Think Oslo 2018 Where Technology Meets Humanity. Oslo. Felicity March Cyber Resilience - Europe

Similar documents
Cyber Resilience. Think18. Felicity March IBM Corporation

Brussels. Cyber Resiliency Minimizing the impact of breaches on business continuity. Jean-Michel Lamby Associate Partner - IBM Security

Cyber Resiliency. Felicity March. May 2018

Understanding Cyber Insurance & Regulatory Drivers for Business Continuity

Cybersecurity and the Board of Directors

Incident Response. Tony Drewitt Head of Consultancy IT Governance Ltd

The Third Annual Study on the Cyber Resilient Organization

Mission: Continuity BUILDING RESILIENCE AGAINST UNPLANNED SERVICE INTERRUPTIONS

The Cyber Resilient Organisation in the United Kingdom: Learning to Thrive against Threats

Cyber Resiliency: A Recipe for Digital Trust?

THE POWER OF TECH-SAVVY BOARDS:

BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE

Cybersecurity, safety and resilience - Airline perspective

Building a Resilient Security Posture for Effective Breach Prevention

How to Optimize Cyber Defenses through Risk-Based Governance. Steven Minsky CEO of LogicManager & Author of the RIMS Risk Maturity Model

PONEMON INSTITUTE RESEARCH REPORT 2018 STUDY ON GLOBAL MEGATRENDS IN CYBERSECURITY

Rejuvenating BCM - Infrastructure. Business Continuity Awareness Week March 2009

PA TechCon. Cyber Wargaming: You ve been breached: Now what? April 26, 2016

10 Cybersecurity Questions for Bank CEOs and the Board of Directors

CYBER SECURITY TAILORED FOR BUSINESS SUCCESS

Bonnie A. Goins Adjunct Industry Professor Illinois Institute of Technology

Cyber Fraud What can you do about it?

State Governments at Risk: State CIOs and Cybersecurity. CSG Cybersecurity and Privacy Policy Academy November 2, 2017

Business continuity management and cyber resiliency

Gaps in Resources, Risk and Visibility Weaken Cybersecurity Posture

Integrating Cyber Security with Business Continuity Management to Build the Resilient Enterprise

Emerging Issues: Cybersecurity. Directors College 2015

U.S. State of Cybercrime

*** THIS DOCUMENT IS CLASSIFIED FOR PUBLIC ACCESS ***

2018 WTA Spring Meeting Are You Ready for a Breach? Troy Hawes, Senior Manager

Cybersecurity for Health Care Providers

Why you should adopt the NIST Cybersecurity Framework

RSA Advanced Cyber Defence Summit

Cyber Risk in the Marine Transportation System

Cyber fraud and its impact on the NHS: How organisations can manage the risk

ICBA Summary of FFIEC Cybersecurity Assessment Tool (May 2017 Update)

RSA Cybersecurity Poverty Index

FTA 2017 SEATTLE. Cybersecurity and the State Tax Threat Environment. Copyright FireEye, Inc. All rights reserved.

Balancing Compliance and Operational Security Demands. Nov 2015 Steve Winterfeld

0x70 Eric Bärenzung. Cyber risks. in the satellite industry

SOLUTION BRIEF esentire Risk Advisory and Managed Prevention (RAMP)

Critical Infrastructure Protection (CIP) as example of a multi-stakeholder approach.

World Energy Perspectives 2016

The Cyber War on Small Business

CYBERSECURITY FOR STARTUPS AND SMALL BUSINESSES OVERVIEW OF CYBERSECURITY FRAMEWORKS

Protecting your next investment: The importance of cybersecurity due diligence

Doug Couto Texas A&M Transportation Technology Conference 2017 College Station, Texas May 4, 2017

Must Have Items for Your Cybersecurity or IT Budget in 2018

Enhancing infrastructure cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services

Dr. Emadeldin Helmy Cyber Risk & Resilience Bus. Continuity Exec. Director, NTRA. The African Internet Governance Forum - AfIGF Dec 2017, Egypt

Copyright 2016 EMC Corporation. All rights reserved.

Cybersecurity is a Team Sport

ARC VIEW. Critical Industries Need Active Defense and Intelligence-driven Cybersecurity. Keywords. Summary. By Sid Snitkin

Cybersecurity A Regulatory Perspective Sara Nielsen IT Manager Federal Reserve Bank of Kansas City

CAGFO Conference September 2018

Cyber Security For Utilities Risks, Trends & Standards. IEEE Toronto March 22, Doug Westlund Senior VP, AESI Inc.

