SlideShare ist ein Scribd-Unternehmen logo
1 von 17
How to make
your enterprise
cyber resilient
Copyright © 2015 Accenture All rights reserved. 2Copyright © 2015 Accenture All rights reserved. 2
For more information, please visit: www.accenture.com/riskstudy2015
According to respondents from the 2015 Global Risk Research Study Cyber Risks
are set to rise and are high priority on the CRO agenda
74%
of insurance respondents expect cyber and IT
risks to become more severe
65%
of Banking respondents expect cyber risk
to become more severe
58%
of capital markets respondents expect an increase
in the severity of cyber risks
Cyber & IT Security Risk in Financial Services
Copyright © 2015 Accenture All rights reserved. 3
What is Cyber Risk?
Cyber
Risk
Reputational Risk
• Loss of Trust (internal and external)
• Brand Damage / Loss of Intangible Value
• Time intensive / costly to repair
• Need to embrace Digital
Technology and Operational Risk
• Failure of infrastructure, processes or systems
• Inability to operate/Run the business
• Requires regular planning and oversight
• Importance of effective and current controls
Fraud and Financial Crime
• Lost revenue and profit – high cost
• High velocity and high frequency/relentless
• Need to stay close to regulatory agenda
• Requires both business and technology solutions
Sources
of Cyber Risk
• Hacktivism
• Hacker / Lone Wolf
• Nation State Attacks
• Insider Data Leakage
• Social Engineering
Internal Origins
of Cyber Risk
• Digital Banking Services
• Payments
• Electronic Trading
• Third Parties
• Technology Infrastructure
Cyber Risk can manifest itself across several dimensions, making
it difficult to detect, measure, and control
Copyright © 2015 Accenture All rights reserved. 4
Protecting Against the Cyber Threat
is not a New Problem
• Linear or horizontal approach
is not working
• Large Institutions lack
the facts and processes
• Challenge to understand
what information needs to
be protected and the most
effective set of defense
mechanisms
• Companies that spend more
on cyber resiliency do not
necessarily manage cyber
resilience risk in a more
mature way
Cyber resilience is a continual challenge due to the exponential rate at
which people, processes and organization are connected digitally
Historical Methods
• It’s not possible to isolate
the risk
• Cyber risk does not respect
your organizational structure
• It’s not just a technology
problem, but rather
a technology, process
and people problem
• Firm that invest in and develop
cyber capabilities to instill trust
will have an competitive edge
in the digital era
New Paradigm
Copyright © 2015 Accenture All rights reserved. 5
Resilience
• Downtime/Loss of service
• Theft/Fraud
• Loss of data
• Impact to reputation/brand
The ability to operate the business processes in normal and adverse
scenarios without adverse outcomes
• Secure processes and systems
• Strong controls
• A strong risk culture
• Digitized/Automated processes
Resilient businesses have: Resilience Prevents:
Copyright © 2015 Accenture All rights reserved. 6
A Comprehensive Approach helps Protect the Full Breadth
of Entry Points and Operations which Underpin Financial
Services Organizations
Detect
IdentifyRespond
Prevent
Detection and
Identification – Tools
and metrics to identify
and log aspects to
manage operations
Operational Monitoring –
Aligning the tools to identify and
detect threats along with their
escalation and oversight
Event Response Plan – Structure
to identify and manage action plans
Business and IT
Controls – Oversight of
the controls and their testing
programs and how to leverage
COBIT®, ISA, ISO/IEC, NIST*
controls
Operating Model –
Specifying the structure with
people, organization, roles, tools
and processes to govern.
Crisis Management –
Structure to manage incidents
and notify impacted parties
Risk Events - Scenarios
which can impact the organization
specific to Cyber threats
Risk Identification – Aggregated set
of typical risk associated with Cyber Risk
How do we
respond?
What is the
impact?
How do we
organize?
How do we
monitor?
Copyright © 2015 Accenture All rights reserved. 7
Measurement with a Purpose
Observations and Hypotheses
• Customers
• Employees
• Partner/Third
Parties
• Business
Process
• Support
Process
• Other Process
• Software
• Configurations
• Access
Management
1. Without the right metrics, Cyber Risk
could become diluted and mis-
aligned to business value
2. Historical key performance indicators
(KPIs) may not provide insights
3. Board-level reporting has no clear
standards and could be out of sync
with the real threats
4. Techniques to model the scenarios,
risk events and residual risk across
the firm are not focused on cyber
threats
Process Technology
People
Copyright © 2015 Accenture All rights reserved. 8
Measurement with a Purpose
Common categories to consider for Cyber Risk Reporting
1. Board-Level Reporting 2. IT Risks 3. Operational
4. Advanced
Analytics
Infrastructure
Third Parties
SoftwareInternal
Employee Training
Data Loss Prevention
Employee Monitoring
External
Vulnerabilities
Surveillance
Funding
Risk/Reward
Decisions
IT Operations
Fraud
Target Residual Risk
Access
Management
Physical SecurityHigh Crimes and
Investigation
New FocusRenewed focus
Copyright © 2015 Accenture All rights reserved. 9
Embed the first line of defense within technology organization.
Create a centralized office with technology control officers across
business lines which just focus upon IT.
Cyber Risk Operating Models
An operating model helps define the organization’s accountability for
doing the work, supporting the right decisions and measure effectiveness
Centralize an entire department as 2nd line of defense with
examinations across the lines of business. Build highly specialized
team and track similar to compliance function.
Policy setting organization and influencer similar to data and
privacy. Develop risk frameworks around IT, Data integrity, and
operations and run as 2nd line of defense.
Create an enterprise-wide risk function dedicated to identify,
measure and respond to threats.
Option 1 – Dedicated
Function
Option 0 – IT Centric
Option 2 – Cyber Czar
Option 3 – Risk Led
Copyright © 2015 Accenture All rights reserved. 10
Operating Model Analysis
Each option should consider the tradeoffs with the firm’s ability to Prevent
and Detect Threats
Efficiency
Ability to Prevent and Detect Threats
Low
High
High
Option 0 – IT Centric
Option 1 – Dedicated
Function
Option 2 – Cyber Czar
Option 3 – Risk Led
Copyright © 2015 Accenture All rights reserved. 11
Operating Model Analysis
Each option should consider the tradeoffs with the firm’s ability to Prevent
and Detect Threats
Ability to Prevent and Detect Threats
Low
High
High
ValuetoCustomer
Option 0 – IT Centric
Option 1 – Dedicated
Function
Option 2 – Cyber Czar
Option 3 – Risk Led
Copyright © 2015 Accenture All rights reserved. 12
Operating Model Analysis
Each option should consider the tradeoffs with the firm’s ability to Prevent
and Detect Threats
Ability to Prevent and Detect Threats
Low
High
High
SpeedtoExecute
Option 0 – IT Centric
Option 1 – Dedicated
Function
Option 2 – Cyber Czar
Option 3 – Risk Led
Copyright © 2015 Accenture All rights reserved. 13
1. Training and Risk Culture – Taking your unique organization and infusing
the right cyber risk behaviors
2. Controls – Where are the weak points – build robust set of controls across
operations, business and IT
3. Measurement with a Purpose – What is going on without you knowing it –
creating metrics which help expose the risks
4. Operating Model – How do you work with the rest of the organization -
assigning clear lines of accountability and ownership
5. Resilience – At some point it will go wrong, how do you get the best
outcome from the worst situation?
The Top 5 Priorities to Get Right
Cyber Risk does not fit neatly into a single organization node to then be
managed and mitigated effectively
Copyright © 2015 Accenture All rights reserved. 14
A risk-based approach helps to set
priorities, establish a risk appetite (and
a budget) and bring order and priority in
place of reaction
Holistic Capabilities to help Deliver
Resilient Solutions
More institutions are focusing on a
better way to address the challenges of
cyber risk, but few have mastered it
Establish effective controls for people,
process and technology to facilitate effective
surveillance and improved incident
response to deliver resilient solutions
Glossary
COBIT: Control Objectives for Information and Related Technology. COBIT® is
a trademark of ISACA® registered in the United States and other countries.
ISA: Information Society of Automation
ISO: International Organization for Standardization
IEC: International Electrotechnical Commission
NIST: National Institute of Standards and Technology
How to Make your Enterprise Cyber
Resilient
Disclaimer:
This presentation is intended for general informational purposes only and does not take into
account the reader’s specific circumstances, and may not reflect the most current
developments. Accenture disclaims, to the fullest extent permitted by applicable law, any
and all liability for the accuracy and completeness of the information in this presentation and
for any acts or omissions made based on such information. Accenture does not provide
legal, regulatory, audit, or tax advice. Readers are responsible for obtaining such advice
from their own legal counsel or other licensed professionals.
About Accenture
Accenture is a global management consulting, technology services and outsourcing
company, with more than 358,000 people serving clients in more than 120 countries.
Combining unparalleled experience, comprehensive capabilities across all industries and
business functions, and extensive research on the world’s most successful companies,
Accenture collaborates with clients to help them become high-performance businesses and
governments. The company generated net revenues of US$31.0 billion for the fiscal year
ended Aug. 31, 2015. Its home page is www.accenture.com.
Accenture, its logo, and High Performance Delivered are trademarks of Accenture.
Learn more about cyber risk and resilience:
www.accenture.com/CyberRisk

Weitere ähnliche Inhalte

Was ist angesagt?

Outside the (Black) Box: Protecting Core Operations in Energy
Outside the (Black) Box: Protecting Core Operations in EnergyOutside the (Black) Box: Protecting Core Operations in Energy
Outside the (Black) Box: Protecting Core Operations in Energyaccenture
 
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...Accenture Technology
 
Accenture Cloud Platform: Control, Manage and Govern the Enterprise Cloud
Accenture Cloud Platform: Control, Manage and Govern the Enterprise CloudAccenture Cloud Platform: Control, Manage and Govern the Enterprise Cloud
Accenture Cloud Platform: Control, Manage and Govern the Enterprise CloudAccenture Operations
 
Technology Vision 2016 - Infographic
Technology Vision 2016 - InfographicTechnology Vision 2016 - Infographic
Technology Vision 2016 - InfographicAccenture Technology
 
Accenture High Performance Security Report 2016 For Communications
Accenture High Performance  Security Report 2016 For CommunicationsAccenture High Performance  Security Report 2016 For Communications
Accenture High Performance Security Report 2016 For Communicationsaccenture
 
The cyber security leap: From laggard to leader
The cyber security leap: From laggard to leaderThe cyber security leap: From laggard to leader
The cyber security leap: From laggard to leaderAccenture Australia
 
Accenture High Performance Security Report 2016 for Insurance
Accenture High Performance Security Report 2016 for InsuranceAccenture High Performance Security Report 2016 for Insurance
Accenture High Performance Security Report 2016 for InsuranceAccenture Insurance
 
Intelligent Security: Defending the Digital Business
Intelligent Security: Defending the Digital BusinessIntelligent Security: Defending the Digital Business
Intelligent Security: Defending the Digital Businessaccenture
 
2018 State of Cyber Resilience - New York
2018 State of Cyber Resilience - New York2018 State of Cyber Resilience - New York
2018 State of Cyber Resilience - New Yorkaccenture
 
Security Implications of Accenture Technology Vision 2015 - Executive Report
Security Implications of Accenture Technology Vision 2015 - Executive ReportSecurity Implications of Accenture Technology Vision 2015 - Executive Report
Security Implications of Accenture Technology Vision 2015 - Executive ReportAccenture Technology
 
Accenture Liquid Application Studio
Accenture Liquid Application StudioAccenture Liquid Application Studio
Accenture Liquid Application StudioAccenture Technology
 
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...Accenture Technology
 
Intelligent Infrastructures: Unlocking the Digital Business
Intelligent Infrastructures: Unlocking the Digital BusinessIntelligent Infrastructures: Unlocking the Digital Business
Intelligent Infrastructures: Unlocking the Digital Businessaccenture
 
