Cyber Risk Services Going beyond limits

Similar documents
Digital Directors: The board s role in the cyber world. Thio Tse Gan, Southeast Asia Leader - Cyber Security

Cyber security: everybody s imperative. A guide for the C-suite and boards on guarding against cyber risks

Achieving effective risk management and continuous compliance with Deloitte and SAP

Real estate predictions 2017 What changes lie ahead?

Are we breached? Deloitte's Cyber Threat Hunting

Emerging Technologies The risks they pose to your organisations

Risk Advisory Academy Training Brochure

Vulnerability Management. June Risk Advisory

Cyber Incident Response. Prepare for the inevitable. Respond to evolving threats. Recover rapidly. Cyber Incident Response

Cybersecurity Protecting your crown jewels

Cybersecurity and the role of internal audit An urgent call to action

Cybersecurity Fortification Initiative (CFI) infrastructure whitepaper

CFOs in a new global environment Sandy Cockrell, Deloitte

Cyber Espionage A proactive approach to cyber security

CYBER CAMPUS KPMG BUSINESS SCHOOL THE CYBER SCHOOL FOR THE REAL WORLD. The Business School for the Real World

Deloitte Discovery Caribbean & Bermuda Countries Guide

Customer Breach Support A Deloitte managed service. Notifying, supporting and protecting your customers through a data breach

BHConsulting. Your trusted cybersecurity partner

Multi-factor authentication enrollment guide for Deloitte client or business partner user

Canada Highlights. Cybersecurity: Do you know which protective measures will make your company cyber resilient?

The New Healthcare Economy is rising up

EY Cyber Response Services. Plan. React. Recover.

INTELLIGENCE DRIVEN GRC FOR SECURITY

Cyber Risk Program Maturity Assessment UNDERSTAND AND MANAGE YOUR ORGANIZATION S CYBER RISK.

MFA Enrollment Guide. Multi-Factor Authentication (MFA) Enrollment guide STAGE Environment

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO

Run the business. Not the risks.

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

Plan a Pragmatic Approach to the new EU Data Privacy Regulation

People risk. Capital risk. Technology risk

National Cyber Security Operations Center (N-CSOC) Stakeholders' Conference

Protection of clients information in the age of IT ECBA Spring Conference Prague 2017 Jan Balatka, Analytic & Forensic Technology

RSA Solution Brief. Managing Risk Within Advanced Security Operations. RSA Solution Brief

Cyber Security: Are digital doors still open?

PREPARE FOR TAKE OFF. Accelerate your organisation s journey to the Cloud.

Security by Default: Enabling Transformation Through Cyber Resilience

CYBER RESILIENCE & INCIDENT RESPONSE

Anticipating the wider business impact of a cyber breach in the health care industry

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT

Implementation Strategy for Cybersecurity Workshop ITU 2016

BHConsulting. Your trusted cybersecurity partner

GDPR: Get Prepared! A Checklist for Implementing a Security and Event Management Tool. Contact. Ashley House, Ashley Road London N17 9LZ

Turning Risk into Advantage

Big data privacy in Australia

Cyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS

Cybersecurity governance in Europe. Sokratis K. Katsikas Systems Security Laboratory Dept. of Digital Systems University of Piraeus

How to be cyber secure A practical guide for Australia s mid-size business

Cyber Security for the future of financial services

Data Protection. Practical Strategies for Getting it Right. Jamie Ross Data Security Day June 8, 2016

13.f Toronto Catholic District School Board's IT Strategic Review - Draft Executive Summary (Refer 8b)

M&A Cyber Security Due Diligence

U.S. Department of Homeland Security Office of Cybersecurity & Communications

Enhance Your Cyber Risk Awareness and Readiness. Singtel Business

GDPR Privacy Webinar. Prioritizing Your Path towards GDPR Compliance Annika Sponselee and Nicole Vreeman 28 February 2018

ISO COMPLIANCE GUIDE. How Rapid7 Can Help You Achieve Compliance with ISO 27002

Managing Cyber Risk. Robert Entin Executive Vice President Chief Information Officer Vornado Realty Trust

COST OF CYBER CRIME STUDY INSIGHTS ON THE SECURITY INVESTMENTS THAT MAKE A DIFFERENCE

Cyber Resilience - Protecting your Business 1

How to Underpin Security Transformation With Complete Visibility of Your Attack Surface

Information Security Controls Policy

CyberEdge. End-to-End Cyber Risk Management Solutions

Strategic threat advisory services

The impact of digital transformation on industries

Key Findings from the Global State of Information Security Survey 2017 Indonesian Insights

Cyber Threat Landscape April 2013

Data Management and Security in the GDPR Era

NEW DATA REGULATIONS: IS YOUR BUSINESS COMPLIANT?

