A new approach to Cyber Security

Similar documents
CYBER RESILIENCE & INCIDENT RESPONSE

CYBER CAMPUS KPMG BUSINESS SCHOOL THE CYBER SCHOOL FOR THE REAL WORLD. The Business School for the Real World

The University of Queensland

DELIVERING SIMPLIFIED CYBER SECURITY JOURNEYS

Never a dull moment. Media Conference «Clarity on Cyber Security» 24 May 2016

Clarity on Cyber Security. Media conference 29 May 2018

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

IBM Security Systems. IBM X-Force 2012 & CISO Survey. Cyber Security Threat Landscape IBM Corporation IBM Corporation

Ahead of the next curve

BHConsulting. Your trusted cybersecurity partner

M&A Cyber Security Due Diligence

FOR FINANCIAL SERVICES ORGANIZATIONS

INTELLIGENCE DRIVEN GRC FOR SECURITY

Cybersecurity. Securely enabling transformation and change

Sage Data Security Services Directory

Cyber Threat Landscape April 2013

RSA Solution Brief. Managing Risk Within Advanced Security Operations. RSA Solution Brief

Physical security advisory services Securing your organisation s future

Canada Highlights. Cybersecurity: Do you know which protective measures will make your company cyber resilient?

SECURING THE UK S DIGITAL PROSPERITY. Enabling the joint delivery of the National Cyber Security Strategy's objectives

Service. Sentry Cyber Security Gain protection against sophisticated and persistent security threats through our layered cyber defense solution

DIGITAL TRUST Making digital work by making digital secure

Presented by Ingrid Fredeen and Pamela Passman. Copyright 2017NAVEXGlobal,Inc. AllRightsReserved. Page 0

RSA RISK FRAMEWORKS MAKING DIGITAL RISK MANAGEABLE

Cyber Accelerate. Fast-track to cyber security for SMEs. KPMG New Zealand. kpmg.com/nz/cyber

SECURITY SERVICES SECURITY

Governing cyber security risk: It s time to take it seriously Seven principles for Boards and Investors

Key Findings from the Global State of Information Security Survey 2017 Indonesian Insights

DIGITAL ACCOUNTANCY FORUM CYBER SESSION. Sheila Pancholi Partner, Technology Risk Assurance

Cyber Security Incident Response Fighting Fire with Fire

NEXT GENERATION SECURITY OPERATIONS CENTER

PREPARE FOR TAKE OFF. Accelerate your organisation s journey to the Cloud.

RED HAT ENTERPRISE LINUX. STANDARDIZE & SAVE.

Vulnerability Management. June Risk Advisory

CYBER SECURITY TAILORED FOR BUSINESS SUCCESS

Cyber Security. It s not just about technology. May 2017

Six Weeks to Security Operations The AMP Story. Mike Byrne Cyber Security AMP

Risk Advisory Academy Training Brochure

HOSTED SECURITY SERVICES

Trough a cyber security lens

Cyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS

THE POWER OF TECH-SAVVY BOARDS:

Cyber Security Strategy

CYBER SOLUTIONS & THREAT INTELLIGENCE

T-SURE VIGILANCE CYBER SECURITY OPERATIONS CENTRE

How to be cyber secure A practical guide for Australia s mid-size business

Cyber Resilience - Protecting your Business 1

A Disciplined Approach to Cyber Security Transformation

BHConsulting. Your trusted cybersecurity partner

Keys to a more secure data environment

Aon Service Corporation Law Global Privacy Office. Aon Client Data Privacy Summary

Awareness and training programs OPTUS MACQUARIE UNIVERSITY CYBER SECURITY HUB

Cyber Security. Building and assuring defence in depth

January 25, Digital Governments. From KPMG s Harvey Nash survey to a future of opportunities

Customer Breach Support A Deloitte managed service. Notifying, supporting and protecting your customers through a data breach

What Directors and C-Suite professionals need to know kpmg.ca/insuranceconference2017