Security Technology Vision 2016
Security Technology Vision 2016Security Technology Vision 2016
Security Technology Vision 2016Melissa Gilpin
 
Going Deep: Mining Experiential and Behavioral Data in VR
Going Deep: Mining Experiential and Behavioral Data in VRGoing Deep: Mining Experiential and Behavioral Data in VR
Going Deep: Mining Experiential and Behavioral Data in VRAccenture Technology
 
Digital Technology in Mining: Progress and Opportunity
Digital Technology in Mining: Progress and OpportunityDigital Technology in Mining: Progress and Opportunity
Digital Technology in Mining: Progress and Opportunityaccenture
 

Was ist angesagt? (18)

Security Technology Vision 2016
Security Technology Vision 2016Security Technology Vision 2016
Security Technology Vision 2016
 
Outside the (Black) Box: Protecting Core Operations in Energy
Outside the (Black) Box: Protecting Core Operations in EnergyOutside the (Black) Box: Protecting Core Operations in Energy
Outside the (Black) Box: Protecting Core Operations in Energy
 
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
 
Accenture Cloud Platform: Control, Manage and Govern the Enterprise Cloud
Accenture Cloud Platform: Control, Manage and Govern the Enterprise CloudAccenture Cloud Platform: Control, Manage and Govern the Enterprise Cloud
Accenture Cloud Platform: Control, Manage and Govern the Enterprise Cloud
 
Technology Vision 2016 - Infographic
Technology Vision 2016 - InfographicTechnology Vision 2016 - Infographic
Technology Vision 2016 - Infographic
 
Accenture High Performance Security Report 2016 For Communications
Accenture High Performance  Security Report 2016 For CommunicationsAccenture High Performance  Security Report 2016 For Communications
Accenture High Performance Security Report 2016 For Communications
 
The cyber security leap: From laggard to leader
The cyber security leap: From laggard to leaderThe cyber security leap: From laggard to leader
The cyber security leap: From laggard to leader
 
Accenture High Performance Security Report 2016 for Insurance
Accenture High Performance Security Report 2016 for InsuranceAccenture High Performance Security Report 2016 for Insurance
Accenture High Performance Security Report 2016 for Insurance
 
Intelligent Security: Defending the Digital Business
Intelligent Security: Defending the Digital BusinessIntelligent Security: Defending the Digital Business
Intelligent Security: Defending the Digital Business
 
2018 State of Cyber Resilience - New York
2018 State of Cyber Resilience - New York2018 State of Cyber Resilience - New York
2018 State of Cyber Resilience - New York
 
Security Implications of Accenture Technology Vision 2015 - Executive Report
Security Implications of Accenture Technology Vision 2015 - Executive ReportSecurity Implications of Accenture Technology Vision 2015 - Executive Report
Security Implications of Accenture Technology Vision 2015 - Executive Report
 
Accenture Liquid Application Studio
Accenture Liquid Application StudioAccenture Liquid Application Studio
Accenture Liquid Application Studio
 
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
 
Intelligent Infrastructures: Unlocking the Digital Business
Intelligent Infrastructures: Unlocking the Digital BusinessIntelligent Infrastructures: Unlocking the Digital Business
Intelligent Infrastructures: Unlocking the Digital Business
 
Cloud in the Boardroom
Cloud in the BoardroomCloud in the Boardroom
Cloud in the Boardroom
 
Security Technology Vision 2016
Security Technology Vision 2016Security Technology Vision 2016
Security Technology Vision 2016
 
Going Deep: Mining Experiential and Behavioral Data in VR
Going Deep: Mining Experiential and Behavioral Data in VRGoing Deep: Mining Experiential and Behavioral Data in VR
Going Deep: Mining Experiential and Behavioral Data in VR
 
Digital Technology in Mining: Progress and Opportunity
Digital Technology in Mining: Progress and OpportunityDigital Technology in Mining: Progress and Opportunity
Digital Technology in Mining: Progress and Opportunity
 

Andere mochten auch

Accenture Security Framework for AWS: Monetary Authority of Singapore Guidelines
Accenture Security Framework for AWS: Monetary Authority of Singapore GuidelinesAccenture Security Framework for AWS: Monetary Authority of Singapore Guidelines
Accenture Security Framework for AWS: Monetary Authority of Singapore GuidelinesAccenture Operations
 
Accenture Cloud-based Lab Reviews Case Study
Accenture Cloud-based Lab Reviews Case StudyAccenture Cloud-based Lab Reviews Case Study
Accenture Cloud-based Lab Reviews Case StudyAccenture Operations
 
Accenture Enkitec Group: Oracle database and Engineered Systems
Accenture Enkitec Group: Oracle database and Engineered SystemsAccenture Enkitec Group: Oracle database and Engineered Systems
Accenture Enkitec Group: Oracle database and Engineered SystemsAccenture Operations
 
The Six Distinctions of Procurement
The Six Distinctions of ProcurementThe Six Distinctions of Procurement
The Six Distinctions of ProcurementAccenture Operations
 
FusionX & Accenture: One Global Security Team
FusionX & Accenture: One Global Security TeamFusionX & Accenture: One Global Security Team
FusionX & Accenture: One Global Security TeamAccenture Operations
 
Accenture Spend Trends Report Q1 2015
Accenture Spend Trends Report Q1 2015Accenture Spend Trends Report Q1 2015
Accenture Spend Trends Report Q1 2015Accenture Operations
 
Collective Ingenuity against Cyber Attacks
Collective Ingenuity against Cyber AttacksCollective Ingenuity against Cyber Attacks
Collective Ingenuity against Cyber AttacksAccenture Operations
 
Herramientas de inteligencia comercial i serpa
Herramientas de inteligencia comercial i serpaHerramientas de inteligencia comercial i serpa
Herramientas de inteligencia comercial i serpaKatherine1704
 
¿Cómo generar más oportunidades de negocio? Inteligencia Comercial y Contrata...
¿Cómo generar más oportunidades de negocio? Inteligencia Comercial y Contrata...¿Cómo generar más oportunidades de negocio? Inteligencia Comercial y Contrata...
¿Cómo generar más oportunidades de negocio? Inteligencia Comercial y Contrata...euroalert
 
