Cyber Security is it a boardroom issue?

Similar documents
Emerging Technologies The risks they pose to your organisations

Multi-factor authentication enrollment guide for Deloitte client or business partner user

Are we breached? Deloitte's Cyber Threat Hunting

Risk Advisory Academy Training Brochure

MFA Enrollment Guide. Multi-Factor Authentication (MFA) Enrollment guide STAGE Environment

#DeloitteInnovation: In-Time Uncover the Potential of SAP HANA

Cyber Espionage A proactive approach to cyber security

Adopting SSAE 18 for SOC 1 reports

CFOs in a new global environment Sandy Cockrell, Deloitte

Plan a Pragmatic Approach to the new EU Data Privacy Regulation

The Future of IT Internal Controls Automation: A Game Changer. January Risk Advisory

CISO MASTERCLASS FOR SENIOR EXECUTIVES 2 DAYS

Customer Breach Support A Deloitte managed service. Notifying, supporting and protecting your customers through a data breach

Step 1: Open browser to navigate to the data science challenge home page

The Deloitte-NASCIO Cybersecurity Study Insights from

#DeloitteInnovation: In-Time How efficiently do you use your SAP HANA?

Real estate predictions 2017 What changes lie ahead?

The New Healthcare Economy is rising up

Achieving third-party reporting proficiency with SOC 2+

Creating your own payment card Joost Kremers MSc CEH

Protection of clients information in the age of IT ECBA Spring Conference Prague 2017 Jan Balatka, Analytic & Forensic Technology

From Dabbling to Doing The Age of the Intuitive Enterprise

Preface. Operations within the EU. Serving the EU customers. Third parties operating in the EU

Achieving effective risk management and continuous compliance with Deloitte and SAP

13.f Toronto Catholic District School Board's IT Strategic Review - Draft Executive Summary (Refer 8b)

Cyber Security Incident Response Fighting Fire with Fire

The value of visibility. Cybersecurity risk management examination

Vulnerability Management. June Risk Advisory

Data Protection. Practical Strategies for Getting it Right. Jamie Ross Data Security Day June 8, 2016

Autobot - IoT enabled security. For Private circulation only October Risk Advisory

Spread your wings Professional qualifications and development at Deloitte. What impact will you make? careers.deloitte.com

IMPLEMENTING SECURITY, PRIVACY, AND FAIR DATA USE PRINCIPLES

Cyber Incident Response. Prepare for the inevitable. Respond to evolving threats. Recover rapidly. Cyber Incident Response

Deloitte Discovery Caribbean & Bermuda Countries Guide

Cyber security and awareness for non-financial services. 24/25 May 2017

BENEFITS of MEMBERSHIP FOR YOUR INSTITUTION

Cyber risk Getting the boardroom focus right

Privacy and Data Protection Draft Personal Data Protection Bill 2018: A Summary. For Private Circulation Only August 2018.

Managing Cyber Risk. Robert Entin Executive Vice President Chief Information Officer Vornado Realty Trust

GDPR Privacy Webinar. Prioritizing Your Path towards GDPR Compliance Annika Sponselee and Nicole Vreeman 28 February 2018

ASSEMBLY, No STATE OF NEW JERSEY. 217th LEGISLATURE INTRODUCED FEBRUARY 4, 2016

Technical Resilience Building the always-on enterprise with Deloitte Advisory and Amazon Web Services

Key Findings from the Global State of Information Security Survey 2017 Indonesian Insights

Introduction. When it comes to GDPR compliance, is OK for now enough? Minds made for protecting financial services

Cybersecurity Fortification Initiative (CFI) infrastructure whitepaper

Building and Testing an Effective Incident Response Plan

The impact of digital transformation on industries

Anticipating the wider business impact of a cyber breach in the health care industry

Trough a cyber security lens

Big data privacy in Australia

Cyber Risks in the Boardroom Conference

Innovation Infrastructure Partnership

Information Security Governance and IT Governance

CESG:10 Steps to Cyber Security WORKING WITH GOVERNMENT, INDUSTRY AND ACADEMIA TO MANAGE INFORMATION RISK

CHARTER OUR MISSION OUR OBJECTIVES OUR GUIDING PRINCIPLES

REQUEST FOR EXPRESSIONS OF INTEREST

Título de portada NIVEL 1

EY Consulting. Is your strategy planning for the future or creating it? #TransformativeAge

Headline Verdana Bold

Cyber Security: Are digital doors still open?

