Cybersecurity Awareness for Executives



Similar documents
A Guide to Successfully Implementing the NIST Cybersecurity Framework. Jerry Beasley CISM and TraceSecurity Information Security Analyst

Obtaining Enterprise Cybersituational

Compliance Guide ISO Compliance Guide. September Contents. Introduction 1. Detailed Controls Mapping 2.

Defending Against Data Beaches: Internal Controls for Cybersecurity

Rethinking Information Security for Advanced Threats. CEB Information Risk Leadership Council

Cybersecurity. Are you prepared?

GEARS Cyber-Security Services

Cyber-Security. FAS Annual Conference September 12, 2014

New York State Department of Financial Services. Report on Cyber Security in the Insurance Sector

FFIEC Cybersecurity Assessment Tool Overview for Chief Executive Officers and Boards of Directors

BECAUSE CYBERSECURITY RISKS ARE ENTERPRISE RISKS.

ISE Northeast Executive Forum and Awards

Practical Steps To Securing Process Control Networks

Logging In: Auditing Cybersecurity in an Unsecure World

ICBA Summary of FFIEC Cybersecurity Assessment Tool

Jumpstarting Your Security Awareness Program

Cyber Security Management

Developing a Successful Security Awareness Training Program. Shea Garber, Sr. Account Executive Wombat Security Technologies, Inc.

Advanced Threat Protection with Dell SecureWorks Security Services

The Importance of Cyber Threat Intelligence to a Strong Security Posture

Experience the commitment WHITE PAPER. Information Security Continuous Monitoring. Charting the Right Course. cgi.com 2014 CGI GROUP INC.

Enterprise Security Governance. Robert Coles Chief Information Security Officer and Global Head of Digital Risk & Security

5 TIPS FOR MAXIMIZING THE VALUE OF YOUR SECURITY ASSESSMENT

VENDOR MANAGEMENT. General Overview

Tuesday, August 19th Prevent, Detect, Respond: A Framework for Effective Cyber Defense Dr. Eric Cole, Fellow, SANS Institute

Cybersecurity The role of Internal Audit

HEALTH CARE AND CYBER SECURITY:

NIST Cybersecurity Framework & A Tale of Two Criticalities

Cybersecurity Awareness. Part 1

What Directors need to know about Cybersecurity?

Sytorus Information Security Assessment Overview

The Path Ahead for Security Leaders

CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS

Building Blocks of a Cyber Resilience Program. Monika Josi monika.josi@safis.ch

developing your potential Cyber Security Training

Zak Khan Director, Advanced Cyber Defence

Formulate A Database Security Strategy To Ensure Investments Will Actually Prevent Data Breaches And Satisfy Regulatory Requirements

Cyber4sight TM Threat. Anticipatory and Actionable Intelligence to Fight Advanced Cyber Threats

Protecting against cyber threats and security breaches

Cyber Security and the Board of Directors

The Changing IT Risk Landscape Understanding and managing existing and emerging risks

KUDELSKI SECURITY DEFENSE.

CONSULTING IMAGE PLACEHOLDER

Developing Secure Software in the Age of Advanced Persistent Threats

CYBER ATTACK INCIDENT RESPONSE READINESS PREPARING FOR THE INEVITABLE. Rob Sloan

Testimony of Dan Nutkis CEO of HITRUST Alliance. Before the Oversight and Government Reform Committee, Subcommittee on Information Technology

Remarks by. Thomas J. Curry. Comptroller of the Currency. Before the. Chicago. November 7, 2014

COUNTERINTELLIGENCE. Protecting Key Assets: A Corporate Counterintelligence Guide

GETTING REAL ABOUT SECURITY MANAGEMENT AND "BIG DATA"

State of Security Survey GLOBAL FINDINGS

Is Your Company Ready for a Big Data Breach?

The NIST Cybersecurity Framework (CSF) Unlocking CSF - An Educational Session

OCIE CYBERSECURITY INITIATIVE

Accenture Intelligent Security for the Digital Enterprise. Archer s important role in solving today's pressing security challenges

Managing Cyber Threats Risk Management & Insurance Solutions. Presented by: Douglas R. Jones, CPCU, ARM Senior Vice President & Principal

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst

RSA CYBERSECURITY POVERTY INDEX 2015

A NEW APPROACH TO CYBER SECURITY

The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/

How To Handle A Threat From A Corporate Computer System

Cisco Security Optimization Service

FFIEC Cybersecurity Assessment Tool

October 24, Mitigating Legal and Business Risks of Cyber Breaches

Avoiding the Top 5 Vulnerability Management Mistakes

NATIONAL CYBER SECURITY AWARENESS MONTH

GUIDE TO IMPROVING INFORMATION SECURITY IDENTIFYING WEAKNESSES & STRENGTHENING SECURITY

Security Controls Implementation Plan

Connecting the dots: A proactive approach to cybersecurity oversight in the boardroom. kpmg.bm

Cyber threat intelligence and the lessons from law enforcement. kpmg.com/cybersecurity

CYBER & PRIVACY INSURANCE FOR FINANCIAL INSTITUTIONS

Italy. EY s Global Information Security Survey 2013

Utility-Scale Applications of Microgrids: Moving Beyond Pilots Cyber Security

Information Security Incident Management Guidelines

SURVEY REPORT SPON. Identifying Critical Gaps in Database Security. Published April An Osterman Research Survey Report.

