How To Be Prepared For A Cybercrime



Similar documents
Security and Privacy Trends 2014

Cybersecurity and internal audit. August 15, 2014

Italy. EY s Global Information Security Survey 2013

The Changing IT Risk Landscape Understanding and managing existing and emerging risks

Address C-level Cybersecurity issues to enable and secure Digital transformation

An Introduction to the Internet of Things (IoT)

Cyber Security - What Would a Breach Really Mean for your Business?

Assessing the strength of your security operating model

Cyberprivacy and Cybersecurity for Health Data

CGI Cyber Risk Advisory and Management Services for Insurers

Mobile computing. Does your organisation have any safe options? The better the question. The better the answer. The better the world works.

A NEW APPROACH TO CYBER SECURITY

Understanding the impact of the connected revolution. Vodafone Power to you

Cyber security Building confidence in your digital future

FWD. What the Internet of Things will mean for business

Seamus Reilly Director EY Information Security Cyber Security

GOVERNMENT AND THE INTERNET OF THINGS (IOT) FINDINGS AND RECOMMENDATION OF ATARC S INTERNET OF THINGS INNOVATION LAB NOVEMBER, 2015

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES

Connecting things. Creating possibilities. A point of view

The Internet of Things Risks and Challenges

Better Operational Agility. For more flexible, resilient and secure communications. Vodafone Power to you

IT Infrastructure Services. White Paper. Cyber Risk Mitigation for Smart Cities

Internal audit of cybersecurity. Presentation to the Atlanta IIA Chapter January 2015

Key Cyber Risks at the ERP Level

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

Risks and Rewards of the Internet of Things. Findings From ISACA s 2013 IT Risk/Reward Barometer

The Evolving Internet of Things Market

Internet of Things: Consumerisation of Technology.

Cybersecurity report As technology evolves, new risks drive innovation in cybersecurity

Services. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure

Microsoft s cybersecurity commitment

Cisco Unified Communications and Collaboration technology is changing the way we go about the business of the University.

How To Understand The Power Of The Internet Of Things

INTRODUCTION. IoT AND IP STRATEGIES

Mobility. Mobility is a major force. It s changing human culture and business on a global scale. And it s nowhere near achieving its full potential.

Cyber Security: Confronting the Threat

POLICIES TO MITIGATE CYBER RISK

A ZK Research Whitepaper. November e t. It s INTERNET OF THINGS

Addressing Cyber Risk Building robust cyber governance

Cybersecurity Strategic Consulting

W H I T E P A P E R I m p a c t o f C y b e r s e c u r i t y A t t a c k s a n d N e w - A g e S e c u r i t y S t r a t e g i e s

Digital Business Services Topic Area Theaters May 17-19, 2016 Orlando, FL

THE CUSTOMER EXPERIENCE

Guiding principles for security in a networked society

The Internet of Things

Nokia Networks. security you can rely on

How To Help The Internet Of Things (Iot) Work With The Government

TUSKEGEE CYBER SECURITY PATH FORWARD

The Internet of Everything

Conquering PCI DSS Compliance

CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES

T r a n s f o r m i ng Manufacturing w ith the I n t e r n e t o f Things

The Internet of Things (IoT)

Cyber security: Are Australian CEOs sleepwalking or a step ahead? kpmg.com.au

The UK cyber security strategy: Landscape review. Cross-government

ISO27032 Guidelines for Cyber Security

MES and Industrial Internet

Industrial Automation. A Manufacturing Revolution in Automotive and Industrial Equipment

Seamless Mobile Security for Network Operators. Build a secure foundation for winning new wireless services revenue.

