Nine recommendations for alternative funds battling cyber crime. kpmg.ca/cybersecurity

Similar documents
Cyber Security Risks for Banking Institutions.

Cyber security: Are consumer companies up to the challenge?

Cyber Security for audit committees

Teradata and Protegrity High-Value Protection for High-Value Data

Security and Privacy

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility

10 Smart Ideas for. Keeping Data Safe. From Hackers

defending against advanced persistent threats: strategies for a new era of attacks agility made possible

External Supplier Control Requirements

How-To Guide: Cyber Security. Content Provided by

THE PERFECT STORM WEATHERING CYBER THREATS IN THE HEALTHCARE INDUSTRY

Central and Eastern European Data Theft Survey 2012

Cyber security Time for a new paradigm. Stéphane Hurtaud Partner Information & Technology Risk Deloitte

How To Protect Your Organization From Insider Threats

WHAT EVERY CEO, CIO AND CFO NEEDS TO KNOW ABOUT CYBER SECURITY.

WHITE PAPER KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST PROTECTING THE PROTECTOR

A NEW APPROACH TO CYBER SECURITY

7 VITAL FACTS ABOUT HEALTHCARE BREACHES.

Data Security: Fight Insider Threats & Protect Your Sensitive Data

THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

A BUSINESS CASE FOR BEHAVIORAL ANALYTICS. White Paper

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

OCIE Technology Controls Program

Services. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure

Plan of Attack 5 Step Plan

New PCI Standards Enhance Security of Cardholder Data

CYBER SECURITY INFORMATION SHARING & COLLABORATION

Is the PCI Data Security Standard Enough?

Franchise Data Compromise Trends and Cardholder. December, 2010

Seamless Mobile Security for Network Operators. Build a secure foundation for winning new wireless services revenue.

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

Protecting Your Data, Intellectual Property, and Brand from Cyber Attacks

Can Your Organization Brave The New World of Advanced Cyber Attacks?

Time Is Not On Our Side!

Increase insight. Reduce risk. Feel confident.

Cyber security: it s not just about technology

PCI Compliance for Healthcare

CYBERSECURITY: Is Your Business Ready?

What SMBs Don t Know Can Hurt Them Perceptions vs. Reality in the New Cyber Threat Landscape

2012 Endpoint Security Best Practices Survey

Bellevue University Cybersecurity Programs & Courses


Combating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center

Access is power. Access management may be an untapped element in a hospital s cybersecurity plan. January kpmg.com

Developing Secure Software in the Age of Advanced Persistent Threats

Cyber threat intelligence and the lessons from law enforcement. kpmg.com/cybersecurity

IT Security Risks & Trends

London Business Interruption Association Technology new risks and opportunities for the Insurance industry

The Business Case for Security Information Management

Proactive Credential Monitoring as a Method of Fraud Prevention and Risk Mitigation. By Marc Ostryniec, vice president, CSID

Nine Steps to Smart Security for Small Businesses

Cyber Security: Confronting the Threat

MANAGING RISK: SECURING DIGITAL IDENTITIES Striking the balance between user experience and security

Today s Cybersecurity Technology: Is Your Business Getting Full Protection?

Surviving the Ever Changing Threat Landscape

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

A Wake-Up Call? Fight Back Against Cybercrime. Prepared for: Ricky Link Managing Director, Southwest Region May 15, 2014

Five keys to a more secure data environment

Managed Security Services

2015 VORMETRIC INSIDER THREAT REPORT

Small businesses: What you need to know about cyber security

Cyber Security Trends Market trends from leading security analysts and consultants at TÜV Rheinland, OpenSky, and OpenSky UK

Security Overview. BlackBerry Corporate Infrastructure

RETHINKING CYBER SECURITY Changing the Business Conversation

Nine Cyber Security Trends for 2016

Cyber Security An Exercise in Predicting the Future

White Paper. Data Security. The Top Threat Facing Enterprises Today

20+ At risk and unready in an interconnected world

WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY

Connecting the dots: A proactive approach to cybersecurity oversight in the boardroom. kpmg.bm

Building a Business Case:

CYBERCRIME AND THE HEALTHCARE INDUSTRY

Big Data, Big Risk, Big Rewards. Hussein Syed

Protecting What Matters Most. Terry Ray Chief Product Strategist Trending Technologies Session 11

Data breach! cyber and privacy risks. Brian Wright Michael Guidry Lloyd Guidry LLC

Data- centric Security: A New Information Security Perimeter Date: March 2015 Author: Jon Oltsik, Senior Principal Analyst