The HIPAA Security & Privacy Rule How Municipalities Can Prepare for Compliance

Standing Together for Financial Industry Resilience Quantum Dawn 3 After-Action Report. November 19, 2015

RIMS Perk Session Protecting the Crown Jewels A Risk Manager's guide to cyber security March 18, 2015

Business Continuity Management: How to get started. Presented by: Tony Drewitt, Managing Director IT Governance Ltd 19 April 2018

Spiros Angelopoulos Principal Solutions Architect ForgeRock. Debi Mohanty Senior Manager Deloitte & Touche LLP

Error! No text of specified style in document.

KENYA SCHOOL OF GOVERNMENT EMPLOYMENT OPORTUNITY (EXTERNAL ADVERTISEMENT)

Clarity on Cyber Security. Media conference 29 May 2018

SOC for cybersecurity

Protecting your data. EY s approach to data privacy and information security

Cybersecurity and the role of internal audit An urgent call to action

CYBERSECURITY AND THE MIDDLE MARKET

Cyber Risk and Networked Medical Devices

Quality Management Systems (ISO 9001:2015 and ISO 29001) Lead Auditor training (EY/IMSA Q03)

GDPR: A QUICK OVERVIEW

BREAKING BARRIERS TO COLLABORATE WITH THE C-SUITE

CYBER INSURANCE: MANAGING THE RISK

TIPS FOR FORGING A BETTER WORKING RELATIONSHIP BETWEEN COUNSEL AND IT TO IMPROVE CYBER-RESPONSE

Incident Response. We ve had a privacy breach now what?

What Directors and C-Suite professionals need to know kpmg.ca/insuranceconference2017

CYBER CAMPUS KPMG BUSINESS SCHOOL THE CYBER SCHOOL FOR THE REAL WORLD. The Business School for the Real World

ISACA Cincinnati Chapter March Meeting

CFE Exam Review Course

Cybersecurity Risk Mitigation: Protect Your Member Data. Introduction

POSITION DESCRIPTION

The Role of the Data Protection Officer

Tax News Update: Global Edition (GTNU) User Guide

Building Resilience to Denial-of-Service Attacks

Global Statement of Business Continuity

How to be cyber secure A practical guide for Australia s mid-size business

EU General Data Protection Regulation (GDPR) A Point of View for Technology Sector Organisations. For private circulation only.

ISAE 3402 and SSAE 16 (replacing SAS 70) Reinforcing confidence through demonstration of effective controls

CYBER RESILIENCE & INCIDENT RESPONSE

2018 MANAGED SECURITY SERVICE PROVIDER (MSSP): BENCHMARK SURVEY Insights That Inform Decision-Making for Retail Industry Outsourcing

Canada Highlights. Cybersecurity: Do you know which protective measures will make your company cyber resilient?

M&A Cyber Security Due Diligence

Aon Service Corporation Law Global Privacy Office. Aon Client Data Privacy Summary

Assessing cyber risk Critical questions for the board and

Staffing Services UnderDefense your source of experienced professionals to solve security staffing challenges today

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO

Transcription:

Brisbane, 23 September 2014 Alistair Blake Director Cyber Security & Risk Services

Today s session will cover Cyber Security and the Boardroom Executive sponsorship Organisational culture Operational readiness Cyber preparedness Cyber security, is it a boardroom issue? 2

