Risk & Responsibility in a Hyper-Connected World: Implications for Enterprises



Similar documents
Risk and responsibility in a hyperconnected world: Implications for enterprises

Partnership for Cyber Resilience

FFIEC Cybersecurity Assessment Tool

Cybersecurity The role of Internal Audit

Cybersecurity: Mission integration to protect your assets

FFIEC Cybersecurity Assessment Tool Overview for Chief Executive Officers and Boards of Directors

The Path Ahead for Security Leaders

Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model

Accenture Risk Management. Industry Report. Life Sciences

CYBER SECURITY INFORMATION SHARING & COLLABORATION

Address C-level Cybersecurity issues to enable and secure Digital transformation

The Changing IT Risk Landscape Understanding and managing existing and emerging risks

Preemptive security solutions for healthcare

Experience the commitment WHITE PAPER. Information Security Continuous Monitoring. Charting the Right Course. cgi.com 2014 CGI GROUP INC.

ICBA Summary of FFIEC Cybersecurity Assessment Tool

Security for Financial Services: Addressing the Perception Gaps in a Dynamic Landscape

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

NATIONAL CYBER SECURITY AWARENESS MONTH

A strategic approach to fraud

Overcoming Five Critical Cybersecurity Gaps

MEMORANDUM. Date: October 28, Federally Regulated Financial Institutions. Subject: Cyber Security Self-Assessment Guidance

Into the cybersecurity breach

The Benefits of an Integrated Approach to Security in the Cloud

Cyber Security: Confronting the Threat

Continuous Network Monitoring

CYBER SECURITY, A GROWING CIO PRIORITY

Protecting against cyber threats and security breaches

The Comprehensive National Cybersecurity Initiative

Cyber security Building confidence in your digital future

Technology. Building Your Cloud Strategy with Accenture

Dodging Breaches from Dodgy Vendors: Tackling Vendor Risk Management in Healthcare

Services. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure

Understanding the impact of the connected revolution. Vodafone Power to you

A To Do List to Improve Supply Chain Risk Management Capabilities

Don t Get Left in the Dust: How to Evolve from CISO to CIRO

Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs

Metrics that Matter Security Risk Analytics

CYBERSECURITY IN HEALTHCARE: A TIME TO ACT

Cyber Risk to Help Shape Industry Trends in 2014

Technology. Building Your Cloud Strategy with Accenture

Keynote Speech. Beth Dugan Deputy Comptroller for Operational Risk. The Clearing House s First Operational Risk Colloquium

Middle Class Economics: Cybersecurity Updated August 7, 2015

A NEW APPROACH TO CYBER SECURITY

REPORT. Next steps in cyber security

ENTERPRISE RISK MANAGEMENT FRAMEWORK

Cybersecurity in the Digital Economy Challenges and Threats to the Financial Services Sector

Riverbed Performance Management

Next-Generation Supply Management

Cyber threat intelligence and the lessons from law enforcement. kpmg.com/cybersecurity

Formulate A Database Security Strategy To Ensure Investments Will Actually Prevent Data Breaches And Satisfy Regulatory Requirements

Whitepaper: 7 Steps to Developing a Cloud Security Plan

Impact of Cybersecurity Innovations in Key Sectors (Technical Insights)

Cyber ROI. A practical approach to quantifying the financial benefits of cybersecurity

Information Technology in the Automotive Aftermarket

The State of Insurance Fraud Technology. A study of insurer use, strategies and plans for anti-fraud technology

The Cyber Threat Profiler

Your asset is your business. The more challenging the economy, the more valuable the asset becomes. Decisions are magnified. Risk is amplified.

Cybersecurity Delivering Confidence in the Cyber Domain

Today s Cybersecurity Technology: Is Your Business Getting Full Protection?

2011 Forrester Research, Inc. Reproduction Prohibited

How Boards of Directors Really Feel About Cyber Security Reports. Based on an Osterman Research survey

IT AUDIT WHO WE ARE. Current Trends and Top Risks of /9/2015. Eric Vyverberg. Randy Armknecht. David Kupinski

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst

Navigating the next generation of cloud ERP Insurance

Rethinking Information Security for Advanced Threats. CEB Information Risk Leadership Council

Fraud Solution for Financial Services

CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES

Cyber security: everybody s imperative. A guide for the C-suite and boards on guarding against cyber risks

Managing business risk

Applying machine learning techniques to achieve resilient, accurate, high-speed malware detection

S 2 ERC Project: A Review of Return on Investment for Cybersecurity. Author: Joe Stuntz, MBA EP 14, McDonough School of Business.