A COMPLETE APPROACH TO SECURITY

CONTENTS. Introduction 3. IoT- the next evolution of the internet..3. IoT today and its importance..4. Emerging opportunities of IoT 5

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

How To Protect Your Network From Attack From A Network Security Threat

Secure Your Success. Intel Security Partner Program

The Importance of Secure Elements in M2M Deployments: An Introduction

CONSULTING IMAGE PLACEHOLDER

SOCIAL MEDIA MOBILE DEVICES CLOUD SERVICES INTERNET OF THINGS (IOT)

Tapping the benefits of business analytics and optimization

Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs

Cybersecurity: Mission integration to protect your assets

Wireless M2M in the Supply Chain Achieving High Performance through Dynamic, Real-Time Insight. by Praveen Shankar

Protecting against cyber threats and security breaches

Managing cyber risks with insurance

Securing the Growth of IoT and M2M

CONECTIVIDAD EN LA ERA DEL IOT THE INTERNET OF THINGS

State of the States: IT Trends, Priorities and Issues

Future Threat Landscape - How will technology evolve and what does it mean for cyber security?

Evolving operator roles. How the Internet of Things can create innovative solutions that support society

Craig McWilliams Craig Burrell. Bringing Smarter, Safer Transport to NZ

White Paper. Bridging the essential gap between Mobile Cloud and crowd based testing. 1. Introduction. 2. Testing Lifecycle

Get ahead of cybercrime EY s Global Information Security Survey 2014

Cyber security: Are consumer companies up to the challenge?

Cyber security Building confidence in your digital future

In the pursuit of becoming smart

Into the cybersecurity breach

The butterfly effect. How smart technology is set to completely transform utilities

Connect Renfrewshire

Accenture Technology Consulting. Clearing the Path for Business Growth

CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS

Sytorus Information Security Assessment Overview

THE PERFECT STORM WEATHERING CYBER THREATS IN THE HEALTHCARE INDUSTRY

U.S. House of Representatives Committee on the Judiciary Subcommittee on Courts, Intellectual Property and the Internet

Mitigating and managing cyber risk: ten issues to consider

Cyber security. Cyber Security. Digital Employee Experience. Digital Customer Experience. Digital Insight. Payments. Internet of Things

BEST PRACTICES RESEARCH INSERT COMPANY LOGO HERE. We Accelerate Growth Frost & Sullivan

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft

Digital Customer Experience

Healthcare Internal Audit: In a Time of Transition

The digital future for energy and utilities.

Transcription:

Cybersecurity and the Internet of Things June 2015

What is the Internet of Things?

Agenda What is the Internet of Things?..2 The many and various benefits of IoT...7 The rise of the cyber threat..13 The multiplying effect of today s cybersecurity challenges...18 Getting prepared for cybercrime..22 How can you get ahead of cybercrime....28 Next steps (how can EY help).33 Page 2

What does the expression Internet of Things stand for? The Internet of Things (IoT) is a network of physical objects that contain technologies to communicate and sense or interact with their internal states or the external environment. Embedded systems and sensors connect the objects to the internet, interacting with it to generate meaningful results and convenience to the end user community. Page 3

Sensor-based technologies Most IoT devices will use sensor-based technologies which will identify or measure any change in position, location, etc. and transmit data to a particular device or server, which in turn will analyze the data to generate the information for the user. In business terms: The sensors will also act as data gatherers Cloud computing will be a platform for storing and analyzing the data Big Data analytics will convert this raw data to knowledge or insights. Page 4

Some real life IoT examples Check on the baby Track your activity levels (wireless activity trackers) Track down those lost keys Make sure the oven is off Light your home in a new and efficient manner Smart fridge Find a parking spot in the city Self tinting windows Wearable drone control Grocery ordering trash bin Page 5

IoT is a hot topic today, but the concept has been around since 1999 If we had computers that knew everything there was to know about things using data they gathered without any help from us we would be able to track and count everything, and greatly reduce waste, loss and cost. We would know when things needed replacing, repairing or recalling, and whether they were fresh or past their best. The Internet of Things has the potential to change the world, just as the Internet did. Maybe even more so Kevin Ashton, That Internet of Things Thing, RFID Journal, July 22, 1999 Page 6

What is driving the successful growth of iot today? 1999 - more questions than answers How to connect everything on the planet? What type of wireless communications could be built into devices? What changes would be needed to support billions of new devices communicating constantly? What would power these devices? What must be developed to make the solutions cost effective? 2015 - enabling technologies exist The size and cost of wireless radios has dropped tremendously. IPv6 assigns a communications address to billions of devices. Electronics companies are building Wi-Fi & cellular wireless connectivity into a wide range of devices (e.g. billions of wireless chips). Mobile data coverage has improved significantly with many networks offering broadband speeds. Battery technology has improved significantly and solar recharging has been built into numerous devices. Page 7

The many and various benefits of IoT

Opportunities for business improvement and customer satisfaction The ever-increasing networking capabilities of machines and everyday devices opens up opportunities for business improvement and customer satisfaction in many areas, e.g.,: Home appliances Office equipment Mobile and wearable technologies Vehicles Factories Supply chains Urban infrastructure Page 9

The forces driving the adoption of IoT IoT is leading change within the digital landscape and it s fast becoming the must-have element of business technology. Some of the primary forces driving the adoption of IoT are: New business opportunities Potential for business revenue growth Improved decision-making Cost reductions Safety and security Improved citizen experience Improved infrastructure. Page 10

The key areas of leading IoT integration Smart life Making life simpler and safer for consumers Health care Consumer and retail businesses Banking convergence Insurance Public services Smart mobility Making travel more enjoyable and reliable Autonomous driving and connected car Urban traffic management Interurban mobility Fare management and payment solutions Distribution and logistics Fleet management Smart city Improving the quality of life in cities Smarter management of city infrastructure using Big Data analytics Collaboration across multiple agencies Enhanced security Better city planning Networked utilities Building developments Smart manufacturing Optimizing processes, controls and quality Machine learning (intelligent, automated decision- making) Machine communication & collaboration Networked control Optimized processes Proactive asset management Better infrastructure integration Page 11

Economic benefits of IoT Potential for trillions of dollars of value waiting to be created for both the end-users and public and private sector enterprises IoT will offer opportunities for companies which are manufacturing IoT goods, and also for those companies which are providing services related to IoT According to industry estimates, machine-to-machine (M2M) communications alone will generate approximately US$900 billion in revenues by 2020. Page 12

IoT will affect different business sectors in different ways For example, the health care sector has been one of the biggest beneficiaries from IoT Although by no means universal, future solutions may become available such as: Personal information telling medics not only about individuals medical history, but also about potential diseases Sensors and microcomputers fitted in the human body that could monitor health conditions and even alarm emergency services in case of any distress Technologies helping to make living ambience suitable to an individual s medical requirements Highly automated devices and processes could help to increase critical treatments efficiency with a limited human interface Page 13

The rise of the cyber threat

Security risks pertaining to IoT are growing and are changing rapidly. In today s world of always on technology and not enough security awareness on the part of users, cyber attacks are no longer a matter of if but when. Cyber criminals can cause business trust damage, disrupt sensitive data and steal intellectual property. Effective cybersecurity is increasingly complex to deliver. 70% of the most commonly used IoT devices contain vulnerabilities. 56% of respondents to EY s Global Information Security Survey say that it is unlikely or highly unlikely that their organization would be able to detect a sophisticated attack.** 37% of GISS respondents say that real time insight on cyber risk is not available. Page 15

Cyber attacks have transformed the risk landscape Page 16

The risk boundary of the enterprise is expanding The security of the thing is only as secure as the network in which it resides: this includes the people, processes and technologies involved in its development and delivery. Many opportunities for IoT will arise through technological integration and collaboration, which will continue to increase in complexity and risk With the internet and mobile working, the boundary of the enterprise is disappearing - the risk landscape also becomes unbounded For organizations to be able to communicate with their business partners they must create holes in the fence Your cybersecurity system should include your broader network, including clients, customers, suppliers/vendors, collaborators, business partners and alumni together called your business ecosystem. Trust management needs to be established, i.e., the new functions and processes, policies and structures required to expand the risk boundary. Page 17

A typical business ecosystem SOC Agreed security limit Variable factors Uncontrollable factors Page 18

