Moving from Prevention to Detection March 2017

Similar documents
Cyber Insurance: What is your bank doing to manage risk? presented by

Enterprise resilience and the role of Standards

Cyber Threat Landscape April 2013

Cyber Attack: Is Your Business at Risk?

RIMS Perk Session Protecting the Crown Jewels A Risk Manager's guide to cyber security March 18, 2015

Understanding Cyber Insurance & Regulatory Drivers for Business Continuity

Key Findings from the Global State of Information Security Survey 2017 Indonesian Insights

CYBER INSURANCE: MANAGING THE RISK

Cyber Security Incident Response Fighting Fire with Fire

INTRODUCTION. We would like to thank HelpSystems for supporting this unique research. We hope you will enjoy the report.

CYBER SECURITY TAILORED FOR BUSINESS SUCCESS

THE CYBER SECURITY PLAYBOOKECTOR SHOULD KNOW BEFPRE, DURING & AFTER WHAT EVERY DIRECTOR SHOULD KNOW BEFORE, DURING AND AFTER AN ATTACK

Governance Ideas Exchange

2018 Data Security Incident Response Report Building Cyber Resilience: Compromise Response Intelligence in Action

Cyber Risks in the Boardroom Conference

Cybersecurity Threat Modeling ISACA Atlanta Chapter Geek Week Conference

Cybersecurity The Evolving Landscape

Public vs private cloud for regulated entities

BREACHES HAPPEN: BE PREPARED. Endpoint Detection & Response

Anticipating the wider business impact of a cyber breach in the health care industry

DHG presenter. August 17, Addressing the Evolving Cybersecurity Landscape. DHG Birmingham CPE Seminar 1

Stephanie Zierten Associate Counsel Federal Reserve Bank of Boston

Safeguarding company from cyber-crimes and other technology scams ASSOCHAM

June 2 nd, 2016 Security Awareness

STAY ONE STEP AHEAD OF THE CRIMINAL MIND. F-Secure Rapid Detection & Response

How to Prepare a Response to Cyber Attack for a Multinational Company.

Governing cyber security risk: It s time to take it seriously Seven principles for Boards and Investors

Cybersecurity and Nonprofit

Are we breached? Deloitte's Cyber Threat Hunting

AIRMIC ENTERPRISE RISK MANAGEMENT FORUM

PULSE TAKING THE PHYSICIAN S

Making trust evident Reporting on controls at Service Organizations

Bringing cyber to the Board of Directors & C-level and keeping it there. Dirk Lybaert, Proximus September 9 th 2016

The Evolving Threat to Corporate Cyber & Data Security

Business continuity management and cyber resiliency

DeMystifying Data Breaches and Information Security Compliance

How will cyber risk management affect tomorrow's business?

The Cyber War on Small Business

CyberEdge. End-to-End Cyber Risk Management Solutions

DIGITAL ACCOUNTANCY FORUM CYBER SESSION. Sheila Pancholi Partner, Technology Risk Assurance

Cybersecurity What Companies are Doing & How to Evaluate. Miguel Romero - NAIC David Gunkel & Dan Ford Rook Security

A CFO s Guide to Cyber Security in the Coming Year

EFFECTIVELY TARGETING ADVANCED THREATS. Terry Sangha Sales Engineer at Trustwave

CYBER SECURITY WORKSHOP NOVEMBER 2, Anurag Sharma [CISA, CISSP, CRISC] Principal Cyber & Information Security Services

Cylance Axiom Alliances Program

NORTH AMERICAN SECURITIES ADMINISTRATORS ASSOCIATION Cybersecurity Checklist for Investment Advisers

SECOPS: NAVIGATE THE NEW LANDSCAPE FOR PREVENTION, DETECTION AND RESPONSE

The Role of the Data Protection Officer

U.S. State of Cybercrime

MITIGATE CYBER ATTACK RISK

Cybersecurity in Higher Ed

Building a Threat Intelligence Program

5 Trends That Will Impact Your IT Planning in Layered Security. Executive Brief

Altitude Software. Data Protection Heading 2018

COUNTERING CYBER CHAOS WITH HIPAA COMPLIANCE. Presented by Paul R. Hales, J.D. May 8, 2017

Jeff Wilbur VP Marketing Iconix

GDPR: An Opportunity to Transform Your Security Operations

CYBERAID + The Cyber Solution for UK SMEs THBGROUP.COM

2018 GLOBAL CHANNEL PARTNER SURVEY THYCOTIC CHANNEL PARTNER SURVEY REPORT

Cyber Security and Data Protection: Huge Penalties, Nowhere to Hide

What can we lose not implementing proper security in our IT environment? Aleksandar Pavlovic Security Account Manager Cisco