Accenture Technology Consulting. Clearing the Path for Business Growth

RE: Experience with the Framework for Improving Critical Infrastructure Cybersecurity

IBM Business Analytics software for Insurance

MANAGEMENT SUMMARY INTRODUCTION KEY MESSAGES. Written by: Michael Azoff. Published June 2015, Ovum

CORE Security and GLBA

Sytorus Information Security Assessment Overview

Key Trends, Issues and Best Practices in Compliance 2014

Managing cyber risks with insurance

Symantec Global Intelligence Network 2.0 Architecture: Staying Ahead of the Evolving Threat Landscape

Cybersecurity and internal audit. August 15, 2014

KUDELSKI SECURITY DEFENSE.

Access is power. Access management may be an untapped element in a hospital s cybersecurity plan. January kpmg.com

RSA ARCHER OPERATIONAL RISK MANAGEMENT

Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team

Big Data Industry Approaches to Operational Excellence

Vulnerability Management

Transcription:

Risk & Responsibility in a HyperConnected World: Implications for Enterprises SESSION ID: PNGF2 James Kaplan Chris Rezek

Overview Despite years of effort, and tens of billions of dollars spent annually, the global economy is still not sufficiently protected against cyberattacks and it is getting worse; the risk of cyberattacks could materially slow the pace of technology and business innovation with as much as US$3 trillion in aggregate impact. Enterprisetechnology executives agree on the seven practices they must put in place to improve their resilience in the face of cyberattacks; even so, most technology executives gave their institutions low scores in making the required changes Given the crossfunctional, high stakes nature of cybersecurity, it is a CEOlevel issue, and progress toward cyberresiliency can only be achieved with active engagement from the seniormost members of the management team

Large majority of technology executives believe that attackers will continue to increase their lead over defenders Most frequent response Interview question: How do you believe the relative level of sophistication will evolve for your institution compared to potential attackers over the course of the next 5 years? % of respondents Aggregate responses 1 Defenders will become more sophisticated than attacker 2 Defenders and attackers will maintain parity 3 Attacks will increase sophistication or pace of attack quicker than defenders 4 Sophistication or pace of attackers will increase dramatically over defenders 5 Responses by sector Banking 18 69 23 Insurance 22 1 58 13 Hightech 8 29 6 17 Healthcare 11 7 2 56 11 SOURCE: Industry leader interviews; Team analysis

Large majority of firms surveyed had nascent or developing cyberrisk management capabilities Distribution of overall cyberrisk management maturity scores [14] Percent of firms 45 34 16 5 <2 2. 2.5 Nascent Best effort based evaluation and mitigation of cyberrisks No defined single point of accountability nor a clearly defined escalation path to top management 2.5 3. > 3. Developing Mostly qualitative framework for evaluating and mitigating cyberrisks Overall consistent governance model and known single point of accountability in each BU with a defined reporting line to top management Mature Quantitative approach for evaluating and qualitative approach for mitigating cyberrisks Defined cybersecurity governance model with a single point of accountability within a BU that owns the risks and decisionmaking SOURCE: McKinsey Cyberrisk Maturity Survey (CRMS)

What this means in large institutions <15% provide the CISOs with veto power over IT projects that violate security policies conduct cybersecurity simulations or war games more than once each year evaluate and prioritize risks related to cyberattacks more than once each year <2% include the cybersecurity organization s impact on business agility in annual performance evaluations include the cybersecurity organization s impact of broader technology costs in annual performance evaluations ensure the Board has reviewed and approved the enterprise cyber security strategy <35% provide the time for the CISOs to meet regularly with the CEO communicate a list of business assets that are most critical to protect to the Board analyze all major attempted or successful attacks <55% conduct systematic penetration testing define minimum standards for data protection for sensitive information update intelligence about attackers more frequently than once a year SOURCE: McKinsey Cyberrisk Maturity Survey (CRMS)

High expenditures do not necessarily yield sophisticated capabilities; many firms are throwing money at the problem Cybersecurity maturity 3.5 3. Most capability Median = 3% Punching above their weight Well protected or highly concerned? Median = 2.4 2.5 2. 1.5 1. Least capability The unprotected 1.5 2. 2.5 Throwing resources at the problem 3. 3.5 4. 4.5 5. 5.5 6. 6.5 7. 7.5 IT security spend as a proportion of total IT spend (%) SOURCE: McKinsey Cyberrisk Maturity Survey (CRMS)

Concerns about cyberattacks have slow deployment of cloud and mobile capabilities Most frequent responses Interview question: What is the likelihood that concerns about cyberattacks will slow the adoption of the following business and technology innovations for your institution? Delay in months Big data analytics Crosssector technologies Responses by sector Aggregate responses Banking 2. Enterprise mobility 6.3 Private cloud computing 4.5 Public cloud computing 17.5 Collaboration with external partners 4.5 Faster and tighter connection with clients and counterparties 4.2 Location of business and tech ops. in low cost countries 2.6 4.5 6.9 6.9 Online commerce 4. Online customer care 3.4.6 Rapid entry into new geographic markets 3.3 Note Data is shown for technologies chosen by more than three respondents Top 6 technologies are also classified under Hightech SOURCE: Industry leader interviews; Team analysis 1.3 6.7 2.4 16. 14.4 18.7 3.5 1.3 4. 7.2 5.1 Insurance 4.8 9. 4. 3.1 Hightech 3. 1.1 6.3 Mobile payments Healthcare 6. 5. 9.6

Alternative future scenarios for 22 highlight risk of a regulatory, consumer and institutional backlash against digitization Dramatic increase in quality of response 3 Gradual increase in intensity of threat Cyberresilience accelerates digitization Proactive state action limits dissemination of sophisticated attack vectors (i.e., arms control) Dramatic uplift in institutional capabilities (e.g. differentiated protection for most important assets, proactive analytics) Governments facilitate capability uplift (e.g. information sharing) Institutions accelerate pace of innovation given comfort level for cyber Institutions implement innovations with relatively few concerns over cyber 1 Dramatic increase in intensity of threat 2 Muddling into the future The level of threat increases incrementally Institutions respond by devoting more resources and implementing more stringent controls Inconvenience increases and selected innovations (e.g. cloud, enterprise mobility) adopted more slowly Institutions continue to react as they have in the past, cybersecurity remains a concern but is not a priority in business decisions Backlash decelerates digitization Sophisticated attack vectors disseminated to a wider range of actors, some with truly destructive intent rather than parasitic intent Relatively few of very visibly destructive attacks In response, governments dramatically increase directive or prescriptive regulations and institutions start to slow down wide range of innovations Balkanization of the Internet into regional or national networks Gradual increase in quality of response SOURCE: Industry leader interviews; Team analysis

Potential impact of cyber security risks to global economy could be as much as $3 trillion Impacted by cyber security risks US$ Billion Business & technology innovation total Est. value created by 22 Low High Impact of alternative future scenarios 1. Muddling 2. Backlash 3. Resilience Cloud technology 12 272 (13)(47)4 (39)(1,41)4 Internet of things 16 2152 (9)(21) (27)(63) Mobile internet 133 1552 (7)(15) (21)(45) Rapid entry into new markets 17 51 (1) (2)(4) Automation of knowledge work 25 722 (8)(1) (24)(31) Social technologies 75 353 (2)(3) (7)(1) Ecommerce 27 241 (1) (2)(4) Autonomous and nearautonomous vehicles 12 122 (2) (1)(7) Nextgeneration genomics 42 542 (1) (2)(4) Others 146 272 9,63 21,63 (41)(1,2) (1,23)(3,6) Total 1 Estimate does not include consumer surplus; based on IMF: April 213 WEO data & MGI Internet Matters report; May 211 2 Based on MGI Disruptive Technologies projections for 225 assuming linear rampup from mid213 to 225 and scaling back to 22 3 Based on MGI Social Economy projections for mid212, extrapolated to 22 based on 1year average world GDP growth rate 2.6% 4 >8% of impact for cloud is due to delayed adoption of public cloud

Most technology executives gave their institutions low scores in making the required changes so far What actions that your institution could take would have the most impact in reducing the risk associated with cyberattacks? (%) No/Limited impact Moderate Impact Significant Impact Avg. selfassessment grade Game changer Percentage of Responses 1 Prioritize information assets and related risks in a way that helps engage business leaders 2 Provide differentiated protection for most important assets 4% 22% 3 Develop deep integration of security into the technology environment to drive scalability 13% 2% 4 Deploy active defenses to be proactive in uncovering attacks early 4% 22% 5 Realistic testing to improve incident response 4% 6 Enlist frontline personnel helping them understand value of information assets 4% 7 Integrate cyberresilience into enterprisewide risk management and governance processes 6% 26% 57% 17% 48% 26% 47% 31% 48% 39% C 38% 55% C 2% 53% 37% 49% C C 12% C+ 12% C 6% C

1 Prioritize information assets and related risks in a way that helps engage business leaders Risks Plotting risk likelihood against impact helps focus investment ` Some reputational impact and/ or limited reputational consequences Economic loss <$1 million High a Competitor steals algorithm used in highly successful foreign exchange trading operating d g j b Medium Impact Catastrophic impact & reputational consequences Includes production loss and damage to facilities Economic loss >$1B Economic loss $1M$1B b Potential JV partner in emerging market gets access to negotiating strategy c System administrator accesses M&A information and trades ahead of announcement f a e i c Low Low Few highly motivated actors None are sophisticated Complex attacks required Medium Actors with high motivation/ incentives are not sophisticated Attacks required are moderately complex Likelihood d Customer account information released publically on the internet e Leakage of internal email communications (e.g., email) among senior executives about decisions related mortgage refinancing k h DISGUISED EXAMPLE High Sophisticated actor(s) with high motivation/ incentives Attacks required are low complexity f One day outage of online channel for customers to access and manage bank accounts in core markets g One hour outage in credit card authorization network h Halfday interruption in remote access services i Retail customers credit card accounts hijacked and used for fraudulent payments j High net worth customer brokerage accounts targeted by sophisticated attacks k Programmer inserts code diverting large number of small amounts

