Cybersecurity and the role of internal audit An urgent call to action

Similar documents
Cybersecurity and the role of internal audit An urgent call to action

Achieving effective risk management and continuous compliance with Deloitte and SAP

CFOs in a new global environment Sandy Cockrell, Deloitte

Risk Advisory Academy Training Brochure

Real estate predictions 2017 What changes lie ahead?

Are we breached? Deloitte's Cyber Threat Hunting

Emerging Technologies The risks they pose to your organisations

Managing Cyber Risk. Robert Entin Executive Vice President Chief Information Officer Vornado Realty Trust

Cyber Risk Services Going beyond limits

INTELLIGENCE DRIVEN GRC FOR SECURITY

Cybersecurity Fortification Initiative (CFI) infrastructure whitepaper

THE POWER OF TECH-SAVVY BOARDS:

The New Healthcare Economy is rising up

Cyber Security: Are digital doors still open?

Customer Breach Support A Deloitte managed service. Notifying, supporting and protecting your customers through a data breach

CYBER RESILIENCE & INCIDENT RESPONSE

The value of visibility. Cybersecurity risk management examination

Standing Together for Financial Industry Resilience Quantum Dawn 3 After-Action Report. November 19, 2015

Security and Privacy Governance Program Guidelines

Digital Directors: The board s role in the cyber world. Thio Tse Gan, Southeast Asia Leader - Cyber Security

Vulnerability Management. June Risk Advisory

Cyber Risks in the Boardroom Conference

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security

Cyber Security is it a boardroom issue?

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT

Why you should adopt the NIST Cybersecurity Framework

Tackling Cybersecurity with Data Analytics. Identifying and combatting cyber fraud

Anticipating the wider business impact of a cyber breach in the health care industry

The Deloitte-NASCIO Cybersecurity Study Insights from

Cybersecurity Presidential Policy Directive Frequently Asked Questions. kpmg.com

Cyber Espionage A proactive approach to cyber security

Data Protection. Practical Strategies for Getting it Right. Jamie Ross Data Security Day June 8, 2016

Integrating Cyber Security with Business Continuity Management to Build the Resilient Enterprise

ICBA Summary of FFIEC Cybersecurity Assessment Tool (May 2017 Update)

Cybersecurity, safety and resilience - Airline perspective

Multi-factor authentication enrollment guide for Deloitte client or business partner user

The Future of IT Internal Controls Automation: A Game Changer. January Risk Advisory

MITIGATE CYBER ATTACK RISK

2015 VORMETRIC INSIDER THREAT REPORT

Cyber Incident Response. Prepare for the inevitable. Respond to evolving threats. Recover rapidly. Cyber Incident Response

Cybersecurity and the Board of Directors

ISO COMPLIANCE GUIDE. How Rapid7 Can Help You Achieve Compliance with ISO 27002

Balancing Compliance and Operational Security Demands. Nov 2015 Steve Winterfeld

Canada Highlights. Cybersecurity: Do you know which protective measures will make your company cyber resilient?

Headline Verdana Bold

Protecting your data. EY s approach to data privacy and information security

Effective Cyber Incident Response in Insurance Companies

Plan a Pragmatic Approach to the new EU Data Privacy Regulation

Keys to a more secure data environment

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE

CYBER SOLUTIONS & THREAT INTELLIGENCE

Run the business. Not the risks.

NYDFS Cybersecurity Regulations: What do they mean? What is their impact?

10 Cybersecurity Questions for Bank CEOs and the Board of Directors

Technology Risk Management in Banking Industry. Rocky Cheng General Manager, Information Technology, Bank of China (Hong Kong) Limited

IT SECURITY OFFICER. Department: Information Technology. Pay Range: Professional 18

BHConsulting. Your trusted cybersecurity partner

CISO as Change Agent: Getting to Yes

Global Security Consulting Services, compliancy and risk asessment services

Achieving third-party reporting proficiency with SOC 2+

Building and Testing an Effective Incident Response Plan

Stephanie Zierten Associate Counsel Federal Reserve Bank of Boston

SOC for cybersecurity

Insider Threat Program: Protecting the Crown Jewels. Monday, March 2, 2:15 pm - 3:15 pm

STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE

locuz.com SOC Services

Cyber Risk Program Maturity Assessment UNDERSTAND AND MANAGE YOUR ORGANIZATION S CYBER RISK.