Ponencia en Adigital sobre herramientas de marketing automation
Ponencia en Adigital sobre herramientas de marketing automationPonencia en Adigital sobre herramientas de marketing automation
Ponencia en Adigital sobre herramientas de marketing automationDavid Lastra
 

Andere mochten auch (16)

Accenture Security Framework for AWS: Monetary Authority of Singapore Guidelines
Accenture Security Framework for AWS: Monetary Authority of Singapore GuidelinesAccenture Security Framework for AWS: Monetary Authority of Singapore Guidelines
Accenture Security Framework for AWS: Monetary Authority of Singapore Guidelines
 
Accenture Cloud-based Lab Reviews Case Study
Accenture Cloud-based Lab Reviews Case StudyAccenture Cloud-based Lab Reviews Case Study
Accenture Cloud-based Lab Reviews Case Study
 
Technology Vision 2016 - Overview
Technology Vision 2016 - OverviewTechnology Vision 2016 - Overview
Technology Vision 2016 - Overview
 
Accenture Enkitec Group: Oracle database and Engineered Systems
Accenture Enkitec Group: Oracle database and Engineered SystemsAccenture Enkitec Group: Oracle database and Engineered Systems
Accenture Enkitec Group: Oracle database and Engineered Systems
 
The Promise of as-a-Service
The Promise of as-a-ServiceThe Promise of as-a-Service
The Promise of as-a-Service
 
The Six Distinctions of Procurement
The Six Distinctions of ProcurementThe Six Distinctions of Procurement
The Six Distinctions of Procurement
 
Security Technology Vision 2016
Security Technology Vision 2016Security Technology Vision 2016
Security Technology Vision 2016
 
FusionX & Accenture: One Global Security Team
FusionX & Accenture: One Global Security TeamFusionX & Accenture: One Global Security Team
FusionX & Accenture: One Global Security Team
 
Accenture Spend Trends Report Q1 2015
Accenture Spend Trends Report Q1 2015Accenture Spend Trends Report Q1 2015
Accenture Spend Trends Report Q1 2015
 
Collective Ingenuity against Cyber Attacks
Collective Ingenuity against Cyber AttacksCollective Ingenuity against Cyber Attacks
Collective Ingenuity against Cyber Attacks
 
Technology Vision 2017 - Overview
Technology Vision 2017 - OverviewTechnology Vision 2017 - Overview
Technology Vision 2017 - Overview
 
Reinvenciones digitales: las empresas en Internet - Universidad de Cantabria
Reinvenciones digitales: las empresas en Internet - Universidad de CantabriaReinvenciones digitales: las empresas en Internet - Universidad de Cantabria
Reinvenciones digitales: las empresas en Internet - Universidad de Cantabria
 
Herramientas de inteligencia comercial i serpa
Herramientas de inteligencia comercial i serpaHerramientas de inteligencia comercial i serpa
Herramientas de inteligencia comercial i serpa
 
Trade map
Trade mapTrade map
Trade map
 
¿Cómo generar más oportunidades de negocio? Inteligencia Comercial y Contrata...
¿Cómo generar más oportunidades de negocio? Inteligencia Comercial y Contrata...¿Cómo generar más oportunidades de negocio? Inteligencia Comercial y Contrata...
¿Cómo generar más oportunidades de negocio? Inteligencia Comercial y Contrata...
 
Ponencia en Adigital sobre herramientas de marketing automation
Ponencia en Adigital sobre herramientas de marketing automationPonencia en Adigital sobre herramientas de marketing automation
Ponencia en Adigital sobre herramientas de marketing automation
 

Ähnlich wie How to Make Your Enterprise Cyber Resilient

Credit Union Cyber Security
Credit Union Cyber SecurityCredit Union Cyber Security
Credit Union Cyber SecurityStacy Willis
 
2016 Risk Management Workshop
2016 Risk Management Workshop2016 Risk Management Workshop
2016 Risk Management WorkshopStacy Willis
 
The myth of secure computing; management information system; MIS
The myth of secure computing; management information system; MISThe myth of secure computing; management information system; MIS
The myth of secure computing; management information system; MISSaazan Shrestha
 
What is the UK Cyber Essentials scheme?
What is the  UK Cyber Essentials scheme?What is the  UK Cyber Essentials scheme?
What is the UK Cyber Essentials scheme?IT Governance Ltd
 
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016FERMA
 
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoftHow Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoftOSIsoft, LLC
 
GDPR | Cyber security process resilience
GDPR | Cyber security process resilienceGDPR | Cyber security process resilience
GDPR | Cyber security process resilienceRishi Kant
 
Risk Management Approach to Cyber Security
Risk Management  Approach to Cyber Security Risk Management  Approach to Cyber Security
Risk Management Approach to Cyber Security Ernest Staats
 
MCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationMCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationWilliam McBorrough
 
10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should KnowIBM Security
 
Broadening Your Cybersecurity Mindset
Broadening Your Cybersecurity MindsetBroadening Your Cybersecurity Mindset
Broadening Your Cybersecurity MindsetCSI Solutions
 
Audit and Compliance BDR Knowledge Training
Audit and Compliance BDR Knowledge TrainingAudit and Compliance BDR Knowledge Training
Audit and Compliance BDR Knowledge TrainingTory Quinton
 
Luncheon 2015-11-19 - Lessons Learned from Avid Life Media by Rob Davis
Luncheon 2015-11-19 - Lessons Learned from Avid Life Media by Rob DavisLuncheon 2015-11-19 - Lessons Learned from Avid Life Media by Rob Davis
Luncheon 2015-11-19 - Lessons Learned from Avid Life Media by Rob DavisNorth Texas Chapter of the ISSA
 
Limit your vulnerabilities: Assess. Develop. Protect.
Limit your vulnerabilities: Assess. Develop. Protect.Limit your vulnerabilities: Assess. Develop. Protect.
Limit your vulnerabilities: Assess. Develop. Protect.accenture
 