4 Deploy active defenses to uncover attacks proactively the emerging model looks like From to i A reactive cyber intelligence and defense model based on alerting and response, which tends to be focused on the last event or generic solutions, not the latest headlines A proactive cyber intelligence model based on dynamic intelligence and analytics to learn, anticipate, and prioritize actions. Ensuring preparation for the next attack by mapping out the anatomy of the highest risk scenarios, ensuring complete visibility over these assets, and arranging thirdparty contracts in advance ii Cyber intelligence reports are not often used to influence business decisions, because they do not provide the right call to action for the business Cyber intelligence which is businessrelevant, based upon understanding the main elements of cyber value creation and business risk priorities Continuous improvement should be at core of the process in order to learn, adapt, and improve the impact of intelligence products upon decision makers/business leaders iii Detection of threats is manual and timeconsuming, with security personnel focusing their time on assessing current threats and reacting to events in realtime Achieving effectiveness and efficiency with a deliberate division of labor between man and machine, by automating or outsourcing certain functions so that security personnel can focus on the most complex tasks where judgment is necessary, at either end of the lifecycle iv Intelligence gathering and threat gathering which is mostly inward looking, only considering the threats known locally rather than leveraging external contacts and resources Source intelligence which is global, leveraging all internal and external data sources, including advanced threat intelligence and informationsharing in the industry

7 Integrate cyberresilience into enterprisewide risk management and governance process Key contributions by business function Product development Incorporate security concerns into product concepts and take security requirements into account in developing business cases Marketing, sales & customer care Design programs that encourage appropriate customer behavior (e.g. password strength, not sharing passwords) Communicate cybersecurity related issues in a sensitive fashion Legal, privacy and regulatory Provide input on customer privacy priorities Set policies that strike appropriate balance between customer privacy and organization s need to protect itself Engage proactively with regulators on cybersecurity plans Shape the external regulatory and public policy environment Human resources Set policies that strike appropriate balance between employee privacy and organization s need to protect itself Drive cultural change and help put targeted training mechanisms in place Operations Take implications about data protection into account when making site decisions Reinforce policies about data usage and protection Incorporate cybersecurity risks into enterprisewide risk management decisionmaking and reporting mechanisms Procurement Risk management Negotiate security requirements into relevant vendor contracts Put enforcement mechanisms in place

Perspective on regulation depends on sector, with banking most skeptical; health care believes it could drive management attention Most frequent response by executives from all sectors except healthcare & insurance Interview question: What impact does government regulation have on your ability to manage cybersecurity related risks? % of respondents Aggregate responses 1 No/Limited impact 4 3 It requires a lot of time and effort, but does not really make us more secure 4 It makes us less secure by requiring actions that do not make sense or taking resources away from higher priority actions 18 14 2 On balance it encourages us to be more secure in a helpful way 33 13 Responses by sector Banking Healthcare 21 25 36 21 Hightech 46 8 21 67 43 38 15 Insurance 14 25 SOURCE: Industry leader interviews; Team analysis

Structural and organizational challenges mean senior management must help drive changes required for cyberresiliency Typical challenges Representative quotes from senior managers Role of senior management in getting the right cybersecurity capabilities in place Need to accept risks given competitive imperatives Yes, there may be security concerns about social media, but this is where our customers are and they expect us to interact with them there. Set overall expectations on institutional risk appetite Providing input on prioritization of information assets and trade Tough to quantify risk or risk mitigation It feels like we re constantly spending more on security, but I have no idea whether that s enough or even what it does Tough to get executive engagement on tradeoffs I get detailed IT security reports, but don t know whether several thousand intrusions detected is good or bad Tough to change behavior at the front lines I have marketing staff and researchers rebelling against security policies that they say prevent them from getting work done offs between business protection and operational impacts Incorporate cybersecurity considerations into product, customer and location decisions Sponsor integration of cybersecurity policies into other functions (e.g. HR, corporate security, vendor management) Drive behavioral changes in senior management team (e.g. for handling sensitive business materials) Communicate need for behavioral change at the front line Incorporate cybersecurity into regulatory and public affairs agenda Backstop security team in enforcing important polices Get actionable reporting in place for board

James Kaplan Chris Rezek james_kaplan@mckinsey.com chris_rezek@mckinsey.com @jmk37