Cyber security – challenges and opportunities for business Business New Zealand AIG - 11 September 2014.

Slides:



Advertisements
Similar presentations
Labour market realities for people with developmental disabilities
Advertisements

The Path from Reactive Reporting to Proactive Business Intelligence Dwight Taylor Manager Enterprise Informatics Health Care Service Corporation September.
Symantec 2004 Pulse of IT Security in Canada Volume II Survey shows Increases in Concern and Spending for IT Security Andrew Bisson Director, Planning.
Features of Property Co. Founded in 1996, Property is an independent company. Property is not a subsidiary of any major company or manufacturer.
Assets in the Workplace Ellen Seidman Director of Financial Services Policy Asset Building Program New America Foundation Invitational.
Note for edits and draft. text above this line is off screen Maximizing Knowledge with Minimal Budget and Space East View Information Services EASL Conference.
Policy Research and Innovation Research and Innovation EUROSTARS JOINT PROGRAMME Research and Development programme undertaken by several Member States.
Teaching schools and ITE and CPD – UCET 8 November 2012 An executive agency of the Department for Education Toby Greany, Acting Executive Director, Leadership.
Professor Miriam Lips Victoria University of Wellington New Zealanders privacy behaviours in the age of big data Privacy Forum 7 May 2014.
Fifth Edition 1 M a n a g e m e n t I n f o r m a t i o n S y s t e m s M a n a g I n g I n f o r m a t i o n T e c h n o l o g y i n t h e E – B u s i.
Dr Fiona Cameron, Executive Director, Biological Sciences and Biotechnology Australian Research Council Centres – an overview.
Natalie Ceeney July 2008 CIO/CEO challenges – the UK perspective.
Security metrics in SCADA system Master of Computer and Information Science Student: Nguyen Duc Nam Supervisor: Elena Sitnikova.
Northern Ireland Smart Specialisation
12 August 2004 Strategic Alignment By Maria Rojas.
Renewable Energy in New Zealand. Introduction NZ’s energy supply NZ’s renewable energy supply NZ’s renewable electricity supply NZ’s renewable energy.
SMILE – home of: A collaborative approach in awareness raising François Thill Brussels, 12th June 2012.
Understanding Finance; avoiding crisis Foundation Trust Governors Richard Douglas, DG, Department of Health.
ACCI speaks on behalf of businesses at a national and international level 1  2009 CUBED Communications Click to edit title Date Month Year Culture and.
Information Systems Management Chapter "I Don’t Know Anything About Doing Business In India.” Copyright © 2014 Pearson Education, Inc. Publishing.
Centre for Research into the Older Workforce HECSU June Guidance and HE: Contexts and issues Stephen McNair Director, CROW.
© 2010 Deloitte & Touche LLP The Cyber-Savvy Organization: 10 Steps to a New Cyber Mission Discipline May 2010.
Individual Service Funds KEY’s Practical Experience Borders SDS Providers Consortium 2 nd April 2014 Created by KEY | All rights reserved | KEY, The Square,
People Places Potential 1 Investing in people Transforming places Maximising potential
Road Traffic Incident Management Seminar 2014 Supt. Carey Griffiths National Manager: Road Policing.
Deloitte Consulting LLP June 22-25, 2014 IIS 50 th Annual Seminar, London 2014 Big Data in Insurance International Insurance Society.
IIA Annual Seminar 2012 Aligning Internal Audit to deliver value 9 August
Study conducted on behalf of Microsoft by Harris Interactive Inc. Study conducted on behalf of Microsoft by Harris Interactive, Inc. Study conducted on.
Network Access Management Trends in IT Applications for Management Prepared by: Ahmed Ibrahim S
Ian Whitehead Executive General Manager Indonesia
Open Access: its contribution to developing a National Information Strategy Elaine Fulton Director Scottish Library and Information Council
UK Government experience in Performance Framework Reform
Director’s Update David Riordan, Institute Director.
The Importance of Compliant Identity & Access Management in Insurance Tuncay Küçüktaş - Aksigorta Assistant General Manager, CIO.
PMBA 8125 Course Map and purpose. Why bother studying the management of IS? Annual worldwide expenditures on IS/IT is estimated to be between $
TELUS Work Styles Copyright © TELUS Corporation. All rights reserved. Neither the whole nor any part of this work maybe copied, scanned, reproduced, or.
FIVE STEPS TO REDUCE THE RISK OF CYBERCRIME TO YOUR BUSINESS.
© 2014 EverEdge IP. September, IP is not a legal right. IP is a business asset.
Bruce Hallas Director Marmalade Box Ltd. UK Business Comparison of Information Security Incidents & Financial Impact Corporate UK SME UK 25% ↓ in number.
Banking Security in a Digital Age Trevor LaFleche, IDC Financial Insights.
Most governments and journalists operate as if global markets only benefit large corporations in developed countries. PROBLEM 1.
LoveLife Expansion into Southern Africa Grace Matlhape Chief Executive Officer loveLife.
Rural Development Council 8 th December Contents Scottish Enterprise Focus Economic Downturn Implications & Actions Core Rural Objectives HIE Economic.
Slide 1 of 24 Week 1: Lecture Structure Title: Managing IT –Business importance of IT –Role of CIO –Review the IS Pyramid –Top Business IT Issues –Discuss.
℠ Pryvos ℠ Computer Security and Forensic Services May 27, 2015 Copyright © 2015 Pryvos, Inc. 1.
Introduction Martin James Vice-Chancellor’s Annual Address.
Sapient Insurance Partners. Overview & Services We have almost four decades of combined experience in the property & casualty insurance and reinsurance.
Economic Value Added Economic Value Added is the financial performance measure that comes closer than any other to capturing the true economic profit of.
HIPAA Implementation: The Challenge Ohio Department of Job and Family Services October 23, 2002.
The Business Environment
Info-Tech Research Group1 1 Info-Tech Research Group, Inc. is a global leader in providing IT research and advice. Info-Tech’s products and services combine.
1 Working with Project Stakeholders in a Statewide Project PMI-SVC PMO Forum Monthly Meeting Dan Conway, PMP October 22, 2008.
Scrutiny in South Tyneside Paul Baldasera. Scrutiny – why do we do it? Local Government Act 2000 – cabinet system Scrutiny roles –Holding Executive to.
Telephone : +234 (0) | Website : Registered company : Telephone : +234.
Cybersecurity as a Business Differentiator
Enterprise Mobility Suite Technical and Business Briefing
Cyber Risk Presentation to the Board of Directors
Figure 1. Critical Infrastructure Organizations Believe that the Cyber-threat Landscape Is Getting Worse From: ESG Brief: Critical Infrastructure Organizations.
Chapter 15 Corporate Governance in New Organizational Forms
YOUR DIGITAL TRANSFORMATION JOURNEY
National Cyber Security Programme Local : Building Resilience Together
8 Building Blocks of National Cyber Strategies
The rise of cloud? Insights from Digital Health Intelligence
Cyber Security and Consumer Financial Transactions Data Security
Global Risk Management Scenario
Cyber security policy in an evolving landscape
Success in a Foreign Land S Renganathan Managing Director / CEO
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
Folkestone & Hythe District Council
October is National Cybersecurity Awareness Month
Presentation transcript:

