cyberr by e-management The Leader in Cybersecurity Risk Intelligence (RI) Cybersecurity Risk: What You Don t Know CAN Hurt You!



Similar documents
Examining the Evolving Cyber Insurance Marketplace

How To Write A Cybersecurity Framework

Cybersecurity Framework. Executive Order Improving Critical Infrastructure Cybersecurity

Cybersecurity Framework: Current Status and Next Steps

Executive Order 13636: The Healthcare Sector and the Cybersecurity Framework. September 23, 2014

Building Blocks of a Cyber Resilience Program. Monika Josi monika.josi@safis.ch

The President issued an Executive Order Improving Critical Infrastructure Cybersecurity, on February 2013.

WILLIS SPECIAL REPORT: 10K DISCLOSURES HOW RETAIL COMPANIES DESCRIBE THEIR CYBER LIABILITY EXPOSURES

Critical Infrastructure Cybersecurity Framework. Overview and Status. Executive Order Improving Critical Infrastructure Cybersecurity

Cyberprivacy and Cybersecurity for Health Data

Why you should adopt the NIST Cybersecurity Framework

Experience the commitment WHITE PAPER. Information Security Continuous Monitoring. Charting the Right Course. cgi.com 2014 CGI GROUP INC.

How To Understand And Manage Cybersecurity Risk

Impact of Data Breaches

Framework for Improving Critical Infrastructure Cybersecurity

PREPARED TESTIMONY OF THE NATIONAL CYBER SECURITY ALLIANCE MICHAEL KAISER, EXECUTIVE DIRECTOR ON THE STATE OF CYBERSECURITY AND SMALL BUSINESS

NIST Cybersecurity Framework. ARC World Industry Forum 2014

Cybersecurity: Learn Critical Strategies to Protecting Your Enterprise November 6, :00PM EST

Cyber security Building confidence in your digital future

Cyber Security Management

White Paper on Financial Industry Regulatory Climate

20+ At risk and unready in an interconnected world

NIST Cybersecurity Framework Sean Sweeney, Information Security Officer 5/20/2015

Applying Framework to Mobile & BYOD

A MULTIFACETED CYBERSECURITY APPROACH TO SAFEGUARD YOUR OPERATIONS

Ten Questions Your Board Should be asking about Cyber Security. Eric M. Wright, Shareholder

Cybersecurity Report on Small Business: Study Shows Gap between Needs and Actions

Remarks for Admiral David Simpson WTA Advocates for Rural Broadband Spring Meeting Cybersecurity Panel

Cybersecurity and the Threat to Your Company

MEDICAL DEVICE Cybersecurity.

Navigating the NIST Cybersecurity Framework

Framework for Improving Critical Infrastructure Cybersecurity

FFIEC Cybersecurity Assessment Tool Overview for Chief Executive Officers and Boards of Directors

State Agency Cyber Security Survey v October State Agency Cybersecurity Survey v 3.4

SEC update: Cybersecurity initiatives. SEC update: Cybersecurity initiatives. Intelligize // 02

Business Continuity & Disaster Recovery

RE: Experience with the Framework for Improving Critical Infrastructure Cybersecurity

Why is this National Cyber Security Month? Stephen G. Austin, CPA, MBA Swenson Advisors, LLP

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility

End of Support Should Not End Your Business. Challenge of Legacy Systems

How To Protect Your Data From Being Hacked

Healthcare Cybersecurity Perspectives from the Michigan Healthcare Cybersecurity Council

Roger s Cyber Security and Compliance Mini-Guide

Voluntary Cybersecurity Initiatives in Critical Infrastructure. Nadya Bartol, CISSP, SGEIT, 2014 Utilities Telecom Council

Managing business risk

Delaware Cyber Security Workshop September 29, William R. Denny, Esquire Potter Anderson & Corroon LLP

Capabilities for Cybersecurity Resilience

THE CYBER SECURITY PLAYBOOK WHAT EVERY BOARD OF DIRECTORS SHOULD KNOW BEFORE, DURING, AND AFTER AN ATTACK SECURITY REIMAGINED

National Institute of Standards and Technology Smart Grid Cybersecurity

April 28, Ms. Hada Flowers Regulatory Secretariat Division General Services Administration 1800 F Street, NW, 2 nd Floor Washington, DC

Seminar on Unfair Competition Enforcement in the United States and Supply Chain Cybersecurity Issues. Palace Hotel Saigon, HCMC, November 19 th 2014

Click to edit Master title style

Assessing the strength of your security operating model

Integrating Cybersecurity with Emergency Operations Plans (EOPs) for K-12 Education

CLIENT UPDATE CRITICAL INFRASTRUCTURE CYBERSECURITY: U.S. GOVERNMENT RESPONSE AND IMPLICATIONS

How To Protect Your Business From A Cyber Attack

Cybersecurity Audit Why are we still Vulnerable? November 30, 2015

CYBER SOLUTIONS HANDBOOK

Diane Honeycutt National Institute of Standards and Technology (NIST) 100 Bureau Drive, Stop 8930 Gaithersburg, MD 20899

