www.pwc.com Developing a robust cyber security governance framework 16 April 2015



Similar documents
Assessing the strength of your security operating model

Cyber security Building confidence in your digital future

The data breach lifecycle: From prevention to response IAPP global privacy summit March 6, 2014 (4:30-5:30) Draft v

Cyber security Building confidence in your digital future

10Minutes. on the stark realities of cybersecurity. The Cyber Savvy CEO. A changed business environment demands a new approach:

January IIA / ISACA Joint Meeting Pre-meeting. Cybersecurity Update for Internal Auditors. Matt Wilson, PwC Risk Assurance Director

Cyber-Security Risk- IP Theft and Data Breaches Protecting your Crown Jewels Internally and with Your Key Third Parties

Cybersecurity and Privacy Hot Topics 2015

Defending yesterday. Financial Services. Key findings from The Global State of Information Security Survey 2014

Managing cyber risks with insurance

Cyber security: Are consumer companies up to the challenge?

Cyber, Social Media and IT Risks. David Canham (BA) Hons, MIRM

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility

Seamus Reilly Director EY Information Security Cyber Security

Cybersecurity. Considerations for the audit committee

Cyber Security: from threat to opportunity

Accenture Intelligent Security for the Digital Enterprise. Archer s important role in solving today's pressing security challenges

Cyber Security for audit committees

Cyber Security key emerging risk Q3 2015

We believe successful global organisations can confront fraud, corruption and abuse PwC Finland Forensic Services

Statement for the Record. Richard Bejtlich. Chief Security Strategist. FireEye, Inc. Before the. U.S. House of Representatives

The NIST Cybersecurity Framework Encouraging NIST Adoption Via Cost/Benefit Analysis

Answering your cybersecurity questions The need for continued action

Cybersecurity and internal audit. August 15, 2014

Defining the Gap: The Cybersecurity Governance Study

Cyber Risks in the Boardroom

Cybersecurity and Hospitals. What Hospital Trustees Need to Know About Managing Cybersecurity Risk and Response

A NEW APPROACH TO CYBER SECURITY

COUNTERINTELLIGENCE. Protecting Key Assets: A Corporate Counterintelligence Guide

How To Write A National Cybersecurity Act

Addressing Cyber Risk Building robust cyber governance

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft

The Influence of Software Vulnerabilities on Business Risks 1

Cyber Security, a theme for the boardroom

HMG Security Policy Framework

CONSULTING IMAGE PLACEHOLDER

Don t Get Left in the Dust: How to Evolve from CISO to CIRO

How to Develop Successful Enterprise Risk and Vendor Management Programs

Cyber Risk Managemet Next? What Board Members, Shareholders, Government, Auditors and Others Will be Asking from the CIO Next:

Information Technology Consulting Services

Cyber Threats Insights from history and current operations. Prepared by Cognitio May 5, 2015

Italy. EY s Global Information Security Survey 2013

Cybercrime: risks, penalties and prevention

October 24, Mitigating Legal and Business Risks of Cyber Breaches

Cyber Warfare. Global Economic Crime Survey. Causes of Cyber Attacks. David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP. Why Cybercrime?

Mitigating and managing cyber risk: ten issues to consider

Cyber security: Are Australian CEOs sleepwalking or a step ahead? kpmg.com.au

Exercising Your Enterprise Cyber Response Crisis Management Capabilities

Secure by design: taking a strategic approach to cybersecurity

Cyber ROI. A practical approach to quantifying the financial benefits of cybersecurity

THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS

Cyber security. Cyber Security. Digital Employee Experience. Digital Customer Experience. Digital Insight. Payments. Internet of Things

PwC Cybersecurity Briefing

ACE European Risk Briefing 2012

Cybersecurity in the States 2012: Priorities, Issues and Trends

Threat smart: Building a cyber resilient financial institution - an East Cluster perspective

How To Manage Risk On A Scada System

Internal audit of cybersecurity. Presentation to the Atlanta IIA Chapter January 2015

Surviving Contact with Reality Crisis exercises as a key element of cyber incident and crisis management response.

Threat and Vulnerability Management (TVM) Protecting IT assets through a comprehensive program. Chicago IIA/ISACA

Defending yesterday. Retail & Consumer. Key findings from The Global State of Information Security Survey 2014

How to effectively respond to an information security incident

Session 9: 20 Questions You Should Answer About Your Cyber Security Readiness Jeff Thomas, Partner, KPMG Ivan Alcoforado, Senior Manager, KPMG

Into the cybersecurity breach

The Importance of Senior Executive Involvement in Breach Response

Reducing Cyber Risk in Your Organization

Cybersecurity: What CFO s Need to Know

London Business Interruption Association Technology new risks and opportunities for the Insurance industry

APICS INSIGHTS AND INNOVATIONS SUPPLY CHAIN RISK CHALLENGES AND PRACTICES

Cyber threat intelligence and the lessons from law enforcement. kpmg.com.au

CYBER RISK INTERNATIONAL COMPANY PROFILE

Cyber Insurance: How to Investigate the Right Coverage for Your Company

Risk management + Strategic planning IT TAKES AN ENTIRE ORGANIZATION

CYBER SECURITY Cyber Security for Canadian Directors in the Wake of Ashley Madison

Data Centric Security Management. Protecting information in a rapidly evolving and interconnected future

