Cybersecurity as a Business Differentiator

Slides:



Advertisements
Similar presentations
Forensic and Investigative Accounting Chapter 16 Cybercrime Loss Valuations © 2011 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL
Advertisements

© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Polycom event Security Briefing 12/03/14 Level 3 Managed Security.
The Business of Empowering Women November 18, 2009 Presentation at the World Bank’s GAP Event Working Women: Better Outcomes for Growth CONFIDENTIAL AND.
Nick Wildgoose 8 March 2012 BCI Workshop DELETE THIS TEXT AND PUT COMPANY LOGO IN THIS WHITE SPACE Understanding Risk within your Supply Chain SC1(V1)Jul/05/10GC/ZCA.
Enterprise Computing Community June , 2010February 27, Information Security Industry View Linda Betz IBM Director IT Policy and Information.
Dell Connected Security Solutions Simplify & unify.
Cyber Security Nevada Businesses Overview June, 2014.
Privacy and Security Risks to Rural Hospitals John Hoyt, Partner December 6, 2013.
℠ Pryvos ℠ Computer Security and Forensic Services May 27, 2015 Copyright © 2015 Pryvos, Inc. 1.
Developments, Trends and Implications for Executive Development June 2010 Nice, France.
What Keeps Your Board Up at Night? Sylvia Kerrigan, Exec. VP, General Counsel & Secretary – Marathon Oil Sean Gorman, Partner – Bracewell & Giuliani.
Microsoft Belgium Security Summit Georges Ataya S olvay B usiness S chool, ISACA Belux Detlef Eckert Microsoft EMEA.
DRAFT 1 Belfast th World Cyber Security Technology Research Summit Suren Gupta Allstate Corporation Executive Vice President Allstate Technology.
Territory Insurance Conference, resilient future Mr Ralph Bönig, Special Counsel, Finlaysons Cyber Times and the Insurance Industry Territory Insurance.
Visibility. Intelligence. response Information Security: Risk Management or Business Enablement? Mike Childs Vice President Rook Security.
The cost of Cybercrime 1 Steve Lamb Regional Marketing Manager – EMEA, Enterprise Security Products Twitter: actionlamb.
Legal Jeopardy: Whose Risk Is It?. SPEAKERS Jason Straight Chief Privacy Officer and Senior Vice President Cyber Risk Solutions at UnitedLex Patrick Manzo.
External Threats Internal Threats Nation States Cyber Terrorists Hacktivists Organised criminal networks Independent insider Insider planted by external.
Trinity Industries, Inc. FEI Presentation May 31, 2012.
HOW TO AVOID COMMON DATA BREACH PITFALLS IAPP Privacy Academy 2014.
CLOSE THE SECURITY GAP WITH IT SOLUTIONS FROM COMPUTACENTER AND CISCO AUGUST 2014.
Cyber Insurance Risk Transfer Alternatives Heather Soronen - Operations Director Rocky Mountain Insurance Information Association.
Cyber Security June 2016.
Edison Electric Institute Cybersecurity 101 October 24,
Prevent - Stopping People Becoming Terrorists or Supporting Terrorism Detective Chief Superintendent Alan Lyon National Coordinator Prevent
Project risk, cybercrime and the way forwards – further thoughts APM Risk SIG presentation 8th November v0.1.
Presented by: Mike Gerdes Director, Information Security Center of Expertise Cybersecurity State of the Union.
Cyber Security Phillip Davies Head of Content, Cyber and Investigations.
Threats & Challenges in the Digital World EY 2015 Global Information Security Survey.
What, when and how – are you prepared?
Cyber Insurance Risk Transfer Alternatives
Cyber in Financial Services
Increasing Information and Data Security in Today’s Cybersecurity World 2017 Conference Review 6/6/2017.
CYBERSECURITY INCIDENCE IN THE FINANCIAL SERVICES SECTOR March 28, 2017 Presented by Osato Omogiafo Head IT Audit.
Physical Security Governance Model
Managing risk – it’s good for business!
Information Security Program
Protecting Our Reputation is Everybody’s Job
CIS 500 Slingshot Academy / cis500.com
Information Security – Current Challenges
Healthcare Cybersecurity: State of Industry
Board Concerns About Cyber Security
Gelişmiş Tehdit Korumasının İnkar Edilemez 4 Gerçeği
Cyber Protections: First Step, Risk Assessment
Information Security: Risk Management or Business Enablement?
Data Security Team 1.
CYBER CRIME Matthew Purchase.
cyberopsalliance.com |
Cyber Trends and Market Update
Understanding Cyber Insurance NASCUS/CUNA Cybersecurity Symposium
National Cyber Security
Threat Monitoring and Defense A fully managed and monitored security and compliance solution for cloud, hybrid, & on-premises infrastructure.
DATA LOSS PREVENTION Mr. Collins Oduor.
IS Risk Management Framework Overview
Protect Your Ecommerce Site From Hacking and Fraud
Forensic and Investigative Accounting
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
Strategic threat assessment
MAZARS’ CONSULTING PRACTICE
No!. [NEXT SLIDE] LOGO HERE.
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
Session 8: Innovative Uses of Captives: Cyber and Beyond
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
Texas Assisted Living Association 2019 Conference
Leading financial services provider
SECURITY IN THE DIGITAL AGE
Cybersecurity and its Relevance to CIT
Protecting Knowledge Assets – Case & Method for New CISO Portfolio
Presentation transcript:

