Board Concerns About Cyber Security

Slides:



Advertisements
Similar presentations
Operational Risk ACSDA Leadership Forum ACSDA Leadership Forum New York City, USA - October 8-10, 2007 Diana Downward, DTCC.
Advertisements

A Covenant University Presentation By Favour Femi-Oyewole, BSc, MSc (Computer Science), MSc (Information Security) Certified COBIT 5 Assessor /Certified.
“The Impact of Sarbanes Oxley, An Evolving Best Practice” Ellen C. Wolf Senior Vice President & Chief Financial Officer American Water National Association.
Top 7 Things to Know about Activation and Genuine Software with Windows 7 For computers with perpetual licensing obtained through Microsoft volume licensing.
90% of EU exports consist of product and services of IPR-intensive industries. Among 269 senior risk managers, 53% said IP loss or theft had inflicted.
Mark Carey, CPA, CISA President x8431 Management-ese: An Introductory Course.
Mid-West Electric Consumers Association Board Meeting Mark A. Gabriel Administrator.
New A.M. Best Cyber Questionnaire
Territory Insurance Conference, resilient future Mr Ralph Bönig, Special Counsel, Finlaysons Cyber Times and the Insurance Industry Territory Insurance.
Legal Jeopardy: Whose Risk Is It?. SPEAKERS Jason Straight Chief Privacy Officer and Senior Vice President Cyber Risk Solutions at UnitedLex Patrick Manzo.
By, CA K RAGHU, PAST PRESIDENT – INSTITUTE OF CHARTERED ACCOUNTANTS OF INDIA.
Innovation in Qualifications Professor Ken Young, MTC Clare Rowntree, Senior Economist, Strategic Policy & Risk.
The Privacy Symposium August 22, 2007 ©2007. Goodwin Procter LLP The Ethics and Responsibilities of a Privacy Professional.
Protection of Transportation Infrastructure from Cyber Attacks EXECUTIVE BRIEFING.
Trinity Industries, Inc. FEI Presentation May 31, 2012.
Quantifying Cyber Security Risk in Dollars and Cents to Optimize Budgets CRM008 Speakers: Chris Cooper, VP, Operational Risk Officer; RGA Reinsurance Company.
FROM SECURITY DATA TO SECURITY INTELLIGENCE ZULFIKAR RAMZAN, CTO, RSA.
Sasol, a South African Success Story: Providing effective assurance on compliance to Audit Committees in a challenging economic climate.
Presented by: Mike Gerdes Director, Information Security Center of Expertise Cybersecurity State of the Union.
Surveillance and Security Systems Cyber Security Integration.
Threats & Challenges in the Digital World EY 2015 Global Information Security Survey.
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024 Advanced Persistent Threats.
Cybersecurity as a Business Differentiator
Managing risk – it’s good for business!
CIS 500 Course Experience Tradition / snaptutorial.com
Progile Automated Verification Engineer • PAVE •
New A.M. Best Cyber Questionnaire
Information Security – Current Challenges
Chris Lintern Co-operative Financial Services
Cybersecurity - What’s Next? June 2017
Data Minimization Framework
ENTERPRISE RISK MANAGEMENT IN THE CASE OF THE FINANCIAL SERVICE SECTOR
How can an Enterprise Risk Management (ERM), programme enable organizations achieve strategic objectives more effectively? Dr P S Sahota  
Enterprise risk management
Cyber Security: State of the Nation
The Internal Audit Role in assessing Cybersecurity
School of Arts, Languages and Cultures
3.5 Presenting HPM to Senior Management
Group 4: James Fort Stephanie Joyner Jeff Seremak
Cyber defense management
Data Security Team 1.
CISM Dumps PDF Latest Certified Information Security Manager CISM dumpsCISM dumps pdfCISM braindumpsCISM exam dumps.
CIS 500 HELPS Lessons in Excellence-- cis500helps.com.
Updated Isaca CISM Exam Questions | Dumps4download.us
5G Security Training
CIS 500 HELPS Education for Service-- cis500helps.com.
I have many checklists: how do I get started with cyber security?
Implementing 360 Appraisal in your organisation.
Enterprise Risk Management
We want to hear from you! chime16.org/evals
Where is Your Organization on the Accessibility Maturity Scale
Joining Records Management and Cyber Security
WHAT SHOULD AN EXECUTIVE EXPECT FROM INFORMATION SECURITY
Reputational Risk Management: Cautionary Tales Excerpts From 2012 CaJPA Annual Conference Jenny P. Emery Executive Director Association of Governmental.
Need senior management support for Change Management?
Module 5 The Climate Expert and your role as a consultant
ITP Maturity Model Survey 2018
Cybersecurity Threats and Opportunities in Latin America
The State of Cybersecurity in State Government NAST March 26, 2019
Presented By: Erez Hevroni
Strategic threat assessment
The MobileIron® Threat Detection difference:
Certified Information Security Manager ISACA CISM
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
<offer name> with Microsoft 365 Business Secure Deployment
Texas Assisted Living Association 2019 Conference
Cyber Threat Vigilance An Organizational Imperative
What is Cybersecurity Office of Information Technology
Protecting Knowledge Assets – Case & Method for New CISO Portfolio
Presentation transcript:

Board Concerns About Cyber Security Billy Kinuthia

Our Focus Areas For Today Cyber Risks of Augmented Reality Zero-day Initiatives (ZDIs) Malware Analysis Advanced Persistent Threats Reverse-code Engineering “Of Course, you can’t get that technical with the Board… (This is the mistake some people make!)”

Recent Cyber Attacks

Impact of Cyber Attacks and why Boards Should be Concerned As seen from the attacks it boils down to key impacts including : Financial Loss/ Fraud Loss of Customer Confidence Reputational damage Regulatory sanctions Litigations Leaked trade secrets

Why Boards should be involved Increasing cyber threat landscape The Board is responsible for steering the organization in the right direction The tone at the top will influence how the rest of the organization behave (organizational culture) The Board sets expectations for Management Litigation – Lawsuits by shareholders against the Board

Challenges in obtaining Board’s buy-in Deeply technical subject that is new to most Professionals serving in Boards Most companies don’t consider Cyber risks as strategic risk The board doesn’t understand the risks and impact of cyber security Failure to articulate the ROI of investments in securing the enterprise. Lack of adequate regulation around cybersecurity

Getting the Board on-board Be clear and concise (Use simple language and avoid technical jargons and acronyms) Articulate business impact, risk, mitigations and plans Clearly identify and describe anything that requires Board action or consideration Do not surprise Senior Management (C-Suite Team). brief them in advance before taking anything to Board Train people from board level to become security aware.

Q & A