A A Shortage of of Superheroes: Healthcare s Cybersecurity Staffing. October 2017

Size: px
Start display at page:

Download "A A Shortage of of Superheroes: Healthcare s Cybersecurity Staffing. October 2017"

Transcription

1 A A Shortage of of Superheroes: Healthcare s Cybersecurity Staffing Challenge Staffing Challenge October

2 Table of Contents Introduction... 3 Short on Superheroes... 4 Cyber Skills Most in Demand... 5 Undergraduate Underproduction... 6 Compensation Competition... 6 Strategies to Overcome the Cyber Skills Shortage... 7 Hire Low and Grow... 7 Build Your Cyber Brand... 8 The Automation Paradox... 9 Finding Experienced Talent... 9 Engage a Managed Compliance Services Provider (MCSP) Retention Strategies Conclusion About Meditology

3 Introduction The shortage of qualified workers to fill cybersecurity roles in healthcare organizations is a significant problem faced by C-level executives. This gap in available and affordable qualified talent weakens an organization s ability to secure sensitive patient data and meet ever-increasing privacy and compliance standards. While, cybersecurity skills are short everywhere, the healthcare industry has unique challenges in recruiting people with cybersecurity skills. Healthcare organizations are considered late arrivals to technology recruiting which has resulted in compensation rates that are typically less than other industries. While the challenges are great, the mission to secure highly-sensitive patient data provides a unique value-proposition to employees. A cybersecurity worker in healthcare is at the front lines in protecting a patient s most sensitive and personal information from malicious use. In recruiting cybersecurity workers, we are extending an invitation to become a protector, possibly a superhero, in securing the most sensitive information in patient care. However, this important role as the patient s information guardian is not well communicated to potential recruits. In recruiting cybersecurity workers, we are extending an invitation to become a protector, possibly a superhero, in securing the most sensitive information in patient care. Addressing the importance of cybersecurity professions is both a challenge and opportunity for healthcare organizations. This challenge is intensified as healthcare executives compete for qualified talent with other industries such as financial services, professional services and retail, which may be perceived as more exciting and challenging careers. The pressures from the regulatory environment and the ever-present, ever-increasing threat of data security breaches impacting the reputation of a healthcare network underscore the urgency in recruiting qualified personnel. Overcoming shortages of available talent interested in serving as healthcare cyber-guardians requires a variety of strategies outlined in this paper. 3

4 Short on Superheroes The shortage of cybersecurity professionals is well documented across all industries. In the 2016 Global Information Security Workforce Study, 70 percent of employers reported a plan to increase their cybersecurity staff size by at least 15 percent in In the healthcare sector, increases in planned cybersecurity staffing jumped to 20 percent. 1 The shortage problem in the healthcare industry is exacerbated by the current environment of change in which technology and patient care are converging into new service delivery models. Artificial intelligence (AI) software, cloud software, medical device monitoring, tele-medicine and the use of wireless devices to collect and retrieve patient data are all driving innovation and change in the patient service delivery model. 69% of healthcare organizations believe they are at greater risk than other industries for a data breach. - Source: Ponemon Institute According to the 2016 study on the Privacy and Security of Healthcare Data, an overwhelming majority of healthcare organizations (69 percent) and business associates (63 percent) believe they are at greater risk than other industries for a data breach. The top reasons for healthcare organization vulnerability is a lack of vigilance in ensuring their partners and other third parties protect patient information (51 percent) and not enough skilled security practitioners (44 percent). 1 In healthcare settings, more entry and sharing points of patient information exist than in many other business service delivery models such as financial services, government retail and entertainment. The need to know level 1 Ponemon Institute, (May 2016). Sixth Annual Benchmark Study on the Privacy and Security of Healthcare Data. Retrieved from pdf 4

5 of patient data is often very broad among vendors serving the healthcare organization as well (e.g. food preparation, pharmacy, specialized equipment, medical device monitoring, etc.) Each of these unique issues makes healthcare an industry full of data risks and vulnerabilities for information hacking and misuse. Indeed, healthcare is an arena in which cybersecurity professionals can become superheroes. The opportunity is in educating the emerging labor force of the skills needed to be successful in cybersecurity and the role they can play in securing patient information in a healthcare setting. Cyber Skills Most in Demand Among the scarce skills required in healthcare cybersecurity positions is the need to communicate at a high-level. The Ability to Communicate Effectively was noted as a scarce skill by over 50 percent of International firms and over 70 percent of U.S. firms responding in a 2016 survey conducted by MacAfee - Intel Security Center for Strategic and International Studies. 2 The need for strong communication skills is especially important in the healthcare industry due to the demands for information sharing and broad access to information within the healthcare network. Communicating in a well-understood, effective manner is increasingly important as the accountability reporting reaches the highest levels of the organization. As the role of cybersecurity becomes a high-level topic, the status of the CISO may be elevated as well. Increasingly the CISO may now report directly to the board of directors rather than the chief information officer (CIO). A 2015 IDC study predicted that by 2018, 75 percent of CISOs and chief security officers (CSOs) will report directly to the CEO or board of directors. 3 In the same MacAfee-Intel Security report cited above, more than 60 percent of International firms and 74% of U.S. firms surveyed noted Intrusion Detection and Attack Mitigation as a scarce skill in their organization. The increased occurrence of virus and hacking attacks of health information is evidence that the healthcare industry is becoming the new favorite among criminal data thieves. 2 MacAfee - Intel Security Center for Strategic and International Studies.(May 2, 2016). Hacking the Skills Shortage. Retrieved from 3 International Data Corporation (IDC), (2015). The State of the "C" in CISO. Retrieved from 5

6 On the positive side, Millennials surveyed in 2016 by the National Cybersecurity Alliance (NCSA) are increasingly attracted to jobs using skills needed to be successful in cybersecurity. 4 While there still exists a gap in finding potential employees with these skills, the best opportunities may be to grow the desired skill sets from within, a strategy we discuss further in this paper. Undergraduate Underproduction The expertise required in cybersecurity positions has expounded the shortage problem. For instance, 10 percent more cybersecurity roles available require specific certifications and/or security clearances as compared to other IT roles. Undergraduate degrees are required for more than 80 percent of cybersecurity roles, however there are still relatively few universities offering undergraduate degrees concentrating in cybersecurity studies. Among CISOs there is discussion about recruiting people from other technical disciplines and training them in security risk management. CISO are often open to recruiting from fields including network engineers, business analysts, bio-medical technicians and other fields. Many CISOs believe the best approach may be hiring low-level employees and training them on the specific risks found in a healthcare environment. This approach is discussed in further detail in this report. Compensation Competition In any scarce market, prices rise. The competition across all industries for qualified cybersecurity talent requires that healthcare organizations offer competitive or more attractive compensation offerings. Healthcare organizations that pay a competitive rate and demonstrate they value security personnel as a key risk management function, will be better able to retain and grow their staff. 4 National Cybersecurity Alliance (2016). Securing Our Future: Closing the Cybersecurity Talent Gap. 6

