Cybersecurity and internal audit. August 15, 2014



Similar documents
Internal audit of cybersecurity. Presentation to the Atlanta IIA Chapter January 2015

Italy. EY s Global Information Security Survey 2013

External Supplier Control Requirements

Cisco Security Optimization Service

Security and Privacy Trends 2014

Introduction. Jason Lawrence, MSISA, CISSP, CISA Manager, EY Advanced Security Center Atlanta, Georgia

Increase insight. Reduce risk. Feel confident.

Discussion Draft of the Preliminary Cybersecurity Framework Illustrative Examples

12/11/15. Evolving Cybersecurity Risks. Agenda. The current cyber risk landscape Overview. Results on EY s Global Information Security Survey

BlackRidge Technology Transport Access Control: Overview

MEMORANDUM. Date: October 28, Federally Regulated Financial Institutions. Subject: Cyber Security Self-Assessment Guidance

Defending Against Data Beaches: Internal Controls for Cybersecurity

Attachment A. Identification of Risks/Cybersecurity Governance

SECURITY. Risk & Compliance Services

REGULATIONS FOR THE SECURITY OF INTERNET BANKING

Appendix. Key Areas of Concern. i. Inadequate coverage of cybersecurity risk assessment exercises

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

THE TOP 4 CONTROLS.

Cybersecurity. Considerations for the audit committee

Cybersecurity The role of Internal Audit

Into the cybersecurity breach

The Protection Mission a constant endeavor

Commonwealth IT Threat Management: Keeping Out the Cyber Villains Category: Cyber Security Initiatives. Initiation date: January 2012

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

OCIE CYBERSECURITY INITIATIVE

Cybersecurity and Privacy Hot Topics 2015

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

BSM for IT Governance, Risk and Compliance: NERC CIP

IBM QRadar Security Intelligence April 2013

Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015

External Supplier Control Requirements

Managing IT Security with Penetration Testing

Guideline on Auditing and Log Management

Cybersecurity and the AICPA Cybersecurity Attestation Project

State of Minnesota. Enterprise Security Strategic Plan. Fiscal Years

Cisco Advanced Services for Network Security

Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence

How To Secure Your System From Cyber Attacks

End-user Security Analytics Strengthens Protection with ArcSight

Continuous Network Monitoring

Enterprise Security Tactical Plan

2011 Cyber Security and the Advanced Persistent Threat A Holistic View

Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense

IT risk management discussion 2013 PIAA Leadership Camp May 15, 2013

End of Support Should Not End Your Business. Challenge of Legacy Systems

Defending Against Cyber Attacks with SessionLevel Network Security

FEDERAL HOUSING FINANCE AGENCY ADVISORY BULLETIN AB Cyber Risk Management Guidance. Purpose

defending against advanced persistent threats: strategies for a new era of attacks agility made possible

Securing the Service Desk in the Cloud

U.S. Department of Energy Office of Inspector General Office of Audits & Inspections. Evaluation Report

INCIDENT RESPONSE CHECKLIST

Security Solutions to Meet NERC-CIP Requirements. Kevin Staggs, Honeywell Process Solutions

EEI Business Continuity. Threat Scenario Project (TSP) April 4, EEI Threat Scenario Project

EY Cyber Security Hacktics Center of Excellence

FINRA Publishes its 2015 Report on Cybersecurity Practices

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility

SANS Top 20 Critical Controls for Effective Cyber Defense

A Database Security Management White Paper: Securing the Information Business Relies On. November 2004

TRIPWIRE NERC SOLUTION SUITE

IT Security & Compliance. On Time. On Budget. On Demand.

Best Practices in ICS Security for System Operators. A Wurldtech White Paper

1 Introduction Product Description Strengths and Challenges Copyright... 5

DETECTING THE ENEMY INSIDE THE NETWORK. How Tough Is It to Deal with APTs?

Information Technology Security Review April 16, 2012

Cyber security Building confidence in your digital future

Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform

IT audit updates. Current hot topics and key considerations. IT risk assessment leading practices

ETHICAL HACKING APPLICATIO WIRELESS110 00NETWORK APPLICATION MOBILE MOBILE0001

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES

Compliance Guide ISO Compliance Guide. September Contents. Introduction 1. Detailed Controls Mapping 2.

