Executive Responsibility
1
Confidential
Executive Responsibility Confidential 1 Executive Responsibility - - PowerPoint PPT Presentation
Executive Responsibility Confidential 1 Executive Responsibility C-Suite Input, Responsibility and Policy Development Duty of Care Implementation of Policy Foreseeable and Reasonable Mitigation Cyber Threat + Its Impact
1
Confidential
Confidential 2
3
Confidential
4
Confidential
and
5
Confidential
be; and
these threats.
6
Confidential
7
Confidential
acquisition; secure development processes; culture
Confidential 8
Property, R&D, Trade Secrets
strategy, financial documents
information (medical, identity)
information
and Financial Value
Reputation
Regulation, Investigation, Litigation
Confidential 9
Confidential 1 10
Confidential 11 11
and 2009 that led to more than $10.6 million in fraudulent charges.
practices by failing to maintain reasonable and appropriate data security for consumers' sensitive personal information and that its privacy policy informing consumers that Wyndham used “commercially reasonable efforts” to safeguard identifiable information was deceptive.
13
Crime Unauthorized computer penetration for immediate financial gain through fraud or blackmail Hacktivism Use of cyber attacks as a form of politically
Espionage Unauthorized computer penetration to acquire sensitive or valuable information to gain competitive advantage War Use of cyber attacks to cause damage through severe disruption or damage of computer controlled systems
Confidential 14 14
tactics, but not financially motivated
increasing in significance
ever-expanding target set
website defacement to long-term
Less Predictable Threat Creates Need for Constant Reassessment of Risk
Confidential 15 15
– Intellectual Property, Research and Development data – Financial, transactional, bid data, M&A
attacks
– RSA/EMC, Lockheed Martin – Google, Adobe, Intel – BP, Exxon, Royal Dutch Shell, Marathon Oil, Baker Hughes – Law firms and other custodians of sensitive data
Confidential 16 16
by national intelligence services, organized crime, often for the benefit of private industry
major US and European corporations have been successfully penetrated
have been successfully penetrated by China.”
Secret Service/Verizon: 92%
firms penetrated were unaware
compromise
Confidential 17 17
– Military and civilian infrastructure targets – Disruption of critical infrastructure, communications – Degrading national security capabilities
part of a larger conflict
– Stuxnet, 2010 – Georgia, 2008 – Syria, 2007 – Estonia, 2007?
Confidential 18 18
militaries, national intelligence services, and state-sponsored proxy groups
explicit cyber warfare capabilities
Confidential 19 19