POSITION DESCRIPTION

Cyber Incident Response. Prepare for the inevitable. Respond to evolving threats. Recover rapidly. Cyber Incident Response

Securing Your Digital Transformation

Mastering The Endpoint

MITIGATE CYBER ATTACK RISK

Security by Default: Enabling Transformation Through Cyber Resilience

Keeping the lid on storage

A Framework for Managing Crime and Fraud

locuz.com SOC Services

Security in India: Enabling a New Connected Era

How to Underpin Security Transformation With Complete Visibility of Your Attack Surface

Cybersecurity Protecting your crown jewels

Cyber security and awareness for non-financial services. 24/25 May 2017

Emerging Technologies The risks they pose to your organisations

BRING EXPERT TRAINING TO YOUR WORKPLACE.

Nine Steps to Smart Security for Small Businesses

Protecting information across government

The new cybersecurity operating model

CYBER SECURITY TRAINING

Leading our discussion today

ENISA EU Threat Landscape

The trouble with referees is that they know the rules, but they do not know the game.

Preparing your network for the next wave of innovation

Cybersecurity for the SMB. CrowdStrike s Murphy on Steps to Improve Defenses on a Smaller Scale

Boston Chapter AGA 2018 Regional Professional Development Conference Cyber Security MAY 2018

Cyber Risk for Maritime

CYBER INSURANCE: MANAGING THE RISK

Cyber Risk Program Maturity Assessment UNDERSTAND AND MANAGE YOUR ORGANIZATION S CYBER RISK.

The power management skills gap

Cyber Security in Real Estate

Cyber Resilience: Developing a Shared Culture. Sponsor Guide

IT SECURITY OFFICER. Department: Information Technology. Pay Range: Professional 18

Real estate predictions 2017 What changes lie ahead?

DATA SHEET RSA NETWITNESS PLATFORM PROFESSIONAL SERVICES ACCELERATE TIME-TO-VALUE & MAXIMIZE ROI

Continuous protection to reduce risk and maintain production availability

RSA INCIDENT RESPONSE SERVICES

Implementing ITIL v3 Service Lifecycle

Changing the Game: An HPR Approach to Cyber CRM007

Run the business. Not the risks.

Better together. KPMG LLP s GRC Advisory Services for IBM OpenPages implementations. kpmg.com

13.f Toronto Catholic District School Board's IT Strategic Review - Draft Executive Summary (Refer 8b)

to Enhance Your Cyber Security Needs

How Secure is Blockchain? June 6 th, 2017

Transcription:

A new approach to Cyber Security Feel Free kpmg.ch

We believe cyber security should be about what you can do not what you can t. DRIVEN BY BUSINESS ASPIRATIONS We work with you to move your business forward. Positively managing cyber risk not only helps you take control of uncertainty across your business; you can turn it into a genuine strategic advantage. RAZOR SHARP INSIGHTS In a fast-moving digital world of constantly evolving threats and opportunities, you need both agility and assurance. Our people are experts in both cyber security and your market, which means we give you leading edge insight, ideas and proven solutions to act with confidence. SHOULDER TO SHOULDER We work with you as long term partners, giving you the advice and challenge you need to make decisions with confidence. We understand that this area is often clouded by feelings of doubt and vulnerability so we work hand-in-hand with you to turn that into a real sense of security and opportunity. 01 Feel Free A new approach to cyber security