Cyber Security and the Boardroom Cyber security, is it a boardroom issue? 3

Cyber security and the boardroom Security is a business issue Directly impacts: investor & Public confidence Reputation Trust Future Revenue Cyber security, is it a boardroom issue? 4

Cyber Security and the Boardroom Executive sponsorship Cyber security, is it a boardroom issue? 5

Executive sponsorship Key Stakeholders Chair or Secretary of Board CEO/GM CFO/CIO/CISO/CRO Audit Risk Committee Elevate discussion to board/execs via a security committee with appointed delegates Standing dedicated agenda item Cyber security, is it a boardroom issue? 6

Cyber Security and the Boardroom Executive sponsorship Organisational culture Cyber security, is it a boardroom issue? 7

Organisational culture Business disabler (needs to be enabler) Path of least resistance CISO often not part of senior leadership We ve always done it this way It won t happen to us Afterthought Budget savings Cyber security, is it a boardroom issue? 8

Cyber Security and the Boardroom Executive sponsorship Organisational culture Operational readiness Cyber security, is it a boardroom issue? 9

Operational Readiness What are the key business goals Business impact analysis Critical systems identification Right People right roles Policies & Procedures Third party contractual clauses Incident response plan Key stakeholders identified Testing & simulations Cyber security, is it a boardroom issue? 10

You ve been breached.now what? Cyber security, is it a boardroom issue? 11

The Domino Effect Cyber security, is it a boardroom issue? 12

Cyber Security and the Boardroom Executive sponsorship Organisational culture Operational readiness Cyber preparedness Cyber security, is it a boardroom issue? 13

Cyber Preparedness Shift culture from Reactive to Proactive Cyber Preparedness Plan Key internal resource identification Cyber simulation testing Incident response plan Media release plan Access to specialist resources (pre-identified) Cyber insurance Cyber security, is it a boardroom issue? 14

Conclusion Security is a business issue Security posture threats are not static Have a plan Test the plan Be prepared to change the plan Annual reviews of environment Move from reactive to proactive Auditors are our friends Don t Panic! Cyber security, is it a boardroom issue? 15

Need more information? For more information please contact: Alistair Blake Director Cyber Security & Risk Services Deloitte Touche Tohmatsu aliblake@deloitte.com.au Mobile: 0450 126 148 Cyber security, is it a boardroom issue? 16

General information only This presentation contains general information only, and none of Deloitte Touche Tohmatsu Limited, its member firms, or their related entities (collectively the Deloitte Network ) is, by means of this presentation, rendering professional advice or services. Before making any decision or taking any action that may affect your finances or your business, you should consult a qualified professional adviser. No entity in the Deloitte Network shall be responsible for any loss whatsoever sustained by any person who relies on this presentation. About Deloitte Deloitte refers to one or more of Deloitte Touche Tohmatsu Limited, a UK private company limited by guarantee, and its network of member firms, each of which is a legally separate and independent entity. Please see www.deloitte.com/au/about for a detailed description of the legal structure of Deloitte Touche Tohmatsu Limited and its member firms. Deloitte provides audit, tax, consulting, and financial advisory services to public and private clients spanning multiple industries. With a globally connected network of member firms in more than 150 countries, Deloitte brings world-class capabilities and high-quality service to clients, delivering the insights they need to address their most complex business challenges. Deloitte's approximately 195,000 professionals are committed to becoming the standard of excellence. About Deloitte Australia In Australia, the member firm is the Australian partnership of Deloitte Touche Tohmatsu. As one of Australia s leading professional services firms. Deloitte Touche Tohmatsu and its affiliates provide audit, tax, consulting, and financial advisory services through approximately 6,000 people across the country. Focused on the creation of value and growth, and known as an employer of choice for innovative human resources programs, we are dedicated to helping our clients and our people excel. For more information, please visit our web site at www.deloitte.com.au. Liability limited by a scheme approved under Professional Standards Legislation. Member of Deloitte Touche Tohmatsu Limited