cybersecurity strategies to manage business risks
play

CYBERSECURITY STRATEGIES TO MANAGE BUSINESS RISKS A C O N V E R S - PowerPoint PPT Presentation

CYBERSECURITY STRATEGIES TO MANAGE BUSINESS RISKS A C O N V E R S A T I O N W I T H H O R N E I T S P E C I A L I S T S P A N E L I S T S M I K E S K I N N E R , C PA , C I S A , C I T P S e n i o r M a n a g e r I T A s s u r a n


  1. CYBERSECURITY STRATEGIES TO MANAGE BUSINESS RISKS A C O N V E R S A T I O N W I T H H O R N E I T S P E C I A L I S T S

  2. P A N E L I S T S M I K E S K I N N E R , C PA , C I S A , C I T P S e n i o r M a n a g e r I T A s s u r a n c e & R i s k S e r v i c e s K E N M I L L E R , C PA , C I A , C R M A , C H C , C I S A S e n i o r M a n a g e r S A L LY H E R B E RT, C PA , C G M A I n d e p e n d e n t S e n i o r A d v i s o r F o r m e r Te c h n o l o g y I n d u s t r y S e n i o r E x e c u t i v e A u d i t C o m m i t t e e M e m b e r, S u s a n G . K o m e n f o r t h e C u r e

  3. WHAT IS CYBERSECURITY? Technologies and processes designed to protect from unauthorized access, vulnerabilities and attacks. ¡ 3

  4. 2014 YEAR OF THE DATA BREACH $400M Estimated 70M Customers’ personal info 56M Credit/debit cards financial loss from 700M 40M Credit/debit cards 53M Email addresses compromised records 42.5% 11TB of information Identified 47% of US adults 5 films breaches 6,000 top salaries had personal info were in Embarrassing emails exposed by hackers HC industry 4 Source: Verizon 2015 Data Breach Investigation Report; Forbes; CNN

  5. CYBERSECURITY OUTLOOK & TRENDS • Attacks will increase in number and sophistication • Political events will continue to shape the cyber threat environment • Evolving attack vectors 5

  6. CHALLENGES TO CYBER RISK MANAGEMENT Third-party service providers Use of employee-owned devices Cloud computing Access management complexities 6

  7. CYBER RISK IS AN ENTERPRISE-WIDE ISSUE • Disrupts business • Damages management credibility • Negative impact on brand • Financial cost of breach 7

  8. LEADERSHIP’S ROLE IN CYBERSECURITY GOVERNANCE • Be risk and threat aware RISK • Understand the changing business and technology landscape • Spend resources wisely to mitigate the greatest threats CONTROLS • Implement effective policies and procedures • Create a formal cybersecurity plan 8

  9. ROOT CAUSES OF DATA BREACHES Malicious or Criminal Attack System Design Source: Verizon 2015 Data Breach Investigation Report Human Error Source: Ponemon Institute 9

  10. HACKERS WANT In addition to credit card and financial information, hackers are seeking: Medical Record Data Employee Data Corporate Data Customer Data Vendor Data Organization IT Assets Intellectual Property 10

  11. REGULATORY IMPACT INCREASING OVERSIGHT FROM REGULATORS 11

  12. KEY RISK AREAS • Education • Access Management • Weak or Non-Existent IT Policies and Procedures • Network Security • Operating System / Application Security • Data Encryption • 3 rd Party Oversight • Disaster Recovery Environment 12

  13. EXAMPLE APPROACH TO CYBERSECURITY FUNCTION CATEGORY PRIMARY RESPONSIBILITY IDENTIFY • Asset Management • Management • Business Environment • Board / Governing Body • Governance • Risk Assessment • Risk Management Strategy PROTECT • Access Control • IT • Awareness & Training • Data Security • Information Protection Processes • Maintenance • Protective Technology DETECT • Anomalies & Events • IT • Security Continuous Monitoring • Detection Processes RESPOND • Response Planning • IT • Communications • Management • Analysis • Board / Governing Body • Mitigation • Improvements RECOVER • Recovery Planning • IT • Improvements • Management • Communications • Board / Governing Body Source: NIST Cybersecurity Framework 13

  14. THREE LINES OF DEFENSE MODEL Source: na.theiia.org 14

  15. GONE IN 60 SECONDS Initial attack takes minutes. Discovery and response takes weeks. 15

  16. QUESTIONS TO ASK • Has our organization identified our most important assets? • How are we protecting critical IT assets? • Does our organization use a security framework? • Has our organization conducted an IT risk assessment? 16

  17. STEPS TO TAKE NOW • Perform a risk/vulnerability assessment • Develop and implement a security plan • Maintain threat awareness 17

  18. QUESTIONS & COMMENTS 18

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend