Cyber Security: It s all about TRUST

Similar documents
Connected & Autonomous vehicles

Cyber security Digital world risk that cannot be ignored

Sage Data Security Services Directory

Key Findings from the Global State of Information Security Survey 2017 Indonesian Insights

FED. Kraftforum M a y Fo s s il Fr ee En er gy d is t r ic t. Jonas Wilhelmsson Global Engagement Director

Cyber Risk Program Maturity Assessment UNDERSTAND AND MANAGE YOUR ORGANIZATION S CYBER RISK.

Cybersecurity Protecting your crown jewels

Understanding the Changing Cybersecurity Problem

ITU CBS. Digital Security Capacity Building: Role of the University GLOBAL ICT CAPACITY BUILDING SYMPOSIUM SANTO DOMINGO 2018

2018 GLOBAL CHANNEL PARTNER SURVEY THYCOTIC CHANNEL PARTNER SURVEY REPORT

CyberVista Certify cybervista.net

2017 PORT SECURITY SEMINAR & EXPO. ISACA/CISM Information Security Management Training for Security Directors/Managers

Canada Highlights. Cybersecurity: Do you know which protective measures will make your company cyber resilient?

Cybersecurity. Overview. Define Cyber Security Importance of Cyber Security 2017 Cyber Trends Top 10 Cyber Security Controls

Cybersecurity Session IIA Conference 2018

Ingram Micro Cyber Security Portfolio

How Secure is Blockchain? June 6 th, 2017

Evaluating Cybersecurity Coverage A Maturity Model. Presented to: ISACA Charlotte Chapter Vision for IT Audit 2020 Symposium

Cybersecurity Risk Mitigation: Protect Your Member Data. Introduction

Career Paths In Cybersecurity

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

Cybersecurity for Service Providers

CYBER CAMPUS KPMG BUSINESS SCHOOL THE CYBER SCHOOL FOR THE REAL WORLD. The Business School for the Real World

Danish Cloud Maturity Survey 2018

Security. Protect your business from security threats with Pearl Technology. The Connection That Matters Most

CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships. from the most trusted name in information security

COST OF CYBER CRIME STUDY INSIGHTS ON THE SECURITY INVESTMENTS THAT MAKE A DIFFERENCE

May the (IBM) X-Force Be With You

Cybersecurity Today Avoid Becoming a News Headline

BHConsulting. Your trusted cybersecurity partner

Les joies et les peines de la transformation numérique

How NSFOCUS Protected the G20 Summit. Guy Rosefelt on the Strategy, Staff and Tools Needed to Ensure Cybersecurity

Must Have Items for Your Cybersecurity or IT Budget in 2018

Cybersmart Buildings: Securing Your Investments in Connectivity and Automation

IMPLEMENTING SECURITY, PRIVACY, AND FAIR DATA USE PRINCIPLES

Introducing Maryville University s CYBER SECURITY ONLINE PROGRAMS. Bachelor of Science in Cyber Security & Master of Science in Cyber Security

Governance Ideas Exchange

Business Context: Key for Successful Risk Management

Cyber Security Incident Response Fighting Fire with Fire

2018 WTA Spring Meeting Are You Ready for a Breach? Troy Hawes, Senior Manager

Forensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services

How Your Organization Can Drive Success in the Age of Digital Disruption

If you were under cyber attack would you ever know?

BRING EXPERT TRAINING TO YOUR WORKPLACE.

with Advanced Protection

DHG presenter. August 17, Addressing the Evolving Cybersecurity Landscape. DHG Birmingham CPE Seminar 1

Sales Presentation Case 2018 Dell EMC

locuz.com SOC Services

STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences

Adaptive & Unified Approach to Risk Management and Compliance via CCF

Big data privacy in Australia

IT Security Mandatory Solutions. Andris Soroka 2nd of July, RIGA

AKAMAI CLOUD SECURITY SOLUTIONS

The fast track to top skills and top jobs in cyber. Guaranteed.