Cyber Risk Program Maturity Assessment UNDERSTAND AND MANAGE YOUR ORGANIZATION S CYBER RISK.

Cybersecurity. You have been breached; What Happens Next THE CHALLENGE FOR THE FINANCIAL SERVICES INDUSTRY

MITIGATE CYBER ATTACK RISK

Are we breached? Deloitte's Cyber Threat Hunting

Cyber Security: An Internal Audit Perspective Eoin Hayes

Engaging Executives and Boards in Cybersecurity Session 303, Feb 20, 2017 Sanjeev Sah, CISO, Texas Children s Hospital Jimmy Joseph, Senior Manager,

GDPR: The Day After. Pierre-Luc REFALO

Cyber Security Incident Response Fighting Fire with Fire

Healthcare HIPAA and Cybersecurity Update

Cyber Risks in the Boardroom Conference

The European Policy on Critical Information Infrastructure Protection (CIIP) Andrea SERVIDA European Commission DG INFSO.A3

Disaster Recovery and Business Continuity Planning (Mile2)

Table of Contents. Sample

Background FAST FACTS

Incident Response Services to Help You Prepare for and Quickly Respond to Security Incidents

2018 GLOBAL CHANNEL PARTNER SURVEY THYCOTIC CHANNEL PARTNER SURVEY REPORT

Cybersecurity: Considerations for Internal Audit. Gina Gondron Senior Manager Frazier & Deeter Geek Week August 10, 2016

Securing Digital Transformation

Cyber (In)Security. What Business Leaders Need To Know. Roy Luebke Innovation and Growth Consultant. Presented by:

Sage Data Security Services Directory

Take Risks in Life, Not with Your Security

Cybersecurity What Companies are Doing & How to Evaluate. Miguel Romero - NAIC David Gunkel & Dan Ford Rook Security

Framework for Improving Critical Infrastructure Cybersecurity

Cyber Security & Homeland Security:

Information Security Is a Business

SECOPS: NAVIGATE THE NEW LANDSCAPE FOR PREVENTION, DETECTION AND RESPONSE

How will cyber risk management affect tomorrow's business?

DIGITAL ACCOUNTANCY FORUM CYBER SESSION. Sheila Pancholi Partner, Technology Risk Assurance

Protecting Against Modern Attacks. Protection Against Modern Attack Vectors

To Audit Your IAM Program

Understanding the Changing Cybersecurity Problem

EU policy on Network and Information Security & Critical Information Infrastructures Protection

U.S. Department of Homeland Security Office of Cybersecurity & Communications

Principles of Protection: Cybersecurity Data Protection. 11/01/2017 Julia Breaux William Sellers

Defense in Depth Security in the Enterprise

Heavy Vehicle Cyber Security Bulletin

Cybersecurity Today Avoid Becoming a News Headline

Data Protection. Practical Strategies for Getting it Right. Jamie Ross Data Security Day June 8, 2016

Panelists. Moderator: Dr. John H. Saunders, MITRE Corporation

How To Build or Buy An Integrated Security Stack

CYBERSECURITY RESILIENCE

Cyber Security Maturity Model

MODERN MALWARE, MODERN DEFENSES AND PROTECTION

The Business Value of including Cybersecurity and Vendor Risk in ERM

Transcription:

Think Oslo 2018 Where Technology Meets Humanity Oslo Felicity March Cyber Resilience - Europe

Cyber Resilience Cyber Resilience is the ability of an organisation to maintain its core purpose and integrity during and after a cyber attack Cyber Resilience needs an end to end approach that brings together critical areas to ensure organisations continue to function during cyber attacks and cyber outages. Cyber Security Cyber security is designed to protect systems, networks and data from cyber crimes. Effective cyber security reduces the risk of a cyber attack and protects organisations from the deliberate exploitation of their assets. Business Continuity Business continuity provides the capability to resume operations when an event causes a service disruption. Plans for business continuity address natural catastrophes, accidents and deliberate physical attacks; but now they must also support resumption of operations following cyber attack disruptions.