Big data privacy in Australia

Cyber Security Incident Response Fighting Fire with Fire

People risk. Capital risk. Technology risk

State of South Carolina Interim Security Assessment

Business continuity management and cyber resiliency

Sage Data Security Services Directory

Avanade s Approach to Client Data Protection

13.f Toronto Catholic District School Board's IT Strategic Review - Draft Executive Summary (Refer 8b)

Cybersecurity in Higher Ed

Cybersecurity. Securely enabling transformation and change

EU General Data Protection Regulation (GDPR) Achieving compliance

Incident Response Services to Help You Prepare for and Quickly Respond to Security Incidents

Cybersecurity: Considerations for Internal Audit. Gina Gondron Senior Manager Frazier & Deeter Geek Week August 10, 2016

Webcast title in Verdana Regular

Presented by Ingrid Fredeen and Pamela Passman. Copyright 2017NAVEXGlobal,Inc. AllRightsReserved. Page 0

CIPP/E CIPT. Data Protection Technologist (DPT) Training Bundle Official IAPP Training and Certification

MFA Enrollment Guide. Multi-Factor Authentication (MFA) Enrollment guide STAGE Environment

CYBER INSURANCE: MANAGING THE RISK

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO

Cybersecurity A Regulatory Perspective Sara Nielsen IT Manager Federal Reserve Bank of Kansas City

Oracle Data Cloud ( ODC ) Inbound Security Policies

RIMS Perk Session Protecting the Crown Jewels A Risk Manager's guide to cyber security March 18, 2015

New York Cybersecurity. New York Cybersecurity. Requirements for Financial Services Companies (23NYCRR 500) Solution Brief

Key Findings from the Global State of Information Security Survey 2017 Indonesian Insights

On the board s agenda US Cyber risk in the boardroom: Accelerating from acceptance to action

Boston Chapter AGA 2018 Regional Professional Development Conference Cyber Security MAY 2018

Continuous protection to reduce risk and maintain production availability

BHConsulting. Your trusted cybersecurity partner

GDPR: A QUICK OVERVIEW

Adopting SSAE 18 for SOC 1 reports

Engaging Executives and Boards in Cybersecurity Session 303, Feb 20, 2017 Sanjeev Sah, CISO, Texas Children s Hospital Jimmy Joseph, Senior Manager,

How to be cyber secure A practical guide for Australia s mid-size business

Transcription:

Cybersecurity and the role of internal audit An urgent call to action

The threat from cyberattacks is significant and continuously evolving. One estimate suggests that cybercrime could cost businesses over $2 trillion by 2019, nearly four times the estimated 2015 expense. 1 Many audit committees and boards have set an expectation for internal audit to understand and assess the organization's capabilities in managing the associated risks. Our experience shows that an effective first step for internal audit is to conduct a cyber risk assessment and distill the findings into a concise summary for the audit committee and board which will then drive a risk-based, multiyear cybersecurity internal audit plan. An ascending agenda item The forces driving business growth and efficiency contribute to a broad attack surface for cyber assaults (Figure 1). Internet, cloud, mobile, and social technologies, now mainstream, are platforms inherently oriented for sharing. Outsourcing, contracting, and remote workforces are shifting operational control. Data continues to expand along with requirements to protect it. And, attackers can range from hackers to nation states, all continuously innovating and subverting common controls, some beyond the reach of a country s law enforcement. Figure 1. Forces of cyber vulnerability Headline-making breaches, combined with growing government focus on cyber threats, have increased concern among corporate audit committees and boards of directors. In USA, Companies are expected to address potentially material cybersecurity risks and cyber incidents in the Management s Discussion and Analysis of Financial Condition and Results of Operations (MD&A). 2 In addition, Executive Order (EO) 13636, Improving Critical Infrastructure Cybersecurity, has highlighted the role of businesses in improving the nation s cybersecurity framework and the need to adapt to rapidly changing regulatory agency expectations and oversight. 3. Worldwide, a large number of Governments are growing concerns about cyberattacks affecting the nation s critical infrastructure, Three lines of defense Business units and the information technology (IT) function integrate cyber risk into day-to-day decision making and operations. This comprises an organization s first line of defense. The second line includes information and technology risk leaders who establish governance and oversight, monitor security operations, and take action as needed, often under the direction of the chief information security officer (CISO). Increasingly, many companies are recognizing the need for a third line of cyber defense independent review of security measures and performance by the internal audit function. Internal audit should play an integral role in assessing and identifying opportunities to strengthen enterprise security. At the same time, internal audit has a duty to inform the audit committee and board of directors that the controls for which they are responsible are in place and functioning correctly, a growing concern across boardrooms as directors face potential legal and financial liabilities. The why and how of cyber-risk assessment and defense Exploring an organization s cyber risks begins with three key questions: Who might attack? Are the perpetrators criminals, competitors, third party vendors, disgruntled insiders, agenda-driven hackers, or someone else? What are they after, and what business risks need to be mitigated? Do they want money or intellectual property? Is their goal to disrupt the business or ruin our reputation? Could health and safety risks be created? What tactics might they use? Will they go phishing, test system vulnerabilities, use stolen credentials, or enter networks through a compromised third party? Technology expansion Data growth Cyber risk Evolving business models Motivated attackers 1