7 Strategies to Overcome the Cyber Skills Shortage To overcome these recruiting challenges, healthcare organizations must increase the value proposition the security and compliance department offers the entire provider network. Any employee involved in securing a patient s private information provides a critical role in providing high-quality patient care. A cybersecurity worker is at the front lines in protecting a patient s most sensitive and personal information from malicious use. We are inviting these specialized technical workers to become a protector, or a modern-day superhero, in securing the most sensitive information in patient care. This important role as the patient s information guardian is not well communicated within the healthcare industry. Addressing the importance of cybersecurity staff is both a challenge and opportunity for healthcare organizations. This challenge is intensified as healthcare executives compete for qualified talent with other industries such as financial services, professional services, entertainment and retail. In researching the cybersecurity shortage, we identified six strategies cited as being effective in recruiting and retaining highly-valued cybersecurity professionals. Each approach is explored below with a specific focus on how to apply these strategies in a healthcare setting. Five of these approaches to overcoming the cybersecurity shortage problem relate to recruiting, the final discussion focused on retention and growth of this group of healthcare heroes. Build Your Cyber Brand Engage an MCSP Hire Low and Grow Overcoming Cyber Skills Shortages Locate Experienced Talent Retain the Best Automate and Train Hire Low and Grow The most cost effective and perhaps quickest way to develop a cybersecurity team is to hire low-level staff members early in their careers and train them. Pairing up new hires with experienced mentors and trainers is a critical success factor for effectively growing cybersecurity professionals from the ground up. Developing formalized training and mentoring programs not only helps to get resources up to speed on core skills required for the role, but also demonstrates a supportive environment and focus on continual career development that helps retain talent over time. Coaching and mentoring also supports the ability to identify areas of interest for team members and provide opportunities to evolve and grow security skills to broaden the value and capabilities of the security team. Organizations should expect a certain percentage of attrition as some young workers will receive training and leave the organization; however, the percentage that stay will further develop into managerial staff that will enhance your organization s ability to respond to cyberthreats. 7

8 Build Your Cyber Brand Healthcare has unique challenges in educating security and compliance employees in the value they bring in patient care. The CISO/CPO/Compliance Officer can view this an opportunity to brand career development and their staff s unique skill set. Effective branding strategies include setting the culture and identity of the department, offering a well-communicated growth path, delivering high-value training programs and tie-back to overall patient service delivery. Employee retention for younger workers can be improved by emphasizing the intrinsic benefit their work brings in securing patient data. Potential and existing employees should understand the impact of their work. Patient data protection is relatable to everyone. Proper data security protects a mother, a father, children and communities challenged by disease and impairment. Doctors and care-giver trust is upheld when safeguarding patient information is taken seriously. Securing this patient data can protect people from financial attacks as well as protecting their personal information from untended release. For example, in August 2017, a vendor servicing Aetna insurance clients, notified patients of their HIV diagnosis in windowed-envelopes, thus increasing the possibility of untended release of a patient diagnosis to anyone handling the mailed letter. 5 Just a few weeks later in September 2017, Equifax announced that 143 million customers may have had their personal financial information compromised in a breach attack. 6 Security employees can be reminded of the significant role they offer in safeguarding sensitive information by the Aetna and Equifax breach examples. Data monitoring, security and protection is literally life-giving if a patient is dependent upon a medical device. A person living with an implanted device (such as a pacemaker) is dependent on the information flows to monitor and control critical life support functions. These are just a few examples of the impact cybersecurity workers have on our society. Positioning the cybersecurity and security department s role as a protector not only of patient information but the overall healthcare network s brand as a trusted provider is worth C-level s time and attention. Reaching out to peers within the Human Resources and Marketing areas of your organization can be helpful in establishing an effective brand for your department, as well. Propose ideas such as a job-shadowing program with local high-schools or colleges to expose young people and the community to the importance data security plays in delivery patient care. Some healthcare networks offer Community Education which can include parental outreach or just general information on how your organization is working to protect patient information. These community outreach programs may help the CISO in identifying recruiting opportunities with local colleges and training programs, while also bolstering the brand image of the healthcare organization within your community. 5 Ellison, A. (August 25, 2017). Aetna reveals customers HIV status in envelope window, Becker s Hospital Review. 6 Bernard, T.S., Hsu, T., Perlroth, N. and Lieber, R. (September 7, 2017). Equifax Says Cyberattack May Have Affected 143 Million in the U.S., New York Times. 8

9 As the NCSA report revealed, healthcare is becoming known as desired field for high-school students who are just exploring cybersecurity as a career option. This is the right time to develop job shadowing programs and parent outreach within the community to further extend your organization s brand as a leader in patient security on all fronts. The Automation Paradox Artificial intelligence and data automation have valuable roles in managing and identifying patient data security risks. Automation, however, may not directly translate into fewer humans to manage the cybersecurity function. Automated systems may more accurately manage specific security tasks; however, people are still needed to run and manage these automated systems. Some of the best uses of automation in cybersecurity tasks include monitoring for irregularities and machine learning to identify new attack patterns. Automated systems may accurately manage specific security tasks; however, people are still needed to run and manage these automated systems. Many organizations are leveraging a combination of technology implementation (automation) and outsourcing the maintenance and monitoring of these functions to third parties. Some of these functions include Security Incident and Event Monitoring (SIEM), Data Loss Prevention (DLP), privacy monitoring, third party risk management, cloud security and intrusion detection and prevention. While automation will play an important role in data security, these technologies do not replace the need for cybersecurity workers. Even executives of artificial intelligence software services are supporting the idea that security analysts will still have an important role in detecting risk. According to AI software firm, PatternX CEO Uday Veeramachaneni, The goal is to change the economics of security... But there will always be a need for a security analyst to make sense of it. 7 Finding Experienced Talent Healthcare executives want to hire qualified security personnel, but it is challenging. CISOs and hiring managers often look to hire experienced cybersecurity professionals from outside the industry, which can work but still requires adjustments and retraining. Often, cybersecurity personnel recruited from other industries such as government and financial services do not always understand the priorities of the healthcare system in setting cybersecurity policy. For example, security controls in a government setting may often be overly restrictive and unable to support information sharing required 7 Vizard, M. (March 16, 2016), How Automation will affect Cybersecurity Jobs, Dice.com, Retrieved from 9