The multiplying effect of today s cybersecurity challenges

The multiplying effect of today s cybersecurity challenges The interconnectivity of people, devices and organizations in today s digital world, opens up new vulnerabilities access points where the cyber criminals can get in. The speed of change can the organization s cybersecurity keep pace? New product launches, mergers, acquisitions, market expansion, new technology A network of networks has made data accessible everywhere, any time One vulnerable device can lead to other vulnerable devices Traditionally closed operating systems can be accessed externally Cloud vulnerabilities and Big data storage and server security issues Application risk and ease of access - malicious apps and app vulnerabilities The estimated number of free apps is projected to reach 253 billion by 2017 Bandwidth consumption from billions of devices will put a strain on the spectrum of other wireless communications Most sensors use an unencrypted link to communicate, causing a lag in security Page 20

The multiplying vulnerabilities of mobile devices data protection and privacy Growing use of mobile devices The loss of a single smart device not only means the loss of information, but increasingly it also leads to a loss of identity Devices do not have the same firmware or software running on them Hardware interoperability issues of devices Network engineers cannot patch vulnerabilities fast enough Organized cyber criminals sell hardware with Trojans or backdoors already installed The bring your own device employer Employees increasingly want to use their own personal mobile devices to conduct work BYOD significantly impacts the traditional security model of protecting the perimeter of the IT organization by blurring the definition of that perimeter, both in terms of physical location and in asset ownership Page 21

The multiplying data protection and privacy issues Governance and compliance issues Increasing privacy legislation will continue IoT policies should include defined, clear expectations on privacy-impacting procedures - legislation may differ in certain geographical regions. Privacy and data protection All IoT devices gather accurate data from real world, but a user might not be comfortable with sharing confidential or sensitive data with a third party There should be better transparency on how data is stored, used and transported If the organization is collecting personal data, the purpose, expiration, security, etc., of the data collected must be clearly stated in the information security policy. If data is processed by a third party (i.e., a cloud email provider), it is important that the data be protected by a data processing agreement with the third party. Breach investigation and notification New and future legislation is proposed on cybersecurity, with fines being levied on companies who do not protect consumer data Mandatory actions are being introduced around data breach notification. Page 22

Are you prepared for cybercrime?

How can you be better prepare for what s coming? Your organization may already have strong IT policies, processes and technologies, but is it prepared for what is coming? Early warning and detection of breaches are decisive to being in a state of readiness: The emphasis of cybersecurity has changed to threat intelligence You need to understand the nature of threats and how they will manifest themselves Learning how to stay ahead of cybercrime is challenging and takes time but the benefits are considerable: You will be able to exploit the opportunities offered by the digital world, while minimizing exposure to risks and the cost of dealing with them. Page 24

Stop reacting start acting Organizations need to change their way of thinking to stop being simply reactive to future threats. 36% of respondents do not have a threat intelligence program. 58% of organizations do not have a role or department focused on emerging technologies and their impact on information security. Page 25

Focus on tackling the right risks in the right way Organizations need to ask: How much can we do to manage the residual risk? Are we prepared to accept a certain level of risk? What can we attempt to control and what do we need to accept is out of our control (for example, world events and changes in location regulations)? Within its defined ecosystem, organizations need to continually reassess relationships and risks, adjusting how the business evolves. Agility is needed to react to uncontrollable factors that affect every business in similar, but distinct, ways. Page 26 CyberSecurity and Internet of Things

Take the initiative away from the cyber criminal Organizations must look ahead and look beyond the business new threats are being created today and you need to get ahead of the game. Proactive, intelligent cybersecurity should become the norm for every organization. The focus should be on enhancing the cybersecurity capabilities and outlook of your organization: 1. Mastering the foundation 2. Introducing innovative new approaches 3. Using powerful new tools making you stronger and safer than ever. Take the initiative to take away the power of the hacker and get ahead of cybercrime Page 27