THE LIFE AND TIMES OF CYBERSECURITY PROFESSIONALS

SWIFT Customer Security Programme

Cybersecurity and the Board of Directors

Intelligent Building and Cybersecurity 2016

CLEARING THE PATH: PREVENTING THE BLOCKS TO CYBERSECURITY IN BUSINESS

Staffing Services UnderDefense your source of experienced professionals to solve security staffing challenges today

Securing Your Digital Transformation

Global Information Security Survey. A life sciences perspective

Prescriptive Security Operations Centers. Leveraging big data capabilities to build next generation SOC

ISACA GEEK WEEK SECURITY MANAGEMENT TO ENTERPRISE RISK MANAGEMENT USING THE ISO FRAMEWORK AUGUST 19, 2015

Mapping Your Requirements to the NIST Cybersecurity Framework. Industry Perspective

Forensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services

Building a Threat Intelligence Program

Cyber Resilience. Think18. Felicity March IBM Corporation

This Online Gaming Company Didn t Want to Roll the Dice on Security That s Why it Worked with BlackBerry

Vulnerability Management Trends In APAC

Emerging Technologies The risks they pose to your organisations

CYBER SECURITY TAILORED FOR BUSINESS SUCCESS

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security

Enhance Your Cyber Risk Awareness and Readiness. Singtel Business

10 Cybersecurity Questions for Bank CEOs and the Board of Directors

Protecting your data. EY s approach to data privacy and information security

Strategic threat advisory services

A Top US Bank Trusts Neustar SiteProtect for Reliable DDoS Protection Depth

EY Consulting. Is your strategy planning for the future or creating it? #TransformativeAge

ISACA MOSCOW CHAPTER Chapter meeting 22 September 2016

Combating Cyber Risk in the Supply Chain

THE KERNEL. Our in-house professional team is highly skilled in delivering cutting-edge solutions to our clients.

Building the trust to succeed in digital business

Real estate predictions 2017 What changes lie ahead?

BHConsulting. Your trusted cybersecurity partner

Risk Advisory Academy Training Brochure

Disaster recovery strategic planning: How achievable will it be?

Building the Cybersecurity Workforce. November 2017

Are we breached? Deloitte's Cyber Threat Hunting

RIMS Perk Session Protecting the Crown Jewels A Risk Manager's guide to cyber security March 18, 2015

Addressing Vulnerabilities By Integrating Your Incident Response Plans. Brian Coates Enaxis Consulting

The Cyber War on Small Business

SECURING THE DIGITAL ECONOMY. Reinventing the Internet for Trust

Building new cybersecurity pipelines. NICE Conference 2017 November 8, Strengthening Cyber Workforce Development sans.

Build Your Zero Trust Security Strategy With Microsegmentation

NISTCSF.COM. NIST Cybersecurity Framework (NCSF) Workforce Development Solutions

Cyber Threat Landscape April 2013

NIST Cybersecurity Framework Protect / Maintenance and Protective Technology

Deception: Deceiving the Attackers Step by Step

Securing Digital Transformation

Transcription:

www.pwc.com/vn Cyber Security: It s all about TRUST 29 th March 2017 Robert Tran Cybersecurity leader, Vietnam