2012 Bit9 Cyber Security Research Report

CYBER & PRIVACY INSURANCE FOR FINANCIAL INSTITUTIONS

SMALL BUSINESS REPUTATION & THE CYBER RISK

Use Bring-Your-Own-Device Programs Securely

The SQL Injection Threat & Recent Retail Breaches

on Data and Identity Theft*

How To Handle A Threat From A Corporate Computer System

$194 per record lost* 3/15/2013. Global Economic Crime Survey. Data Breach Costs. David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP

NATIONAL CYBER SECURITY AWARENESS MONTH

Defending yesterday. Financial Services. Key findings from The Global State of Information Security Survey 2014

The 12 Essentials of PCI Compliance How it Differs from HIPPA Compliance Understand & Implement Effective PCI Data Security Standard Compliance

What keep the CIO up at Night Managing Security Nightmares

The Four-Step Guide to Understanding Cyber Risk

Pursuing Compliance with the FFIEC Guidance Risk Assessment 101 KPMG RISK ADVISORY SERVICES

Cyber- Attacks: The New Frontier for Fraudsters. Daniel Wanjohi, Technology Security Specialist

Why should I care about PDF application security?

Cyber Threats: Exposures and Breach Costs

I ve been breached! Now what?

Privilege Gone Wild: The State of Privileged Account Management in 2015

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

Cyber Security. The changing landscape. Financial Sector. March 4-5, 2014

Application Security in the Software Development Lifecycle

Transcription:

Nine recommendations for alternative funds battling cyber crime kpmg.ca/cybersecurity

Cyber criminals steal user names and passwords and use it to conduct financial trading activity illicitly. Hackers seek ransom payments for private information of a prominent investor. Your fund headlines the paper when an attack crashes your trading network and disrupts the financial markets.

The cyber threat has reached the stock market and criminals are targeting publicly traded organizations with the sole purpose of market manipulation. Kevvie Fowler, Partner, Cyber Security & National Cyber Forensics Leader A recent New York Times article says cyber criminals are zeroing in on alternative investment (AI) funds, many of which oversee massive pools of assets but haven t invested sufficiently in security i. Furthermore, a report on the Operation Cleaver campaign indicates that financial services, alternative investment and private equity firms are targets for nation state actors ii. It s no wonder many fund managers feel as if they are in a losing battle against cyber crime. KPMG explored cyber security in the AI industry during a January 2015 webcast featuring our own cyber security specialists. During the event, we polled approximately 2,000 AI managers about their experiences with cyber crime. This article shares the findings and provides AI managers tips for minimizing cyber risk. i Cybercriminals Zero In on a Lucrative New Target: Hedge Funds (The New York Times, 6.19.2014) ii Operation Cleaver Report (Cylance, 2014) Nine recommendations for alternative funds battling cyber crime 1

The front lines Here s what fund managers face on the front lines of today s cyber security conflict. The enemy has evolved Today s hackers include organized crime syndicates, stealing intellectual property and personal information from corporate networks. These assets are a goldmine to the cyber criminals, who profit directly, seek ransom payments or sell on the black market. Or, they are foreign nation states, intent on disabling the economy or destroying reputations through embarrassing and costly intrusions. And while recent coverage revolved around payment card industry (PCI) data, advanced persistent threat (APT) actors are now going after intellectual property, merger and acquisition data, personally identifiable information (PII), and any other data that might give an attacker applying APT techniques a leg up. The battleground has expanded Organizations today need to protect a widening perimeter that includes third parties, with their own ecosystem of software, systems, desktops, laptops, and mobile devices. And complicating matters further, smart and wireless technology, like printers, may connect to your core IT infrastructure and could be the weak spot cyber criminals exploit. The cause is more important than ever Our intelligence tells us that cyber attacks are going to become more frequent, more sophisticated and more dangerous as time goes on. Just look at how losses are mounting. KPMG s 2013 Data Loss Barometer Survey found that the average loss by a U.S. financial services company from cyber breaches was $23.6 million iii, while a 2014 Ponemon Institute study found the cost of a data breach across industries was $3.5 million, 15 percent more than the prior year iv. Spend is skyrocketing, too. Gartner estimates that the overall worldwide security spend on technology and services will reach $76.9 billion in 2015 v. But will this spend be effectively directed? iii Ponemon Institute Releases 2014 Cost of Data Breach: Global Analysis (Ponemon Institute, 5.5.2014) iv Gartner Says Worldwide Information Security Spending Will Grow Almost 8 Percent in 2014 as Organizations Become More Threat-Aware (Gartner, 8.22.2014) v Research conducted through a survey of approximately 2000 alternative investment managers during a January 2015 KPMG webcast 2 Nine recommendations for alternative funds battling cyber crime