Deloitte Advisory has identified a threepronged approach to help clients address the threats identified through examining these questions: Secure. Most organizations have established controls such as perimeter defenses, identity, and data protection to guard against known and emerging threats. Risk-focused programs prioritize controls in areas that align with top business risks. Vigilant. Threat intelligence, security monitoring, and behavioral and risk analyses are used to detect malicious or unauthorized activity such as application configuration changes or unusual data movement, and help the organization respond to the shifting threat landscape. Resilient. Incident response protocols, forensics, and business continuity and disaster recovery plans are put into action to recover as quickly as possible and reduce impact. Cybersecurity assessment framework a comprehensive approach Many internal audit functions have performed procedures around evaluating components of the organization s cyber security readiness. These targeted audits, such as attack and penetration procedures, are valuable, but do not provide assurance across the spectrum of cyber security risks. For internal audit to provide a comprehensive view of cyber security, and avoid providing a false sense of security by only performing targeted audits, a broad approach should be employed. Figure 2 portrays a cybersecurity assessment framework built on our recommended Secure.Vigilant.Resilient. TM concept. As shown, multiple security domains support each of the three themes. In assessing cybersecurity readiness, internal audit can benefit from understanding the capabilities within each of the 12 domains, how they are addressed today, and gaps that may exist within the organization. Exploring the who, what, and how questions posed above in the context of a secure, vigilant, and resilient organization provides the foundation for a broad internal audit cybersecurity assessment framework that will be an integral component of the organization s cyber defense initiatives. As used in this document, Deloitte Advisory refers to one or more of Deloitte Touche Tohmatsu Limited, a UK private company limited by guarantee ( DTTL ), its network of member firms, and their related entities. DTTL and each of its member firms are legally separate and independent entities. DTTL (also referred to as Deloitte Global ) does not provide services to clients. Please see www.deloitte.com/mm/about to learn more about our global network of member firms. Deloitte provides audit, consulting, financial advisory, risk advisory, tax and related services to public and private clients spanning multiple industries. Certain services may not be available to attest clients under the rules and regulations of public accounting. To learn more about how Deloitte s approximately 245,000 professionals make an impact that matters, please connect with us on Facebook, LinkedIn, or Twitter. 2

Figure 2. Forces of cyber vulnerability Resilient Vigilant Secure Cybersecurity risk and compliance Compliance monitoring Issue and corrective action planning Regulatory and exam Risk and compliance assessment and Integrated requirements and control framework Third-party Evaluation and selection Contrast and service initiation Ongoing monitoring Service termination Incident response and forensics Application security testing Threat modeling and intelligence Security event monitoring and logging Penetration testing Vulnerability Recover strategy, plans and procedures Testing and exercising Business impact analysis Business continuity planning Disaster recovery planning Secure development life cycle Secure build and testing Secure coding guidelines Application role design/access Security design/architecture Security/risk requirements Information and asset Information and asset classification and inventory Information records Physical and environment security controls Physical media handling Data classification and inventory Breach notification and Data loss prevention Data security strategy Data encryption and obfuscation Records and mobile device Change Configuration Network defense Security operations Security architecture Security direction and strategy Security budget and finance Policy and standards Exception Talent strategy Account provisioning Privileged user Access certification Threat and vulnerability Data and protection Risk analytics Crisis and resiliency Security operations Security program and talent Identity and access Access and governance Information gathering and analysis around: User, account, entity Events/incidents Fraud and anti-money laundering Operational loss Security awareness and training Security training Security awareness Third-party responsibilities SOX (financially relevant systems only) Penetration and vulnerability testing BCP/DRP testing 3

