RSA Advanced Cyber Defence Summit

Similar documents
Helping the C-Suite Define Cyber Risk Appetite. The executive Imperative

INTELLIGENCE DRIVEN GRC FOR SECURITY

Enterprise GRC Implementation

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT

SOLUTION BRIEF RSA ARCHER BUSINESS RESILIENCY

Cyber Resilience. Think18. Felicity March IBM Corporation

TRUSTED IT: REDEFINE SOCIAL, MOBILE & CLOUD INFRASTRUCTURE. John McDonald

What matters in Cyber Security

SOLUTION BRIEF HELPING BREACH RESPONSE FOR GDPR WITH RSA SECURITY ADDRESSING THE TICKING CLOCK OF GDPR COMPLIANCE

TAKING COMMAND OF YOUR GRC JOURNEY WITH RSA ARCHER

RSA Solution Brief. The RSA Solution for Cloud Security and Compliance

BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE

Turning Risk into Advantage

MITIGATE CYBER ATTACK RISK

RSA Solution Brief. Managing Risk Within Advanced Security Operations. RSA Solution Brief

Incident Response. Tony Drewitt Head of Consultancy IT Governance Ltd

OPERATIONAL RISK MANAGEMENT: A GUIDE TO HARNESS RISK WITH ENTERPRISE GRC

Cyber Risk Program Maturity Assessment UNDERSTAND AND MANAGE YOUR ORGANIZATION S CYBER RISK.

Best Practices & Lesson Learned from 100+ ITGRC Implementations

Think Oslo 2018 Where Technology Meets Humanity. Oslo. Felicity March Cyber Resilience - Europe

Decoding security frameworks for effective cyber defense. David Allott McAfee

RSA Cybersecurity Poverty Index

MetricStream GRC Summit 2013: Case Study

ORGANIZATIONS FACE RAPID RATE OF REGULATORY CHANGE

Next Generation Policy & Compliance

Demystifying Governance, Risk, and Compliance (GRC) with 4 Simple Use Cases. Gen Fields Senior Solution Consultant, Federal Government ServiceNow

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

Changing the Game: An HPR Approach to Cyber CRM007

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO

BPS Suite and the OCEG Capability Model. Mapping the OCEG Capability Model to the BPS Suite s product capability.

Optimisation drives digital transformation

HCL GRC IT AUDIT & ASSURANCE SERVICES

A Data-Centric Approach to Endpoint Security

A New Cyber Defense Management Regulation. Ophir Zilbiger, CRISC, CISSP SECOZ CEO

TSC Business Continuity & Disaster Recovery Session

Brussels. Cyber Resiliency Minimizing the impact of breaches on business continuity. Jean-Michel Lamby Associate Partner - IBM Security

Better together. KPMG LLP s GRC Advisory Services for IBM OpenPages implementations. kpmg.com

2016 KPMG AS, a Norwegian limited liability company and a member firm of the KPMG network of independent member firms affiliated with KPMG

Business Continuity Management: How to get started. Presented by: Tony Drewitt, Managing Director IT Governance Ltd 19 April 2018

RSA IT Security Risk Management

A Model for Resilience

Evolution of IT in the Finance Industry. Europe

OVERVIEW BROCHURE GRC. When you have to be right

THE POWER OF TECH-SAVVY BOARDS:

Ready, Willing & Able. Michael Cover, Manager, Blue Cross Blue Shield of Michigan

Best Practices in Securing a Multicloud World

How to Underpin Security Transformation With Complete Visibility of Your Attack Surface

RSA Advanced Security Operations Richard Nichols, Director EMEA. Copyright 2015 EMC Corporation. All rights reserved. 1

Adaptive & Unified Approach to Risk Management and Compliance via CCF

The University of Queensland

RSA Cybersecurity Poverty Index : APJ

IT Redefined. Hans Timmerman CTO EMC Nederland. Copyright 2015 EMC Corporation. All rights reserved.

Session 5: Business Continuity, with Business Impact Analysis

Business Continuity Management Standards A Side-by-Side Comparison

Robert Hayes Senior Director Microsoft Global Cyber Security & Data Protection Group

SOLUTION BRIEF Virtual CISO

Canada Highlights. Cybersecurity: Do you know which protective measures will make your company cyber resilient?

Toward All-Hazards Security and Resilience for the Power Grid

Security Metrics Framework

Data Management and Security in the GDPR Era

CYBER CAMPUS KPMG BUSINESS SCHOOL THE CYBER SCHOOL FOR THE REAL WORLD. The Business School for the Real World

State of Cloud Survey GERMANY FINDINGS

WHITE PAPER OCTOBER 2017 VMWARE ENTERPRISE RESILIENCY. Integrating Resiliency into Our Culture and DNA

Gain Control Over Your Cloud Use with Cisco Cloud Consumption Professional Services

Best-in-Class Crisis Preparation: Maximize Readiness with the Four T s. Business Continuity Readiness Overview

Sustainable Security Operations

Addressing Vulnerabilities By Integrating Your Incident Response Plans. Brian Coates Enaxis Consulting

RSA RISK FRAMEWORKS MAKING DIGITAL RISK MANAGEABLE

How Secure is Blockchain? June 6 th, 2017

FOR FINANCIAL SERVICES ORGANIZATIONS

Critical Infrastructure Protection (CIP) as example of a multi-stakeholder approach.

