CYBER SECURITY
PROTECTING AGAINST CYBER FRAUD IN SCALEUP COMPANIES AND WHAT TO DO SHOULD THEY HAPPEN
London June 2019
CYBER SECURITY PROTECTING AGAINST CYBER FRAUD IN SCALEUP COMPANIES - - PowerPoint PPT Presentation
CYBER SECURITY PROTECTING AGAINST CYBER FRAUD IN SCALEUP COMPANIES AND WHAT TO DO SHOULD THEY HAPPEN London June 2019 INTRODUCTION Cyber Security The activity or process, ability or capability, or state whereby information and
London June 2019
Date 2
Date 3
Hacker attack Data breach Virus transmission Cyber extortion Employee sabotage Network downtime Human error
Date 4
Holiday camp firm Butlin's says up to 34,000 guests at its resorts may have had their personal information stolen by hackers.
NHS trusts were left vulnerable in a major ransomware attack in May because cyber-security recommendations were not followed, a government report has said. At least 6,900 NHS appointments were cancelled as a result of the attack.
A cyber-security firm has said it found malicious code injected into the British Airways website, which could be the cause of a recent data breach that affected 380,000 transactions.
Date 5
Economic cost of cyber attack Reputational damage Legal consequences of cyber breach
Cyber security threat to banks has grown in last decade
the last decade is risk related to cyber security. "The defences have to be in place and we also have to have plans if a bank were to be knocked out because of a cyber attack - how to we keep a system functioning and service to customers functioning in that event.“. BBC Sept 2018
Date 6
Tory app security breach reveals MPs' numbers
be accessed through the party's conference app. BBC
Sept 2018
Rise in cyber-attacks on NI universities
suffered 16 serious cyber-attacks in 2017/18 compared to three the year before. BBC Sept 2018 UK cyber-centre thwarts hostile hackers
attacks since it was created, it reveals. BBC Oct 2018 UK accuses Russian spies of cyber-attacks
athletes' data was published, and the US Democratic Party. BBC Oct 2018
Date 7
Date 8
Date 9
Date 10
Date 11
Date 12
Date 13
Date 14
Date 15
Date 16
PREDICT
Proactive risk analysis Predict attacks Baseline systems Prevent issues Divert attackers Harden and isolate systems Contain issues Confirm and prioritize risk Detect issues Remediate/ Make change/Learn Design/ Model change
RESPOND PREVENT DETECT
Investigate/ Forensics Mobile user attacks Cloud Computer attacks Denial of Service Geolocation attacks High profile target spoofing
17
CONTINUOUS THREAT MONITORING
Monitoring and Detection of Unauthorized Activities
department trends.
functions.
BOARD AND MANAGEMENT INTERACTION
18
EMPLOYEE TRAINING
Workforce
and lower case letters, numbers and symbols)?
TECHNOLOGY UPGRADE
– Review and reassess data privacy and computer security policies and procedures
address the plethora of mobile devices that are now available to employees)?
19
– Is it sufficiently detailed to provide guidance for what needs to be done immediately in the event
– Data breach investigation to discover and perform analysis? – Are key stakeholders represented on the team? – Data Breach team lead granted sufficient authority to quickly execute? – Lessons are learnt – Senior management and Board level awareness.
INCIDENT RESPONSE RECOVERY PLAN
– Review and reassess business continuity and disaster recovery plans
addition to more commonly covered business disruptions, such as natural disasters and fire?
20
BEST PRACTICES
National Cyber Security Centre (NCSC)
critical national infrastructure and private SMEs. International Standardization Organization
(ISO) 27000 and 27001 Standards
– Policy – Threat prevention
– Threat detection – Training and Awareness – Response
BEST PRACTICES – Key Areas
21
THIRD PARTY RISK AVERSION
Third Party Vendors
service providers
computer security issues are adequately addressed
22
CYBER SECURITY INSURANCE
Review Insurance Policies
and officers’ liability or errors and omissions liability coverage often contain express “electronic data”
party (i.e., losses related to clients) coverage
AUDIT COMMITTEE CONSIDERATIONS
– Has the number of breaches increased since last month/year? – New initiatives to bolster its information security program? – Is information security an IT function in house? If so, to whom does it report? – audit committee or on the board member with an IT background? – audit committee involvement in planning of information security risks? – How often does the committee discuss cybersecurity? Is the full board aware?
Date 23
Date 24