Notably, roles and responsibilities within the framework are not limited to the IT organization, but span the entire enterprise. For example, data and protection, elements of vigilance shown in Figure 2, are put in the hands of managers and employees across the business to define what their data is. This responsibility exists up and down the organization, with even CEOs tasked to assess the risk exposures in their memos and other communications. Other important considerations can include the limited scope of existing IT audits and the lack of internal audit review of certain capabilities. Color highlights in the framework indicate that Sarbanes-Oxley testing, penetration and vulnerability testing, and business continuity and disaster recovery testing each address certain elements of the Secure.Vigilant.Resilient. TM framework. However, numerous other risks may be missed in the IT function s general computer controls testing, for example, the non-highlighted vigilance functions of threat modeling and security event monitoring, and the resilience functions of recovery, testing and exercising. An internal audit cyber-risk assessment could identify these gaps, leading to war gaming scenarios and exercising to spotlight critical questions. Who should a threat recipient alert to the danger? How does the organization respond? If a ransom is demanded, should we pay it? Several factors are noteworthy as internal audit professionals consider and conduct a cybersecurity assessment. First, it is vital to involve people with the necessary experience and skills. Internal audit has the know-how to conduct assessments. However, understanding whether the IT department or the CISO is doing a robust job of threat modeling can require subject matter specialists who know effective questions to ask. A tech-oriented audit professional versed in the cyber world can be an indispensable resource. It s also important to evaluate the full cybersecurity framework, rather than cherry pick items. This evaluation involves understanding the current state against framework characteristics, where the organization is going, and the minimum expected cybersecurity practices across the industry or business sector. Finally, the initial assessment should be a broad evaluation. It is not intended to be an exhaustive analysis requiring extensive testing. Instead, the initial assessment should drive additional risk-based cybersecurity deep dive reviews. Cyber risk assessment an important starting point Maintaining and enhancing security capabilities can help mitigate cyber threats and move the organization toward its desired level of cybersecurity maturity. By performing a comprehensive cyber risk assessment, internal audit can present objective perspectives and findings to the audit committee and board members, and use those findings to develop a broad internal audit plan that addresses the areas of cyber risk for the organization over a single or multi-year audit period. Performing risk assessments may be one strategy for organizations, or some may elect to use the maturity analysis approach. The maturity analysis approach can provide additional value to and those tasked with corporate governance by providing a quick visual reference that gives clear cues about areas they should explore further. With the proper subject matter expertise and involvement, a cyber risk assessment can also be structured to generate a list of cybersecurity gaps and provide the organization with a road-map for short and long-term remediation activities. Figure 3 presents an analysis built around the secure, vigilant, and resilient themes and is mapped to the themes 12 cybersecurity domains. The five maturity stages Initial, Managed, Defined, Predictable and Optimized reflect the progress the organization has made in maintaining and enhancing security capabilities to help mitigate cyber threats and achieve its desired maturity level. The green dotted lines lead to the level of maturity an organization is targeting, potentially identified in a remediation roadmap. As changes are implemented, the results should map to the location of the green dots. The board should agree to the desired maturity level upon completion of the work, at which point internal audit would test once again and come back to the board to confirm the targeted level has been achieved. 4

Figure 3. Sample risk assessment maturity analysis Stage 1: Initial Stage 2: Managed Stage 3: Defined Stage 4: Predictable Stage 5: Optimized Recognized the issue Ad-hoc/case by case Partially achieved goals No training, communication, or standardization Process is managed Responsibility defined Defined procedures with deviations Process reviews Defined process Communicated procedures Performance data collected Integrated with other processes Compliance oversight Defined quantitative performance thresholds and control limits Constant improvement Automation and tools implemented Managed to business objectives Continuously improved Improvement objectives defined Integrated with IT Automated workflow Improvements from new technology Maturity analysis Cybersecurity domain Initial Managed Defined Predictable Optimized Cybersecurity risk and compliance Third-party Secure Secure development life cycle Information and asset Security program and talent Identity and access Threat and vulnerability Vigilant Data and protection Risk analytics Crisis and resiliency Resilient Security operations Security awareness and training Current state CMMI maturity* Desired/Target state *The industry recognized Capability Maturity Model Integration (CMMI) can be used as the model for the assessment. Each domain consists of specific capabilities which are assessed and averaged to calculate an overall domain maturity. 5