THE EVOLUTION OF CYBERSECURITY

FINRA Publishes its 2015 Report on Cybersecurity Practices

PREPARED DIRECT TESTIMONY OF SCOTT KING ON BEHALF OF SOUTHERN CALIFORNIA GAS COMPANY

Operational Risk Management - The Next Frontier The Risk Management Association (RMA)

Cybersecurity. Considerations for the audit committee

Risk Considerations for Internal Audit

Click to edit Master title style

PRIORITIZING CYBERSECURITY

SECURITY OPERATIONS CENTER (SOC) Implementing Security Monitoring in Small and Mid-Sized Organizations

Security and Privacy Trends 2014

Everything You Wanted to Know about DISA STIGs but were Afraid to Ask

Transcription:

SESSION ID: SOP-R04 Cybersecurity Awareness for Executives Rob Sloan Head of Cyber Content and Data Dow Jones @_rob_sloan

Session Overview Aim: Provide a high level overview of an effective cybersecurity awareness program for executives in any size of enterprise Objectives: Discuss necessity, scope and pre-requisites Consider challenges of delivery Focus on individual elements of program Application: Putting a program into practice and content suggestions 2

Dow Jones and Cyber Risk 3

Awareness is Essential Cybersecurity is no longer solely an I.T. risk Potential loss of revenue, customers, reputation, IP, PII Regulatory responsibility Significant risks to organizations Network size and complexity makes defense near impossible Evolving threat landscape Shortage of suitably qualified/skilled/experienced professionals General lack of cyber awareness among executives Cybersecurity knowledge based on headlines & vendors Awareness closely linked to organizational cyber security maturity 4

Awareness & Maturity Maturity Curve Awareness Curve Level Low Medium High Tactical Metrics Long-term sustainment Clarity of risk Awareness & change Cyber threat awareness Executive hygiene Compliance focused Non-existent Non-existent Time Managed risk Strategic Maturity level credit: Lance Spitzner, Sans High Medium Low Maturity 5

One Size Does Not Fit All Variety of factors will influence program: Size of organization Security maturity Industry Perceived threat Data loss experience Criticality of data at risk Time available Level of interest 6

Scope and Considerations Which executives need awareness briefings and what is their existing level of awareness? What does the executive need to know? Tailored to the individual executive or generic? Where do these briefings fit into wider cyber security strategy priorities? How will program be structured and scheduled? Who will deliver the briefings? 7

Pre-requisites Establish the critical data assets of the organization and the defenses in place to protect them Collect evidence of previous compromises, data breaches, and impact. Repeat for peer organizations Perform a gap analysis to establish the true state of cyber preparedness Understand the executive and their focus, the hardware / software they use, and their current level of awareness 8

Practical Application

Cyber Hygiene The executive must understand that they are at heightened risk of being targeted themselves Basic protective security advice in line with that provided to the wider user community, complemented with tailored assistance depending on their devices Visual examples of the social engineering and phishing attacks to highlight reasons for suspicion Executive support in case of issues Annual refresher and/or ad hoc alerts 10

Cyber Hygiene Key points for delivery: Understand how the individual executive likes to consume information Use professional materials and provide a takeaway sheet Be led by the executive Do not focus on the tech Keep it short and to the point This is hygiene, not vaccination 11

Threat Landscape The executive needs to understand the threat actors and their capabilities What data does your organization have that threat actors might target and for what purpose? Has your organization or industry been targeted by cyber threat actors? What was the impact? How is the organization getting better insight into the landscape? 12

Threat Landscape Key points for delivery: Do not resort to FUD Keep it relevant to your industry Include statistics and their sources Use example incidents from your organization and focus on the business, not the tech Exploit vendor materials, open source, and government reports Brief at least annually, supplemented with ad hoc relevant briefings to highlight incidents and landscape trends 13

Organizational Risk This is the heart of the awareness program. Understanding risk and potential impact, and measures to deal with it Significant preparatory work may be necessary including third party consultancy engagements Risk assessment Threat assessment Gap analysis Internal regular engagement with legal, marketing, comms, business leads, risk owners, IT, and internal experts Executives require a clear picture of critical data risk exposure against the current level of investment and staffing 14

Organizational Risk Risk = Threat x Vulnerability x Cost Ultimate outcome is the ability to reduce and track risk with metrics Number of attacks detected Number of successful compromises Impact of compromises Quantification of risk Compliance with regulations and adoption of standards The maturity of the cyber security program will aid the tracking of risk and vice versa 15

Cyber Awareness Timeline Cyber Hygiene Content Threat Landscape Content Initial hygiene briefing Organizational Risk Content Information Gathering Threat landscape briefing On-going quarterly organizational risk briefings Ad hoc update Refresher Q1 Q2 Q3 Q4 Q5 Q6 16

Outcomes & Benefits Immediate benefits: Cyber security strategy strengthened with high-level buy-in and leadership Recognition of cyber as a business risk Decision-making based on subject matter familiarity Stronger tactical/strategic response to breaches Longer term benefits: Support for security mission drives investment Potential for new lines of business Organizational and personal advantages 17

Initial Steps Gap Analysis Establish awareness gaps Collect requirements for cyber briefings from individual executives Budget for projects to determine exposure to threat and risk Risk Assessment People Confidentiality Integrity Threats Availability Process Threat Assessment Set responsibility for tracking landscape evolution and cyber hygiene Technology Metrics 18

Final Thought Cyber security is everyone s responsibility, but leadership starts at the top 19

Questions