The Value Proposition for Cyber Security: Does it exist and how can we create it? Larry Clinton, ISAlliance Chief Operating Officer



Similar documents
I S O I E C I N F O R M A T I O N S E C U R I T Y A U D I T T O O L

Why you should adopt the NIST Cybersecurity Framework

INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION

How to build a great compliance program for your U.S. imports

Question: 1 Which of the following should be the FIRST step in developing an information security plan?

An Overview of Information Security Frameworks. Presented to TIF September 25, 2013

CISM (Certified Information Security Manager) Document version:

ESKISP Manage security testing

Bridging the HIPAA/HITECH Compliance Gap

Mitigating and managing cyber risk: ten issues to consider

Cyber-Insurance Metrics and Impact on Cyber-Security

DATA BREACH, NETWORK SECURITY, CYBER LIABILITY, PRIVACY PROTECTION: ARE YOU INSURED?

Healthcare in the Crosshairs for Data Breaches. April 22, Deborah Hiser (512)

Italy. EY s Global Information Security Survey 2013

Contingency Planning and Disaster Recovery for BOMA

Key Considerations for Information Technology Governance. 900 Monroe NW Grand Rapids, MI (616)

Data Privacy, Security, and Risk Management in the Cloud

Healthcare and IT Working Together KY HFMA Spring Institute

State Agency Cyber Security Survey v October State Agency Cybersecurity Survey v 3.4

Cyber Warfare. Global Economic Crime Survey. Causes of Cyber Attacks. David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP. Why Cybercrime?

The top 5 mistakes companies make in managing supply chain risk effectively

Information Security Management System Policy

DATA BREACH BREAK DOWN LESSONS LEARNED FROM TARGET

Information Security Management System Information Security Policy

Continuity of Operations Planning. A step by step guide for business

INFRAGARD.ORG. Portland FBI. Unclassified 1

Business Continuity & Disaster Recovery

Sempra Energy Utilities response Department of Commerce Inquiry on Cyber Security Incentives APR

SHARED ASSESSMENTS PROGRAM STANDARD INFORMATION GATHERING (SIG) QUESTIONNAIRE 2014 MAPPING TO OCC GUIDANCE ( ) ON THIRD PARTY RELATIONSHIPS

INTERNATIONAL AUDITING PRACTICE STATEMENT 1013 ELECTRONIC COMMERCE EFFECT ON THE AUDIT OF FINANCIAL STATEMENTS

Managing Cyber Threats Risk Management & Insurance Solutions. Presented by: Douglas R. Jones, CPCU, ARM Senior Vice President & Principal

How-To Guide: Cyber Security. Content Provided by

Business Continuity for Cyber Threat

Helping Corporations Defend Enterprise Attacks through Security Awareness & Desktop Security

Howelliott (Aero)

Rogers Insurance Client Presentation

One Hundred Twelfth Congress of the United States of America

Cyber Security Recommendations October 29, 2002

BSA-ISSA Information Security Study Online Survey of ISSA Members

Big Data, Big Risk, Big Rewards. Hussein Syed

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

Demystifying Cyber Insurance. Jamie Monck-Mason & Andrew Hill. Introduction. What is cyber? Nomenclature

Insurance Considerations Related to Data Security and Breach in Outsourcing Agreements

IT Vendor Due Diligence. Jennifer McGill CIA, CISA, CGEIT IT Audit Director Carolinas HealthCare System December 9, 2014

January IIA / ISACA Joint Meeting Pre-meeting. Cybersecurity Update for Internal Auditors. Matt Wilson, PwC Risk Assurance Director

NIST Cybersecurity Framework What It Means for Energy Companies

How to ensure control and security when moving to SaaS/cloud applications

Privacy and Data Breach Protection Modular application form

ISO? ISO? ISO? LTD ISO?

DEVELOPING A CYBERSECURITY POLICY ARCHITECTURE

Cybersecurity in the States 2012: Priorities, Issues and Trends

THE NEW REALITY OF RISK CYBER RISK: TRENDS AND SOLUTIONS

The Authorized Economic Operator and the Small and Medium Enterprise FAQ

Cyber Risk: Global Warning? by Cinzia Altomare, Gen Re

Hit ratios are still very low for Security & Privacy coverage: What are companies waiting for?

The Encana Service Provider Safety Manual

The potential legal consequences of a personal data breach

How To Implement Data Loss Prevention

VENDOR RISK MANAGEMENT UPDATE- ARE YOU AT RISK? Larry L. Llirán, CISA, CISM December 10, 2015 ISACA Puerto Rico Symposium

Corporate Basel, Panalpina Security. "Adding value, while ensuring our customers' products are safe and secure"

A NEW APPROACH TO CYBER SECURITY

Cyber Risks in the Boardroom

SRI LANKA AUDITING PRACTICE STATEMENT 1013 ELECTRONIC COMMERCE EFFECT ON THE AUDIT OF FINANCIAL STATEMENTS

Feature. Developing an Information Security and Risk Management Strategy

Middle Class Economics: Cybersecurity Updated August 7, 2015

DEFENSE SUPPLY CHAIN SECURITY & RISK MANAGEMENT: PRINCIPLES & PRACTICE

Technology Services Strategic Plan

Cybersecurity and Corporate America: Finding Opportunities in the New Executive Order

Managing Information Resources and IT Security

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft

Cyber security: Are Australian CEOs sleepwalking or a step ahead? kpmg.com.au

Public Private Partnerships and National Input to International Cyber Security

CyberSecurity Solutions. Delivering

Information Systems and Tech (IST)

Transcription:

The Value Proposition for Cyber Security: Does it exist and how can we create it? Larry Clinton, ISAlliance Chief Operating Officer

Who We Are

What we believe n The World has Changed n Globalization n Digitalization n Terrorism n Traditional Regulatory Mechanisms won t work n Too slow n US only n Retard needed economic growth

Economic Effects of Attacks n 25% of our wealth---$3 trillion---is transmitted over the Internet daily n FBI: Cyber crime cost business $26 billion (probably LOW estimate) n Financial Institutions are generally considered the safest---their losses were up 450% in the last year n There are more electronic financial transactions than paper checks now, 1% of cyber crooks are caught.