CYBER SECURITY. ADVISORY SERVICES Governance Risk & Compliance. Shemrick Rodney IT Specialist Consultant Antigua & St. Kitts

Cybersecurity..Is your PE Firm Ready? October 30, 2014

Small Business Cybersecurity Dos and Don ts. Helping Businesses Grow and Succeed For Over 30 Years. September 25, 2015 Dover Downs

THE WHITE HOUSE Office of the Press Secretary

National Security & Homeland Security Councils Review of National Cyber Security Policy. Submission of the Business Software Alliance March 19, 2009

HP Fortify Software Security Center

Protecting Your Assets: How To Safeguard Your Fund Against Cyber Security Attacks

Cyber security Building confidence in your digital future

Cybersecurity. Are you prepared?

NIST CYBERSECURITY FRAMEWORK COMPLIANCE WITH OBSERVEIT

NIST Cybersecurity Framework & A Tale of Two Criticalities

Framework for Improving Critical Infrastructure Cybersecurity

MONTHLY WEBSITE MAINTENANCE PACKAGES

WHITE PAPER KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST PROTECTING THE PROTECTOR

Commonwealth IT Threat Management: Keeping Out the Cyber Villains Category: Cyber Security Initiatives. Initiation date: January 2012

IAPP Global Privacy Summit Protecting Privacy Under the Cybersecurity Microscope

Applying IBM Security solutions to the NIST Cybersecurity Framework

Internet threats: steps to security for your small business

CYBERSECURITY: Is Your Business Ready?

Security & SMEs. An Introduction by Jan Gessin. Introduction to the problem

Cyber-Security Risk- IP Theft and Data Breaches Protecting your Crown Jewels Internally and with Your Key Third Parties

CYBERSECURITY & EXPECTATIONS FOR INDEPENDENT GROCERS

Business Continuity for Cyber Threat

CONSULTING IMAGE PLACEHOLDER

Department of Homeland Security

Testimony of Dan Nutkis CEO of HITRUST Alliance. Before the Oversight and Government Reform Committee, Subcommittee on Information Technology

Sempra Energy Utilities response Department of Commerce Inquiry on Cyber Security Incentives APR

CYBER SECURITY Cyber Security for Canadian Directors in the Wake of Ashley Madison

DHS, National Cyber Security Division Overview

Cybersecurity Framework Security Policy Mapping Table

Effective Information Sharing and Analysis Process

ENERGY SECTOR CYBERSECURITY FRAMEWORK IMPLEMENTATION GUIDANCE

Cyber Security and your Financial Institution: Are you ready for the increased scrutiny related to cyber risks?

Cyber ROI. A practical approach to quantifying the financial benefits of cybersecurity

Integrating Cybersecurity with Emergency Operations Plans (EOPs) for Institutions of Higher Education (IHEs)

Westlaw Journal. What is the Cybersecurity Framework? Risk Management Process And Pathway to Corporate Liability? Expert Analysis

Cyber Security: Confronting the Threat

Survey: Small Business Security

The promise and pitfalls of cyber insurance January 2016

NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY

Transcription:

cyberr by e-management The Leader in Cybersecurity Risk Intelligence (RI) Cybersecurity Risk: What You Don t Know CAN Hurt You!

Cybersecurity is all over the news. Target, University of Maryland, Neiman Marcus, J.C. Penney, Indiana University, Sally Beauty Supply, and many smaller companies are being targeted by hackers, disgruntled employees, and competitors every day. According to a recent study of small businesses by Symantec, 77% of small and medium-sized companies think their companies are safe from hackers, viruses, malware or a cybersecurity breach. But the data shows differently. In 2013, 1 in 5 small business organizations was the recipient of at least one targeted attack. It s happening every day and we re losing money, data and ideas. Research by Symantec also found that in 2013, 61% of all targeted attacks focused on businesses with fewer than 2,500 employees (an 11% increase from 2012). In addition, the Symantec report warns of an expansion of traditional threats...in particular, social media and mobile devices have come under increasing attack...online criminals are following users onto these new platforms. 60% of small firms go out of business within six months of a data breach. National Cyber Security Alliance 1

KSGs of Cybersecurity Risk Management for Small-to-Medium Sized Businesses Cybersecurity for small and medium-size companies is a business problem that can affect the ability to keep business, stay in business, or get new business. These are the KSGs of cybersecurity risk management. K S G The ability to KEEP business: Once a company s infrastructure has been breached, sales plummet, customers leave, students apply elsewhere, and many of them don t come back. This can cause irreparable damage, including the loss of reputation. Even when a company does everything it can after the fact, such as strengthen its cybersecurity risk management solutions and provide free credit monitoring, the damage has been done. The ability to STAY in business: Anyone whose data has been compromised employees, customers, or suppliers may have legal grounds to sue. They expect the companies they do business with to be careful with their information and keep it safe. Companies that fail to protect this information from being compromised may be liable. The cost of a single lawsuit can put a small business out of business. The frightening fact is that 60 percent of small firms go out of business within 60 months of a data breach, according to the National Cyber Security Alliance. The ability to GET business: If sensitive company data or company intellectual property (such as financials, trademarks, copyrights, or new product / service plans) are hacked, the potential inability to attract new customers creates a huge competitive disadvantage. There is a problem if a company is perceived to be vulnerable to cybersecurity attacks, or is unable to demonstrate that it is investing in protecting its assets or its customers. The firm may be perceived as more risky in the supply chain or a business partner and could have difficulty securing new business. Recently AT&T Chairman & CEO, Randall Stephenson, was quoted that any large company that isn t imposing cybersecurity standards on service providers has a vulnerability that they re missing. 2