Advancing Cyber Security Using System Dynamics Simulation Modeling for System Resilience, Patching, and Software Development

Transcription:

www.pwc.com Developing a robust cyber security governance framework 16 April 2015

Cyber attacks are ubiquitous Anonymous hacker group declares cyber war on Hong Kong government, police - SCMP, 2 October 2014 Adobe hack: At least 38 million accounts breached - BBC, 30 October 2013 2

Are we doing enough to protect? 3

To get started evaluate the risks Information and communications technologies Business deals information What s most at risk? Military technologies Clean technologies Healthcare, pharmaceuticals, and related technologies Energy and other natural resources information Advanced materials and manufacturing techniques Agricultural technologies Macroeconomic information Management should understand what their most valuable information assets are and where they are located in the business ecosystem at any given time How losing these assets will cost the business? Businesses should prioritise and allocate resources to effectively protect the crown jewels today and into the future Source: Office of the National Counterintelligence Executive, Report to Congress on the Foreign Economic Collection and Industrial Espionage, 2009-2011, October 2011. 4

Will these enterprise risks cost your assets? Common Risks 5

Examples of key assets and their costs Adversary Motives Target Assets Costs to organisation Nation State Economic, political, and / or military advantage Trade secrets Sensitive business information Emerging technologies Critical infrastructure Loss of competitive advantage Disruption to critical infrastructure Organised Crime Immediate financial gain Collect information for future financial gains Financial / payment systems Personally Identifiable Info Payment Card Info Protected Health Info Costly regulatory inquiries and penalties Consumer / shareholder lawsuits and loss of their confidence Hacktivists Influence political and / or social change Pressure business to change their practices Corporate secrets Sensitive business info Info related to key executives, staff, customers & business partners Disruption of business activities Brand and reputation Loss of consumer confidence and even Cyber Terrorists Political and / or ideological change Create fear, uncertainty, and doubt Critical infrastructure Operational technologies Highly visible venues Destabilise, disrupt, and destroy physical and logical assets 6

With these in mind, we move towards a cyber security model that is Business Aligned Partner with the business to define and deliver solutions for cyber security risk Information Oriented Gather the necessary insight into the information processing environment to provide relevant risk reporting Risk Driven Drive processes which balance business needs, services portfolio delivery and cyber security risk Delivered Effectively Provide strategies, direction and oversight of delivery to drive consistent, reusable and cost effective services 7

A holistic cyber security governance model Business Risk Reporting / Business Requirements Business Aligned Partner with the business to define and deliver solutions for cyber security risk KPIs & Reporting Operations Plan Information Oriented Strategic Planning, Gather the necessary Business insight into the Partnership information & processing Risk environment Manage-tment relevant risk reporting provide Define / Build Architecture Delivered Effectively Provide strategies, Sustain / Policies, Operate Risk Driven Standards, Drive processes which Awareness & direction and balance business needs, Change services portfolio delivery and cyber security risk oversight of delivery to drive consistent, reusable and cost effective services Technology Data, Controls, Remediation 8

Building blocks of the model Cyber security strategy Strategic Planning, Business Partnership & Risk Management IT risk management program planning 3rd party risk management 10

Building blocks of the model Architecture architecture design Research & development Policy & standard guidance 11

Building blocks of the model Policies, Standards, Awareness & Change Policy & standard development Training & awareness Tech risk change management 12

Building blocks of the model Operations Infrastructure security Operational Identity and access management Threat & vulnerability management Application Event monitoring & incident response 13

Building blocks of the model KPIs & Reporting Metrics and Reporting Compliance and Audit Support 14

A successful security framework needs strong oversight General Counsel Chief Risk Officer Chief Compliance Officer Chief Privacy Officer Chief Administrative Officer CFO CIO CISO Board Audit Committee ERM Risk Committee Data Governance Committee Privacy Committee Cyber Organisation Strategic Planning, Business Partnership & Risk Management Architecture Policies, Standards, Awareness & Change Operations KPIs & Reporting Manage Risk with Metrics Plan Define / Build Operate Sustain Key: Leadership & Governance Definition & Guidance Management & Delivery 15

Expect the unexpected In all things success depends on previous preparation, and without such previous preparation there is sure to be failure 凡 事 豫 則 立, 不 豫 則 廢 Chinese Confucian proverb 16

It s not if, but when Capability to respond to a cyber attack requires: a response mechanism that is integrated from the bottom to the top of the organisation a response mechanism that has been recorded (plans) staff who have been trained in their response role, and who have rehearsed that role in crisis conditions a culture that recognises and reports potential business impacting cyber attacks, and not fix on fail and 17

a capability to respond must consider the entire business response How are clients impacted? 96% 72% 20% 65% What does this mean? concerned about the impact of a cyber attack have cyber threat on their risk register conducted a C-Suite level exercise to rehearse their response to a cyber attack regularly conduct a C- Suite level exercise Cyber attacks are still perceived as an IT issue and the business wide impact may not be fully appreciated 18

Thank you! Jason Ho E-mail: jason.wk.ho@hk.pwc.com Phone: +852 2289 1213 This content is for general information purposes only, and should not be used as a substitute for consultation with professional advisors. 2015 PricewaterhouseCoopers Limited. All rights reserved. refers to the China or Hong Kong member firm, and may sometimes refer to the network. Each member firm is a separate legal entity. Please see www.pwc.com/structure for further details.