SlideShare ist ein Scribd-Unternehmen logo
1 von 35
Get ahead of cybercrime
EY’s Global Information Security Survey
Page 2
Agenda
► The cyber threat landscape
► The journey to cybersecurity maturity
► Activate
► Adapt
► Anticipate
► Summary
Get ahead of cybercrime — EY’s Global Information Security Survey 2014
Page 3
The cyber threat landscape
Get ahead of cybercrime — EY’s Global Information Security Survey 2014
Page 4
Cyber attacks are headline news
► It is no longer possible to prevent attacks or breaches
► With organizations increasingly relying on vast amounts of
digital data to do business, cybercrime is growing ever more
damaging to an organization and its brands.
► The interconnectivity of people, devices and organizations
opens up new vulnerabilities.
► New technologies, regulatory pressure and changing business
requirements call for more security measures.
► What companies used to know and do to protect their most
valued information is no longer enough.
What everyone wants to know is “what can companies do about
cybercrime?”
Get ahead of cybercrime — EY’s Global Information Security Survey 2014
Page 5
The growing attacking power of cyber criminals
Cybercrime is big business. Today’s attackers:
► Are more organized – they are not just opportunists
► Have significant funding
► Are patient and sophisticated – they will often gain access and
wait until the right moment to pounce
Cybercrime is an organization-wide issue
► Attackers take advantage of vulnerabilities in the whole operating
environment – including people and process.
► Due to the relative ease of access via IP-addresses, operational
technology systems are often targets for cyber criminals
Get ahead of cybercrime — EY’s Global Information Security Survey 2014
Page 6
GISS 2014 results: “Who or what do you consider the most likely
source of an attack?”
Get ahead of cybercrime — EY’s Global Information Security Survey 2014
41%
46%
27%
53%
14%
12%
10%
35%
57%
Lone wolf hacker
Hacktivists
State sponsored attacker
Criminal syndicates
Other business partner
Supplier
Customer
External contractor working on our site
Employee
Respondents were asked to choose all that apply.
Page 7
The roadblocks facing today’s organizations
► Roadblock 1 — Lack of agility
► Organizations admit there are still known vulnerabilities in their cyber
defences and they are not moving fast enough to mitigate these. They
are therefore lagging behind in establishing foundational cybersecurity.
► 65% tell us that they lack real-time insight on cyber risks
► Roadblock 2 — Lack of budget
► For the first time, we see more organizations reporting that their
information security budgets will not increase. There is a need for
more money and resources to face the growing threats effectively.
► Roadblock 3 — Lack of cybersecurity skills
► The lack of specialists is a constant and growing issue. Organizations
also need to build skills in non-technical disciplines (like analytics) to
integrate cybersecurity into the core business.
Get ahead of cybercrime — EY’s Global Information Security Survey 2014
Page 8
GISS 2014 results: Roadblocks
Get ahead of cybercrime — EY’s Global Information Security Survey 2014
43%of respondents say that their
organization’s total information
security budget will stay approximately
the same in the coming 12 months
and a further 5% said that their budget
will actually decrease.
53%of organizations say that lack of
skilled resources is one of the main
obstacles that challenge their
information security.
Page 9
The journey to cybersecurity maturity -
Activate > Adapt > Anticipate
Get ahead of cybercrime — EY’s Global Information Security Survey 2014
Page 10
How do you get ahead of cybercrime?
Focus on the three As.
Get ahead of cybercrime — EY’s Global Information Security Survey 2014
Page 11
A 3-stage improvement process
To get ahead of cybercrime we suggest that organizations adopt a
3-stage improvement process:
► Activate (a foundational approach)
► Organizations need to establish and improve the solid foundations of
their cybersecurity
► Adapt (a dynamic approach)
► Because organizations are constantly changing and cyber threats are
evolving, cybersecurity needs to be able to adapt to changing
requirements
► Anticipate (a proactive approach)
► Organizations need to make efforts to predict what is coming so they
can be better prepared for the inevitable cyber attacks
Get ahead of cybercrime — EY’s Global Information Security Survey 2014
Page 12
Activate
Get ahead of cybercrime — EY’s Global Information Security Survey 2014
Page 13
Activate: the need to establish
foundations
Organizations in this level can only deal with threats in a world
without change. They will typically have these capability shortfalls:
► Bolt-on cybersecurity
► Cybersecurity has been added on to current business processes and
activities, but it has not yet been integrated into the business.
