Cybersecurity A presentation to the National Association of Black - - PowerPoint PPT Presentation

cybersecurity
SMART_READER_LITE
LIVE PREVIEW

Cybersecurity A presentation to the National Association of Black - - PowerPoint PPT Presentation

Cybersecurity A presentation to the National Association of Black Accountants Cleveland Chapter Contents Cybersecurity and risk management 1 Cybersecurity and the regulatory 2 environment Cybersecurity and the audit 3 4 Appendix


slide-1
SLIDE 1

Cybersecurity

A presentation to the National Association of Black Accountants – Cleveland Chapter

slide-2
SLIDE 2

Cybersecurity and risk management 1 Appendix 3 4 Cybersecurity and the audit

Contents

Cybersecurity and the regulatory environment 2

Page 2

slide-3
SLIDE 3

“Resources devoted to cyber-based threats are expected to eclipse resources devoted to terrorism.”

The Honorable James B. Comey, Jr., Director of the Federal Bureau of Investigation Statement of the Federal Bureau of Investigation before the Committee on Homeland Security and Governmental Affairs United States Senate

“The constant threat of cyber attack is real, lasting and cannot be ignored.”

Luis Aguilar Commissioner of the Securities and Exchange Commission SEC Cybersecurity Roundtable

Cybersecurity

What is it and what is the risk landscape

Page 3

slide-4
SLIDE 4

Cybersecurity

What is cybersecurity

What is cybersecurity?

► Cybersecurity is the body of:

► Technologies ► Processes ► Practices

► Designed to protect networks, computers, applications and data

from attack, damage or unauthorized access, typically via the internet or other forms of connectivity.

Page 4

slide-5
SLIDE 5

Cybersecurity

What is cybersecurity risk

Cybersecurity risk

► Represents the possibility that these technologies, processes and

practices can be circumvented, allowing unauthorized users to:

► Access or exfiltrate protected or sensitive information, such as: ► Intellectual property ► Proprietary information ► Credit card information ► Personally identifiable information ► Protected health information ► Modify and/or delete key applications and information, which could

affect the accuracy and/or integrity of processing (both financial and/or operating).

► Disrupt computer-controlled operations

Page 5

slide-6
SLIDE 6

Cybersecurity

Is every company a target? Common misconception

“I don’t process credit card transactions internally; therefore, my company is not a target.”

Reality

Companies can be targeted for many reasons:

Company is a vendor of the ultimate target

Gain access to research and development information

Stock price manipulation

Gain access to sensitive merger and acquisition information

Disrupt operations

Page 6

slide-7
SLIDE 7

Cybersecurity

How have cybersecurity threats evolved?

Unsophisticated attackers (script kiddies)

You are attacked because you are

  • n the internet and have a

vulnerability.

Sophisticated attackers (hackers)

You are attacked because you are

  • n the internet and have

information of value.

Corporate espionage (malicious insiders)

Your current or former employee seeks financial gain from stealing and selling your intellectual property (IP).

State-sponsored attacks and advanced persistent threat1 (APT)

You are targeted because of who you are, what you do

  • r the value of your IP.

Risk Attacker resources and sophistication

Revenge, personal gain, stock price manipulation Organized crime (criminal gangs)

You are attacked because you have money or something else of value that can be sold.

Script kiddies Hackers Malicious insiders Criminal gangs APT Amusement, experimentation, nuisance, notoriety State-sponsored espionage Market manipulation Competitive advantage Military/political objectives Cash, credit cards, Identities, inside information Money, embarrassment, political, social or environmental causes

1

An advanced persistent threat (APT) is a set of sophisticated, stealthy and continuous computer attacks often targeting a specific entity with business or political motives. The processes used involve a high degree of covertness over a long period of time using sophisticated techniques to exploit vulnerabilities in systems.

Page 7

slide-8
SLIDE 8

Cybersecurity

What can a targeted attack look like?

Enable persistence Conduct enterprise reconnaissance Move laterally to new systems Escalate privileges Gather and encrypt data of interest Maintain persistent presence Exfiltrate data from victim systems Conduct background research

Intelligence gathering Command and control Privilege escalation Data exfiltration

Execute initial attack Establish foothold

Initial exploitation

Point where most targets are notified of the attack (generally by third parties) Potential detection point with robust threat intelligence

Degrading security posture or health as the attack life cycle progresses Accelerating attack detection Page 8

slide-9
SLIDE 9

Cybersecurity

How are security programs positioned to deal with today’s cyber risks?