Why you MUST protect your customer data

Must Have Items for Your Cybersecurity or IT Budget in 2018

HEALTH CARE AND CYBER SECURITY:

CYBER SECURITY RISK ASSESSMENT: WHAT EVERY PENSION GOVERNMENTAL ENTITY NEEDS TO KNOW

Cybersecurity Protecting your crown jewels

Presented by Ingrid Fredeen and Pamela Passman. Copyright 2017NAVEXGlobal,Inc. AllRightsReserved. Page 0

The Data Breach: How to Stay Defensible Before, During & After the Incident

What matters in Cyber Security

Skybox Security Vulnerability Management Survey 2012

Security & Phishing

FTA 2017 SEATTLE. Cybersecurity and the State Tax Threat Environment. Copyright FireEye, Inc. All rights reserved.

Cyber Security. It s not just about technology. May 2017

Cyber Security Law --- How does it affect the business operations in China? Xun Yang Of Counsel, Commercial IP and Technology

Making your Enterprise Cyber Resilient

2017 Data Security Incident Response Report. Be Compromise Ready: Go Back to the Basics

PRC Cyber Security Law --- How does it affect a UK business? Xun Yang Of Counsel, Commercial IP and Technology

From Managed Security Services to the next evolution of CyberSoc Services

Traditional Security Solutions Have Reached Their Limit

SEC Issues Interpretive Guidance on Public Company Cybersecurity Disclosures

A Data-Centric Approach to Endpoint Security

Incident Response Services to Help You Prepare for and Quickly Respond to Security Incidents

RESELLER LOGO RADICALLY BETTER. DDoS PROTECTION. Radically more effective, radically more affordable solutions for small and medium enterprises

SEC Issues Updated Guidance on Cybersecurity Disclosure

Panda Security 2010 Page 1

Cyber Security. The Question of the Day. Sylint Group, Inc. How did we come up with the company name Sylint and what does it mean?

CYBERSECURITY PREPAREDNESS AND RESPONSE

Cybersecurity Session IIA Conference 2018

2017 Cyber Incident & Breach Readiness Webinar Will Start Shortly

TIPS FOR FORGING A BETTER WORKING RELATIONSHIP BETWEEN COUNSEL AND IT TO IMPROVE CYBER-RESPONSE

THE CYBERSECURITY LITERACY CONFIDENCE GAP

Cyber Security in M&A. Joshua Stone, CIA, CFE, CISA

Managing IT Risk: What Now and What to Look For. Presented By Tina Bode IT Assurance Services

To Audit Your IAM Program

Leveraging Best Practices to Determine your Cyber Insurance Needs. Sector Conference, Toronto November 2017

Data Breach Preparation and Response. April 21, 2017

50% 45% 40% 25% 20% 15%

Legal Aspects of Cybersecurity

CYBER RESILIENCE & INCIDENT RESPONSE

2018 HISCOX Small Business Cyber Risk Report

Transcription:

www.pwc.com Moving from Prevention to Detection Le Tran Hai Minh Manager Cyber Security 29

Agenda Slide Cyber Security Statistics 3 How to Stay Confidence 8 Contact 19 2

Cyber Security Statistics 3

Cyber Security Crime Statistics Top cyber threats in 2016 In Q3 2016 alone, 18 million new malware samples were captured (Source: Panda lab) More than 4,000 ransomeware attacks have occurred everyday since the beginning of 2016 (Source: FBI report) The amount of phishing emails containing a form of ransomware grew to 97.25% during Q3 2016, up from 92% in Q1 2016 (Source: Phisme) (Source: Keepersecurity) 4

Cyber Security Crime Statistics 60% Of Hacked SMBs Are Out Of Business 6 Months Later Lloyd s of London Inga Beale, CEO of Lloyd's Reputational damage is usually the thing that's most difficult to quantify" Recent Lloyd's of London data revealed that 92 percent of businesses asked had experienced a breach, Inga Beale, CEO of Lloyd's, told CNBC's Squawk Box. "Apart from businesses in the U.S., there is not a lot of take up of cyber insurance," Beale detailed, despite the problem "affecting almost every single business because of technology these days. With regards to the cost of insurance premiums, "reputational damage is usually the thing that's most difficult to quantify," Beale added. But, she said that by taking out cyber insurance, firms can essentially "limit (their) share price reduction by the action (they) take." Responding appropriately to an attack includes liaising with PR companies and crisis management firms, Beale said. Beale asserted that Lloyd's of London considered itself global market leader in the cyber insurance space, with 20-25 percent of market share. Evaluating "new risks" was the "essence" of the company 92% 92 percent of European businesses have experienced cyber breaches 5

SMEs become favorite targets 1. SMEs an easy target: Limited finance, human, technology 2. SMEs are potentially easy targets due to not being equipped with advanced technologies and lower employees awareness to prevent and resolve attacks on real-time 3. SMEs believed they are not big or important enough to be a target to hackers 4. A compromised SME can be the stepping-stone to attack large organizations 6