Cyber security – challenges and opportunities for business Business New Zealand AIG - 11 September 2014

Cyber risks are increasing Source: NCSC 2013 Incident Summary

Targets

© Colmar Brunton | SLIDE 6 The main barrier to improving cyber security behaviour is confusion Q Why don’t you take more steps to manage your cyber security?

SMEs Critical to NZ’s economy – account for 97% of all enterprises in NZ – employ around 30% of the working population – generate more than a quarter (27.8%) of our GDP More SMEs taking advantage of the Internet Usually don’t have a dedicated IT person or department May rely on the internet to do business but may not have the time nor expertise to understand security Higher risk tolerance

Technology is no longer simply a budget line or operational issue—it is an enabler of virtually every strategy. ……….. Technological opportunities abound, but so do threats, including cybersecurity risks, which will become the concern of a broader group of executives as digitization touches every aspect of corporate life. McKinsey Quarterly – Sept The use of technology in business changes our risk landscape…

The problem we’re all facing… 2010 Apple iPad 2008 Apple iPhone 2014 Apple iWatch 2004 Facebook Dot.com boom 1998 The Rise of Technology = a change in where data is processed The effectiveness of traditional security controls – i.e. trust H L Time

Where should you focus? PeopleProcessTechnology Our staff handle our data; Our customers receive our data; Our partners process our data Have we told them what’s acceptable / what’s not? “Top Down” security helps build a strong security posture A positive “Security Culture” works better than a “policing” approach Implementing the basics covers off 80% of your risks. Don’t let complexity trip you up. Don’t rely on big brands – always check they are securing your data

So what can you do….SME TOOLKIT

Connectsmart.govt.nz Paul Ash Director, National Cyber Policy Office, Department of Prime Minister & Cabinet Thank You Matthew Lord Head of Technology Governance and Risk, Kiwi Bank