Cyber crisis management: Readiness, response, and recovery

TIPS FOR FORGING A BETTER WORKING RELATIONSHIP BETWEEN COUNSEL AND IT TO IMPROVE CYBER-RESPONSE

Enhancing the Cybersecurity of Federal Information and Assets through CSIP

Case Study. Encode helps University of Aberdeen strengthen security and reduce false positives with advanced security intelligence platform

Cybersecurity Risk Mitigation: Protect Your Member Data. Introduction

MITIGATE CYBER ATTACK RISK

Cyber Security Incident Response Fighting Fire with Fire

GDPR Update and ENISA guidelines

KEDAYAM A KAAPAGAM MANAGED SECURITY SERVICES. Kaapagam Technologies Sdn. Bhd. ( T)

Incident Response Services to Help You Prepare for and Quickly Respond to Security Incidents

PA TechCon. Cyber Wargaming: You ve been breached: Now what? April 26, 2016

2018 MANAGED SECURITY SERVICE PROVIDER (MSSP): BENCHMARK SURVEY Insights That Inform Decision-Making for Retail Industry Outsourcing

DELIVERING SIMPLIFIED CYBER SECURITY JOURNEYS

Business Continuity Management: How to get started. Presented by: Tony Drewitt, Managing Director IT Governance Ltd 19 April 2018

2015 VORMETRIC INSIDER THREAT REPORT

with Advanced Protection

Cyber Resilience: Developing a Shared Culture. Sponsor Guide

egensburg, February 1st, 2005

Insider Threat Program: Protecting the Crown Jewels. Monday, March 2, 2:15 pm - 3:15 pm

MATURE YOUR CYBER DEFENSE OPERATIONS with Accenture s SIEM Transformation Services

Adopting SSAE 18 for SOC 1 reports

Cyber Security Technologies

Information Security Controls Policy

Modern Database Architectures Demand Modern Data Security Measures

Cyber Resilience. Think18. Felicity March IBM Corporation

SECURITY SERVICES SECURITY

Building a Resilient Security Posture for Effective Breach Prevention

CYBER SECURITY TAILORED FOR BUSINESS SUCCESS

IoT & SCADA Cyber Security Services

Cybersecurity and the Board of Directors

Enterprise Case Study

EY Consulting. Is your strategy planning for the future or creating it? #TransformativeAge

Transcription:

Cyber Risk Services Going beyond limits

Current Threat Environment Security breaches: 318 Scanned websites with vulnerabilities: 78% Average identities exposed per breach: 1.3 Million Email malware rate (Overall): 1 in 220 New mobile vulnerabilities: 528 Web attacks blocked per day: 1.1 Million Source: https://www.symantec.com/content/dam/symantec/docs/security-center/archives/istr-16-april-volume-21-en.pdf 02

Potential Cyber Issue 3 4 Cyber Resilience Perceive resilience as an IT issue Insufficient processes to engage broad terms in crisis management Unable to conduct full incident response investigation 1 2 Cyber Vigilance Overwhelmed by too many alerts Fear of security breach Traditional in-house security team Cyber Secure Complex IT system Competitive challenges to achieve agility Need for common identity management framework Cyber Strategy Overlaps and gaps amongst cyber solutions Significant period of change or business innovation Complex compliance mandates & lack of cohesive visibility 03

Cyber Risk Services Going beyond limits A global network of Cyber Intelligence Centres As cyber threats evolve and become more complex, many business leaders recognise they can t manage the challenge alone. That s why Deloitte offers a global network of Cyber Intelligence Centres (CICs), operating around the clock, 365 days of the year. Our CICs provide fully customisable managed security solutions including advanced security event monitoring, threat analytics, cyber threat management, and incident response for businesses in the region to meet the increasing market demand in cybersecurity services. Calgary Vancouver Mexico City Operational Santiago Montreal Toronto Jersey City Camp Hill Orlando Bueno Aires Sao Paulo The Hague Madrid Lisbon Brussels Reading Barcelona Avellino Copenhagen Munich Budapest Istanbul Tel Aviv Johannesburg Dubai Mumbai New Delhi Hong Kong Hyderabad Kuala Lumpur Singapore Tokyo Sydney Planned 04 05