► A focus on safeguarding the current environment
► Cybersecurity starts with looking at the risks the organization is
already aware of based on prior experience; the focus is on risk
assessments, controls efficiency and risk mitigation
► A static approach
► Cybersecurity aims to enable the business to carry out its known and
regular day-to-day functions securely. It will be rule-based and
compliance-driven, relying on metric-driven reporting.
Get ahead of cybercrime — EY’s Global Information Security Survey 2014
Page 14
GISS 2014 results: improvement needed
Get ahead of cybercrime — EY’s Global Information Security Survey 2014
Across almost every cybersecurity
process, between 35% and 45% of
respondents rated themselves “still a
lot to improve.”
Nearly two thirds of organizations do
not have well-defined and automated
Identity and Access Management
programs.
Page 15
GISS 2014 results: lack of real time insight on
cyber risk
Get ahead of cybercrime — EY’s Global Information Security Survey 2014
37%say that real time insight on
cyber risk is not available.
42%of organizations do not
have a SOC.
Page 16
GISS 2014 results: How long on average does it take for
your SOC to initiate an investigation on discovered/
alerted incidents?
Get ahead of cybercrime — EY’s Global Information Security Survey 2014
33%
4%
13%
13%
25%
12%
Unknown
Longer than 1 day
Within 1 day
Within 4 hours
Within 1 hour
Within 10 minutes
Respondents were asked to choose one.
Page 17
Foundational activities all
organizations need to “activate”
1. Conduct a cyber threat assessment and design an implementation
roadmap
2. Get Board-level support for a security transformation
3. Review and update security policies, procedures and supporting
standards
► Implement an information security management system
4. Establish a Security Operations Center (SOC)
► Develop monitoring and incident response procedures
5. Design and implement cybersecurity controls
► Assess the effectiveness of data loss prevention and identity and
access management processes.
► Harden the security of IT assets.
6. Test business continuity plans and incident response procedures
Get ahead of cybercrime — EY’s Global Information Security Survey 2014
Page 18
Adapt
Get ahead of cybercrime — EY’s Global Information Security Survey 2014
Page 19
Adapt: a dynamic approach
If an organization doesn’t adapt, its cybersecurity foundation will
quickly be obsolete. The Adapt stage adds:
► Built-in security
► Cybersecurity is considered and involved in everything the
organization does and cybersecurity requirements are built in to all
business processes
► A focus on the changing environment
► Cybersecurity continuously adapts to ongoing changes in the business
and its environment. Increased situational awareness enables the
organization to react to expected changes in the threat landscape.
► A dynamic approach
► Cybersecurity is flexible, agile and under constant revision. It
continually adapts to better protect the business.
Get ahead of cybercrime — EY’s Global Information Security Survey 2014
Page 20
The need to be adaptable
Organizations are undergoing constant change:
► The necessity to integrate new technologies into business
processes
► Mobile devices blurring the lines between the business and
personal world
► The growth in managed services and remote hosting
► The integration of process control infrastructure with the back
office and the outside world
► Rapidly changing regulatory environment and requirements
As a result, organizations have to cope with a never-ending cycle
of new threats and challenges requiring the adoption of a never-
ending cycle of improvement and re-evaluation of the changing
cybersecurity capabilities.
Get ahead of cybercrime — EY’s Global Information Security Survey 2014
Page 21
Cybersecurity not aligned to the
business
In order to get ahead of cybercrime, it is essential to keep your
cybersecurity measures 100% aligned with your business.