10 to treat patients across the continuum of care. Similarly, in financial services, the willingness of end-users to enter passwords and have multi-factor authentication to access data is much greater than in a healthcare environment. Finding the right fit outside the healthcare industry may work in filling top-level cybersecurity roles, but preparations should be made for on-the-job training of younger workers. In department training and promotion programs help cybersecurity professionals learn the specific nuances of healthcare data flows and security needs. The internal IT department is a great place to look for talent as they have a built-in understanding of information flows within a healthcare setting. However, providing appropriate security training is important for organizations hiring from within. In the 2017 ISC report on cybersecurity professional skills, 63 percent of IT professionals surveyed said their organizations face a cybersecurity shortage, but only 34 percent of respondent say their companies will cover the cost of security training. 8 The ISC report also infers that there is a disconnect between the skills desired by the CISO and the skills the frontline IT hiring manager and CIO look for in making a hiring decision. The CISO level tends to focus on highlevel communication and analytical skills at the top of the list, while the hiring manager looks for cloud computing and risk assessment skills as key skills. This disconnect of perceived needed skills underscores the issue of appropriate investment in training and the immediate need to address technical security risks. Engage a Managed Compliance Services Provider (MCSP) When qualified security candidates are scarce, having a third-party MCSP engaged brings instant access to a wider range of skill sets than your healthcare organization can offer alone. Outsourcing some information security and compliance functions will help scale the organization s capacity for handling new, unanticipated security tasks. An MCSP vendor will provide an immediate expansion in staff resources and coverage of many gaps and vulnerabilities within the organization s data security network. 8 (ISC 2 ) (2017). IT Professionals Are a Critically Underutilized Resource for Cybersecurity. 10

11 Specifically, outsourcing the tasks involved in meeting government compliance requirements makes sense. Compliance activities involve time-consuming monitoring and remediation activities, require knowledge of everchanging government and industry regulation in the healthcare industry as well as require expertise in fraud and data intrusion detection. Vendor risk management is also tied into government compliance requirements as hundreds of vendors typically have detailed access to sensitive patient information. Many of these vendors are unfamiliar with government requirements to secure patient information. Bringing on an MCSP with detailed knowledge of the healthcare delivery system and related government requirements and security risks, will greatly expand the security team s effectiveness and capacity. New trends in tele-medicine and remote equipment monitoring expound the need for additional security processes and protocols. A MCSP is a good partner to engage in identifying potential security gaps and bringing security protocol options for securing new types of medical devices. Engaging a MCSP with a proven record in the healthcare industry will allow your information security and compliance staff to plan, manage and communicate more effectively at the higher levels within and across your healthcare network. This increased efficiency typically results in a decrease in the overall cost of compliance and risk management. Here are some of the most common functions healthcare organizations outsource effectively to a third-party MCSP: 11

12 Retention Strategies Recruiting firms in the IT industry are providing sage advice that benefits healthcare organizations in understanding how to retain employees. 9 Here are few suggestions for healthcare organization IT managers to help ensure retention of their valued information guardians: 9 Billar, Todd. VAR Staffing. Top 10 Tips to Improve Employee Retention. tips-to-improve-employee-retention/?wpnd_cid=c5ae4325d31807b9 12

13 Conclusion Indeed, in this era of broad cyber information sharing, the healthcare industry is truly seeking superheroes that can protect and secure it from outside risks. Cybersecurity personnel are among the scarcest talent available in any industry, but especially in healthcare. While there are indicators that young people are becoming interested in technical careers within the healthcare industry, a great need exists now to fill positions related to data security and protection. A strategic talent acquisition and staffing plan can include both near-term and long-term solutions. In the near term, hiring a MSCP partner that understands healthcare is an effective strategy to address pressing compliance, privacy and security requirements. Third-party partners have greater access to the skills sets needed to respond and protect against to these security threats unique to the healthcare industry. Outsourcing many of the tedious compliance, risk management and vendor management functions will also free up resources so you can scale your security program quickly. For long-term staff growth and retention, expanding the CISO s reach across the organization and working alongside Human Resources and Marketing in branding, training and community outreach will help uncover and retain some of the most promising talent for the future. Using a combined approach of outsourcing, training and developing a long-term strategy to identify, grow and retain security talent, the shortage of cybersecurity talent can be effectively addressed. CISOs that view the cybersecurity challenge as an opportunity to groom young people into rewarding careers will also reap the intrinsic rewards of helping the greater good. After all, you are superheroes, too. 13

14 About Meditology Meditology Services LLC is a healthcare-focused advisory services firm with core principles of quality, integrity, loyalty, and value. Our executive team has an average of 15 years of consulting and operational experience in healthcare with provider and payer clients nationally of varying size and complexity. We understand the importance of relationships and derive much of our business from a long list of satisfied clients who value the quality of our work products combined with the professionalism, approach, and innovative solutions we bring to our engagements. Meditology services clients across the U.S. with offices in Atlanta, Philadelphia, San Diego, Denver, and Nashville. Meditology Services LLC 5256 Peachtree Road, Suite 190 Atlanta, GA info@meditologyservices.com Tel. (404)

Which Side Are You On?

Which Side Are You On? 12/9/2015 ARE YOU THE NEXT CYBER WARRIOR? Maria S. Thompson State Chief Risk/Security Officer Which Side Are You On? 8/17/2015 2 Information Technology 2 1 Cyber Professionals Deficiency Statistics Cybersecurity

More information

Emerging Technologies The risks they pose to your organisations

Emerging Technologies The risks they pose to your organisations Emerging Technologies The risks they pose to your organisations 10 June 2016 Digital trends are fundamentally changing the way that customers behave and companies operate Mobile Connecting people and things

More information

PONEMON INSTITUTE RESEARCH REPORT 2018 STUDY ON GLOBAL MEGATRENDS IN CYBERSECURITY

PONEMON INSTITUTE RESEARCH REPORT 2018 STUDY ON GLOBAL MEGATRENDS IN CYBERSECURITY PONEMON INSTITUTE RESEARCH REPORT 2018 STUDY ON GLOBAL MEGATRENDS IN CYBERSECURITY Benchmark research sponsored by Raytheon. Independently conducted by Ponemon Institute LLC. February 2018 2018 Study on

More information

Security in India: Enabling a New Connected Era

Security in India: Enabling a New Connected Era White Paper Security in India: Enabling a New Connected Era India s economy is growing rapidly, and the country is expanding its network infrastructure to support digitization. India s leapfrogging mobile

More information

State of the Cyber Training Market January 2018

State of the Cyber Training Market January 2018 State of the Cyber Training Market January 2018 2018 by CYBERBIT 2018 by CYBERBIT Proprietary CYBERBIT Proprietary Cybersecurity Market Worth 202.36 Billion USD by 2021 Marketandmarkets analysis, 2017

More information

Cybersecurity. Securely enabling transformation and change

Cybersecurity. Securely enabling transformation and change Cybersecurity Securely enabling transformation and change Contents... Cybersecurity overview Business drivers Cybersecurity strategy and roadmap Cybersecurity in practice CGI s cybersecurity offering Why