Some top-of-mind questions for today’s information security executives are:

How does my information security program compare with those of my peers in the industry?

Is my information security strategy aligned with business objectives?

How well do we protect high-value information, especially given today’s increasingly mobile workforce?

Are we well prepared to monitor, detect and respond to information security threats?

Do we have the right people and skill sets?

Are we spending on the right information security priorities?

Am I or have I been the victim of an attack or a breach?

Source – Global Information Security Survey, Ernst & Young LLP, 2015.

Today’s information security programs must enable business objectives and defend against threats while investing in the right priorities.

Page 9

36%

unlikely they would be able to detect a sophisticated attack

57%

lack of skilled resources is challenging Information Security’s contribution and value to the organization

59%

see criminal syndicates as the most likely source of an attack today

slide-10
SLIDE 10

Source – Global Information Security Survey, Ernst & Young LLP, 2015.

Cybersecurity

Spend considerations

Page 10

slide-11
SLIDE 11

Who or what do you consider the most likely source of an attack?

Respondents were asked to choose all that apply.

Page 11

59% 56% 54% 43% 36% 35% 14% 13% 12% 3% 0% 10% 20% 30% 40% 50% 60% 70% Criminal syndicates Employee Hacktivists Lone Wolf hacker External contractor working on our site State sponsored attacker Supplier Other business partner Customer Other (please specify)

Source – Global Information Security Survey, Ernst & Young LLP, 2015.

slide-12
SLIDE 12

Cybersecurity

What are the motivations and who are the common attackers?

Motivations Common targets Common attackers Financial gain through the theft of Intellectual Property and/or proprietary information

  • Accelerate company/country research

and development

  • Competitive advantage
  • Sales and economic growth

Companies that manufacture/produce products that leverage certain IP to maximize their advantage in the marketplace (e.g., aerospace and defense, drug manufacturing, companies negotiating M&A transactions)

  • State sponsored
  • Organized crime

Financial gain through access to non- monetary assets (e.g., personally identifiable information - PII), which can be sold to others Companies with credit card information and/or

  • ther PII of a target audience
  • Organized crime
  • Employees and

contractors Financial gain through direct access to monetary assets and/or financially relevant information Banks, insurance companies, trading firms

  • Competitors
  • Organized crime
  • Employees/contractors

Political disruption, terrorism, service disruption Financial markets, power generation and distribution facilities, oil and gas exploration and distribution facilities

  • State sponsored
  • Organized crime
  • “Hacktivists”

Manipulation of stock price Companies competing in emerging or expanding markets

  • State sponsored
  • Organized crime

Page 12

slide-13
SLIDE 13

3rd Party Attack Vector

Cyber criminals attacking company networks using 3rd party vendor connections.

Ransomware

Criminals disabling company networks with ransomware such as “CryptoLocker” demanding ransom payment.

Market Manipulation Attacks

Compromised corporate assets leading to manipulation of financial markets (e.g. Twitter attacks on AP and Burger King) as well as compromising trading activity and acting on it and/or front running

Convergence of Attacks

Cybersecurity attacks are converging with physical security attacks to cause comprehensive damage ( e.g. cyber attack

  • n critical national infrastructure)

Cybersecurity Trends

Page 13

slide-14
SLIDE 14

Cybersecurity

What is the current risk landscape

  • It is no longer possible to simply prevent cyber attacks or

breaches.

  • With organizations increasingly relying on vast amounts of

digital data to do business, cybercrime is growing ever more damaging to an organization and its brands.

  • The interconnectivity of people, devices and organizations
  • pens up new vulnerabilities.
  • New technologies, regulatory pressure and changing business

requirements call for more security measures.

  • What companies used to know and do to protect their most

valued information is no longer enough.

Page 14

slide-15
SLIDE 15

Cybersecurity

What is the current risk landscape?