Deloitte s leading Cyber Risk team helps organisations address pressing and pervasive strategic information and technology risks, such as cyber security, data leakage, identity and access management, and data security breaches. We provide industry-tailored solutions, using demonstrated methodologies and tools in a consistent manner, with the goal of enabling on-going, secure and reliable operations across the enterprise. Cyber Strategy Traditional security programs have often been unsuccessful in unifying the need to both secure and support technology innovation required by the business. Deloitte s Cyber Strategy services support the transition to an executive-led cyber risk program that balances requirements to be secure, vigilant, and resilient in line with the strategic objectives and risk appetite of the organisation. Cyber Secure Being secure means having risk-prioritised controls to defend critical assets against known and emerging threats. Secure services help clients establish risk-focused controls around their most sensitive assets, balancing the need to reduce risk, while also enabling productivity, business growth, and cost optimisation objectives. Cyber Vigilance Being vigilant means having threat intelligence and situational awareness to anticipate and identify harmful behaviour. Vigilant services leverage deep experience with analytic and correlation technologies to help clients develop monitoring solutions focused on critical business processes. Data integration and context-rich alerts can help prioritise incident handling and streamline incident investigation. Cyber Resilience Being resilient allows an organisation s operations to rapidly adapt and respond to internal and external dynamic changes opportunities, demands, disruptions, or threats and continue operations with limited impact to the business. A comprehensive enterprise Resilient program requires the right oversight and governance to integrate and coordinate with multiple stakeholders. 06

Cyber Risk Services Cyber Secure Application Protection Cloud Security Secure Messaging Secure SDLC Identity & Access Management Identity Lifecycle Management Role Based Access Control Privileged User Access Control Information Privacy & Protection Data Loss Prevention Encryption Infrastructure Protection End-user Device Security System Security Vulnerability Management Penetration Testing & Vulnerability Scanning Cyber Strategy Cyber Risk Management & Compliance Cyber Risk Management, Metrics & Reporting Cyber Training, Education & Awareness Strategy And Operating Model Policies, Standards And Architecture Cyber Risk Culture And Behaviour Cyber Strategy, Transformation & Assessments Information Classification Cyber Vigilance Security Operations Centre Network Security Brand Protection Security Event Monitoring Social Threat Monitoring Threat Intelligence & Analysis Cyber Threat Intelligence Cyber Risk Analytics Cyber Analytics Advanced Threat Readiness & Preparation Malware Protection Security Platform Administration & Operations Cyber Resilience Cyber War Gaming Incident Readiness Cyber Incident Response Business Continuity Management And Recovery Incident Management 07

Contact us SEA and Singapore Thio Tse Gan, SEA Cyber Risk Leader +65 6216 3158 tgthio@deloitte.com Edna Yap +65 6531 5016 edyap@deloitte.com Eric Lee +65 6800 2100 ewklee@deloitte.com Victor Keong +65 6216 3222 vkeong@deloitte.com Siah Weng Yew +65 6216 3112 wysiah@deloitte.com Jaffa Law +65 6216 3350 jalaw@deloitte.com Leslie Moller +65 6800 2333 lesmoller@deloitte.com Indonesia Sigit Kwa Associate +62 21 2992 3100 Ext. 33548 skwa@deloitte.com Malaysia Megat Mohammad Faisal +60 3 7610 8863 mkhirjohari@deloitte.com Ho Siew Kei +603 7610 8040 sieho@deloitte.com Shaharil Abdul Malek +60 3 7610 8882 sabdulmalek@deloitte.com Philippines Anna Marie Pabellon Partner +63 2 581 9038 apabellon@deloitte.com Thailand Parichart Jiravachara +66 (0) 2034 0130 pjiravachara@deloitte.com Pinyo Treepetcharaporn +66 (0) 2034 0000 Ext. 11946 ptreepetcharaporn@deloitte.com Deloitte refers to one or more of Deloitte Touche Tohmatsu Limited, a UK private company limited by guarantee ( DTTL ), its network of member firms, and their related entities. DTTL and each of its member firms are legally separate and independent entities. DTTL (also referred to as Deloitte Global ) does not provide services to clients. Please see www.deloitte.com/about to learn more about our global network of member firms. Deloitte provides audit, consulting, financial advisory, risk advisory, tax and related services to public and private clients spanning multiple industries. Deloitte serves four out of five Fortune Global 500 companies through a globally connected network of member firms in more than 150 countries and territories bringing world-class capabilities, insights, and high-quality service to address clients most complex business challenges. To learn more about how Deloitte s approximately 245,000 professionals make an impact that matters, please connect with us on Facebook, LinkedIn, or Twitter. 2017 Deloitte Southeast Asia Ltd