Clarity on Cyber Security. Media conference 29 May 2018

Similar documents
Never a dull moment. Media Conference «Clarity on Cyber Security» 24 May 2016

Ahead of the next curve

Trough a cyber security lens

A new approach to Cyber Security

Testers vs Writers: Pen tests Quality in Assurance Projects. 10 November Defcamp7

Cybersecurity Presidential Policy Directive Frequently Asked Questions. kpmg.com

THE POWER OF TECH-SAVVY BOARDS:

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security

The GDPR Are you ready?

Cyber security and awareness for non-financial services. 24/25 May 2017

M&A Cyber Security Due Diligence

RIMS Perk Session Protecting the Crown Jewels A Risk Manager's guide to cyber security March 18, 2015

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO

Cyber Security. It s not just about technology. May 2017

Emerging Technologies The risks they pose to your organisations

December 10, Statement of the Securities Industry and Financial Markets Association. Senate Committee on Banking, Housing, and Urban Development

BUSINESS LECTURE TWO. Dr Henry Pearson. Cyber Security and Privacy - Threats and Opportunities.

SECURING THE DIGITAL ECONOMY. Reinventing the Internet for Trust

Turning Risk into Advantage

Accelerate GDPR compliance with the Microsoft Cloud

CYBER INSURANCE: MANAGING THE RISK

Canada Highlights. Cybersecurity: Do you know which protective measures will make your company cyber resilient?

Survey - Governance, Risk and Compliance

Customer Breach Support A Deloitte managed service. Notifying, supporting and protecting your customers through a data breach

Angela McKay Director, Government Security Policy and Strategy Microsoft

BREAKING BARRIERS TO COLLABORATE WITH THE C-SUITE

GDPR: A QUICK OVERVIEW

January 25, Digital Governments. From KPMG s Harvey Nash survey to a future of opportunities

Evaluating Cybersecurity Coverage A Maturity Model. Presented to: ISACA Charlotte Chapter Vision for IT Audit 2020 Symposium

Physical security advisory services Securing your organisation s future

Cyber Risk A Corporate Directors' Briefing Webcast Q&A Summary

Boston Chapter AGA 2018 Regional Professional Development Conference Cyber Security MAY 2018

How Secure is Blockchain? June 6 th, 2017

Larry Clinton President & CEO Internet Security Alliance

MITIGATE CYBER ATTACK RISK

SOC for cybersecurity

Aon Service Corporation Law Global Privacy Office. Aon Client Data Privacy Summary

IT Attestation in the Cloud Era

CYBER SECURITY AIR TRANSPORT IT SUMMIT

How to avoid storms in the cloud. The Australian experience and global trends

CYBERCRIME AS A NEW FORM OF CONTEMPORARY CRIME

Bringing cyber to the Board of Directors & C-level and keeping it there. Dirk Lybaert, Proximus September 9 th 2016

Security Awareness Training Courses

Presented by Ingrid Fredeen and Pamela Passman. Copyright 2017NAVEXGlobal,Inc. AllRightsReserved. Page 0

Cyber Risk for Maritime

Key Findings from the Global State of Information Security Survey 2017 Indonesian Insights

Anticipating the wider business impact of a cyber breach in the health care industry

It s Not If But When: How to Build Your Cyber Incident Response Plan

Institute of Internal Auditors 2019 CONNECT WITH THE IIA CHICAGO #IIACHI

DHS Cybersecurity: Services for State and Local Officials. February 2017

WHITE PAPER. Title. Managed Services for SAS Technology

Governing cyber security risk: It s time to take it seriously Seven principles for Boards and Investors

UNCLASSIFIED. National and Cyber Security Branch. Presentation for Gridseccon. Quebec City, October 18-21

AIRMIC ENTERPRISE RISK MANAGEMENT FORUM

Business Continuity Planning

Cyber Security Law --- Are you ready?

The Deloitte-NASCIO Cybersecurity Study Insights from

Cyber Risk and Third Party Risk Management. Lisa Murphy First Horizon National Corporation

NORTH AMERICAN SECURITIES ADMINISTRATORS ASSOCIATION Cybersecurity Checklist for Investment Advisers

Developing Issues in Breach Notification and Privacy Regulations: Risk Managers Are you having the right conversation with the C Suite?

Run the business. Not the risks.