More information

CERTIFIED IN THE GOVERNANCE OF ENTERPRISE IT CGEIT AFFIRM YOUR STRATEGIC VALUE AND CAREER SUCCESS

CERTIFIED IN THE GOVERNANCE OF ENTERPRISE IT CGEIT AFFIRM YOUR STRATEGIC VALUE AND CAREER SUCCESS CERTIFIED IN THE GOVERNANCE OF ENTERPRISE IT CGEIT AFFIRM YOUR STRATEGIC VALUE AND CAREER SUCCESS Good IT governance is a key element of a well-performing enterprise. Enterprises need qualified information

More information

THE POWER OF TECH-SAVVY BOARDS:

THE POWER OF TECH-SAVVY BOARDS: THE POWER OF TECH-SAVVY BOARDS: LEADERSHIP S ROLE IN CULTIVATING CYBERSECURITY TALENT SHANNON DONAHUE DIRECTOR, INFORMATION SECURITY PRACTICES 1 IT S A RISK-BASED WORLD: THE 10 MOST CRITICAL UNCERTAINTIES

More information

Why the Security Workforce Needs More Women and Men

Why the Security Workforce Needs More Women and Men Why the Security Workforce Needs More Women and Men ISSA International Conference Tammy Moskites, CIO/CISO, Venafi October 10, 2015 A Little Bit About Me 25+ Years in IT & Security Current CIO/CISO of

More information

Canada Highlights. Cybersecurity: Do you know which protective measures will make your company cyber resilient?

Canada Highlights. Cybersecurity: Do you know which protective measures will make your company cyber resilient? Canada Highlights Cybersecurity: Do you know which protective measures will make your company cyber resilient? 21 st Global Information Security Survey 2018 2019 1 Canada highlights According to the EY

More information

Cyber Security in Smart Commercial Buildings 2017 to 2021

Cyber Security in Smart Commercial Buildings 2017 to 2021 Smart Buildings Cyber Security in Smart Commercial Buildings 2017 to 2021 Published: Q2 2017 Cyber Security in Smart Buildings Synopsis 2017 This report will help all stakeholders and investors in the

More information

Mapping Your Requirements to the NIST Cybersecurity Framework. Industry Perspective

Mapping Your Requirements to the NIST Cybersecurity Framework. Industry Perspective Mapping Your Requirements to the NIST Cybersecurity Framework Industry Perspective 1 Quest has the solutions and services to help your organization identify, protect, detect, respond and recover, better

More information

SOC Summit June 6, Strengthening Capacity in Cyber Talent sans.org/cybertalent

SOC Summit June 6, Strengthening Capacity in Cyber Talent sans.org/cybertalent SOC Summit 2017 June 6, 2017 Strengthening Capacity in Cyber Talent sans.org/cybertalent Increasing Sense of Urgency Cyber threats to U.S. national and economic security are increasing in frequency, scale,

More information

Security in Today s Insecure World for SecureTokyo

Security in Today s Insecure World for SecureTokyo Security in Today s Insecure World for SecureTokyo David Shearer (ISC) 2 Chief Executive Officer dshearer@isc2.org www.isc2.org I m Influenced by a Mission Driven Background U.S. Maritime Transportation

More information

State Governments at Risk: State CIOs and Cybersecurity. CSG Cybersecurity and Privacy Policy Academy November 2, 2017

State Governments at Risk: State CIOs and Cybersecurity. CSG Cybersecurity and Privacy Policy Academy November 2, 2017 State Governments at Risk: State CIOs and Cybersecurity CSG Cybersecurity and Privacy Policy Academy November 2, 2017 About NASCIO National association representing state chief information officers and

More information

UK Gender Pay Gap Report 2018

UK Gender Pay Gap Report 2018 UK Gender Pay Gap Report 2018 As part of McAfee s commitment to build a better, more balanced workplace and community, we wholly embrace the UK Gender Pay Gap report. This year s calculations cover our

More information

IDC FutureScape: Worldwide Security Products and Services 2017 Predictions

IDC FutureScape: Worldwide Security Products and Services 2017 Predictions IDC FutureScape: Worldwide Security Products and Services 2017 Predictions Sean Pike, Program Vice President, Robert Ayoub, Research Director IDC Web Conference December, 7, 2016 Logistics Submit any questions

More information

The State of Cybersecurity and Digital Trust 2016

The State of Cybersecurity and Digital Trust 2016 The State of Cybersecurity and Digital Trust 2016 Identifying Cybersecurity Gaps to Rethink State of the Art Executive Summary Executive Summary While the advent of digital technology has fueled new business

More information

2018 GLOBAL CHANNEL PARTNER SURVEY THYCOTIC CHANNEL PARTNER SURVEY REPORT

2018 GLOBAL CHANNEL PARTNER SURVEY THYCOTIC CHANNEL PARTNER SURVEY REPORT 2018 GLOBAL CHANNEL PARTNER SURVEY THYCOTIC CHANNEL PARTNER SURVEY REPORT THYCOTIC 2018 GLOBAL CHANNEL PARTNER SURVEY Channel Partner survey highlights client cybersecurity concerns and opportunities for

More information

Key Findings from the Global State of Information Security Survey 2017 Indonesian Insights

Key Findings from the Global State of Information Security Survey 2017 Indonesian Insights www.pwc.com/id Key Findings from the State of Information Security Survey 2017 n Insights Key Findings from the State of Information Security Survey 2017 n Insights By now, the numbers have become numbing.

More information

Background FAST FACTS

Background FAST FACTS Background Terra Verde was founded in 2008 by cybersecurity, risk and compliance executives. The founders believed that the market needed a company that was focused on using security, risk and compliance

More information

IBM Security Systems. IBM X-Force 2012 & CISO Survey. Cyber Security Threat Landscape IBM Corporation IBM Corporation

IBM Security Systems. IBM X-Force 2012 & CISO Survey. Cyber Security Threat Landscape IBM Corporation IBM Corporation IBM X-Force 2012 & CISO Survey Cyber Security Threat Landscape 1 2012 IBM Corporation IBM X-Force 2011 Trend and Risk Report Highlights The mission of the IBM X-Force research and development team is to:

More information

Defensible and Beyond

Defensible and Beyond TELUS Defensible and Beyond Mike Vamvakaris Director and Head of Cyber Security Consulting November 2017 Digital transformation brings many benefits Communication and Collaboration Autonomous and Artificial

More information

Understanding Cybersecurity Talent Needs Findings From Surveys of Business Executives and College Presidents

Understanding Cybersecurity Talent Needs Findings From Surveys of Business Executives and College Presidents Understanding Cybersecurity Talent Needs Findings From Surveys of Business Executives and College Presidents BHEF_Report_mk_050817_ms Acknowledgements This report is supported primarily by a grant from

More information

Mitigating Risk with Ongoing Cybersecurity Risk Assessment. Scott Moser CISO Caesars Entertainment