Privilege Gone Wild: The State of Privileged Account Management in 2015

¼ããÀ ããè¾ã ¹ãÆãä ã¼ãîãä ã ããõà ãäìããä ã½ã¾ã ºããñ à Securities and Exchange Board of India

Technology Blueprint. Protect Your Servers. Guard the data and availability that enable business-critical communications

FFIEC Cybersecurity Assessment Tool

Unified Cyber Security Monitoring and Management Framework By Vijay Bharti Happiest Minds, Security Services Practice

應 用 SIEM 偵 測 與 預 防 APT 緩 攻 擊

Critical Controls for Cyber Security.

locuz.com Professional Services Security Audit Services

NERC CIP VERSION 5 COMPLIANCE

State Agency Cyber Security Survey v October State Agency Cybersecurity Survey v 3.4

Getting real about cyber threats: where are you headed?

North Dakota 2013 IT Security Audit Vulnerability Assessment & Penetration Test Project Briefing

SIEM Implementation Approach Discussion. April 2012

Managing cyber risks with insurance

Cyber Security Metrics Dashboards & Analytics

Cyber- Attacks: The New Frontier for Fraudsters. Daniel Wanjohi, Technology Security Specialist

Threat and Vulnerability Management (TVM) Protecting IT assets through a comprehensive program. Chicago IIA/ISACA

Developing Secure Software in the Age of Advanced Persistent Threats

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

Conquering PCI DSS Compliance

Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team

Session 9: Changing Paradigms and Challenges Tools for Space Systems Cyber Situational Awareness

CYBER SECURITY, A GROWING CIO PRIORITY

2014 Entry Form (Complete one for each entry.) Fill out the entry name exactly as you want it listed in the program.

Impact of Data Breaches

Larry Wilson Version 1.0 November, University Cyber-security Program Critical Asset Mapping

Data Privacy: The High Cost of Unprotected Sensitive Data 6 Step Data Privacy Protection Plan

Five keys to a more secure data environment

Transcription:

Cybersecurity and internal audit August 15, 2014

arket insights: what we are seeing so far? 60% of organizations see increased risk from using social networking, cloud computing and personal mobile devices at work. But only 52% of organizations indicate data leakage is a top new increased risk. 87% of organizations believe the damage to reputation and brand is the most significant issue related to data loss. Yet only 10% of respondents indicated that examining new and emerging trends is a very important activity for the information security function. 61% are not making policy adjustments or increasing security awareness to address these new threats. Source: EY's Global Information Security Survey Page 1

Cyber attacks: increasing complexity Unsophisticated attackers (script kiddies) You are attacked because you are on the internet and have vulnerability. Sophisticated attackers (hackers) You are attacked because you are on the internet and have information of value. Corporate espionage (insider) Your current or former employee seeks financial gain from selling your intellectual property (IP). State-sponsored attacks Advanced persistent threat (APT) You are targeted because of who you are, what you do, or the value of your IP. State-sponsored espionage Intelligence gathering Risk Corporate espionage Data exfiltration Initial exploitation APT life cycle onetization Experimentation Privilege escalation Command and control Attacker resource and sophistication Page 2

Key risks associated with cybersecurity Physical access to critical infrastructure is provided to unauthorized personnel. Strategy is not aligned to business requirements. Policy lacks cybersecurity robustness to protect against current and upcoming threats to production availability, integrity and information confidentiality. Tangible benefits are not defined, resulting in non-profitable or non-strategic security projects being delivered. Governance and strategy Outsourcing Physical environment Cybersecurity risks Logical access Technical security Company assets are not properly safeguarded against environmental disruptions (natural disasters, man-made catastrophies and accidental damage). Users are provided with inappropriate access to systems and data. Systems have not been configured to provide an adequate level of logical security to prevent unauthorized access to programs and data. Unauthorized software products are used to process business data. Vendors do not support security policies, leading to compromise of security controls or poor service levels. Service levels are not defined or not aligned to business requirements. Incident management Attackers may find or connect to unauthorized and unprotected systems. Attackers exploit flaws in system configurations to access or alter sensitive information. Attacks and malicious activity may not be detected. The extent of damage from an attack may not be identified, contained or remediated. igh risk oderate risk Page 3