A separate assessment scorecard should support the maturity evaluation, highlighting in detail the cyber risks surrounding people, process, and technology. Findings must be documented and recommendations made for closing identified gaps. Foundations of an internal audit plan for cybersecurity As noted earlier, the cyber-risk assessment underpins both the maturity analysis provided to the audit committee and board and the development of a riskbased, multiyear internal audit plan for cybersecurity. The multiyear plan can be developed through the results of the assessment, with some audits occurring at a higher frequency than others based upon urgency and consideration of other testing and assessment activities underway in the organization. The internal audit plan for cybersecurity is not set in stone. Adjustments can be made based on the emergence of new risks, changes in the relative intensity and importance of existing threats, and other organizational developments. Internal audit s role in strengthening cybersecurity Cyber risks continue to grow in frequency, variety, and the potential harm they can cause to companies, their trading partners, and their customers. Most businesses take these risks seriously, but more can be done, both to combat the dangers and to keep company leaders apprised of cybersecurity preparedness. Internal audit has a critical role in helping organizations in the ongoing battle of managing cyber threats, both by providing an independent assessment of existing and needed controls, and helping the audit committee and board understand and address the diverse risks of the digital world. 6

Contacts Contact us to further discuss internal audit s role in cybersecurity and how Deloitte Advisory is helping organization meet the expectations of boards and audit committees today. Rui Figueiredo Senior Manager Risk Asvisory rfigrdo@deloitte.com +95 99 6014 0501 Soe Win Country Managing Partner, Myanmar soewin@deloitte.com Victor Keong Partner Risk Advisory vkeong@deloitte.com Cheryl Khor Partner Risk Advisory ckhor@deloitte.com 7

Endnotes 1. Cybercrime will Cost Businesses Over $2 Trillion by 2019, Juniper Research, May 12, 2015, http://www.juniperresearch.com/press/press-releases/cybercrime-cost-businesses-over-2trillion. 2. CF Disclosure Guidance: Topic No. 2, US Securities and Exchange Commission, October 13, 2011, https://www.sec.gov/divisions/corpfin/guidance/cfguidance-topic2.htm. 3. Fact Sheet: Executive Order (EO) 13636 Improving Critical Infrastructure Cybersecurity and Presidential Policy Directive (PPD)-21 Critical Infrastructure Security and Resilience, US Department of Homeland Security, [undated], http://www.dhs.gov/publication/fact-sheet-eo-13636-improving-critical-infrastructure-cybersecurity-and-ppd- 21-critical. 4. The framework in Figure 2 aligns with industry standards including National Institute of Standards and Technology (NIST), International Organization for Standardization (ISO), Committee of Sponsoring Organizations (COSO) and Information Technology Infrastructure Library (ITIL). 8

Deloitte refers to one or more of Deloitte Touche Tohmatsu Limited, a UK private company limited by guarantee ( DTTL ), its network of member firms, and their related entities. DTTL and each of its member firms are legally separate and independent entities. DTTL (also referred to as Deloitte Global ) does not provide services to clients. Please see www.deloitte.com/my/about to learn more about our global network of member firms. Deloitte provides audit, consulting, financial advisory, risk advisory, tax and related services to public and private clients spanning multiple industries. Deloitte serves four out of five Fortune Global 500 companies through a globally connected network of member firms in more than 150 countries and territories bringing world-class capabilities, insights, and high-quality service to address clients most complex business challenges. To learn more about how Deloitte s approximately 245,000 professionals make an impact that matters, please connect with us on Facebook, LinkedIn, or Twitter. About Deloitte Southeast Asia Deloitte Southeast Asia Ltd a member firm of Deloitte Touche Tohmatsu Limited comprising Deloitte practices operating in Brunei, Cambodia, Guam, Indonesia, Lao PDR, Malaysia, Myanmar, Philippines, Singapore, Thailand and Vietnam was established to deliver measurable value to the particular demands of increasingly intraregional and fast growing companies and enterprises. Comprising 290 partners and over 7,400 professionals in 25 office locations, the subsidiaries and affiliates of Deloitte Southeast Asia Ltd combine their technical expertise and deep industry knowledge to deliver consistent high quality services to companies in the region. All services are provided through the individual country practices, their subsidiaries and affiliates which are separate and independent legal entities. About Deloitte in Myanmar In Myanmar, services are provided by Deloitte Touche Myanmar Vigour Advisory Ltd. and its affiliates. This communication contains general information only, and none of Deloitte Touche Tohmatsu Limited, its member firms, or their related entities (collectively, the Deloitte Network ) is, by means of this communication, rendering professional advice or services. Before making any decision or taking any action that may affect your finances or your business, you should consult a qualified professional adviser. No entity in the Deloitte Network shall be responsible for any loss whatsoever sustained by any person who relies on this communication. Copyright 2017 Deloitte Limited