Mitigating Risk with Ongoing Cybersecurity Risk Assessment. Scott Moser CISO Caesars Entertainment Mitigating Risk with Ongoing Cybersecurity Risk Assessment Scott Moser CISO Caesars Entertainment CSO50 Presentation Caesars Entertainment Cybersecurity Risk Management Scott Moser Chief Information Security

More information

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO White Paper Incentives for IoT Security May 2018 Author: Dr. Cédric LEVY-BENCHETON, CEO Table of Content Defining the IoT 5 Insecurity by design... 5 But why are IoT systems so vulnerable?... 5 Integrating

More information

Reducing Cybersecurity Costs & Risk through Automation Technologies

Reducing Cybersecurity Costs & Risk through Automation Technologies Reducing Cybersecurity Costs & Risk through Automation Technologies Sponsored by Juniper Networks Independently conducted by Ponemon Institute LLC Publication Date: November 2017 Ponemon Institute Research

More information

Evaluating Cybersecurity Coverage A Maturity Model. Presented to: ISACA Charlotte Chapter Vision for IT Audit 2020 Symposium

Evaluating Cybersecurity Coverage A Maturity Model. Presented to: ISACA Charlotte Chapter Vision for IT Audit 2020 Symposium Discussion on: Evaluating Cybersecurity Coverage A Maturity Model Presented to: ISACA Charlotte Chapter Vision for IT Audit 2020 Symposium By: Eric C. Lovell PricewaterhouseCoopers LLP ( PwC ) March 24,

More information

Engaging Executives and Boards in Cybersecurity Session 303, Feb 20, 2017 Sanjeev Sah, CISO, Texas Children s Hospital Jimmy Joseph, Senior Manager,

Engaging Executives and Boards in Cybersecurity Session 303, Feb 20, 2017 Sanjeev Sah, CISO, Texas Children s Hospital Jimmy Joseph, Senior Manager, Engaging Executives and Boards in Cybersecurity Session 303, Feb 20, 2017 Sanjeev Sah, CISO, Texas Children s Hospital Jimmy Joseph, Senior Manager, Deloitte & Touche LLP 1 Speaker Introduction Sanjeev

More information

Cybersecurity and the Board of Directors

Cybersecurity and the Board of Directors Cybersecurity and the Board of Directors Key Findings from BITS/FSR Meetings OVERVIEW Board directors are increasingly required to engage in cybersecurity risk management yet some may need better education

More information

National Initiative for Cyber Education (NICE) and the Cybersecurity Workforce Framework: Attract and Retain the Best in InfoSec.

National Initiative for Cyber Education (NICE) and the Cybersecurity Workforce Framework: Attract and Retain the Best in InfoSec. National Initiative for Cyber Education (NICE) and the Cybersecurity Workforce Framework: Attract and Retain the Best in InfoSec April 12, 2018 1 Introduction to NICE - The National Initiative for Cybersecurity

More information

Cybersecurity Job Seekers

Cybersecurity Job Seekers Cybersecurity Job Seekers 2018 Insights and Trends David Shearer, CISSP (ISC)² CEO 3 Who s This Guy?» Lead (ISC)² Certified CISSP» 30 years experience Public sector CIO, architecture, security, engineering

More information

IT People has been offering end-to-end IT outsourcing & staffing solutions to companies since two decades.

IT People has been offering end-to-end IT outsourcing & staffing solutions to companies since two decades. Corporate Profile Company Profile IT People has been offering end-to-end IT outsourcing & staffing solutions to companies since two decades. As a resource partner, we offer personalized and professional

More information

Doug Couto Texas A&M Transportation Technology Conference 2017 College Station, Texas May 4, 2017

Doug Couto Texas A&M Transportation Technology Conference 2017 College Station, Texas May 4, 2017 Cyber Concerns of Local Government and What Does It Mean to Transportation Doug Couto Texas A&M Transportation Technology Conference 2017 College Station, Texas May 4, 2017 Transportation and Infrastructure

More information

Anticipating the wider business impact of a cyber breach in the health care industry

Anticipating the wider business impact of a cyber breach in the health care industry Anticipating the wider business impact of a cyber breach in the health care industry John Gelinne, Director Cyber Risk Services Deloitte & Touche LLP jgelinne@deloitte.com commodore_22 Hector Calzada,

More information

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE EXECUTIVE SUMMARY ALIGNING CYBERSECURITY WITH RISK The agility and cost efficiencies

More information

ITU CBS. Digital Security Capacity Building: Role of the University GLOBAL ICT CAPACITY BUILDING SYMPOSIUM SANTO DOMINGO 2018

ITU CBS. Digital Security Capacity Building: Role of the University GLOBAL ICT CAPACITY BUILDING SYMPOSIUM SANTO DOMINGO 2018 GLOBAL ICT CAPACITY BUILDING SYMPOSIUM ITU CBS SANTO DOMINGO 2018 Digital Capacity Building: Role of the University 18 20 June 2018 Santo Domingo, Dominican Republic Dr. Nizar Ben Neji Faculty of Sciences

More information

Florida Government Finance Officers Association. Staying Secure when Transforming to a Digital Government

Florida Government Finance Officers Association. Staying Secure when Transforming to a Digital Government Florida Government Finance Officers Association Staying Secure when Transforming to a Digital Government Agenda Plante Moran Introductions Technology Pressures and Challenges Facing Government Technology

More information

Hearing Voices: The Cybersecurity Pro s View of the Profession

Hearing Voices: The Cybersecurity Pro s View of the Profession SESSION ID: AST2-W02 Hearing Voices: The Cybersecurity Pro s View of the Profession Jon Oltsik Senior Principal Analyst and ESG Fellow Enterprise Strategy Group @joltsik Candy Alexander, CISSP CISM International

More information

Sales Presentation Case 2018 Dell EMC

Sales Presentation Case 2018 Dell EMC Sales Presentation Case 2018 Dell EMC Introduction: As a member of the Dell Technologies unique family of businesses, Dell EMC serves a key role in providing the essential infrastructure for organizations

More information

Compliant. Secure. Dependable.

Compliant. Secure. Dependable. NAVIFY Cloud Security with the NAVIFY Tumor Board solution Compliant. Secure. Dependable. Trust that your oncology patients healthcare information stays protected. In the era of precision medicine, you

More information

PULSE TAKING THE PHYSICIAN S

PULSE TAKING THE PHYSICIAN S TAKING THE PHYSICIAN S PULSE TACKLING CYBER THREATS IN HEALTHCARE Accenture and the American Medical Association (AMA) surveyed U.S. physicians regarding their experiences and attitudes toward cybersecurity.

More information

Personnel Certification

Personnel Certification Personnel Certification Facilitating the Growth of a Global Economy Roy A. Swift, Ph.D. Senior Director, Personnel Credentialing Accreditation Programs American National Standards Institute Building a

More information

DIGITAL TRUST Making digital work by making digital secure

DIGITAL TRUST Making digital work by making digital secure Making digital work by making digital secure MARKET DRIVERS AND CHALLENGES THE ROLE OF IT SECURITY IN THE DIGITAL AGE 2 In today s digital age we see the impact of poor security controls everywhere. Bots

More information

INTRODUCTION. We would like to thank HelpSystems for supporting this unique research. We hope you will enjoy the report.