Item46763
Item46763Item46763
Item46763madunix
 
Cyber risk management-white-paper-v8 (2) 2015
Cyber risk management-white-paper-v8 (2) 2015Cyber risk management-white-paper-v8 (2) 2015
Cyber risk management-white-paper-v8 (2) 2015Accounting_Whitepapers
 
2010 06 gartner avoiding audit fatigue in nine steps 1d
2010 06 gartner   avoiding audit fatigue in nine steps 1d2010 06 gartner   avoiding audit fatigue in nine steps 1d
2010 06 gartner avoiding audit fatigue in nine steps 1dGene Kim
 

Ähnlich wie How to Make Your Enterprise Cyber Resilient (20)

Credit Union Cyber Security
Credit Union Cyber SecurityCredit Union Cyber Security
Credit Union Cyber Security
 
2016 Risk Management Workshop
2016 Risk Management Workshop2016 Risk Management Workshop
2016 Risk Management Workshop
 
Strategic Cybersecurity
Strategic CybersecurityStrategic Cybersecurity
Strategic Cybersecurity
 
The myth of secure computing; management information system; MIS
The myth of secure computing; management information system; MISThe myth of secure computing; management information system; MIS
The myth of secure computing; management information system; MIS
 
What is the UK Cyber Essentials scheme?
What is the  UK Cyber Essentials scheme?What is the  UK Cyber Essentials scheme?
What is the UK Cyber Essentials scheme?
 
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
 
Secure Iowa Oct 2016
Secure Iowa Oct 2016Secure Iowa Oct 2016
Secure Iowa Oct 2016
 
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoftHow Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
 
GDPR | Cyber security process resilience
GDPR | Cyber security process resilienceGDPR | Cyber security process resilience
GDPR | Cyber security process resilience
 
Risk Management Approach to Cyber Security
Risk Management  Approach to Cyber Security Risk Management  Approach to Cyber Security
Risk Management Approach to Cyber Security
 
MCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationMCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service Presentation
 
10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know
 
Broadening Your Cybersecurity Mindset
Broadening Your Cybersecurity MindsetBroadening Your Cybersecurity Mindset
Broadening Your Cybersecurity Mindset
 
Audit and Compliance BDR Knowledge Training
Audit and Compliance BDR Knowledge TrainingAudit and Compliance BDR Knowledge Training
Audit and Compliance BDR Knowledge Training
 
Luncheon 2015-11-19 - Lessons Learned from Avid Life Media by Rob Davis
Luncheon 2015-11-19 - Lessons Learned from Avid Life Media by Rob DavisLuncheon 2015-11-19 - Lessons Learned from Avid Life Media by Rob Davis
Luncheon 2015-11-19 - Lessons Learned from Avid Life Media by Rob Davis
 
Limit your vulnerabilities: Assess. Develop. Protect.
Limit your vulnerabilities: Assess. Develop. Protect.Limit your vulnerabilities: Assess. Develop. Protect.
Limit your vulnerabilities: Assess. Develop. Protect.
 
Item46763
Item46763Item46763
Item46763
 
Cyber risk management-white-paper-v8 (2) 2015
Cyber risk management-white-paper-v8 (2) 2015Cyber risk management-white-paper-v8 (2) 2015
Cyber risk management-white-paper-v8 (2) 2015
 
Data Protection Governance IT
Data Protection Governance ITData Protection Governance IT
Data Protection Governance IT
 
2010 06 gartner avoiding audit fatigue in nine steps 1d
2010 06 gartner   avoiding audit fatigue in nine steps 1d2010 06 gartner   avoiding audit fatigue in nine steps 1d
2010 06 gartner avoiding audit fatigue in nine steps 1d
 

Mehr von Accenture Operations

Making Finance the Predictive Powerhouse | SlideShare | Accenture
Making Finance the Predictive Powerhouse | SlideShare | AccentureMaking Finance the Predictive Powerhouse | SlideShare | Accenture
Making Finance the Predictive Powerhouse | SlideShare | AccentureAccenture Operations
 
Making Finance the Predictive Powerhouse | SlideShare | Accenture
Making Finance the Predictive Powerhouse | SlideShare | AccentureMaking Finance the Predictive Powerhouse | SlideShare | Accenture
Making Finance the Predictive Powerhouse | SlideShare | AccentureAccenture Operations
 
Making Finance the Predictive Powerhouse | SlideShare | Accenture
Making Finance the Predictive Powerhouse | SlideShare | AccentureMaking Finance the Predictive Powerhouse | SlideShare | Accenture
Making Finance the Predictive Powerhouse | SlideShare | AccentureAccenture Operations
 
Network Operations | SlideShare | Accenture
Network Operations | SlideShare | AccentureNetwork Operations | SlideShare | Accenture
Network Operations | SlideShare | AccentureAccenture Operations
 
Network Operations | SlideShare | Accenture
Network Operations | SlideShare | AccentureNetwork Operations | SlideShare | Accenture
Network Operations | SlideShare | AccentureAccenture Operations
 
Start your Sustainability Journey | SlideShare | Accenture
Start your Sustainability Journey | SlideShare | AccentureStart your Sustainability Journey | SlideShare | Accenture
Start your Sustainability Journey | SlideShare | AccentureAccenture Operations
 
Start your Sustainability Journey | SlideShare | Accenture
Start your Sustainability Journey | SlideShare | AccentureStart your Sustainability Journey | SlideShare | Accenture
Start your Sustainability Journey | SlideShare | AccentureAccenture Operations
 
The Changing Role of Compliance | Accenture
The Changing Role of Compliance | AccentureThe Changing Role of Compliance | Accenture
The Changing Role of Compliance | AccentureAccenture Operations
 
The Changing Role of Compliance | Accenture
The Changing Role of Compliance | AccentureThe Changing Role of Compliance | Accenture
The Changing Role of Compliance | AccentureAccenture Operations
 
Driving change: Unlocking data to transform the front office
Driving change: Unlocking data to transform the front officeDriving change: Unlocking data to transform the front office
Driving change: Unlocking data to transform the front officeAccenture Operations
 
Marketing Operations | SlideShare | Accenture
Marketing Operations | SlideShare | AccentureMarketing Operations | SlideShare | Accenture
Marketing Operations | SlideShare | AccentureAccenture Operations
 
The Value Multiplier | SlideShare | Accenture
The Value Multiplier | SlideShare | AccentureThe Value Multiplier | SlideShare | Accenture
The Value Multiplier | SlideShare | AccentureAccenture Operations
 
Intelligent Talent & HR Operations | SlideShare | Accenture
Intelligent Talent & HR Operations | SlideShare | AccentureIntelligent Talent & HR Operations | SlideShare | Accenture
Intelligent Talent & HR Operations | SlideShare | AccentureAccenture Operations
 
Intelligent Marketing Operations | SlideShare | Accenture
Intelligent Marketing Operations | SlideShare | AccentureIntelligent Marketing Operations | SlideShare | Accenture
Intelligent Marketing Operations | SlideShare | AccentureAccenture Operations
 
Elevate with Intelligent Supply Chain | SlideShare | Accenture
Elevate with Intelligent Supply Chain | SlideShare | AccentureElevate with Intelligent Supply Chain | SlideShare | Accenture
Elevate with Intelligent Supply Chain | SlideShare | AccentureAccenture Operations
 
Fast-Track to Future-Ready Finance Operations
Fast-Track to Future-Ready Finance OperationsFast-Track to Future-Ready Finance Operations
Fast-Track to Future-Ready Finance OperationsAccenture Operations
 
Elevate Every Decision with Intelligent Procurement
Elevate Every Decision with Intelligent ProcurementElevate Every Decision with Intelligent Procurement
Elevate Every Decision with Intelligent ProcurementAccenture Operations
 
Elevate Every Decision with Digital Inside Sales
Elevate Every Decision with Digital Inside SalesElevate Every Decision with Digital Inside Sales
Elevate Every Decision with Digital Inside SalesAccenture Operations
 
Fast Track to Future Ready Banking Operations
Fast Track to Future Ready Banking OperationsFast Track to Future Ready Banking Operations
Fast Track to Future Ready Banking OperationsAccenture Operations
 
Fast-Track to Future-Ready Insurance Operations
Fast-Track to Future-Ready Insurance OperationsFast-Track to Future-Ready Insurance Operations
Fast-Track to Future-Ready Insurance OperationsAccenture Operations
 

Mehr von Accenture Operations (20)

Making Finance the Predictive Powerhouse | SlideShare | Accenture
Making Finance the Predictive Powerhouse | SlideShare | AccentureMaking Finance the Predictive Powerhouse | SlideShare | Accenture
Making Finance the Predictive Powerhouse | SlideShare | Accenture
 
Making Finance the Predictive Powerhouse | SlideShare | Accenture
Making Finance the Predictive Powerhouse | SlideShare | AccentureMaking Finance the Predictive Powerhouse | SlideShare | Accenture
Making Finance the Predictive Powerhouse | SlideShare | Accenture
 
Making Finance the Predictive Powerhouse | SlideShare | Accenture
Making Finance the Predictive Powerhouse | SlideShare | AccentureMaking Finance the Predictive Powerhouse | SlideShare | Accenture
Making Finance the Predictive Powerhouse | SlideShare | Accenture
 
Network Operations | SlideShare | Accenture
Network Operations | SlideShare | AccentureNetwork Operations | SlideShare | Accenture
Network Operations | SlideShare | Accenture
 
Network Operations | SlideShare | Accenture
Network Operations | SlideShare | AccentureNetwork Operations | SlideShare | Accenture
Network Operations | SlideShare | Accenture
 
Start your Sustainability Journey | SlideShare | Accenture
Start your Sustainability Journey | SlideShare | AccentureStart your Sustainability Journey | SlideShare | Accenture
Start your Sustainability Journey | SlideShare | Accenture
 
Start your Sustainability Journey | SlideShare | Accenture
Start your Sustainability Journey | SlideShare | AccentureStart your Sustainability Journey | SlideShare | Accenture
Start your Sustainability Journey | SlideShare | Accenture
 
The Changing Role of Compliance | Accenture
The Changing Role of Compliance | AccentureThe Changing Role of Compliance | Accenture
The Changing Role of Compliance | Accenture
 
The Changing Role of Compliance | Accenture
The Changing Role of Compliance | AccentureThe Changing Role of Compliance | Accenture
The Changing Role of Compliance | Accenture
 
Driving change: Unlocking data to transform the front office
Driving change: Unlocking data to transform the front officeDriving change: Unlocking data to transform the front office
Driving change: Unlocking data to transform the front office
 
Marketing Operations | SlideShare | Accenture
Marketing Operations | SlideShare | AccentureMarketing Operations | SlideShare | Accenture
Marketing Operations | SlideShare | Accenture
 
The Value Multiplier | SlideShare | Accenture
The Value Multiplier | SlideShare | AccentureThe Value Multiplier | SlideShare | Accenture
The Value Multiplier | SlideShare | Accenture
 
Intelligent Talent & HR Operations | SlideShare | Accenture
Intelligent Talent & HR Operations | SlideShare | AccentureIntelligent Talent & HR Operations | SlideShare | Accenture
Intelligent Talent & HR Operations | SlideShare | Accenture
 
Intelligent Marketing Operations | SlideShare | Accenture
Intelligent Marketing Operations | SlideShare | AccentureIntelligent Marketing Operations | SlideShare | Accenture
Intelligent Marketing Operations | SlideShare | Accenture
 
Elevate with Intelligent Supply Chain | SlideShare | Accenture
Elevate with Intelligent Supply Chain | SlideShare | AccentureElevate with Intelligent Supply Chain | SlideShare | Accenture
Elevate with Intelligent Supply Chain | SlideShare | Accenture
 
Fast-Track to Future-Ready Finance Operations
Fast-Track to Future-Ready Finance OperationsFast-Track to Future-Ready Finance Operations
Fast-Track to Future-Ready Finance Operations
 
Elevate Every Decision with Intelligent Procurement
Elevate Every Decision with Intelligent ProcurementElevate Every Decision with Intelligent Procurement
Elevate Every Decision with Intelligent Procurement
 