Digital Growth? Sure n Companies have built into their business models the efficiencies of digital technologies such as real time tracking of supply lines, inventory management and on-line commerce. The continued expansion of the digital lifestyle is already built into almost every company s assumptions for growth. ---Stanford University Study, July 2006

Digital Defense? Maybe not n The technology community has made much progress in the past 5 years improving technical security. Yet, moving the needle on information security is a team activity, The hardest remaining issues involve people and organizations. Embedding Information Security into the Extended Enterprise. Dartmouth University 2006

Everyone on the Team? Maybe Not n 29% of Senior Executives acknowledged that they did not know how many negative security events they had in the past year n 50% of Senior Executives said they did not know how much money was lost due to attacks Source: PricewaterhouseCoopers survey of 7,000 companies 9/06

Digital Defense NOT n 23% of CTOs did not know if cyber losses were covered by insurance or not. n 34% of CTOs thought their cyber losses would be covered by insurance----and were wrong. n The biggest network vulnerability in American corporations are extra connections added for senior executives without proper security. ---Source: DHS Chief Economist Scott Borg

What needs to be Done? Realize the Value Proposition n Role for industry: n Determine how to solve the problem n Role for Government n Encourage industry to adopt proven solutions

Can we mitigate cyber Attacks? YES n PricewaterhouseCoopers conducted 2 International surveys (2004 & 2006) covering 15,000 corporations of all types n Apx 25% of the companies surveyed were found to have followed recognized best practices for cyber security.

Benefits of Best Practices n Reduces the number of successful attacks n Reduces the amount of down-time suffered from attacks n Reduces the amount of money lost from attacks n Reduces the motivation to comply with extortion threats

Senior Mgrs Best Practices n Cited in US National Draft Strategy to Protect Cyber Space (September 2002) n Endorsed by TechNet for CEO Security Initiative (April 2003) n Endorsed US India Business Council (April 2003)

ISALLIANCE BEST PRACTICES n Practice #1: n Practice #2: n Practice #3: n Practice #4: n Practice #5: n Practice #6: n Practice #7: n Practice #8: n Practice #9: General Management Policy Risk Management Security Architecture & Design User Issues System & Network Management Authentication & Authorization Monitor & Audit Physical Security n Practice #10: Continuity Planning & Disaster Recovery

Why Doesn t Everyone Comply with the Best Practices? n Many organizations have found it difficult to provide a business case to justify security investments and are reluctant to invest beyond the minimum. One of the main reasons for this reluctance is that companies have been largely focused on direct expenses related to security and not the collateral benefits that can be realized ---Stanford University 06

Management is WRONG n Stanford Global Supply Chain Management Forum/IBM Study: Clearly demonstrated that investments in security can provide business value such as: * Improved Product Safety (38%) Improved Inventory management (14%) Increase in timeliness of shipping info (30%)

There s More!!! n Increase in supply chain information access (50%) n Improved product handling (43%) n Reduction in cargo delays (48% reduction in inspections) n Reduction in transit time (29%) n Reduction in problem identification time (30%) n Higher customer satisfaction (26%)

Security, like Digital Technology must be Integrated in Bus Plan n Security is still viewed as a cost, not as something that could add strategic value and translate into revenue and savings. But if one digs into the results there is evidence that aligning security with enterprise business strategy reduces the number of successful attacks and financial loses as well as creates value as part of the business plan. PricewaterhoseCoopers Sept 2006

Key Issues for Industry n Globalization and outsourcing have increased the challenges of security n Security metrics must be more tightly linked to the business. n Investment in security must move from reactive add ons to proactive initiatives consistent with company s strategic goals n Directives must come from the top Dartmouth University 2006

ISA Insurance Incentives n AIG developed an on-line metric tool based on ISAlliance Best Practices for Senior Managers Separate tool developed for small businesses based on small business best practices Qualified companies can receiv3e up to 15% discount on cyber insurance

ISA Security Integration Program-Get the team involved n Issues must be addressed simultaneously from the: n Legal n Business n Technology n Policy Perspectives TECH/R&D LEGAL/REG PROBLEM / ISSUE POLICY BUS/OPERATIONAL

ISAlliance Integrated Business Security Program n Outsourcing n Risk Management n Security Breech Notification n Privacy n Insider Threats n Auditing n Contractual Relationships (suppliers, partners, sub-contractors, customers)

Things Government Can Do n Stimulate the insurance market Temporary insurer of last resort (e.g. w/crop and flood insurance) Use government s market power (e.g. require contractors to have insurance) Civil Liability reform (Precedent: Anti- Terrorism Act of 2002) Allow info sharing to create better metrics (e.g. Y2K)

More for Government to do n Create Gov/Industry/Education Consortium (e.g. Sema-Tech) n Create Awards Programs (e.g. Baldridge Awards for Quality) n Develop Significant outreach programs targeted at senior corporate execs.

Larry Clinton Chief Operations Officer Internet Security Alliance lclinton@isalliance.org 703-907-7028 (O) 202-236-0001 (C)