INTRODUCTION. We would like to thank HelpSystems for supporting this unique research. We hope you will enjoy the report. 2019 SIEM REPORT INTRODUCTION Security Information and Event Management (SIEM) is a powerful technology that allows security operations teams to collect, correlate and analyze log data from a variety of

More information

Cybersecurity: Considerations for Internal Audit. Gina Gondron Senior Manager Frazier & Deeter Geek Week August 10, 2016

Cybersecurity: Considerations for Internal Audit. Gina Gondron Senior Manager Frazier & Deeter Geek Week August 10, 2016 Cybersecurity: Considerations for Internal Audit Gina Gondron Senior Manager Frazier & Deeter Geek Week August 10, 2016 Agenda Key Risks Incorporating Internal Audit Resources Questions 2 San Francisco

More information

AUSTRALIA Building Digital Trust with Australian Healthcare Consumers

AUSTRALIA Building Digital Trust with Australian Healthcare Consumers AUSTRALIA Building Digital Trust with Australian Healthcare Consumers Accenture 2017 Consumer Survey on Healthcare Cybersecurity and Digital Trust 2 Consumers in Australia trust healthcare organisations

More information

RIMS Perk Session Protecting the Crown Jewels A Risk Manager's guide to cyber security March 18, 2015

RIMS Perk Session Protecting the Crown Jewels A Risk Manager's guide to cyber security March 18, 2015 www.pwc.com RIMS Perk Session 2015 - Protecting the Crown Jewels A Risk Manager's guide to cyber security March 18, 2015 Los Angeles RIMS Agenda Introductions What is Cybersecurity? Crown jewels The bad

More information

Executive Insights. Protecting data, securing systems

Executive Insights. Protecting data, securing systems Executive Insights Protecting data, securing systems February 2018 Protecting data, securing systems Product and information security is a combination of education, policies and procedures, physical security

More information

Cyber Security Program

Cyber Security Program Cyber Security Program Cyber Security Program Goals and Objectives Goals Provide comprehensive Security Education and Awareness to the University community Build trust with the University community by

More information

DIGITAL TRANSFORMATION IN FINANCIAL SERVICES

DIGITAL TRANSFORMATION IN FINANCIAL SERVICES DIGITAL TRANSFORMATION IN FINANCIAL SERVICES Global Priorities, Progress, and Obstacles Insights from business and IT executives at financial services institutions worldwide reveal that while digital transformation

More information

Run the business. Not the risks.

Run the business. Not the risks. Run the business. Not the risks. RISK-RESILIENCE FOR THE DIGITAL BUSINESS Cyber-attacks are a known risk to business. Today, with enterprises becoming pervasively digital, these risks have grown multifold.

More information

BRING EXPERT TRAINING TO YOUR WORKPLACE.

BRING EXPERT TRAINING TO YOUR WORKPLACE. BRING EXPERT TRAINING TO YOUR WORKPLACE. ISACA s globally respected training and certification programs inspire confidence that enables innovation in the workplace. ISACA s On-Site Training brings a unique

More information

Don t Be the Next Headline! PHI and Cyber Security in Outsourced Services.

Don t Be the Next Headline! PHI and Cyber Security in Outsourced Services. Don t Be the Next Headline! PHI and Cyber Security in Outsourced Services. June 2017 Melanie Duerr Fazzi Associates Partner, Director of Coding Operations Jami Fisher Fazzi Associates Chief Information

More information

Institute of Internal Auditors 2019 CONNECT WITH THE IIA CHICAGO #IIACHI

Institute of Internal Auditors 2019 CONNECT WITH THE IIA CHICAGO #IIACHI Institute of Internal Auditors 2019 CONNECT WITH THE IIA CHICAGO CHAPTER: @IIACHI #IIACHI WWW.FACEBOOK.COM/IIACHICAGO HTTPS://WWW.LINKEDIN.COM/GROUPS/1123977 1 CAE Communications and Common Audit Committee

More information

Securing Digital Transformation

Securing Digital Transformation September 4, 2017 Securing Digital Transformation DXC Security Andreas Wuchner, CTO Security Innovation Risk surface is evolving and increasingly complex The adversary is highly innovative and sophisticated

More information

ISACA MOSCOW CHAPTER Chapter meeting 22 September 2016

ISACA MOSCOW CHAPTER Chapter meeting 22 September 2016 ISACA MOSCOW CHAPTER Chapter meeting 22 September 2016 Introduction Special guest speaker ISACA Audit committee member, Rosemary Amato Open dialog Wrap-up and close Special guest speaker CISA, CMA, CPA,

More information

Security and Privacy Governance Program Guidelines

Security and Privacy Governance Program Guidelines Security and Privacy Governance Program Guidelines Effective Security and Privacy Programs start with attention to Governance. Governance refers to the roles and responsibilities that are established by

More information

Keys to a more secure data environment

Keys to a more secure data environment Keys to a more secure data environment A holistic approach to data infrastructure security The current fraud and regulatory landscape makes it clear that every firm needs a comprehensive strategy for protecting

More information

CYBERSECURITY IN THE POST ACUTE ARENA AGENDA

CYBERSECURITY IN THE POST ACUTE ARENA AGENDA CYBERSECURITY IN THE POST ACUTE ARENA AGENDA 2 Introductions 3 Assessing Your Organization 4 Prioritizing Your Review 5 206 Benchmarks and Breaches 6 Compliance 0 & Cybersecurity 0 7 Common Threats & Vulnerabilities

More information

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security SYMANTEC: SECURITY ADVISORY SERVICES Symantec Security Advisory Services The World Leader in Information Security Knowledge, as the saying goes, is power. At Symantec we couldn t agree more. And when it

More information

Healthcare IT Modernization and the Adoption of Hybrid Cloud

Healthcare IT Modernization and the Adoption of Hybrid Cloud Healthcare IT Modernization and the Adoption of Hybrid Cloud An IDC InfoBrief, Sponsored by VMware June 2018 Executive Summary The healthcare industry is facing unprecedented changes brought about by a

More information

SOC for cybersecurity

SOC for cybersecurity April 2018 SOC for cybersecurity a backgrounder Acknowledgments Special thanks to Francette Bueno, Senior Manager, Advisory Services, Ernst & Young LLP and Chris K. Halterman, Executive Director, Advisory

More information

What It Takes to be a CISO in 2017

What It Takes to be a CISO in 2017 What It Takes to be a CISO in 2017 Doug Copley Deputy CISO Sr. Security & Privacy Strategist February 2017 IMAGINE You re the CISO In Bangladesh Of a bank On a Friday when you re closed You realize 6 huge