What can organizations do? In a hyper-connected world, no organization can be 100% secure. But organizations need to ensure that they are secure enough to protect customer information and intellectual property and avoid potential lawsuits, brand damage and loss of shareholder value. 1. Identifying and quantifying the real risks 2. Protecting what matters most 3. Sustaining an enterprise-wide program 4. Optimizing for business performance 5. Enabling business performance The risk management life cycle is a process that: defines how the external threats specially apply to the company; estimates their potential business impact; defines the possible legal consequences; considers the risk management options based on a cost/risk reduction analysis; presents a prioritized financial-based set of risk management options for all relevant risks; makes a business decision based on the company s risk tolerance; and executes the decision. That means protecting the most important information that impacts your bottom line. Senior executives should champion a risk management strategy to protect business growth, brand and high-value data and systems, as well as improve processes that control liability by putting in place programs that help detect, deter and respond to breaches both internally and externally. The management of technology risks needs to be a board-level priority, where executives understand that well-established risk management practices need to be applied to security-related risks. Aligning all aspects of technology risks with the business, including information/cybersecurity, privacy, and physical and business continuity/resiliency, will not only protect the bottom line, it will also generate cost efficiencies and improve performance. Safeguarding against cyber breaches and protecting the organization s critical assets should not be only IT s responsibility. It is rapidly emerging as a board fiduciary responsibility. And when done well, the proposed enterprise-wide program can enable business performance through faster product launches, more effective customer communication and higher-quality information for decision-making. Page 4

ow can internal audit help? Scope Governance and processes Network architecture and security review and behavioral analysis Proactive APT review Objective and areas covered Objective: Identifying gaps in the policies and procedures implemented in the organization pertaining to information security and IT infrastructure and the associated risks Review the cybersecurity policies, procedures, guidelines and strategies Testing of operating effectiveness as per the policies and procedures established in the organization on sample basis for the IT processes Security operations log analysis, event monitoring, antivirus management End user security awareness and training Objective: Assessment of network architecture to evaluate whether the security architecture supports the client s thresholds for risk, while still supporting key business objectives Review of security architecture and devices Network topology and zoning Log-in procedures and authentication requirements Behavioral analysis of the existing network infrastructure Assessment of vulnerabilities pertaining to protocol Objective: itigation of the risk of information leakage and eavesdropping and used to foresee the expected attacks and threats that the network might be subjected to Root cause analysis Deep packet inspection alware identification Code-based malware analysis (static analysis) Behavioral analysis (dynamic analysis) Page 5

ow can internal audit help? Scope Baseline security review Cyber attack identification and response Vulnerability identification and mitigation Objective and areas covered Objective: Identifying security risks in the network Redundancy testing for security related network components to ensure secure communication over the network, along with the assessment of perimeter security of the network Vulnerability analytics Conduct of penetration test of the network and servers from internal and external network Review of security patch upgrades on all end user and server systems Review of licenses and inventory of all vendor-specific applications (S/W assets) operating in the organization Review of baseline configuration of all OS and DB deployed Objective: Evaluating procedures and processes that enable discovery and reporting of cyber attack incidents Response team Reporting Investigation Recovery and follow-up Law enforcement Objective: elp discover the vulnerability exploited and the associated application so that the appropriate fix can be applied to the infected part and stringent steps can be taken to strengthen the capability to combat such attacks Identification of exploited vulnerability using analysis (code-based and behavioral) of captured malware Identification of exploited applications Deployment of security fixes, patches and updates of the exploited vulnerability Antivirus signature preparation against the captured malware Page 6

EY Assurance Tax Transactions Advisory About EY EY is a global leader in assurance, tax, transaction and advisory services. The insights and quality services we deliver help build trust and confidence in the capital markets and in economies the world over. We develop outstanding leaders who team to deliver on our promises to all of our stakeholders. In so doing, we play a critical role in building a better working world for our people, for our clients and for our communities. EY refers to the global organization, and may refer to one or more, of the member firms of Ernst & Young Global Limited, each of which is a separate legal entity. Ernst & Young Global Limited, a UK company limited by guarantee, does not provide services to clients. For more information about our organization, please visit ey.com. Ernst & Young LLP is a client-serving member firm of Ernst & Young Global Limited operating in the US. About EY s Advisory Services Improving business performance while managing risk is an increasingly complex business challenge. Whether your focus is on broad business transformation or, more specifically, on achieving growth or optimizing or protecting your business, having the right advisors on your side can make all the difference. Our 30,000 advisory professionals form one of the broadest global advisory networks of any professional organization, delivering seasoned multidisciplinary teams that work with our clients to deliver a powerful and exceptional client service. We use proven, integrated methodologies to help you solve your most challenging business problems, deliver a strong performance in complex market conditions and build sustainable stakeholder confidence for the longer term. We understand that you need services that are adapted to your industry issues, so we bring our broad sector experience and deep subject matter knowledge to bear in a proactive and objective way. Above all, we are committed to measuring the gains and identifying where your strategy and change initiatives are delivering the value your business needs. 2014 Ernst & Young LLP. All Rights Reserved. BSC No. 1404-1239678 ey.com