  • The growing attacking power of cyber criminals
  • Cybercrime is big business. Today’s attackers:
  • Are more organized – they are not just opportunists
  • Have significant funding
  • Are patient and sophisticated – they will often gain access and wait

until the right moment to pounce

  • Cybercrime is an organization-wide issue
  • Attackers take advantage of vulnerabilities in the whole operating

environment – including people and process

Page 15

slide-16
SLIDE 16

Cybersecurity

Historical approaches to security are not good enough

► Historically:

Companies relied on “layers of defense”

Controls at the firewall, network, host and application levels

Focused on managing the risks you were aware of and implementing point solutions

► Today & into the future:

The perimeter of your network can no longer be defined and effectively controlled (cloud, mobile devices, connections to 3rd parties)

Attackers have learned to be patient and exploit lower risk vulnerabilities that are often ignored, thus allowing their exploits to go unnoticed

Gain a foothold

Expand their level of access

Broaden their level of access to other networks and applications

Focus on predicting where the next risks will be and evolving solutions (“active defense”)

Page 16

slide-17
SLIDE 17

Cybersecurity

The “new normal” for cybersecurity

Your approach needs to evolve to ‘Complicate, Detect, Respond and Sustain Since absolute prevention is not feasible, companies must move to a posture of preparedness and response Adversaries are using social engineering and social networks to target sensitive roles or individuals within an organization that either have knowledge, use of or access to the data targeted

Sustain Detect

Govern

Respond Complicate Design and execute a formal, sustainable strategy Effectively and efficiently respond and remediate an attack Complicate an attacker’s ability to achieve their objective Implement controls to detect the attack before meaningful business impact is accomplished

Page 17

slide-18
SLIDE 18

Cybersecurity

The response gap

► Companies continue to make

progress to respond to information security threats

► However, the number and

sophistication of threats are increasing faster

► As a result, the gap is widening

Roadblocks:

► Lack of agility ► Lack of budget ► Lack of cybersecurity skills

The gap

2006 2016

Page 18

slide-19
SLIDE 19

Cybersecurity Risk Management

Page 19

slide-20
SLIDE 20

Cybersecurity Risk Management

► Companies can no longer operate and execute their cybersecurity program in

  • isolation. Much like the web of all business offerings being dependent on

each other, so too must a company’s cybersecurity risk management culture be dependent on many groups, needs, and risks. Recent trends in Cybersecurity risk management:

Development of IT Risk processes, risk and controls framework integration into the Company’s risk reporting, and relevant metrics / dashboards that are correlated into the Company’s overall risk appetite.

Increase in sophistication of simulated attacks (table top exercises)

Increase in complexity of external party penetration testing including:

Malicious insider consideration

Social engineering aspects

Coordinated incident response attacks ►

Controls Based Defense in Depth Models

Identification of Company’s “Crown Jewels” and agreed to at the Board level

Audit Committee and Board presentation of program health, recent potential incidents, and planned activities

Cybersecurity Examination Preparation and Execution

Page 20

slide-21
SLIDE 21

Standard of due care - disclosure Enterprise risk management - cyber Acceptable level

  • f compromise

Cyber Risk Mgt

Operations CEO GC BOD CFO CRO COO CISO Incident Response

Manage to adequate level

CIO

< Exfiltration prevention & breach investigation Business assurance >

Cyber legal risk Cyber financial risk Cyber operational risk

Protect most valued assets & critical business systems

Cyber Risk Mgt

$ Cybersecurity Risk Management : C-everyone Issue

Page 21

slide-22
SLIDE 22

Cybersecurity Risk Management

How are cybersecurity risk management activities typically allocated?

Function (stakeholder) Risk management for cybersecurity risks Govern (ongoing) Respond (incident and breach) Contain (damages and liabilities) Board/audit committee

► Set standard of due care ► Periodically evaluate

cybersecurity risk governance and review annual cybersecurity risk assessment

► Oversight of management’s

cybersecurity risk disclosures per SEC guidance

► Monitor breach

notifications and governance process and updates

► Re-evaluate cybersecurity risk

governance oversight

► Re-evaluate standard of due

care

► Re-evaluate cybersecurity risk

disclosures Executive management

► Identification of critical assets ► Prepare cyber risk assessment ► Prepare incident response plan ► Prepare cybersecurity risk

disclosures per SEC guidance

► Categorize and assess

incidences

► Develop short-term and long-

term remedial actions Risk management (e.g., CRO)

► Define and oversee ongoing

technology risk management program for cybersecurity risks

► Monitor breach and

cybersecurity risk trends and measure risk management execution

► Evaluate effectiveness of

cybersecurity breach response and technology risk management

Page 22

slide-23
SLIDE 23

Cybersecurity Risk Management

How are cybersecurity risk management activities typically allocated?