A positive approach to managing cyber risk can set organisations free UNDERSTANDING THE CYBER SECURITY LANDSCAPE The digital environment presents opportunities for businesses that want to seek out new markets and are prepared to invest in transformational change. The last ten years have seen a rapid emergence of new technology, greater connectivity for organisations and individuals, and a 24/7 approach to global commerce. However, this has left many organisations behind the curve and struggling to achieve their business aspirations without feeling exposed to cyber security risk. Every day we hear of new vulnerabilities, attacks and incidents. A recent report 1 by renowned think-tank The Centre for Strategic and International Studies quoted losses of $375 $575 billion, and suggests that cyber crime might extract up to 20% of the global economic value created by the internet through fraud and espionage. The constantly evolving threat landscape means that cyber risk is an everyday business consideration. This undoubtedly presents a feeling of vulnerability, which has been leveraged by some to increase budget and to sell products. We have often found that this results in significant sums of investment on ineffective programmes with poor alignment to risk and business imperatives. Cyber security is not a quick technical fix nor is it a matter solely for the IT department. At KPMG we see all too often that these behaviours leave leadership wondering what they really need to do, how much is really enough and who they can trust to help them get it right. We believe that by turning traditional thinking on its head, adopting a positive approach to managing cyber risk, will set organisations free to achieve their business aspirations. 1 Net Losses: Estimating the Global Cost of Cybercrime, June 2014 Feel Free A new approach to cyber security 02

ACHIEVE A 360 VIEW OF CYBER SECURITY FREE FROM FEAR Scaremongering is an easy tactic, but staying on top of the evolving threat landscape and how it impacts you can remove fear, uncertainty and doubt. Understanding the external threats from hacktivists, organised criminals, industrial espionage and increasingly National States is important. However, it is all too easy to ignore the insider threats posed by careless, disgruntled or malicious employees. Attackers are frequently gaining access to employee s accounts through phishing emails and other socially engineered attacks. Bribery and intimidation is also still commonplace in most parts of the world. By managing the external and internal threats together, rather than separately, creates an integrated approach that removes the fear and uncertainty of attack sources. Many attackers are simply using different means to achieve a very old objective; be that theft, subversion, sabotage or espionage. Drawing parallels between security in the real and virtual worlds can remove fear of the unknown. At KPMG we assess the motivation and intent of the attacker in both the real and virtual worlds to see how they might compromise your systems. Based on this insight, we can then challenge and advise you on how to position your defences. Building in agility, with the expectation of change and disruption, enables you to architect an environment that is secure by design. 03 Feel Free A new approach to cyber security

LEVERAGING INDEPENDENT AND TAILORED ADVICE CAN GIVE YOU THE CONFIDENCE TO PURSUE YOUR GROWTH AMBITIONS Putting the correct foundations in place around governance, risk and compliance is the place to start. You can then achieve a balance of technical security, internal capability and the appropriate usage of technology and outsourced services. We believe that successful organisations are ones that integrate cyber risk management into all their activities. Those that practice sound transformational principles rather than succumbing to knee-jerk reactive solutions can create a comprehensive approach that focuses on what they can do not what they can t. Feel Free A new approach to cyber security 04

FREE TO CHALLENGE The UK government is regularly implementing initiatives to boost awareness of cyber threats. Boards need to challenge their teams to gain answers to the right questions before they themselves are challenged by stakeholders on their capability and control. Being able to identify, prioritise and protect the information lifecycle helps you to move confidently, safely and securely. At KPMG we can help you understand your dependencies on your supply chain, work with your community to understand cyber risks, share information on threats and improve readiness to respond together. Having a robust strategy and architecture in place will enable you to access clear and actionable management information to give you strength 05 in your decision making; provide access to timely threat insights; trusted information-sharing networks; and credible benchmarks against peers and competitors. Information sources need to be impartial and independent of specific vendor agendas. Accessing sources you can trust allows you to test and examine the right mix of technology, service providers and internal capability to create a blend of control and visibility. We believe that this is where collaboration and knowledge will differentiate to deliver business advantage. By leveraging collective experience of those you trust, you will have confidence to execute new ideas, approaches and solutions to respond to today and tomorrow s security issues. Feel Free A new approach to cyber security