SOLUTION BRIEF RSA SECURID SUITE ACCELERATE BUSINESS WHILE MANAGING IDENTITY RISK

Symantec Data Center Transformation

Now on Now: How ServiceNow has transformed its own GRC processes

Operational Risk Management: Major Processes and Assignments

Bringing cyber to the Board of Directors & C-level and keeping it there. Dirk Lybaert, Proximus September 9 th 2016

The Business Value of including Cybersecurity and Vendor Risk in ERM

SECURING THE UK S DIGITAL PROSPERITY. Enabling the joint delivery of the National Cyber Security Strategy's objectives

Cloud Confidence: Simple Seamless Secure. Dell EMC Data Protection for VMware Cloud on AWS

GRC Maturity. Benchmarking Your GRC Program. October 2014

Why you should adopt the NIST Cybersecurity Framework

No More Security Empires The CISO as an Individual Contributor

IT SECURITY OFFICER. Department: Information Technology. Pay Range: Professional 18

Rethinking Information Security Risk Management CRM002

LEADING WITH GRC. Approaching Integrated GRC. Knute Ohman, VP, GRC Program Manager. GRC Summit 2017 All Rights Reserved

Building a BC/DR Control Library and Regulatory Response Program

RSA NetWitness Suite Respond in Minutes, Not Months

Presented by Ingrid Fredeen and Pamela Passman. Copyright 2017NAVEXGlobal,Inc. AllRightsReserved. Page 0

Data Protection. Practical Strategies for Getting it Right. Jamie Ross Data Security Day June 8, 2016

Build confidence in the cloud Best practice frameworks for cloud security

The Third Annual Study on the Cyber Resilient Organization

BUSINESS CONTINUITY MANAGEMENT

SOLUTION BRIEF esentire Risk Advisory and Managed Prevention (RAMP)

Sirius Security Overview

ON CALL, ALL THE TIME DISASTER RECOVERY AS A SERVICE FROM WINDSTREAM

Cybersafety Culture Assessment

Background FAST FACTS

Survey Report Industry Survey. Data Governance, Technology & Analytics Trends Q1 2014

Building a Secure and Compliant Cloud Infrastructure. Ben Goodman Principal Strategist, Identity, Compliance and Security Novell, Inc.

The Ultimate Guide for Virtual Server Protection

Transcription:

Lee Edge Head Archer Business UK&I RSA Advanced Cyber Defence Summit London 30-April-2015 1

64% 8% 2014 Gartner CEO and Senior Executive Survey: 'Risk-On' Attitudes Will Accelerate Digital Business. 2

The Challenge Results Resource overload Rate of Change Compliance Lack of resources Lack of business context Risk Opportunity 64% 3,400+ >$100M 20 PERCENT 8% Reach 3

Risk Intelligence Results Transform Compliance Harness Risk Exploit Opportunity Reach 4

The Market Evolution IT Security IT Risk IT Compliance Corporate Compliance Enterprise Risk Audit Vendor Management Crisis Management Business Continuity Disaster Recovery GRC IT & Security Risk Management Enterprise & Operational Risk Management Regulatory & Corporate Compliance Management Audit Management Third Party Governance Business Resiliency 5

RSA Archer s Evolution Oriented around Faster key core Time GRC processes (policy, to Value risk, compliance, incident, etc.) BE the Flexibility to address Human immaturity of practices Interface Circa 2009 Enterprise Foster convergence Scale 2015 6

Building Enterprise Capabilities Identify & resolve security deficiencies Detect & respond to attacks Manage the lifecycle of 3 rd party relationships Track inherited risks Establish IT policies & standards Prepare for & recover from IT outages Identify & prepare business resumption strategies Manage crisis & communications Catalog & resolve operational incidents Establish business policies & standards Monitor performance Establish business policies & standards Implement and Monitor Controls Identify, assess & track emerging & operational risks Identify & meet regulatory obligations Implement and Monitor Controls Independently review & assure management actions We are moving to a world where risk management will become the primary source of competitive advantage 7

Your Internal Evolution To be successful, you must present a compelling picture to the business to get buy-in. It isn t rocket science but it is a challenge. Keys to Success Reduce Risk of Execution Foster culture of Adoption Take command of the journey 8

Reduce Risk of Execution Executives do not like Surprises A Digestible Strategy Understand your Audience 9

Foster Culture of Adoption Understand the power of Frustration Make it Personal Know where technology is an answer and where it isn t 10

Take Command of the Journey Keep end game constantly in mind Address the Pain Don t GRC to just GRC 11

Partnering for the Journey Reduce Risk of Execution Provide platform and solution updates that make it easier to perform GRC tasks Continue our execution of our product roadmap Foster Culture of Adoption Significant investment in walk up friendly user interface Streamlined workflow capabilities Take Command of the Journey Nurturing maturing processes within the product Maturity Models 12

Taking Command of The GRC Journey Siloed compliance focus, disconnected risk, basic reporting Managed automated compliance, expanded risk focus, improved analysis/metrics Advantaged fully risk aware, exploit opportunity Reduce compliance cost Compliance Manage Gain Known resource & & unknown risk visibility risks Risk Identify new business opportunities Opportunity 13

Final Thoughts Talking Opportunity vs. Compliance Your Evolution Keys to Success: Reduce Risk of Execution Foster Culture of Adoption Take Command of the Journey Fuel Your Enterprise 14

Thank you. Questions? 15

EMC, RSA, the EMC logo and the RSA logo are trademarks of EMC Corporation in the U.S. and other countries.