Deloitte-LBG UK screen 4:3 (19.05 cm x 25.40 cm) © 2013 Deloitte LLP. Private and confidential. Cyber Security. Evolved. Building Resilience 29th May 2013.

Slides:



Advertisements
Similar presentations
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Advertisements

Driving change in information risk within the financial services industry Subtitle Date.
The Corporate Laws Amendment Bill, B6/2006. © 2006 Deloitte Touche Tohmatsu Corporate Laws Amendment Bill, B6/2006 – 29 May 2006 Introduction Presenting.
© 2010 Deloitte Touche Tohmatsu Sustainable Business Australia Counting the beans - retro-fitted commercial buildings Chris Leach Partner, National Leader.
Deloitte UK screen 4:3 (19.05 cm x cm) © 2013 Deloitte LLP. All rights reserved. April 2013 Parameters of Competition for a Turkish International.
1 Cyber Risk – What can you do…? Chris Clark Managing Director, Prosperity 24.7.
Deloitte graduate opportunities
Government Finance Profession Annual Conference 19 th and 20 th November 2009 Margaret Ewing Partner and Vice Chairman Deloitte Managing Out of a Recession.
A Covenant University Presentation By Favour Femi-Oyewole, BSc, MSc (Computer Science), MSc (Information Security) Certified COBIT 5 Assessor /Certified.
Deloitte CFO Survey Q Fewer risks, greater optimism Feel free to use these slides in your presentations Internal webinar event, 16 th April CFO Survey.
Increasing customer value through effective security risk management
Retail and Consumer Roadmap to Retailing in the Digital Era Strictly Private and Confidential 17 June 2015.
Trade Across the Americas: Bolstering Security and Efficiency Supply Chain Risk Analytics May 2015.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Deloitte UK screen 4:3 (19.05 cm x cm) © 2012 Deloitte MCS Limited. All rights reserved. Storage Challenges Client Conundrums David RS Rogers \ 5.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Agenda Do You Need to Be Concerned? Information Risk at Nationwide
© 2012 Deloitte LLP. Private and confidential. FATCA Update for Individuals Alex Jones November 2013.
Tax Transformation: What does it mean to you?
Staying Ahead of the Curve in Cyber Security Bill Chang CEO, SingTel Group Enterprise.
Deloitte UK screen 4:3 (19.05 cm x cm) © 2014 Deloitte LLP. Private and confidential. Anti-bribery legislation Practical view on business implications.
Brand Resilience: Managing Risk and Recovery in a High Speed World Jonathan Copulsky Deloitte Consulting LLP Chief Executives’ Roundtable Series Lubbock,
Dell Connected Security Solutions Simplify & unify.
Deloitte UK screen 4:3 (19.05 cm x cm) Employment Support Services for ‘Deaf’ Users Understanding the current system 25 September 2014.
Results of CFO Survey in Central Europe The only way is up Gavin Hill Partner, Central Europe.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
Mike Wyatt, Director State Public Sector Cyber Risk Services
KNR- Studiedag 25 september 2013 Btw-checklist. © 2013 Deloitte The Netherlands KNR Studiedag Btw-checklist 1.
Georgia Gateway– Integrated Eligibility System (IES)
Deloitte Forensic Forensic Technology Conference of Regulatory Officers - CORO November 2012.
Threat context TLP WHITE Cyber security panel
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
Topic 5: Basic Security.
Tamra Pawloski Jeff Miller. The views, information, and content expressed herein are those of the authors and do not necessarily represent the views of.
Ewan Donald Cyber Security FEEL FREE A NEW APPROACH TO CYBER SECURITY.
Deloitte UK screen 4:3 (19.05 cm x cm) © All rights reserved. It’s your future, how far will you take it? Opportunities for School Leavers.
Benchmarking: Gaining a 360o view of your claims operation
CYBER RESILIENCE BEST PRACTICE. To Discuss Why cyber risk management is increasingly challenging How everyone has a role to play in your cyber risk management.
Unraveling technology speak October 2012 Steve Hallam Partner, Deloitte Digital.
Incident Response… Be prepared for “not if” but “when” it happens.
Security Mindset Lesson Introduction Why is cyber security important?
Evolution not revolution Trends in Compliance functions Kirsty Searles.
© 2013 Deloitte Belgium DEF-Debate “Cyber Security – Risks and Opportunities for Europe’s Economy ” May 21 st 2014 Erik R. van Zuuren Director Deloitte.
CYBER SECURITY & ITS IMPACT ON FINANCIAL STATEMENTS AUDITS BOB WAGNER TUESDAY, NOVEMBER FLORIDA SCHOOL FINANCE OFFICERS ASSOCIATION CONFERENCE.
Friday 22nd April 2016 DS Chris Greatorex SEROCU
PDP & Graduate Recruitment. Supporting Lifelong Professional Development.
External Threats Internal Threats Nation States Cyber Terrorists Hacktivists Organised criminal networks Independent insider Insider planted by external.
CLOSE THE SECURITY GAP WITH IT SOLUTIONS FROM COMPUTACENTER AND CISCO AUGUST 2014.
Cyber Risks: Protecting confidential data against unauthorized access Vik Bansal Deloitte & Touche LLP John Reidhead State of Utah March 17, 2016.
Cyber Security – Client View Peter Gibbons | Head of Cyber Security, Group Business Services Suppliers’ Summer Conference 15/07/2015.
© 2013 Deloitte Global Services Limited Growing Markets for Social Impact September 16 th, 2014 Global Public SectorThinking people.
1Third Party Assurance Optimization and Control RationalizationCopyright © 2016 Deloitte Development LLC. All rights reserved. Third-Party Assurance (TPA)
SADCOPAC Conference Accountability and Transparency in SOEs– opportunities and challenges for the Public Accounts Committees. September 2012.
How Do You Plan Inventory in an Omnichannel World? Integrated Merchandising, Planning, and Supply Chain Presentation and Panel Discussion Led by Jamie.
Cybersecurity as a Business Differentiator
What business really needs
CYBERSECURITY INCIDENCE IN THE FINANCIAL SERVICES SECTOR March 28, 2017 Presented by Osato Omogiafo Head IT Audit.
Information Security – Current Challenges
Stratford-upon-Avon: 14th March 2013
University of Stellenbosch Business School
Cyber Security: State of the Nation
Originating the role of Information Governance Officer
Securing the Law Firm Myth vs. Reality vs. Practicality:
Modernizing compliance: Moving from value protection to value creation
Threat Landscape for Data Security
DEF-Debate “Cyber Security – Risks and Opportunities for Europe’s Economy ” May 21st 2014 Erik R. van Zuuren Director Deloitte ERS BE Board Member EEMA.
Securing the Threats of Tomorrow, Today.
Keeping your data, money & reputation safe
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
Presentation transcript:

Deloitte-LBG UK screen 4:3 (19.05 cm x cm) © 2013 Deloitte LLP. Private and confidential. Cyber Security. Evolved. Building Resilience 29th May 2013 James Nunn-Price Partner and UK Cyber Security Lead, Deloitte

Deloitte-LBG UK screen 4:3 (19.05 cm x cm) © 2013 Deloitte LLP. Private and confidential. Bio James Nunn-Price James is Deloitte’s UK lead partner for Cyber Security He is also the Partner responsible for Deloitte’s information security and cyber advisory services to UK Government and is currently advising regulators on the UK and EU Cyber initiatives. He has over 15 years security experience assisting clients with a number of high-profile and complex challenges and prior to this a deep technology background.

Deloitte-LBG UK screen 4:3 (19.05 cm x cm) © 2013 Deloitte LLP. Private and confidential. New technology, new opportunities, new threats Exciting technological innovations bring opportunities to enter new markets, alternative business models, increase integration and drive efficiencies. But this opportunity brings security risk. Organisations are more exposed to cyber attacks than ever before. Assets that were once physically protected are accessible online; customer channels are vulnerable to disruption; criminals have new opportunities for theft and fraud. Cloud Nation states Espionage Criminal gangs Patch failure Hactivists Insiders Shared services Analytics Virtualisation Social Mobile Your Business

Deloitte-LBG UK screen 4:3 (19.05 cm x cm) © 2013 Deloitte LLP. Private and confidential. Companies like yours

Deloitte-LBG UK screen 4:3 (19.05 cm x cm) © 2013 Deloitte LLP. Private and confidential. In our latest global industry security survey 50 per cent* of companies had knowingly experienced an attack in the last 12 months. The frequency is increasing and it only takes a single weakness for an attack to be successful. Governments and regulators at national and international levels are looking to enhance the security of nation states, companies and their citizens to enhance cyber resilience, reduce cyber-crime and protect opportunities for future economic growth The cost to UK Business, £27 billion and growing... *Deloitte’s 2012 Report, Blurring the Lines

Deloitte-LBG UK screen 4:3 (19.05 cm x cm) © 2013 Deloitte LLP. Private and confidential. From hype to reality *Deloitte’s 2013 Report, A Secure Consumer Our 2013 security survey reveals the true impact of cyber attacks on UK citizens* Receive phishing s Were victims of cybersquatting Had their computer affected with malware 65 % 32 % 26 %