FEEL FREE TO SPREAD YOUR WINGS Feel Free A new approach to cyber security 06

FREE TO INVEST With each aspect of emerging technology, new considerations arise; from the adoption of cloud technologies, the proliferation of social media, to remote working. These are all potential high growth investment options when managed effectively. Similarly, the rise of mobile technology and its applications is relevant to all sectors and business models. Organisations need to make choices around these new technologies, understand the cyber security issues up front, to strike the right balance between risk and opportunity. At KPMG we can work alongside you to identify how much investment is appropriate to ensure that cyber risk management is an enabler to achieve your business aspirations. CYBER RISK MANAGEMENT IS AN ENABLER Leveraging independent and tailored advice on which security services, technologies and approaches fit your culture, can give you the confidence to pursue your growth ambitions. We can help you develop a broad understanding of the threat environment which is specific to you, the regulatory landscape in which you do business, and your own asset environment. We believe that investing in a proactive approach to cyber risk management delivers wider commercial benefits. It is about having the confidence that as your business increasingly moves into the digital world, it is able to grow in an informed and agile manner. 07 Feel Free A new approach to cyber security

FREE TO CHANGE Currently many firms only act if and when a serious breach or failure occurs. Taking a proactive security stance can slow the attacker s progress and identify their actions early. Developing an adaptive approach can prevent downtime, avoid expensive disruptive responses to incidents, and maintain business operations. Thinking through the cyber attack scenarios and the changing threat landscape will help you understand how your business might be targeted and how to configure your defences. SECURITY IS THE RESPONSIBILITY OF ALL At KPMG we focus our approach on making best use of an organisation s scarce resources. We start at the beginning with a concept of secure by design, where money is invested early in the development lifecycle to achieve greater impact. By focusing on building solid foundations, you can underpin your security operations with leadership, sponsorship and governance. This helps set the conditions for the right culture where everyone recognises that security is the responsibility of all, and each individual understands the part that they can and must play. Having the confidence to transform in this way integrates strategy, policy, governance, organisation, process, skills and technology. We believe that businesses who accept cyber attacks as an inevitable part of today s business landscape and who build in proactive safeguards and responses, will secure the future of their business. Feel Free A new approach to cyber security 08

WE ARE... AWARD WINNING Whether it s SC Magazine or the MCA Awards, KPMG shines in independent recognition. Forrester also recognises KPMG as a leader in Information Security Consulting, highlighting our strong focus and ability to take on challenging engagements. INDEPENDENT We are not tied to any technology or software vendor. All of our recommendations and technical strategies are based solely on what is fit and appropriate for your business. GLOBAL, LOCAL We have over 2,000 security practitioners working in KPMG s network of firms, giving us the ability to orchestrate and deliver to consistently high standards globally. KPMG member firms can service your local needs from information security strategy and change programmes, to technical assessments, forensic investigations, incident response, training, and even ISO 27001 certification. COLLABORATIVE We facilitate and work with collaborative forums to bring together the best minds in the industry to collectively solve shared challenges. KPMG s I-4 forum brings together over 50 of the world s biggest organisations to discuss emerging issues and solutions. TRUSTED We have a long list of certifications and permits to work on engagements for the world s leading organisations. 09 Feel Free A new approach to cyber security

THE DIGITAL ENVIRONMENT PRESENTS MANY OPPORTUNITIES FOR BUSINESSES THAT WANT TO SEEK OUT NEW MARKETS AND ARE PREPARED TO INVEST IN TRANSFORMATIONAL CHANGE Feel Free A new approach to cyber security 10

CONTACT US KPMG AG Badenerstrasse 172 PO Box CH-8036 Zurich kpmg.ch Matthias Bossardt Partner, Cyber Security T: +41 58 249 36 98 E: mbossardt@kpmg.com The information contained herein is of a general nature and is not intended to address the circumstances of any particular individual or entity. Although we endeavor to provide accurate and timely information, there can be no guarantee that such information is accurate as of the date it is received, or that it will continue to be accurate in the future. No one should act on such information without appropriate professional advice after a thorough examination of the particular situation. The scope of any potential collaboration with audit clients is defined by regulatory requirements governing auditor independence. 2018 KPMG AG is a subsidiary of KPMG Holding AG, which is a member of the KPMG network of independent firms affiliated with KPMG International Cooperative ( KPMG International ), a Swiss legal entity. All rights reserved.