Cybersecurity as a Business Differentiator February 28, 2017 Presented by Susan Whittemore VP, Enterprise Cybersecurity Fidelity Investments

Susan Whittemore VP, Consulting, Enterprise Cybersecurity Joined Fidelity in 2007 Leads a security consulting team serving the enterprise Manages the information security office for several business units Over 20 years in the cybersecurity field Profile Senior-level cybersecurity positions at: Previous Positions Previous positions in audit, accounting, and operations management BS Business Administration Worcester State University Education

Strategic Forces Shaping Cyber Significant Cyber Events in 2016 Social Media Infrastructure & Government Healthcare Hospitality Business

The Threat Landscape Impact: Costly regulatory inquiries and penalties, consumer and shareholder lawsuits, loss of consumer confidence Motivation: Financial gain 2017 Outlook: Cyber-extortion will continue to rise Impact: Competitive advantage, trade secret disclosure, operational disruption, brand and reputation Motivation: Personal advantage, monetary gain, professional revenge, patriotism 2017 Outlook: More organizations will implement insider threat mitigation programs and processes Impact: Disruption of business activities, brand and reputation, loss of consumer confidence Motivation: Negatively impact reputation, drive attention to a cause, pressure for change 2017 Outlook: Expected to escalate attack methods with high-profile data breaches Impact: loss of competitive advantage, disruption to critical infrastructure Motivation: Economic, political, and/or military advantage 2017 Outlook: Will continue to strengthen their defensive and offensive cyber skills

Cybersecurity The cost and risks of cyber attacks are increasing Cyber Threat Landscape Cybersecurity events and costs are increasing: 79% of survey respondents detected a security incident in the past 12 months1 Average total cost of a data breach increased 23% over the past two years2 Average cost paid for each lost / stolen record increased 6%1 Industry Outlook Data breaches are expected to reach $2.1 trillion globally by 20193 76% of survey respondents1 were more concerned about cybersecurity threats than in previous 12 months: Increase from 59% in 2014 Reputational Risk An IT security breach can have serious implications in how a company is perceived: 46% of companies suffered damage to reputation & brand value due to a security breach4 19% of companies suffered damage to reputation & brand value due to a third-party security breach or IT system failure4 The risk of losing customer trust is significant and rising: 82% of customers would consider leaving an institution that suffered a data breach5 Source: 1U.S. State of Cybercrime Survey, 2Ponemon Institute, 3Juniper Research , 4Forbes

Cybersecurity A critical part of a company’s business strategy Board level engagement, business driven strategy Risk based approach is key — threats vary according to industry, but all industries are vulnerable As technology advances, so do the threats; it is harder than ever to protect business processes and information Compliance and regulatory requirements are a factor Strategy must be consumable and scalable The U.S. Government has identified cybersecurity as “one of the most serious economic and national security challenges we face as a nation”1 Source: 1U.S. White House Office

Cybersecurity = Trust = Business Value Cyber is a compelling business differentiator Safeguarding intellectual property, financial information, and a company’s reputation is fundamental to business strategy Clients expect their data and their assets to be secure, and services to be available Cyber is not just about technology, it’s also about people and processes A diverse and talented workforce can be the difference between cyber being viewed as a technology solution or as a business differentiator

1 million cybersecurity job openings globally in 2016* 8 *Cisco, 2016; 1Information System Security Certification Consortium, 2015;PricewaterhouseCoopers, 2015; Burning Glass, 2015; ISC2, 2015; Cybersecurity Ventures, 2016

Tips for Success Be opportunistic and persistent Consider your brand Develop expertise No excuses!

Questions