Making Cybersecurity Risk Management an Industry Priority Responding to a need for better preparedness and coordination of critical infrastructure protection initiatives across the entire business spectrum, leading information technology companies, professional service firms, and information technology trade associations formed the Information Technology Sector Coordinating Council (IT SCC) in 2006. The IT SCC is currently working in partnership with the U.S. Department of Homeland Security (DHS) to address strategies for mitigating cybersecurity threats and risks to our nation s critical infrastructure, especially for businesses and organizations that are particularly vulnerable. Needless to say, the IT SCC is a crucial resource for addressing solutions for security issues and engages with the public and private sectors in all areas of Critical Infrastructure (CI) protection. Framework for Cybersecurity Risk Management Recognizing that the national and economic security of the United States depends on the reliable functioning of critical infrastructure, the President issued Executive Order 13636, Improving Critical Infrastructure Cybersecurity, in February 2013. It directed NIST to work with stakeholders to develop a voluntary framework based on existing standards, guidelines, and practices - for reducing cyber risks to critical infrastructure. Keeping the focus on risk management is very important to us. We re looking at how you foster risk management across ecosystems, how you get people to be more aware of risk management and to share the practices. We want to consider security, privacy and resiliency all together...in a global context the approaches should be usable around the world. Microsoft s Angela McKay, 2014 Chair of the IT SCC 3

NIST released the first version of the Framework for Improving Critical Infrastructure Cybersecurity on February 12, 2014. The Framework, created through collaboration between industry and government, consists of standards, guidelines, and practices to promote the protection of critical infrastructure. The prioritized, flexible, repeatable, and cost-effective approach of the Framework helps owners and operators of critical infrastructure to manage cybersecurity-related risk. Cybersecurity Framework: 5 Core Elements of Any Organization s Risk-based approach to Managing Cybersecurity Risk Recover: Develop and implement the appropriate activities, prioritized through the organization s risk management process, to restore the appropriate capabilities that were impaired through a cybersecurity Identify: Develop the institutional understanding of which organizational systems, assets, data, and capabilities need to be protected; determine priority in light of organizational mission; and establish processes to achieve risk management goals. Protect: Develop and implement the appropriate safeguards, prioritized through the organization s risk management process, to ensure delivery of critical infrastructure services. Respond: Develop and implement the appropriate activities, prioritized through the organization s risk management process (including effective planning), to take action regarding a detected cybersecurity event. Detect: Develop and implement the appropriate activities to identify the occurrence of a cybersecurity event. 4

It is important to note that the Cybersecurity Framework is not a risk management process itself. It enables the integration of cybersecurity risk management into an organization s overall risk management process by fostering: Approaches that address both traditional IT and industrial control systems; and Cybersecurity standards that can be used to support risk management activities. Key to implementation of the Cybersecurity Framework is DHS s Critical Infrastructure Cyber Community C³ Voluntary Program. The C3 (or C cubed ) Program aligns critical infrastructure owners and operators with existing resources that will assist their efforts to adopt the Cybersecurity Framework and manage their cyber risks. How e-management Fits Into the Cybersecurity Framework The perspective of small and medium-sized businesses like e-management is essential to the IT sector and the government in helping to shape implementation of the Cybersecurity Framework, so that it is easier and more affordable for smaller firms to adopt. For 15 years, e-management has been working in the cybersecurity, risk mitigation and technology industries, delivering mission-critical information protection, technology development, and risk management solutions for clients that own, operate, or support critical infrastructure. e-management has recognized the market need for a cybersecurity risk management tool geared to the elements of the NIST Cybersecurity Framework. CyberRx, e-management s new and innovative solution, helps small and medium-sized organizations understand their cybersecurity risks and the financial impact of a cybersecurity breach so they can be better equipped to make critical IT security decisions, prioritize investments, and maximize the impact of their investments in cybersecurity. By automating the NIST Cybersecurity Framework to create a cyber early warning system, CyberRx is designed to be the prescription for cybersecurity assurance for businesses. Early Adopters of the NIST Cybersecurity Framework American Chemical Council; National Association of Manufacturers; PwC US; AIG; and Dow Chemical. These organizations have emerged as champions to help NIST and DHS tell the story of what the Framework is and what it can do. cyberr by e-management The Leader in Cybersecurity Risk Intelligence (RI) 5