Elevate Every Decision with Digital Inside Sales
Elevate Every Decision with Digital Inside SalesElevate Every Decision with Digital Inside Sales
Elevate Every Decision with Digital Inside Sales
 
Fast Track to Future Ready Banking Operations
Fast Track to Future Ready Banking OperationsFast Track to Future Ready Banking Operations
Fast Track to Future Ready Banking Operations
 
Fast-Track to Future-Ready Insurance Operations
Fast-Track to Future-Ready Insurance OperationsFast-Track to Future-Ready Insurance Operations
Fast-Track to Future-Ready Insurance Operations
 

Kürzlich hochgeladen

/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In.../:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...lizamodels9
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africaictsugar
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?Olivia Kresic
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfRbc Rbcua
 
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...lizamodels9
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyotictsugar
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Riya Pathan
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaoncallgirls2057
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607dollysharma2066
 
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...lizamodels9
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis UsageNeil Kimberley
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...lizamodels9
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfpollardmorgan
 
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxContemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxMarkAnthonyAurellano
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdfKhaled Al Awadi
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607dollysharma2066
 
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...lizamodels9
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessSeta Wicaksana
 

Kürzlich hochgeladen (20)

/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In.../:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africa
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdf
 
Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)
 
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyot
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
 
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage
 
Corporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information TechnologyCorporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information Technology
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
 
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxContemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
 
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful Business
 

How to Make Your Enterprise Cyber Resilient

  • 1. How to make your enterprise cyber resilient
  • 2. Copyright © 2015 Accenture All rights reserved. 2Copyright © 2015 Accenture All rights reserved. 2 For more information, please visit: www.accenture.com/riskstudy2015 According to respondents from the 2015 Global Risk Research Study Cyber Risks are set to rise and are high priority on the CRO agenda 74% of insurance respondents expect cyber and IT risks to become more severe 65% of Banking respondents expect cyber risk to become more severe 58% of capital markets respondents expect an increase in the severity of cyber risks Cyber & IT Security Risk in Financial Services
  • 3. Copyright © 2015 Accenture All rights reserved. 3 What is Cyber Risk? Cyber Risk Reputational Risk • Loss of Trust (internal and external) • Brand Damage / Loss of Intangible Value • Time intensive / costly to repair • Need to embrace Digital Technology and Operational Risk • Failure of infrastructure, processes or systems • Inability to operate/Run the business • Requires regular planning and oversight • Importance of effective and current controls Fraud and Financial Crime • Lost revenue and profit – high cost • High velocity and high frequency/relentless • Need to stay close to regulatory agenda • Requires both business and technology solutions Sources of Cyber Risk • Hacktivism • Hacker / Lone Wolf • Nation State Attacks • Insider Data Leakage • Social Engineering Internal Origins of Cyber Risk • Digital Banking Services • Payments • Electronic Trading • Third Parties • Technology Infrastructure Cyber Risk can manifest itself across several dimensions, making it difficult to detect, measure, and control
  • 4. Copyright © 2015 Accenture All rights reserved. 4 Protecting Against the Cyber Threat is not a New Problem • Linear or horizontal approach is not working • Large Institutions lack the facts and processes • Challenge to understand what information needs to be protected and the most effective set of defense mechanisms • Companies that spend more on cyber resiliency do not necessarily manage cyber resilience risk in a more mature way Cyber resilience is a continual challenge due to the exponential rate at which people, processes and organization are connected digitally Historical Methods • It’s not possible to isolate the risk • Cyber risk does not respect your organizational structure • It’s not just a technology problem, but rather a technology, process and people problem • Firm that invest in and develop cyber capabilities to instill trust will have an competitive edge in the digital era New Paradigm
  • 5. Copyright © 2015 Accenture All rights reserved. 5 Resilience • Downtime/Loss of service • Theft/Fraud • Loss of data • Impact to reputation/brand The ability to operate the business processes in normal and adverse scenarios without adverse outcomes • Secure processes and systems • Strong controls • A strong risk culture • Digitized/Automated processes Resilient businesses have: Resilience Prevents:
  • 6. Copyright © 2015 Accenture All rights reserved. 6 A Comprehensive Approach helps Protect the Full Breadth of Entry Points and Operations which Underpin Financial Services Organizations Detect IdentifyRespond Prevent Detection and Identification – Tools and metrics to identify and log aspects to manage operations Operational Monitoring – Aligning the tools to identify and detect threats along with their escalation and oversight Event Response Plan – Structure to identify and manage action plans Business and IT Controls – Oversight of the controls and their testing programs and how to leverage COBIT®, ISA, ISO/IEC, NIST* controls Operating Model – Specifying the structure with people, organization, roles, tools and processes to govern. Crisis Management – Structure to manage incidents and notify impacted parties Risk Events - Scenarios which can impact the organization specific to Cyber threats Risk Identification – Aggregated set of typical risk associated with Cyber Risk How do we respond? What is the impact? How do we organize? How do we monitor?
  • 7. Copyright © 2015 Accenture All rights reserved. 7 Measurement with a Purpose Observations and Hypotheses • Customers • Employees • Partner/Third Parties • Business Process • Support Process • Other Process • Software • Configurations • Access Management 1. Without the right metrics, Cyber Risk could become diluted and mis- aligned to business value 2. Historical key performance indicators (KPIs) may not provide insights 3. Board-level reporting has no clear standards and could be out of sync with the real threats 4. Techniques to model the scenarios, risk events and residual risk across the firm are not focused on cyber threats Process Technology People
  • 8. Copyright © 2015 Accenture All rights reserved. 8 Measurement with a Purpose Common categories to consider for Cyber Risk Reporting 1. Board-Level Reporting 2. IT Risks 3. Operational 4. Advanced Analytics Infrastructure Third Parties SoftwareInternal Employee Training Data Loss Prevention Employee Monitoring External Vulnerabilities Surveillance Funding Risk/Reward Decisions IT Operations Fraud Target Residual Risk Access Management Physical SecurityHigh Crimes and Investigation New FocusRenewed focus
  • 9. Copyright © 2015 Accenture All rights reserved. 9 Embed the first line of defense within technology organization. Create a centralized office with technology control officers across business lines which just focus upon IT. Cyber Risk Operating Models An operating model helps define the organization’s accountability for doing the work, supporting the right decisions and measure effectiveness Centralize an entire department as 2nd line of defense with examinations across the lines of business. Build highly specialized team and track similar to compliance function. Policy setting organization and influencer similar to data and privacy. Develop risk frameworks around IT, Data integrity, and operations and run as 2nd line of defense. Create an enterprise-wide risk function dedicated to identify, measure and respond to threats. Option 1 – Dedicated Function Option 0 – IT Centric Option 2 – Cyber Czar Option 3 – Risk Led
  • 10. Copyright © 2015 Accenture All rights reserved. 10 Operating Model Analysis Each option should consider the tradeoffs with the firm’s ability to Prevent and Detect Threats Efficiency Ability to Prevent and Detect Threats Low High High Option 0 – IT Centric Option 1 – Dedicated Function Option 2 – Cyber Czar Option 3 – Risk Led
  • 11. Copyright © 2015 Accenture All rights reserved. 11 Operating Model Analysis Each option should consider the tradeoffs with the firm’s ability to Prevent and Detect Threats Ability to Prevent and Detect Threats Low High High ValuetoCustomer Option 0 – IT Centric Option 1 – Dedicated Function Option 2 – Cyber Czar Option 3 – Risk Led
  • 12. Copyright © 2015 Accenture All rights reserved. 12 Operating Model Analysis Each option should consider the tradeoffs with the firm’s ability to Prevent and Detect Threats Ability to Prevent and Detect Threats Low High High SpeedtoExecute Option 0 – IT Centric Option 1 – Dedicated Function Option 2 – Cyber Czar Option 3 – Risk Led
  • 13. Copyright © 2015 Accenture All rights reserved. 13 1. Training and Risk Culture – Taking your unique organization and infusing the right cyber risk behaviors 2. Controls – Where are the weak points – build robust set of controls across operations, business and IT 3. Measurement with a Purpose – What is going on without you knowing it – creating metrics which help expose the risks 4. Operating Model – How do you work with the rest of the organization - assigning clear lines of accountability and ownership 5. Resilience – At some point it will go wrong, how do you get the best outcome from the worst situation? The Top 5 Priorities to Get Right Cyber Risk does not fit neatly into a single organization node to then be managed and mitigated effectively
  • 14. Copyright © 2015 Accenture All rights reserved. 14 A risk-based approach helps to set priorities, establish a risk appetite (and a budget) and bring order and priority in place of reaction Holistic Capabilities to help Deliver Resilient Solutions More institutions are focusing on a better way to address the challenges of cyber risk, but few have mastered it Establish effective controls for people, process and technology to facilitate effective surveillance and improved incident response to deliver resilient solutions
  • 15. Glossary COBIT: Control Objectives for Information and Related Technology. COBIT® is a trademark of ISACA® registered in the United States and other countries. ISA: Information Society of Automation ISO: International Organization for Standardization IEC: International Electrotechnical Commission NIST: National Institute of Standards and Technology
  • 16. How to Make your Enterprise Cyber Resilient Disclaimer: This presentation is intended for general informational purposes only and does not take into account the reader’s specific circumstances, and may not reflect the most current developments. Accenture disclaims, to the fullest extent permitted by applicable law, any and all liability for the accuracy and completeness of the information in this presentation and for any acts or omissions made based on such information. Accenture does not provide legal, regulatory, audit, or tax advice. Readers are responsible for obtaining such advice from their own legal counsel or other licensed professionals. About Accenture Accenture is a global management consulting, technology services and outsourcing company, with more than 358,000 people serving clients in more than 120 countries. Combining unparalleled experience, comprehensive capabilities across all industries and business functions, and extensive research on the world’s most successful companies, Accenture collaborates with clients to help them become high-performance businesses and governments. The company generated net revenues of US$31.0 billion for the fiscal year ended Aug. 31, 2015. Its home page is www.accenture.com. Accenture, its logo, and High Performance Delivered are trademarks of Accenture.
  • 17. Learn more about cyber risk and resilience: www.accenture.com/CyberRisk