Getting ahead of cybercrime To get ahead of cybercrime we suggest that organizations adopt a 3-stage improvement process: Activate (a foundational approach) Organizations need to establish and improve the solid foundations of their cybersecurity Adapt (a dynamic approach) Because organizations are constantly changing and cyber threats are evolving, cybersecurity needs to be able to adapt to changing requirements Anticipate (a proactive approach) Organizations need to make efforts to predict what is coming so they can be better prepared for the inevitable cyber attacks Page 28

Cybersecurity system building blocks - the 3A s What it is Cybersecurity system building blocks Status Anticipate is about looking into the unknown. Based on cyber threat intelligence, potential hacks are identified; measures are taken before any damage is done. Adapt is about change. The cybersecurity system is changing when the environment is changing. It is focused on protecting the business of tomorrow. Activate sets the stage. It is a complex set of cybersecurity measures focused on protecting the business as it is today. Anticipate Adapt Activate Anticipate is an emerging level. More and more organizations are using cyber threat intelligence to get ahead of cybercrime. It is an innovative addition to the below. Adapt is not broadly implemented yet. It is not common practice to assess the cybersecurity implications every time an organization makes changes in the business. Activate is part of the cybersecurity system of every organization. Not all necessary measures are taken yet; there is still a lot to do. Page 29

How can you get ahead of cybercrime

How can you anticipate cybercrime? The only way to get ahead of the cyber criminals is to learn how to anticipate their attacks. Your cybersecurity capability needs to be able to answer: What is happening out there that our organization needs to learn from? How are other successful organizations dealing with threats and attacks? How can our organization become hardened against attack? Can our organization distinguish a random attack from a targeted one? What would be the economic cost of an attack? How would our customers be impacted by an attack? What would the legal and regulatory consequences of a serious attack be? How can we help others in our ecosystem deal with threats and attacks? Page 31

Be in a state of readiness You can t predict or prevent attacks; but you can reduce your attractiveness as a target, increase your resilience, and limit damage from any given attack by being in a state of readiness: Designing and implementing a cyber threat intelligence strategy to support strategic business decisions and leverage the value of security Defining and encompassing the organizations extended cybersecurity ecosystem, including partners, suppliers, services and business networks Taking a cyber economic approach understanding your vital assets and their value, and investing specifically in their protection Using forensic data analytics and cyber threat intelligence to analyze and anticipate where likely threats are coming from and when, Ensuring that everyone in the organization understands the need for strong governance, user controls and accountability A well-functioning security operations center (SOC) can form the heart of effective detection Page 32

Follow leading cybersecurity practices Continuously assess the security implications of adopting IoT advancements A consistent and agile multi-perspective security risk assessment methodology will help to evaluate the organizations risk exposure. Introducing appropriate procedures and regular testing will help organizations become smarter and make their employees more aware of the challenges that IoT poses for the entire enterprise. Know your environment, inside and out Continually learn and evolve Be confident in your incident response and crisis response mechanisms Align cybersecurity to business objectives Page 33

Move from security as a cost, to security as a plus Security is usually positioned as an obligatory cost - a cost to pay to be compliant, or a cost to pay to reduce risk. But moving to a model of security as risk and trust management implies looking upon security as a business enabler This transformation means enabling the development of: more extended networks of networks new forms of collaboration and mobility new business models. Page 34

Next steps

Next steps act rather than react Consider these key questions What IoT capabilities does your organization have today? Can you harness the complementary insights of both service and IT leaders? Have you identified major IoT opportunities that link with your vision and strategy? Can you build an IoT culture around the possibilities of connecting the unconnected? How will IoT change the basis of competition? How will you delight customers as everything gets connected? Do your business plans reflect the full potential of IoT? Are your technology investments aligned with opportunities and threats? How will IoT improve your agility? Do you have the capabilities to deliver value from IoT? What is your accountability and governance structure/model for IoT execution? How are the risks associated with IoT being addressed? How will you communicate about IoT to stakeholders? Page 36

