions regarding cyber security. In that manner, Deloitte creates an innovative environment where people want to work and develop themselves and clients feel comfortable to work with. Furthermore, the Center for Cyber Innovation supports fast growing, innovative organizations by connecting new start-ups with clients from Deloitte. The Center for Cyber Innovation is about pioneering, moving forward and lay out a blueprint for a cyber -ecosystem that s built to last - an ecosystem built on the values of collaboration, innovation and acceleration. Teaching children about cyber security in HackLab for Kids