Hinweis der Redaktion

  1. Financial services organizations need to recognize the threats of cyber risk in a different way. Many have put in place thick walls to protect themselves. But the threats from a cyber event perspective are becoming more prolific. So although the walls are in place, the threats or activities to commit fraud or attack a firm are expanding. Organizations cannot protect themselves at all times from a cyber-related incident. So putting in place structures, technologies and processes to ensure resilience—or fast recovery—is as much or more important than simply putting more locks on the doors or building stronger walls.
  2. Historical Methods Linear or Horizontal Approach is not working – This is Network or matrix problem of technology, process and people Large Institutions lack the facts and processes to make and implement effective decisions about cyber resilience Large institutions do not systematically understand which information assets need to be protected, who are their attackers, what is their appetite or which is the most effective set of defense mechanisms Companies that spend more on cyber resiliency do not necessarily manage cyber resilience risk in a more mature way New Paradigm It is not possible to isolate the risk. The common notion of security implies isolation and it is impossible to draw a clear ring around cyber resilience. Weakest links are often customers and employees and third parties Not just a technology problem, but rather a technology, process and people problem Cyber risk does not respect your organizational structure i.e. the operating model for identifying, measuring and managing the risk does not match how firms are being attached. Firm that invest in and develop cyber capabilities to instill trust in customers, the public and its investors will have an competitive edge in the digital era
  3. Improve Communicate with senior management about the risk organizations impact on the overall Cyber Risk Profile Demonstrate the value of current and future Cyber/IT management activities Improve capital management and profitability by putting Cyber/IT related capital to better use Enable all the stakeholders to understand the contribution risk management makes to the firm and to understand the value of controls Identify the outcomes by which we can assess effectiveness of program and controls
  4. Option 0 – Do nothing, embedded with IT Option 1- How compliance is organized, dec