Content s Digital IQ Survey 1 Current state of Cybersecurity in Vietnam 2 2

Our global team and credentials Our team helps organizations understand dynamic cyber challenges, adapt and respond to risks inherent to their business ecosystem, and prioritize and protect the most valuable assets fundamental to their business strategy. 3,000+ professionals Focused on consulting, solution implementation, incident response, and forensic investigation Knowledge and experience across key industries and sectors Largest professional security provider as ranked by Gartner 1 Leader ranking by Forrester Research " has very strong global delivery capabilities, and the firm offers solid, comprehensive services with the ability to address almost all of the security and risk challenges that clients will face 2 Knowledge & Experience Advanced degrees and certifications including Certified Information System Security Professional (CISSP) Offensive Security Certified Professional (OSCP) Certified Ethical Hacker (CEH) SANS GCIH, SANS GNFA, CISA, CISM. CRISC, Cisco CCIE Security clearances that allow for classified discussions that often stem from cyber related incidents We provide pragmatic insight and a balanced view of how to prioritize investments in people, processes and technology solutions needed to address the cybersecurity challenge Technical security and forensics labs located in forty countries Designed to conduct assessments, design and test security solutions, and conduct cyber forensic analysis and investigations. 100+ labs Proprietary tools and methods Extensive library of templates, tools, and accelerators Cyber threat intelligence fusion and big data analysis platforms to process data related to cyber threats and incidents 1 Gartner: Competitive Landscape: Professional Security Consulting Services, Worldwide, 2013 2 The Forrester Wave: Information Security and Risk Consulting Services, Q1 2013, Forrester Research, Ed Ferrara and Andrew Rose, February 1, 2013

s Digital IQ 2017 1 4

Digital IQ Survey: The world was a simpler place when first set out to measure Digital IQ 10 years ago. http://www.pwc.com/us/en/advisory-services/digital-iq.html 5

Digital IQ Survey: The world was a simpler place when first set out to measure Digital IQ 10 years ago. http://www.pwc.com/us/en/advisory-services/digital-iq.html 6

Up to 38% of existing US jobs could be impacted by automation by early 2030s Up to around 30% of existing UK jobs are susceptible to automation from robotics and Artificial Intelligence (AI) by the early 2030s, but in many cases the nature of jobs will change rather than disappear This is lower than the US at 38% and Germany at 35%, but higher than Japan at 21% Male workers could be at greater potential risk of job automation than women, but education is the key differentiating factor for individual workers 7

Digital disruption already happened The worlds largest taxi company owns no taxis (Uber) The largest accommodation provider owns no real estate (Airbnb) The largest phone companies own no Telco infrastructure (Skype, WeChat) The world s most valuable retailer has no inventory (Alibaba) The most popular media owner creates no content (Facebook) The fastest growing banks have no actual money (SocietyOne) The world s largest movie house owns no cinemas (Netflix) The largest software vendors don t write the apps (Apple & Google) 8

Cybersecurity in Vietnam 2 9

Current State of Cybersecurity in Vietnam Source: Microsoft 10

5 days after Tan Son Nhat airport s hack 11

And 1 week after 12

DDoS attack that disrupted internet in October 2016 was WORLD s largest of its kind in history In October 2016 The Cyber attack that brought down much of America s internet was caused by a new weapon called the Mirai botnet and was likely the largest of its kind in history Mirai (future in Japanese) is malware that exploits the vulnerable IP cameras around the world. It was the world s largest DDOS attack lunched from hacked IoT IP cameras 13

IoT: Vietnam is the Top country of origin of Mirai DDoS attacks Source: incapsula.com 14

Top countries of origin of Mirai DDoS attacks Source: incapsula.com 15

What s next Stop thinking that you are so small to be a hacker s target When we invest in the best technical tools, we are NOT safe: it s time to move on from prevention to detection It s time to move on from prevention to detection and response Be prepared for Cyber breach, it s not a matter of IF but WHEN There are only two types of companies: those that have been hacked and those who have not discovered that they have been hacked. James Comey, Director, Federal Bureau of Investigation Cybersecurity, it s all about TRUST 28-Mar-17 16

Thank you! www.pwc.com/vn This content is for general information purposes only, and should not be used as a substitute for consultation with professional advisors. At Vietnam, our purpose is to build trust in society and solve important problems. We re a member of the network of firms in 157 countries with more than 223,000 people who are committed to delivering quality in assurance, advisory, tax and legal services. Find out more and tell us what matters to you by visiting us at www.pwc.com/vn. 2017 PricewaterhouseCoopers (Vietnam) Ltd. All rights reserved. refers to the Vietnam member firm, and may sometimes refer to the network. Each member firm is a separate legal entity. Please see www.pwc.com/structure for further details. 17