INTELLIGENCE DRIVEN GRC FOR SECURITY

Avanade s Approach to Client Data Protection

Global cybersecurity and international standards

Stephanie Zierten Associate Counsel Federal Reserve Bank of Boston

Cyber Security in Smart Commercial Buildings 2017 to 2021

ISACA Cincinnati Chapter March Meeting

2017 RIMS CYBER SURVEY

Swedish bank overcomes regulatory hurdles and embraces the cloud to foster innovation

CYBER CAMPUS KPMG BUSINESS SCHOOL THE CYBER SCHOOL FOR THE REAL WORLD. The Business School for the Real World

Version 1/2018. GDPR Processor Security Controls

Advanced Cyber Risk Management Threat Modeling & Cyber Wargaming April 23, 2018

How to implement NIST Cybersecurity Framework using ISO WHITE PAPER. Copyright 2017 Advisera Expert Solutions Ltd. All rights reserved.

Cyber Security Incident Response Fighting Fire with Fire

HIPAA Privacy, Security and Breach Notification

Cybersecurity, safety and resilience - Airline perspective

Data Privacy Corporate Responsibility in Multi Polar World

TIPS FOR FORGING A BETTER WORKING RELATIONSHIP BETWEEN COUNSEL AND IT TO IMPROVE CYBER-RESPONSE

Cyber Risk Program Maturity Assessment UNDERSTAND AND MANAGE YOUR ORGANIZATION S CYBER RISK.

Safeguarding company from cyber-crimes and other technology scams ASSOCHAM

Mid-Market Data Center Purchasing Drivers, Priorities and Barriers

Security in India: Enabling a New Connected Era

NYDFS Cybersecurity Regulations: What do they mean? What is their impact?

Cyber Risks in the Boardroom Conference

Forensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services

CFOs in a new global environment Sandy Cockrell, Deloitte

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT

RESOLUTION 130 (REV. BUSAN, 2014)

HEALTH CARE AND CYBER SECURITY:

Auditing IT General Controls

Forensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services

An overview of mobile call recording for businesses

Cyber Threat Landscape April 2013

Implementing the Administration's Critical Infrastructure and Cybersecurity Policy

DHS Cybersecurity. Election Infrastructure as Critical Infrastructure. June 2017

NYDFS Cybersecurity Regulations

GDPR Update and ENISA guidelines

ISO / IEC 27001:2005. A brief introduction. Dimitris Petropoulos Managing Director ENCODE Middle East September 2006

Driving Global Resilience

Data Protection. Practical Strategies for Getting it Right. Jamie Ross Data Security Day June 8, 2016

Transcription:

Clarity on Cyber Security Media conference 29 May 2018

Why this study? 2

Methodology

Methodology of the study Online survey consisting of 33 questions 60 participants from C-Level (CISOs, CIOs, CTOs) 26 large companies (> 5,000 FTEs) 34 small and mid-size companies (< 5,000 FTEs) Personal interviews were conducted with five subject matter experts Evaluation of the data was carried out by a KPMG s cyber security team of experts 4

Distribution of survey participants by sector 5

In-depth interviews with subject matter experts Entering new territory: the opportunities and risks of blockchain and cryptocurrencies Oliver Bussmann President Crypto Valley Association The search is on: finding alternative security technologies to deal with the rise of quantum computing Renato Renner Professor for Theoretical Physics ETH Zurich Know your target: how cyber due diligence feeds investment decisions Christian Unger Managing Director and Co-Head Industry Value Creation Partners Group Protecting civilians in cyberspace: the Digital Geneva Convention Brad Smith President and Chief Legal Officer Microsoft SwissID s quest to provide security, reliability and trust Markus Naef CEO SwissSign 6

Study results Resilience and trust are prerequisites for sustainable growth in the digital age

Genuine threats, real damage From those attacked: 42% incurred financial losses (2017: 36%). 75% in financial services vs 25% in non-financial services 33% suffered from disclosure of confidential internal information (2017: 29%). 42% experienced disruption of business processes (2017: 56%). 25% in financial services vs 50% in non-financial services 25% needed to deal with reputational damage (2017: 37%). 8

Security breaches damage trust 73% believe that customers trust in an organization is very or fairly impacted by cyber security breaches. 58% believe it impacts on investors trust in the business. «Companies are increasingly expected to have a clear strategy towards cyber security and privacy risks. Building it into your due diligence is vital to protecting both investors and customers.» Christian Unger, Partners Group 9

Acknowledgment, but limited action 80% of 36% address boards consider cyber security to be an operational risk. the topic in their annual report. 10