Deloitte-LBG UK screen 4:3 (19.05 cm x cm) © 2013 Deloitte LLP. Private and confidential. More targeted and sophisticated Global exposure Commoditisation of exploitation Relentless/persistent attacks Low stake high rewards Accidental discovery Malware Cyber squatting Phishing and determination Increasing sophistication determination Increasing Insider threats Competitor risk Nation state cyber warfare Hacktivism Script kiddy Botnet The threat is real and growing and sophistication

Deloitte-LBG UK screen 4:3 (19.05 cm x cm) © 2013 Deloitte LLP. Private and confidential. The threat intelligence – key terms 101 Cyber Campaigns Phishing Artificial websites linked from forged s with the express intent to defraud customers, either for money or sensitive information. E.g., usernames and passwords. Malware Malicious software, generally concealing its presence, that contains references to a company's domain name or IP addresses. Vulnerabilities Planned, in progress or executed attacks by individuals or organisations of cyber criminals. Examples include Anonymous, 3xp1r3 Cyber Army, & Iran Security Team. Social Media Detection of un-authorised social profiles, compromised social media user accounts as well as adverse / negative mentions. Information Leakage Sensitive and non-sensitive information belonging to the companies being posted online. Information which describes systems, databases, networks, devices, applications and their corresponding websites that are vulnerable to attack. Cyber- Squatting Domains that are not owned by the likely / related company, but registered to be used by cyber criminals for the purposes of defraud customers or extorting companies. Advanced Persistent Threat (APT) is a term for highly skilled targeted attacks that use all of the above over a sustained period of time.

Deloitte-LBG UK screen 4:3 (19.05 cm x cm) © 2013 Deloitte LLP. Private and confidential. So, what does an attack look like? Seconds to enter your organisation Minutes to start extracting your data Days, weeks or even months until discovery Response and containment, until the next time? Initial stages are slow and quiet as attackers try to compromise your defences. It only takes a single weakness to get in... From then its takes:

Deloitte-LBG UK screen 4:3 (19.05 cm x cm) © 2013 Deloitte LLP. Private and confidential. Loss of consumer confidence, loss of sales Brand reputation and market confidence damaged Lost IP reducing commercial advantage Operating margin down and assets devalued Reduced stakeholder confidence Depending on how an organisation responds, the business impact can severely dent the reputation and performance of even the most established firm. The devastating impact of an attack Intense and prolific media coverage exposing breach

Deloitte-LBG UK screen 4:3 (19.05 cm x cm) © 2013 Deloitte LLP. Private and confidential. Painful questions for business Cyber attacks bring an organisation under the spotlight with stakeholders probing for answers: Where was the defence? Was there no intelligence? Did the execs understand the risk? Was there no priority at board level to protect the firm? Why was the response so slow? ?*!&

© 2013 Deloitte LLP. Private and confidential. The future of security – are you evolving? “Ignorance more frequently begets confidence than does knowledge;” Charles Darwin Activities are still largely reactive and compliance-driven: Largely compliance focused Developing policies Meeting industry baselines Audit Often limited visibility or interest to the business – unless something goes wrong Touching some change programmes Limited future watching Low operational agility Social forces Technological forces Organisation Political forces Environmental forces Legislative forces Economic forces

Deloitte-LBG UK screen 4:3 (19.05 cm x cm) © 2013 Deloitte LLP. Private and confidential. Striving for cyber resilience To succeed companies need to take control of their cyber risks, building cyber resilience Companies need to be aware of the latest risks; prepare their organisations to be robust and; respond quickly and effectively to mitigate new risks. By getting this right, organisations can evolve to cyber resilience enabling them to focus on core business, rather than reactively managing and responding to security incidents. Board and Audit Committee owned risk – don’t over delegate to IT! Cyber Security. Evolved.

© 2013 Deloitte LLP. Private and confidential. Questions?

© 2013 Deloitte LLP. Private and confidential. Deloitte refers to one or more of Deloitte Touche Tohmatsu Limited (“DTTL”), a UK private company limited by guarantee, and its network of member firms, each of which is a legally separate and independent entity. Please see for a detailed description of the legal structure of DTTL and its member firms. Deloitte LLP is the United Kingdom member firm of DTTL. This publication has been written in general terms and therefore cannot be relied on to cover specific situations; application of the principles set out will depend upon the particular circumstances involved and we recommend that you obtain professional advice before acting or refraining from acting on any of the contents of this publication. Deloitte LLP would be pleased to advise readers on how to apply the principles set out in this publication to their specific circumstances. Deloitte LLP accepts no duty of care or liability for any loss occasioned to any person acting or refraining from action as a result of any material in this publication. Deloitte LLP is a limited liability partnership registered in England and Wales with registered number OC and its registered office at 2 New Street Square, London EC4A 3BZ, United Kingdom. Tel: +44 (0) Fax: +44 (0) © 2013 Deloitte LLP. All rights reserved.