Nine cyber defense recommendations AI funds need to step up their defenses to avoid the reputational and financial damage of a major cyber breach. From our extensive work advising funds on best practices across the cyber security spectrum, here are nine strategies to help funds battle cyber crime. 1 2 3 Rethink the governance model. Cyber security is a business problem, not just an IT problem. It should be treated as such and handled as such. A recent KPMG poll encouragingly found most funds (82 percent) have a dedicated information security officer, but all C level executives must be engaged in the prevention and response to an attack. Manage the internal threat. As the universe of people with access to your IT infrastructure explodes, funds need to take internal security seriously, especially those with Bring Your Own Device (BYOD) programs, online operations, or applications in the cloud. Disgruntled employees, contract employers with privileged access, and fraudsters could all pose a risk. Build a cyber awareness program. People are the weakest link. As such, employee training and development should be a core aspect of any fund s security program, and firms should validate training through targeted social engineering. Effective user awareness is also critical for any external providers handling your data, which leads to our fourth strategy. CYBER SECURITY STATISTICS (U.S.) 82 % Funds with a dedicated information security officer or group 45 % Funds with a written cyber security incident response plan 64 % Funds that restrict certain information from leaving the internal network 44 % Funds focused on enhancing third party data security oversight vi Nine recommendations for alternative funds battling cyber crime 3

4 5 6 7 8 9 Improve third party security assessment. Third parties could expose funds to cyber risk. Major retailers, for example, have been compromised through their heating, ventilating and air conditioning (HVAC) vendors vi. Our poll shows that only 44 percent of funds are focused on third party data security oversight. As your third party network grows, look closely at what type of sensitive information you share, how it is encrypted, how vendors secure it, and how your organization can reclaim previously provided data. Consider emerging technology risks. Closely review the security implications of moving to the cloud or sharing information on social media. Install security software on devices. And, like 64 percent of funds in our poll, block the ability to download or remove certain sensitive information. Given the dangers of advanced persistent threats, strong network protection and safety measures are especially important today. Enhance security intelligence. Beyond installing the latest patches and managing firewalls, funds can step up security intelligence by collaborating with security intelligence aggregators, analyzing log data, and introducing new models for identity, trust, authentication and entitlements. Develop an incident response plan. Unlike the majority of the funds we surveyed, you should have a formal cyber security incident response plan you follow in the event of a network compromise. And you should regularly test the plan, just like any other business continuity program. The plan should have both executive and technical components and identify all participants in your response, as your customers will expect to hear from business executives should an incident occur. Conduct a risk assessment. The assessment can help you understand your cyber risk, including how you rank against peers and against industry standards, so you can focus resources on improving the most vulnerable areas that represent the highest areas risk to your business. The risk assessment should also include a prioritized action plan for strategic security initiatives. Enhance data classification and management. Do you know what your most valuable data is, where it resides, how many copies exist, or even who owns it, let alone who is entitled to view it? A data classification program, which involves categorizing data according to its sensitivity, is an extremely important step in building a secure organization. To build a risk-based security controls program, funds should carefully consider how they define their levels of data. What s more, you can no longer collect unimaginable volumes of data without consequence. Safeguarding it also requires a robust data privacy and security strategy.. vi HVAC Vendor Eyed as Entry Point for Target Breach (CNN Money, 2.6.2014) 4 Nine recommendations for alternative funds battling cyber crime

Nine recommendations for alternative funds battling cyber crime 5

Be in a Defensible Position. Be Cyber Resilient. To learn more about how we can help your organization be cyber resilient, please reach out to us. Benjie Thomas National Industry Leader Private Equity T: + 1 416 777 8715 E: bthomas@kpmg.ca Kevvie Fowler Partner, Cyber Security & National Cyber Forensics Leader T: +1 416 777 3742 E: kevviefowler@kpmg.ca Paul Hanley Partner, National Cyber Security Services Leader T: +1 416 777 8501 E: pwhanley@kpmg.ca Peter Hayes Partner, Audit, National Director Alternative Investments Practice T: +1 416 777 3939 E: phayes@kpmg.ca kpmg.ca/cybersecurity The information contained herein is of a general nature and is not intended to address the circumstances of any particular individual or entity. Although we endeavor to provide accurate and timely information, there can be no guarantee that such information is accurate as of the date it is received or that it will continue to be accurate in the future. No one should act on such information without appropriate professional advice after a thorough examination of the particular situation. firms affiliated with KPMG International Cooperative ( KPMG International ), a Swiss entity. All rights reserved. 10400 The KPMG name, logo and cutting through complexity are registered trademarks or trademarks of KPMG International.