More information

GEORGIA CYBERSECURITY WORKFORCE ACADEMY. NASCIO 2018 State IT Recognition Awards

GEORGIA CYBERSECURITY WORKFORCE ACADEMY. NASCIO 2018 State IT Recognition Awards GEORGIA CYBERSECURITY WORKFORCE ACADEMY NASCIO 2018 State IT Recognition Awards Title: Georgia Cybersecurity Workforce Academy Category: Cybersecurity State: Georgia Contact: Stanton Gatewood Stan.Gatewood@gta.ga.gov

More information

Enhancing the Cybersecurity of Federal Information and Assets through CSIP

Enhancing the Cybersecurity of Federal Information and Assets through CSIP TECH BRIEF How BeyondTrust Helps Government Agencies Address Privileged Access Management to Improve Security Contents Introduction... 2 Achieving CSIP Objectives... 2 Steps to improve protection... 3

More information

Securing the Internet of Things (IoT) at the U.S. Department of Veterans Affairs

Securing the Internet of Things (IoT) at the U.S. Department of Veterans Affairs Securing the Internet of Things (IoT) at the U.S. Department of Veterans Affairs Dominic Cussatt Acting Deputy Assistant Secretary / Chief Information Security Officer (CISO) February 20, 2017 The Cyber

More information

Training and Certifying Security Testers Beyond Penetration Testing

Training and Certifying Security Testers Beyond Penetration Testing Training and Certifying Security Testers Beyond Penetration Testing Randall W. Rice, CTAL (Full), CTAL-SEC Director, ASTQB Board of Directors www.astqb.org Most organizations do not know the true status

More information

A Global Look at IT Audit Best Practices

A Global Look at IT Audit Best Practices A Global Look at IT Audit Best Practices 2015 IT Audit Benchmarking Survey March 2015 Speakers Kevin McCreary is a Senior Manager in Protiviti s IT Risk practice. He has extensive IT audit and regulatory

More information

Swedish bank overcomes regulatory hurdles and embraces the cloud to foster innovation

Swedish bank overcomes regulatory hurdles and embraces the cloud to foster innovation Think Cloud Compliance Case Study Swedish bank overcomes regulatory hurdles and embraces the cloud to foster innovation Customer details : Collector Bank - Sweden 329 employees www.collector.se/en Banking

More information

TIPS FOR FORGING A BETTER WORKING RELATIONSHIP BETWEEN COUNSEL AND IT TO IMPROVE CYBER-RESPONSE

TIPS FOR FORGING A BETTER WORKING RELATIONSHIP BETWEEN COUNSEL AND IT TO IMPROVE CYBER-RESPONSE TIPS FOR FORGING A BETTER WORKING RELATIONSHIP BETWEEN COUNSEL AND IT TO IMPROVE CYBER-RESPONSE Association of Corporate Counsel NYC Chapter 11/1 NYC BDO USA, LLP, a Delaware limited liability partnership,

More information

ISACA West Florida Chapter - Cybersecurity Event

ISACA West Florida Chapter - Cybersecurity Event ISACA West Florida Chapter - Cybersecurity Event Presented by Sri Sridharan Managing Director & Chief Operating Officer Florida Center for Cybersecurity CURRENT TRENDS Top Cybersecurity Trends of 2015

More information

PAIN AND PROGRESS THE RSA CYBERSECURITY AND BUSINESS RISK STUDY

PAIN AND PROGRESS THE RSA CYBERSECURITY AND BUSINESS RISK STUDY WHITEPAPER PAIN AND PROGRESS THE RSA CYBERSECURITY AND BUSINESS RISK STUDY CONTENTS Executive Summary........................................ 3 The Cybersecurity and Business Risk Survey..........................

More information

POSITION DESCRIPTION

POSITION DESCRIPTION Network Security Consultant POSITION DESCRIPTION Unit/Branch, Directorate: Location: Regulatory Unit Information Assurance and Cyber Security Directorate Auckland Salary range: I $90,366 - $135,548 Purpose

More information

DeMystifying Data Breaches and Information Security Compliance

DeMystifying Data Breaches and Information Security Compliance May 22-25, 2016 Los Angeles Convention Center Los Angeles, California DeMystifying Data Breaches and Information Security Compliance Presented by James Harrison OM32 5/25/2016 3:00 PM - 4:15 PM The handouts

More information

2015 VORMETRIC INSIDER THREAT REPORT

2015 VORMETRIC INSIDER THREAT REPORT Research Conducted by Research Analyzed by 2015 VORMETRIC INSIDER THREAT REPORT Trends and Future Directions in Data Security GLOBAL EDITION #2015InsiderThreat EXECUTIVE PERSPECTIVE 1 INSIDER THREATS:

More information

SELLING YOUR ORGANIZATION ON APPLICATION SECURITY. Navigating a new era of cyberthreats

SELLING YOUR ORGANIZATION ON APPLICATION SECURITY. Navigating a new era of cyberthreats SELLING YOUR ORGANIZATION ON APPLICATION SECURITY Navigating a new era of cyberthreats Selling Your Organization on Application Security 01 It's no secret that cyberattacks place organizations large and

More information

Sponsored by Raytheon. Don t Wait: The Evolution of Proactive Threat Hunting Executive Summary

Sponsored by Raytheon. Don t Wait: The Evolution of Proactive Threat Hunting Executive Summary Don t Wait: The Evolution of Proactive Threat Hunting Executive Summary Sponsored by Raytheon Independently conducted by Ponemon Institute LLC Publication Date: June 2016 Connect with us: #DontWaitHunt

More information

A CFO s Guide to Cyber Security in the Coming Year

A CFO s Guide to Cyber Security in the Coming Year CYBER SECURITY A CFO s Guide to Cyber Security in the Coming Year LEVERAGE TECHNOLOGY AND YOUR FINANCIAL INSTITUTION TO BUILD BETTER DEFENSES www.cfo.com www.huntington.com A CFO s Guide to Cyber Security

More information

PREPARE FOR TAKE OFF. Accelerate your organisation s journey to the Cloud.

PREPARE FOR TAKE OFF. Accelerate your organisation s journey to the Cloud. PREPARE FOR TAKE OFF Accelerate your organisation s journey to the Cloud. cloud. Contents Introduction Program & Governance BJSS Cloud Readiness Assessment: Intro Platforms & Development BJSS Cloud Readiness

More information

CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships. from the most trusted name in information security

CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships. from the most trusted name in information security CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships About SANS The SANS (SysAdmin, Audit, Network, Security) Institute Established in 1989 Cooperative research

More information

The Quest for Independence - Information Security Management Pyramid. Mikhail Utin, CISSP, PhD, Daniil Utin, MS and Rubos, Inc.