Cyber Resilience Maturity Assessment Workshop Often these attacks disrupt business operations instead of garnering financial gain WikiLeaks CIA Vault 7 Petya/NotPetya/Nyetya/Goldeneye/ QakBot Trojan destructive malware Deloitte Equifax breach of 143 million records City of Atlanta Meltdown/Spectre Feb May July 2017 March June Sept Jan 2018 Mar Shamoon - destructive malware Macron Campaign Hack WannaCry Verizon Triton targets industrial control systems (ICS) 3

Cyber Resilience Maturity Assessment Workshop Why is cyber resilience needed? Cyber attacks are evolving and on the rise. Top 5 causes of cyber disruptions 61% Phishing and social engineering 45% Malware 37% Spear-phishing attack 24% Denial of service 21% Out-of-date software Many organizations are unprepared 68% 66% 75% 197 days Lack the ability to remain resilient in the wake of a cyber attack Suffer from insufficient planning and preparedness Have ad-hoc, non-existent, or inconsistent cyber security incident response plans Average amount of time hackers spend inside IT environments before discovery Sources: Ponemon Institute 2018 Cost of Data Breach Study: Impact of Business Continuity Management IBM/Forbes Insights survey of 153 executives at large enterprises worldwide, 4

As a result of these new attacks board leaders have ranked cyberattacks in the top 5 of Global Risks at the World Economic Forum in Davos, Switzerland, in 2018 Business Impact 4.8-15% * Stock Value Erosion post Cyberattack / Data Breach Source: Cyber Value Connection Source: Source: World Economic Forum, 2018 WEF Regional Risks for Doing Business 2018

The Cyber Resilient Organisation - current awareness & action Stance on Cyber Resilience Only 43% improved in past 12 months Barriers to Cyber Resilience Lack of investment 60% Inability to hire skills 56% Lack of Visibility into assets 46% Lack of end user training 31% Lack of training and cert for IT staff 28% Silo and Turf issues 24% Lack of Information governance practices 22% Lack of Board reporting 17% Lack of C Level Buy in 15% Business Owner Who has overall responsibility for directing an organizations efforts to ensure a high level of cyber resilience? CIO 23% BU Leader 22% CISO 14% NO ONE PERSON 11% BC Manager 8% CRO 7% CEO 7% CTO 6% 6 2018 IBM Corporation

Work out your vulnerabilities and build a safe future proof strategy Identify your risks Identify Recover normal operations Recover Respond with a Plan Respond Protect Detect https://www.nist.gov/cyberframework Protect your assets against attacks Detect threat activity

Cyber Resilience Maturity Assessment Workshop Cyber resilience serves a number of IT and risk management disciplines Incident Response Information Security Cyber Resilience Business Continuity Disaster Recovery Network Security Risk Management 8

Our Approach Identify Protect Detect Respond Recover Uses IBM Cyber Resilience Lifecycle Measures Cyber Resilience capabilities of IT environment and Operational Processes Uses recognized best practice Framework Identifies current and target state Provides recommended improvements and road map Preliminary Assessment Workshop Approach 1 2 3 Asset Management Business Environment Risk Assessment Define Goals and Requirements Discuss initial situation and define requirements in context Cyber Resiliency Assess Maturity Levels of Each Category Analysis Access Control Supply Chain Risk Awareness Training Protection Technologies Anomalies & Events Maintenance Governance Mitigation Security Monitoring Detection Processes Data Security Response Planning Response Improvements Recovery Planning Present Results and Roadmap Risk Management Strategy Info Protection Services Recovery Improvements Analyze assessment results and derive roadmap to enhance Cyber Resiliency Level Response Communications Recovery Communications 9

Cyber Resiliency Assessment 10

Cyber Resilience Maturity Assessment Workshop Is there a universally accepted standard? Cyber Resilience as a domain is still evolving Different industry bodies recommend different approaches based on geography, industry, size Cyber Security Framework (CSF) from NIST is one of most popular and widely used. COBIT National Institute of Standards and Technology Contains informative references to other industry recognized standards and frameworks. International Organization for Standards Council on CyberSecurity International Society of Automation 11

Do you have one defined Leader that is responsible for Switch over & Fail Over? Does your CISO work hand in hand with your Disaster Recovery Manager and Business Continuity Manager? Does your Backup Strategy include Point in Time copies, Air gapped & WORM storage, forensic analysis and continuous switch over testing? Does your Disaster Recovery Plan get tested regularly that includes your supply chain? Do you run your production environment from your DR environment on a regular basis? Is Resilience at the core of your architectural design principles? 12

Thank You FelicityMarch@UK.IBM.COM Oslo