Function (stakeholder) Risk management for cybersecurity risks Govern (ongoing) Respond (incident and breach) Contain (damages and liabilities) Legal (e.g., GC)

► Develop cybersecurity risk legal

response strategy

► Approve cybersecurity breach

response program

► Execute breach

communications plan

► Execute

authority/regulator response plan

► Perform cybersecurity risk

liability control (long lived) Information security (including incident response team) (e.g., CISO)

► Build threat mitigation program

to plan/protect most critical assets

► Establish incident, investigation

and forensics response programs and conduct tests

► Detect and respond to

incident

► Execute investigation

plans, including incident forensics

► Assess effectiveness of

cybersecurity incident response

► Execute incident remediation

plan and assess effectiveness

Notice that Complicate and Sustain are NOT RISK MANAGEMENT FUNCTIONS

Page 23

slide-24
SLIDE 24

Regulatory Cybersecurity Focus

Page 24

slide-25
SLIDE 25

► Cyber disclosure guidance (SEC) - October 2011 ► Cybersecurity Presidential Executive Order-

February 2013

► SEC Announces Cybersecurity to be a focus

during their 2014 reviews of Investment Advisors

► US Commerce Departments National Institute of

Standards issues Cybersecurity Framework- February 2014

► SEC Cybersecurity focused roundtable- March

2014

► Increased fiduciary responsibility of boards,

  • fficers and directors

► Cyber Insurance coverage expanding ► 2015 NYDFS declarations of increased focus for

banks AND insurance companies.

► Theft of financial assets ► Brand and reputational impact ► Theft of intellectual property, or other

sensitive information

► Loss or destruction of confidential company,

client, and investor data

► Disruption to the operations of the company

and/or their business partners

► Large scale attack due to overflow can result

in loss of credentials, and customer information

► Compromise of Personal Identity data may

lead to compliance and regulatory fines

Regulations are increasing Risks that regulations address

Increased regulatory compliance for Cybersecurity is the new normal

Cybersecurity Risk Driving Regulation

Page 25

slide-26
SLIDE 26

The impact of cybersecurity and the audit

Page 26

slide-27
SLIDE 27

Cybersecurity and the Audit

What impact does cybersecurity have on the audit?

► Based on the our knowledge of past high-profile breaches, cyber risks

are unlikely to represent risks of material misstatement to the financial statements:

Cyber risks are not typically exploited within the transaction stream

The likelihood of an attacker making material unauthorized changes to production data or programs that would go undetected is not significant, among other reasons.

► Further, the auditor does not presume that cyber threats represent a

risk of material misstatement to the financial statements, even when there is a risk of a cyber-breach or a breach has occurred.

► However, the auditor considers cybersecurity as part of understanding

the entity and its environment, which includes considering whether cyber risks represent a risk of material misstatement to the financial statements.

Page 27

slide-28
SLIDE 28

Cybersecurity and the Audit

What is covered in an external audit of financial statements and internal control over financial reporting relative to IT risks?

► During the risk assessment procedures, auditing standards require that

auditors obtain an understanding and evaluate the various “business risks” that affect the Company

► As IT typically has a material impact on the internal controls of most

companies, the standards also require that auditors obtain an understanding of how:

The company uses IT

IT’s affect the financial statements

The extent of the company’s use of automated controls and the impact of these controls (including IT general controls) relative to financial reporting.

► Based on this understanding, auditors develop an audit approach

that focuses on those risk factors that may result in a material misstatement in the financial statements

Page 28

slide-29
SLIDE 29

Cybersecurity and the Audit

What is covered relative to cybersecurity risk?

Auditing standards do not require that Cybersecurity be given any special consideration; it is evaluated like various other potential business risks

Another consideration:

A company’s overall IT environment is made up of components that support:

An audit of financial statements only covers the portion of IT that supports internal controls over “financial reporting.”

Security breaches typically occur within the “operational” components of a company’s IT environment; therefore, cybersecurity not a primary focus.

Business Activity IT Component Financial reporting

Financial applications

Supporting databases

Supporting operating systems All other operating activities

Other business applications

Other databases

Other supporting operating systems

Internal networks

Perimeter networks

Page 29

slide-30
SLIDE 30

Cybersecurity and the Audit

What is the nature and extent of audit procedures

Through inquiry and observation, the auditor must develop an informed view

  • f cyber risks, including gaining an understanding of management’s risk

assessment process related to cybersecurity and the actions management has taken to manage its cyber risk. Focus areas include:

Privileged account access

Governance / Risk assessment program

Security monitoring activities / Incident management program

Security awareness program

Threat and vulnerability management program

Patch management program

Vendor risk management program

Data classification program (i.e., Information asset safeguarding)

If the auditor determines that cyber threats represent a risk of material misstatement to the financial statements, the auditor designs and implements appropriate responses to address the identified risks.

Page 30

slide-31
SLIDE 31

Cybersecurity and the Audit

What represents a cybersecurity breach of audit significance? (continued) A breach of audit significance generally occurs when:

1.

An unauthorized user gaining administrator-level access rights to a system

  • r application potentially giving them the ability to:

Access or exfiltrate protected or sensitive information

Could result in: (1) fines / penalties, (2) lawsuits requiring the recording of material liabilities, and/or (3) commitment and contingency disclosures

Modify and/or delete protected financially-relevant applications and information

Could affect the accuracy and/or integrity of processing

Disrupt significant computer-controlled operations

Page 31

slide-32
SLIDE 32

Cybersecurity and the Audit

What represents a cybersecurity breach of audit significance? (continued) A breach of audit significance generally occurs when:

2.

An authorized user leverages their access to perform unauthorized activity

Access/modify protected financially-relevant applications or information

Exhilarate protected information

etc.

Page 32

slide-33
SLIDE 33

Cybersecurity and the audit

What are the audit considerations when a breach is identified? When a known or suspected cyber breach comes to the auditor’s attention (through inquiries, other audit procedures or through other sources):

Auditors expect that management will investigate the matter, as appropriate in the circumstances as well as:

  • Gain an understanding of known facts
  • Evaluate the scope and extent of internal investigations performed
  • Determine whether there is evidence that financially relevant data (books

and records) may have been manipulated in a way that could cause a material misstatement in the financial statements

  • Modify our planned audit strategy, as necessary, to be responsive to the

identified risks of potential misstatement in the financial statements

  • Consider possible disclosure requirements and review, as appropriate
  • Address possible asset impairment, commitments and contingencies, and
  • ther liability impacts and estimates

Page 33

slide-34
SLIDE 34

Cybersecurity and the Audit

Board reporting Cyber security has historically been a topic of discussion in board rooms, the increase in the volume and severity of attacks, coupled with the increased scrutiny by regulators, has significantly elevated its importance. Audit committees are now expected to have an appropriate understanding of the business implications of cybersecurity risks on the company to enable them to evaluate:

  • The suitably of the governance structure implemented by management.
  • The cybersecurity risk management program implemented by management.
  • The appropriateness of the cybersecurity risk disclosures required per SEC

guidance.

Page 34

slide-35
SLIDE 35

Cybersecurity and the Audit

Board reporting Leading boards expect regular (e.g., quarterly) updates from management on information security and cyber threat intelligence that is both meaningful and actionable. The report should address the following:

  • Identification - Which are the top three to five threats that are most relevant to the
  • rganization?
  • Protection - Summarize the actions taken to manage these threats. Summarize

what other actions management considered, but elected not to pursue.

  • Detection - What mechanisms are being used to detect incidents? How does

management evaluate and categorize incidents identified and determine which incidents to elevate to senior leadership? What activity has been seen since the last report?

  • Response and recovery - How did the Company respond to higher risk incidents?

Page 35

slide-36
SLIDE 36

Wrapup

Questions / comments / discussion Presenter information:

Calvin Slegal | calvin.slegal@ey.com | 412.644.7473

EY thought leadership / other materials

www.ey.com/GRCinsights www.ey.com/GL/en/Services/Advisory/EY-cybersecurity www.ey.com/US/en/Industries

Wrap-up

Page 36

slide-37
SLIDE 37

Want to learn more?

Achieving resilience in the cyber ecosystem

www.ey.com/cyberecosystem To be published December 2014

Security Operations Centers

  • helping you get ahead
  • f cybercrime

www.ey.com/SOC

Using cyber analytics to help you get on top

  • f cybercrime

www.ey.com/3SOC Cybersecurity and the Internet of Things

www.ey.com/IoT

Managed SOC EY’s Advanced Security Center; world class cybersecurity working for you

www.ey.com/managedSOC

Get ahead of cybercrime: EY’s Global information Security Survey 2014

www.ey.com/GISS2014

Please visit our Insights on governance, risk and compliance series at www.ey.com/GRCinsights

Cyber program management: identifying ways to get ahead of cybercrime

www.ey.com/CPM

Cyber threat intelligence: how to get ahead of cybercrime

www.ey.com/CTI Published November 2014

Unlocking the value of your program investments

www.ey.com/prm

Page 37