The Quest for Independence - Information Security Management Pyramid. Mikhail Utin, CISSP, PhD, Daniil Utin, MS and Rubos, Inc. 1 1. Introduction The Quest for Independence - Information Security Management Pyramid Mikhail Utin, CISSP, PhD, Daniil Utin, MS and Rubos, Inc. team The current state of global cybersecurity remains chaotic

More information

Does someone else own your company s reputation? EY Global Information Security Survey 2018

Does someone else own your company s reputation? EY Global Information Security Survey 2018 Does someone else own your company s reputation? EY Global Information Security Survey 2018 Perspectives for technology, media and entertainment, and telco companies Risking cyber reputations Are TMT companies

More information

NZTECH ADVANCE SECURITY SUMMIT: ADDRESSING A CRITICAL

NZTECH ADVANCE SECURITY SUMMIT: ADDRESSING A CRITICAL NZTECH ADVANCE SECURITY SUMMIT: ADDRESSING A CRITICAL SKILLS SHORTAGE BRIEFING PAPER CONNECT PROMOTE ADVANCE @NZTechIA PREPARED BY THE NEW ZEALAND TECHNOLOGY INDUSTRY ASSOCIATION Published: November 2016

More information

The Cost of Denial-of-Services Attacks

The Cost of Denial-of-Services Attacks The Cost of Denial-of-Services Attacks Sponsored by Akamai Technologies Independently conducted by Ponemon Institute LLC Publication Date: March 2015 Ponemon Institute Research Report The Cost of Denial-of-Service

More information

MOBILE SECURITY 2017 SPOTLIGHT REPORT. Information Security PRESENTED BY. Group Partner

MOBILE SECURITY 2017 SPOTLIGHT REPORT. Information Security PRESENTED BY. Group Partner MOBILE SECURITY 2017 SPOTLIGHT REPORT Group Partner Information Security PRESENTED BY OVERVIEW Security and privacy risks are on the rise with the proliferation of mobile devices and their increasing use

More information

Professional Training Course - Cybercrime Investigation Body of Knowledge -

Professional Training Course - Cybercrime Investigation Body of Knowledge - Overview The expanded use of the Internet has facilitated rapid advances in communications, systems control, and information sharing. Those advances have created enormous opportunities for society, commerce

More information

Protecting your next investment: The importance of cybersecurity due diligence

Protecting your next investment: The importance of cybersecurity due diligence Protecting your next investment: The importance of cybersecurity due diligence Oct. 11, 2018 Baker Tilly Virchow Krause, LLP. All rights reserved. Baker Tilly refers to Baker Tilly Virchow Krause, LLP,

More information

Building a Threat Intelligence Program

Building a Threat Intelligence Program WHITE PAPER Building a Threat Intelligence Program Research findings on best practices and impact www. Building a Threat Intelligence Program 2 Methodology FIELD DATES: March 30th - April 4th 2018 351

More information

Modernizing Healthcare IT for the Data-driven Cognitive Era Storage and Software-Defined Infrastructure

Modernizing Healthcare IT for the Data-driven Cognitive Era Storage and Software-Defined Infrastructure Modernizing Healthcare IT for the Data-driven Cognitive Era Storage and Software-Defined Infrastructure An IDC InfoBrief, Sponsored by IBM April 2018 Executive Summary Today s healthcare organizations

More information

Gain Control Over Your Cloud Use with Cisco Cloud Consumption Professional Services

Gain Control Over Your Cloud Use with Cisco Cloud Consumption Professional Services Solution Overview Gain Control Over Your Cloud Use with Cisco Cloud Consumption Professional Services OPTIMIZE YOUR CLOUD SERVICES TO DRIVE BETTER BUSINESS OUTCOMES Reduce Cloud Business Risks and Costs

More information

GDPR COMPLIANCE REPORT

GDPR COMPLIANCE REPORT 2018 GDPR COMPLIANCE REPORT INTRODUCTION Effective as of May 25, 2018, the European Union General Data Protection Regulation (GDPR) represents the most sweeping change in data privacy regulation in decades.

More information

Presented by Ingrid Fredeen and Pamela Passman. Copyright 2017NAVEXGlobal,Inc. AllRightsReserved. Page 0

Presented by Ingrid Fredeen and Pamela Passman. Copyright 2017NAVEXGlobal,Inc. AllRightsReserved. Page 0 Cyber Security and Inside Threats: Turning Policies into Practices Presented by Ingrid Fredeen and Pamela Passman Copyright 2017NAVEXGlobal,Inc. AllRightsReserved. Page 0 Presented By Ingrid Fredeen, J.D.

More information

Healthcare HIPAA and Cybersecurity Update

Healthcare HIPAA and Cybersecurity Update Baker Tilly refers to Baker Tilly Virchow Krause, LLP, an independently owned and managed member of Baker Tilly International. Healthcare HIPAA and Cybersecurity Update Agenda > Introductions > Cybersecurity

More information

Creating a Cybersecurity Culture: (ISC)2 Survey Responses

Creating a Cybersecurity Culture: (ISC)2 Survey Responses 10/3/18 Creating a Cybersecurity Culture: (ISC)2 Survey Responses Dr. Keri Pearlson (ISC)2 Conference October 8, 2018 CAMS - (IC)3 https://cams.mit.edu 1 200,000Security events The average company handles

More information

Today s cyber threat landscape is evolving at a rate that is extremely aggressive,

Today s cyber threat landscape is evolving at a rate that is extremely aggressive, Preparing for a Bad Day The importance of public-private partnerships in keeping our institutions safe and secure Thomas J. Harrington Today s cyber threat landscape is evolving at a rate that is extremely

More information

RSA Solution Brief. Managing Risk Within Advanced Security Operations. RSA Solution Brief

RSA Solution Brief. Managing Risk Within Advanced Security Operations. RSA Solution Brief RSA Solution Brief Managing Risk Within Advanced Security Operations RSA Solution Brief How do you advance your security operations function? Increasingly sophisticated security threats and the growing

More information

When Computing Becomes Human: Automation, Innovation, and the Rise of the All-Powerful Service Provider

When Computing Becomes Human: Automation, Innovation, and the Rise of the All-Powerful Service Provider When Computing Becomes Human: Automation, Innovation, and the Rise of the All-Powerful Service Provider Michelle Bailey GVP/GM and Research Fellow Datacenter and Cloud Human Industry Human Productivity

More information

Continuous protection to reduce risk and maintain production availability

Continuous protection to reduce risk and maintain production availability Industry Services Continuous protection to reduce risk and maintain production availability Managed Security Service Answers for industry. Managing your industrial cyber security risk requires world-leading

More information

The Deloitte-NASCIO Cybersecurity Study Insights from

The Deloitte-NASCIO Cybersecurity Study Insights from The Deloitte-NASCIO Cybersecurity Study Insights from 2010-2016 August 21, 2018 Srini Subramanian State Government Sector Leader Deloitte Erik Avakian CISO Pennsylvania Michael Roling CISO Missouri Meredith

More information