Staying at the Forefront of Cybersecurity Threats
Presented by:
John Hock, CPA, CITP, CISA, SOC IT Audit Manager
Staying at the Forefront of Cybersecurity Threats Presented by: - - PowerPoint PPT Presentation
2019 Annual Leadership Conference September 25 -27, 2019 Staying at the Forefront of Cybersecurity Threats Presented by: John Hock, CPA, CITP, CISA, SOC IT Audit Manager Objectives How scary is it? Pervasiveness Cost Identify
Presented by:
John Hock, CPA, CITP, CISA, SOC IT Audit Manager
2
4
5 million debit and credit cards
143 million identities
5
6
7
8
9
10
11
12
13
Source: University of Maryland A. James Clark School of Engineering Study
Map
14
15
16
17
18
Source: Verizon 2018 DBIR
19
How was ransomware unleashed? Where was ransomware unleashed?
20
Source: 2019 Cost of a Data Breach Report
21
22
§ Organizational changes and process fixes § Additional training § Remediation to recover data § Good will incentives to keep customers § Increased cyber insurance premiums § Member loyalty lowered
24
Source: CNSSI-4009 - NIST.IR.7298r2
25
27
28
29
30
31
32
33
34
35
§ Engage management in establishing the institution’s vision, risk appetite and overall strategic direction. § Approve plans to use the assessment. § Review management’s analysis of the assessment results, inclusive
management or internal audit functions regarding those results. § Review management’s determination of whether the institution’s cybersecurity preparedness is aligned with its risks. § Review and approve plans to address any risk management or control weaknesses. § Review the results of management’s ongoing monitoring of the institution’s exposure to and preparedness for cyber threats.
36
Baseline Baseline maturity is characterized by minimum expectations required by law and regulations
Management has reviewed and evaluated guidance. Evolving Evolving maturity is characterized by additional formality of documented procedures and policies not already required. Risk-driven objectives are in place. Accountability for cybersecurity is formally assigned and broadened beyond protection of customer information to incorporate information assets and systems. Intermediate Intermediate maturity is characterized by detailed, formal processes. Controls are validated and consistent. Risk-management practices and analysis are integrated into business strategies. Advanced Advanced maturity is characterized by cybersecurity practices and analytics integrated across lines of business. Majority of risk-management processes are automated and include continuous process improvement. Accountability for risk decisions by frontline businesses is formally assigned. Innovative Innovative maturity is characterized by driving innovation in people, processes, and technology for the institution and the industry to manage cyber risks. This may entail developing new controls, new tools or creating new information-sharing groups. Real-time, predictive analytics are tied to automated responses.
38
39
40
41
42
44
45
46
47
48
49
50
51
52
§ https://www.ncua.gov/regulation-supervision/Pages/policy- compliance/resource-centers/cyber-security.aspx
§ https://www.nist.gov/topics/cybersecurity
§ https://www.sans.org/security-resources/
§ https://www.ffiec.gov/cybersecurity.htm
53
John Hock CPA, CITP, CISA, SOC
IT Audit Manager Hock@doeren.com 248-535-8650