Major Data Breaches 1. SMEs an easy target: Limited finance, human, technology 2. SMEs are potentially easy targets due to not being equipped with advanced technologies and lower employees awareness to prevent and resolve attacks on real-time 3. SMEs believed they are not big or important enough to be a target to hackers 4. A compromised SME can be the stepping-stone to attack large organizations 7

How to Stay Confidence 8

How to Make Your Business More Cyber Resilient When are we going to be hacked? People Small and medium-sized enterprises Cyber Risk Awareness training. Most cyber breaches happen because an employee does something that they aren t supposed to do. SMEs believed they are not big or important enough to be a target to hackers: Process Be prepared. Create a business continuity and incident response plan, and test it. Technology Hygiene IT environment, Network security, Malware protection, Managing User Priviledges 9

Balance between Prevention and Detection Identity and Account Management (IAM) Advanced authentication technologies boost consumer confidence in their security and privacy capabilities, as well as enhance the customer experienceand protect brand reputation... Security Orchestration and Automation A method of connecting security tools and integrating disparate security systems. It is the connected layer that streamlines security processes and powers security automation. User Behavior Analytics (UBA) UBA solutions look at patterns of human behavior, and then apply algorithms and statistical analysis to detect meaningful anomalies from those patterns anomalies that indicate potential threats. Endpoint Detection and Response (EDR) Technology A comprehensive, proactive endpoint security solution designed to continuous monitor for incidents on hosts and endpoints. 10

Threat Detection Tools and Process in place, 2016 Source: s Global State of Information Security Survey 2017 11

Other Solutions to Protect Businesses from Cyber Risks Companies focus should remain on core business and growth, Cloud is a perfect security solution to quickly identify and respond to threats. 12

Business Functions Run in the Cloud 63% 36% IT Operations 32% 34% 34% Finance Marketing & Sales Customer Service Source: s Global State of Information Security Survey 2017 13

Other Solutions to Protect Businesses from Cyber Risks (cont.) Companies focus should remain on core business and growth, Cloud is a perfect security solution to quickly identify and respond to threats. MSSP (Managed Security Service Provider) provides outsourced monitoring and management of security devices and systems. 14

Increasing of Managed Security Service Provider use 63% Run IT function in the Cloud 60% of financial firms use managed security services for authentication and real-time monitoring and analytics 62% Use managed security services for cyber security 57% Employ biometric for authentication 53% Use open-source software 51% Employ Big Data analytics for cyber security 46% Invest in a security strategy for the IoT Source: s Global State of Information Security Survey 2017 15

Other Solutions to Protect Businesses from Cyber Risks (cont.) Companies focus should remain on core business and growth, Cloud is a perfect security solution to quickly identify and respond to threats. MSSP (Managed Security Service Provider) provides outsourced monitoring and management of security devices and systems. What can t be protected, can be insured. Businesses need to consider Cyber insurance. 16

Cyber Insurance The Last Line of Defense Cyber liability insurance cover can include: Data breach/privacy crisis management cover: the investigation, the remediation, data subject notification, legal costs, court attendance and regulatory fines. Multimedia/Media liability cover: defacement of website and intellectual property rights infringement. Extortion liability cover: professional fees related to dealing with the extortion. Network security liability: damages as a result of denial of access, and costs related to the theft of data on thirdparty systems. Source: The Insurance Insider 17

Key Takeaways When will we be hacked? be prepared It s time to move from Prevention to Detection Consider out sourced solutions Cloud, MSSP 18

Contact us Robert Trong Tran Director robert.trong.tran@vn.pwc.com +84 (8) 3823 0796 Ext. 1007 Le Tran Hai Minh Manager le.tran.hai.minh@vn.pwc.com +84 (4) 3946 2246 Ext. 1014 19

Thank you! WARNING: The following disclaimer and copyright notices must be customised for your local territory - if you need assistance with appropriate wording, contact your local Risk Management or Office of General Counsel. This publication has been prepared for general guidance on matters of interest only, and does not constitute professional advice. You should not act upon the information contained in this publication without obtaining specific professional advice. No representation or warranty (express or implied) is given as to the accuracy or completeness of the information contained in this publication, and, to the extent permitted by law, [insert legal name of the firm], its members, employees and agents do not accept or assume any liability, responsibility or duty of care for any consequences of you or anyone else acting, or refraining to act, in reliance on the information contained in this publication or for any decision based on it. 2017 [insert legal name of the firm]. All rights reserved. In this document, refers to [insert legal name of the firm] which is a member firm of PricewaterhouseCoopers International Limited, each member firm of which is a separate legal entity.