Business At the Speed of Cyber

Slides:



Advertisements
Similar presentations
Property Inventory Valuation Replacement Cost Value The amount it would take to replace property with like property of the same quality and construction.
Advertisements

INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Travelers CyberRisk for Insurance Companies
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Sponsored by Lumension Ponemon Institute© Private & Confidential Document Page Security Mega Trends Survey Independently conducted by Ponemon Institute.
Lockton Companies International Limited. Authorised and regulated by the Financial Services Authority. A Lloyd’s Broker. Protecting Your Business from.
Forensic and Investigative Accounting Chapter 16 Cybercrime Loss Valuations © 2011 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL
BACKGROUND  Hawkes Bay Holdings/Aquila Underwriting LLP  Established 2009 utilising Lloyd’s capacity: Canopius % Hiscox 33 50% to May 2010, replaced.
Cybercrime Outlook on African banks Adwo Heintjes Global Head IT Audit & Ops Rabobank.
Company LOGO Copyright Carrie Kerskie Data Breach & Identity Theft By Carrie Kerskie Kerskie Group, Inc.
Protecting Mainframe and Distributed Corporate Data from FTP Attacks: Introducing FTP/Security Suite Alessandro Braccia, DBA Sistemi.
Enterprise Computing Community June , 2010February 27, Information Security Industry View Linda Betz IBM Director IT Policy and Information.
© 2014 IBM Corporation Smarter Workforce Services Business Process Innovation.
AUGUST 25, 2015 Cyber Insurance:
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
Cyber Security Nevada Businesses Overview June, 2014.
Managing Data Against Insider Threats Dr. John D. Johnson, CISSP.
INFORMATION TECHNOLOGY SERVICES Mike Russo, PMP, CISSP, CISA, CFE, CGEIT Director, Information Security and Privacy Office CYBERSECURITY AND PRIVACY Information.
Tamra Pawloski Jeff Miller. The views, information, and content expressed herein are those of the authors and do not necessarily represent the views of.
DRAFT 1 Belfast th World Cyber Security Technology Research Summit Suren Gupta Allstate Corporation Executive Vice President Allstate Technology.
Cybersecurity Risk, Remediation, Response Nathan Gibson, CCE, CEH.
The cost of Cybercrime 1 Steve Lamb Regional Marketing Manager – EMEA, Enterprise Security Products Twitter: actionlamb.
15 years of Web Security © 2015 WhiteHat Security, Inc. Jeremiah Grossman Founder WhiteHat Security, Inc. The Rebellious Teenage Years.
Legal Jeopardy: Whose Risk Is It?. SPEAKERS Jason Straight Chief Privacy Officer and Senior Vice President Cyber Risk Solutions at UnitedLex Patrick Manzo.
1 Current Trends in Enterprise IT Network Security Key Takeaways Based on 100 Survey Responses © 2016 Lumeta Corporation.
WHEN, NOT IF THE CYBER SECURITY CHALLENGES AMONG LOCAL GOVERNMENT UMBC Public Policy Forum Baltimore Maryland April 15, 2016 Gayle B. Guilford CISO Baltimore.
HOW TO AVOID COMMON DATA BREACH PITFALLS IAPP Privacy Academy 2014.
Cyber Insurance Risk Transfer Alternatives Heather Soronen - Operations Director Rocky Mountain Insurance Information Association.
YJT1 - Application of Effective Comm (UG 0914) Task 2: Presentation Kody M. Hackbusch.
Figure 1. Current Threat Landscape Sentiment From: ESG Research Report: Cyber Supply Chain Security Revisited. Source: Enterprise Strategy Group, 2015.
Presented by: Mike Gerdes Director, Information Security Center of Expertise Cybersecurity State of the Union.
Figure 1. Current Threat Landscape Sentiment
Risk or Reward Internal Threat External Threat.
Cyber Insurance Risk Transfer Alternatives
Cybersecurity as a Business Differentiator
Law Firm Data Security: What In-house Counsel Need to Know
Michael Wright • Chief Security Officer • Tech Lock
Increasing Information and Data Security in Today’s Cybersecurity World 2017 Conference Review 6/6/2017.
Hot Topics in the Financial Industry: Cybersecurity
Enterprise Mobility Suite Technical and Business Briefing
Case Study - Target.
E&O Risk Management: Meeting the Challenge of Change
IT Security Goes Organic
The Game has Changed… Ready or Not! Andrew Willetts Technologies, Inc.
F5 PRO ASSETS We’ve created these Pro Assets to help you communicate the ideas in this article to your team. Feel free to remove these intro pages, and.
F5 PRO ASSETS We’ve created these Pro Assets to help you communicate to your team the importance of app security and performance. Feel free to remove.
Lecture 14: Business Information Systems - ICT Security
Cyber Attacks on Businesses 43% of cyber attacks target small business Only 14% of small business rate their ability to mitigate cyber risk highly.
Forensics Week 11.
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024 Identity and Access Management.
Andy Hall – Cyber & Tech INSURANCE Specialist
Cyber Issues Facing Medical Practice Managers
Cyber Trends and Market Update
National Cyber Security
Securing the Threats of Tomorrow, Today.
Cybercrime and Canadian Businesses
Forensic and Investigative Accounting
The State of Cybersecurity in State Government NAST March 26, 2019
Tom Murphy Chief Information Security Officer
Session 8: Innovative Uses of Captives: Cyber and Beyond
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024 Low Power Wide Area Network.
Figuring out CyberSecurity Return On Investment
2019 Thales Global Cloud Security Study
Protecting Knowledge Assets – Case & Method for New CISO Portfolio
Presentation transcript:

Business At the Speed of Cyber Understanding the CISO Dilemma ISACA Denver October Chapter Meeting Ian Bramson Siemens

RISK IS GOOD

The CISO dilemma: expanding accountability and shrinking control Senior Leadership External Operations Cross-Organizational Security Operations

Most Senior Leadership are very concerned about cyber security, but have little understanding of what it is Senior Leadership Cyber fatigue Strategic alignment Business context Executive reporting Risk reduction High Exposure, Low Understanding 85% Cybercrime will cost the world in excess of $6 trillion annually by 2021 The average cost per breach worldwide was $4 million, that figure rose to $7 million in the U.S. (Ponemon Institute) Board of Directors Focus Due care – How do boards know if they’re doing a good enough job when it comes to cybersecurity oversight? Insider threats – What has the company done to deter, detect, and remediate insider threats? Third-party risk management – How is the company reducing risks with its vendors, partners, contractors, and suppliers? How is data and access managed with third parties? What are our exposures if they get hacked? Cyber insurance – What is covered with cyber insurance? Should the company get cyber insurance? What kind of coverage? How do we minimize premiums? Information sharing – How does the company share cyber information with competitors and the government? What are the privacy laws and regulations about cyber information sharing? Mergers and acquisitions (M&A) – How does cybersecurity factor into M&A? Incident response/breach notification – Who needs to be notified, and when, during a cyber breach? 39% of board executives feel security information is too technical -- Osterman organizations failed to report Ransomware attacks to CEO or Board -- SentinelOne 35X 70% cyber security budgets have increased 35 times over the last thirteen years -- Cybersecurity Ventures of the value of publicly traded companies are “intangible assets” -- Commission on the Theft of American Intellectual Property

Cyber security attackers exploit traditional organizational stovepipes and organizational divisions Cross-Organizational The people problem Span of control and accountability Business enabler, not inhibitor Partnership with business Cyber security and IT Managing Other Executives 95% 53% of mobile professionals carry confidential company information (Ponemon) Up To 12,000 laptop computers are lost weekly and up to 600,000 are lost annually in U.S. airports (Ponemon) 69% percent of organizations have experienced attempted or successful data theft or corruption by corporate insiders during the last 12 months Ransomware increased 6,000% in 2016 - IBM Ransomware was in almost 40% of all spam messages in 2016 - IBM 70% of business victims paid the hackers to get their data back – IBM 26% of employees admitted to uploading sensitive information to cloud apps with the specific intent to share that data outside the company – Sailpoint 65% of all security incidents involve human error -- IBM of those who carry confidential information don’t protect it -- Ponemon 63% 60% of confirmed data breaches involve weak, default or stolen passwords -- Verizon of fired employees steal important corporate data -- Global HR

CISOs are struggling to address expanding cyber threats with severe talent shortages Security Operations Talent shortage Operational reporting and metrics Business impacts of technical operations Career paths Doing More with Less 3.5 Million 47% of organizations say that the number of employees dedicated to network security is inadequate - ESG 44% of organizations say that the number of networking/security staff with strong knowledge in both security and networking technology is inadequate in some, most, or all cases – ESG The demand for information security analysts will grow 37% from 2012-2022—S. Bureau of Labor Statistics  The average senior security analyst in the US makes $103,226, more than double the national average—Glassdoor.com 35%  of organizations are unable to fill open security jobs, despite the fact that 82 percent expect to be attacked this year—ISACA and RSA, “State of Cybersecurity: Implications for 2015” 52% unfilled cybersecurity jobs by 2020 -- Cybersecurity Ventures of organizations that suffered successful cyber attacks aren't making changes to their security –- Barkly 37% 41% of organizations say that the ability of the security staff to keep up with the threat landscape is inadequate -- ESG of workers will be temps, contractors or consultants by 2018 -- CyberArk

CISOs inherit the risks posed by their external partners, suppliers, and customers External Operations Elastic attack surface Supply chain cyber challenges Vendorpalooza and vendor leverage Compliance conundrum Cyber insurance Managing Risks from the Outside 90% The cyber insurance market rose to $2.5 Billion in 2016 Intel predicts there will be up to 200 Billion connected devices by 2020 Microsoft predicts that the number of connected devices will be about 50 Billion by 2020 There are 25 connected devices per 100 inhabitants in the US (Symantec Internet Security Threat Report) $120 Billion of organizations lack full confidence in their IoT security -- AT&T cyber security market in 2017 (it was $3.5 Billion in 2004) -- Wired 50X 88% increase in data volume by 2020 -- Microsoft of organizations lack full confidence in the security of their business partners’ connected devices -- AT&T

MANAGING RISK IS GOOD