Acknowledgment, but limited action 69% of important step towards trusted interactions with customers. respondents see digital ID as an 35% plan to incorporate digital ID into their products or services. «As a growing number of activities are carried out online, users need to be confident that the environment is secure and reliable. Digital IDs are an integral part of building this trust.» Markus Naef, SwissSign 11

Acknowledgment, but limited action 35% have an overview of Internet of Things and operational technology devices deployed in their organizations (2017: 31%). 58% admit that these are not covered in their current cyber security strategy and policies (2017: 48%). 12

Acknowledgment, but limited action 53% expect its use of blockchain technology to pose new security risks. 8% have already taken specific steps to manage these risks. «Blockchain represents great potential but also massive challenges. Huge sums of money could be lost through error or malicious action if we don t invest enough in security and threat prevention.» Oliver Bussmann, Crypto Valley Association. «For blockchains, long-term security is obviously essential, even more than for encryption. No-one wants to use a cryptocurrency that will become worthless in 15 years due to a quantum attack. But exactly this could in principle happen.» Renato Renner, ETH Zurich 13

Do we learn from past incidents? 23% include cyber security in their due diligence scope of investments and mergers. «Compared to other due diligence elements cyber is a relatively new topic. However, the overall understanding of technology and its associated risks is growing rapidly in the investor community. We will see this clearly develop further and become more sophisticated. This will be necessary as the threats and risks will become more difficult to judge.» Christian Unger, Partners Group 14

Third party risks are slipping off the radar 44% have no instruments to enforce their control framework on suppliers (2017: 32%). 38% have no contractually agreed, binding terms related to cyber risks (2017: 29%). 34% do not require specific cyber security measures in third party contracts (2017: 30%). 59% of contracts with third parties do not include a right to audit (2017: 40%). 15

Inadequate scenario plans 82% of cyber response plans do not cover attacks against suppliers or business partners. 60% in financial services vs 93% in non-financial services Personal data breaches (GDPR: notification within 72 hours) 40% of financial institutions do not have a bespoke response plan. 76% of non-financial service organizations do not have a bespoke response plan. 16

Product/market fit? 28% of respondents have cyber insurance. The reason why they don t have a cyber insurance policy in place 68% say the it doesn t match their needs. 64% say it is too expensive. 64% say the coverage has too many limitations. 17

Do we need regulations to get things moving? 100% 87% 67% 54% 42% 48% 2016 2017 2018 2016 2017 2018 Cyber response plans financial services Cyber response plans non-financial services 18

Driving growth with confidence Growth opportunities Unleash the value of data Leverage emerging business models and technologies Benefits from cyber resilience Build/increase trust Governance and (emerging) technology to use AND protect data Enhance understanding of upside and downside risks of business models and technologies «Toolbox» to get security and privacy right by design when deploying such business models and/or technologies From supply chains to networks and ecosystems Understand, mitigate and monitor risk exposure caused by third parties (business partner, suppliers) Acquisitions and investments Due diligence for cyber/privacy risk-adjusted target valuation Align cyber resilience to protect investment 19

These should be organizations priorities Act now Get the basics right Understand your cyber and privacy risks Put the human at the center of your cyber security strategy Clients, employees, business partners AND attackers Implement cyber resilience consequently and with focus both private sector and governments Get ready for the future Adopt a forward looking mode Understand impact of data, emerging technologies and emerging business and operating models on your cyber and privacy risk exposure Encourage a cyber resilience and privacy friendly political, economic and regulatory environment «We live in an internet-dependent world and cannot rely on governments to fix this problem in isolation. Governments sometimes need to be encouraged to act for the benefit of society as a whole. I think the time has come to do so with regard to cyber weapons.» Brad Smith, Microsoft 20

Media requests Can Arikan Head of Media Relations +41 58 249 53 51 +41 79 396 66 46 carikan@kpmg.com kpmg.ch/cyber The information contained herein is of a general nature and is not intended to address the circumstances of any particular individual or entity. Although we endeavor to provide accurate and timely information, there can be no guarantee that such information is accurate as of the date it is received, or that it will continue to be accurate in the future. No one should act on such information without appropriate professional advice after a thorough examination of the particular situation. The scope of any potential collaboration with audit clients is defined by regulatory requirements governing auditor independence. 2018 KPMG AG is a subsidiary of KPMG Holding AG, which is a member of the KPMG network of independent firms affiliated with KPMG International Cooperative ( KPMG International ), a Swiss legal entity. All rights reserved.