How can EY help? We provide services to assist organizations in developing inhouse threat intelligence programs as well as several key threat intelligence services in subscription-based models and full spectrum managed cyber threat intelligence services. We help you to secure both the device ecosystem and assess security at the network level, and we assist in defining and implementing state-of-the-art security controls to: Secure the data from device to data center to the cloud Manage large volumes of data, combining our expertise in data analytics Comply with the applicable security and regulatory requirements Standardize the security controls for their offerings, thereby ensuring a faster go-to-market Page 37

Our approach We have an integrated perspective on all aspects of organizational risk, and cybersecurity is a key area of focus where EY is an acknowledged leader We aim to be a trusted advisor to our clients as they face the challenge of protecting and securing their assets Our cybersecurity professionals address the challenge of managing the information and cybersecurity risk to business operations. We draw on in-depth industry-leading technical and IT-related risk management knowledge from our global organization to deliver IT controls services focused on the design, implementation and rationalization of controls that potentially reduce the risks in our clients applications, infrastructure and data. We know the business impact and technical details of cybersecurity and how to present these to C-level executives, resulting in deeper risk insights and more in-depth executive-level discussions. We want to help you get ahead of cybercrime

Further information See the full report: Cybersecurity and the Internet of Things visit: www.ey.com/iot For further GRC thought leadership, please refer to our Insights on governance, risk and compliance series on: www.ey.com/grcinsights Page 39

Want to learn more? Please visit our Insights on governance, risk and compliance series at: ey.com/grcinsights Get ahead of cybercrime: EY s Global Information Security Survey 2014 www.ey.com/giss2014 Achieving resilience in the cyber ecosystem www.ey.com/icyberecosystem Bring your own device: security and risk considerations for your mobile device program www.ey.com/byod Security Operations Centers helping you get ahead of cybercrime www.ey.com/soc Cyber Program Management: drive business results through harnessing uncertainty www.ey.com/repm Cyber threat intelligence how to get ahead of cybercrime www.ey.com/cti Maximizing the value of a data protection program www.ey.com/dataprotect Big data: changing the way businesses compete and operate. www.ey.com/bigdatachange Building trust in the cloud: creating confidence in your cloud ecosystem www.ey.com/cloudtrust Page 40

Thank you

EY Assurance Tax Transactions Advisory Ernst & Young LLP Ernst & Young LLP. Published in the UK. All Rights Reserved. The UK firm Ernst & Young LLP is a limited liability partnership registered in England and Wales with registered number OC300001 and is a member firm of Ernst & Young Global Limited. Ernst & Young LLP, 1 More London Place, London, SE1 2AF. ey.com About EY EY is a global leader in assurance, tax, transaction and advisory services. The insights and quality services we deliver help build trust and confidence in the capital markets and in economies the world over. We develop outstanding leaders who team to deliver on our promises to all of our stakeholders. In so doing, we play a critical role in building a better working world for our people, for our clients and for our communities. EY refers to the global organization, and may refer to one or more, of the member firms of Ernst & Young Global Limited, each of which is a separate legal entity. Ernst & Young Global Limited, a UK company limited by guarantee, does not provide services to clients. For more information about our organization, please visit ey.com. About EY s Advisory Services Improving business performance while managing risk is an increasingly complex business challenge. Whether your focus is on broad business transformation or, more specifically, on achieving growth or optimizing or protecting your business, having the right advisors on your side can make all the difference. Our 30,000 advisory professionals form one of the broadest global advisory networks of any professional organization, delivering seasoned multidisciplinary teams that work with our clients to deliver a powerful and exceptional client service. We use proven, integrated methodologies to help you solve your most challenging business problems, deliver a strong performance in complex market conditions and build sustainable stakeholder confidence for the longer term. We understand that you need services that are adapted to your industry issues, so we bring our broad sector experience and deep subject matter knowledge to bear in a proactive and objective way. Above all, we are committed to measuring the gains and identifying where your strategy and change initiatives are delivering the value your business needs. To find out more about how our Risk Advisory services could help your organization, speak to your local EY professional or a member of our global team, or view: ey.com/advisory