Get ahead of cybercrime — EY’s Global Information Security Survey 2014
Organizations are
continuing to improve
their cybersecurity, but
the changes in the
threat are travelling at
an even faster rate,
meaning they are
effectively going
backwards. 2013 2104
Instead of an expected increase
in the number of organizations
reporting that their Information
Security function fully meets the
needs of their organization, our
survey found a decrease.
2013 2104
Instead of an increase in the number
of organizations reporting that their
Information Security function
partially meets their needs and that
improvements are under way, there
has been a decrease of 5%.
Page 22
GISS 2014 results: Cybersecurity not meeting the
needs of many organizations
Get ahead of cybercrime — EY’s Global Information Security Survey 2014
GISS 2014 explored why cybersecurity measures are not meeting the
needs of so many organizations, for example in breach detection:
Respondents were asked to choose one.
9%
20%
24%
31%
16%
We have a formal and advanced detection function that brings together each
category of modern technology (host-based malware detection, antivirus, network-
based malware detection, DLP, IDS, next-gen firewalls, log aggregation) and uses
sophisticated data analytics to identify anomalies, trends and correlations. We have
formal processes for threat collection, dissemination, integration, response,
escalation and prediction of attacks
We have a formal detection program that leverages modern technologies (host-
based and network-based malware detection, behavioral anomaly detection, etc.) to
monitor both internal and external traffic. We use ad hoc processes for threat
collection, integration, response and escalation
We utilize a security information and event management (SIEM) solution to actively
monitor network, IDS/IPS and system logs. We have an informal response and
escalation processes in place
We have perimeter network security devices (i.e., IDS). We do not have formal
processes in place for response and escalation
We do not have a detection program
Page 23
GISS 2014 results: How do you ensure that your
external partners, vendors or contractors are
protecting your organization’s information?
Get ahead of cybercrime — EY’s Global Information Security Survey 2014
13%
8%
24%
34%
27%
27%
27%
56%
No reviews or assessments performed
Fourth parties (also known as sub-service organizations) are identified and assessments
performed (e.g., questionnaires issued, reliance placed on your vendor's assessment
processes)
Only critical or high-risk third parties are assessed
Self-assessments or other certifications performed by partners, vendors or contractors
Independent external assessments of partners, vendors or contractors (e.g., SSAE 16,
ISAE-3402)
Accurate inventory of all third-party providers, network connections and data transfers is
maintained and regularly updated
All third parties are risk-rated and appropriate diligence is applied
Assessments performed by your organization’s information security, IT risk, procurement
or internal audit function (e.g., questionnaires, site visits, security testing)
Respondents were asked to choose all that apply.
Page 24
Adapt - take action to improve and
transform
1. Design and implement a transformation program
► Get external help in designing the program, and providing program
management.
2. Decide what to keep in-house and what to outsource
3. Define a RACI matrix for cybersecurity
4. Define the organization’s ecosystem
► Make moves to eliminate or lessen potential security gaps in your
interaction with third parties
5. Introduce cybersecurity awareness training for employees
Get ahead of cybercrime — EY’s Global Information Security Survey 2014
Page 25
Anticipate
Get ahead of cybercrime — EY’s Global Information Security Survey 2014
Page 26
Anticipate: a proactive state of
readiness
‘Anticipate’ means embracing cybersecurity as a core aspect of
the business and being in a proactive state of readiness:
► Built-beyond security
► Cybersecurity capabilities are part of a dynamic decision process
► Prioritize your “crown jewels” - understand the impact of a breach
► A focus on the future environment
► Understand the wider threat landscape and how it relates to the
organization – use cyber threat intelligence
► Continually learn and evolve in a cycle of continual improvement
► A proactive approach
► Be confident in your incident response and crisis response
mechanisms
► Regularly rehearse your incident response capabilities
Get ahead of cybercrime — EY’s Global Information Security Survey 2014
Page 27
GISS 2014 results: Organizations are not planning
for the future
Get ahead of cybercrime — EY’s Global Information Security Survey 2014
58%of organizations do not have a
role or department focused on
emerging technologies and their
impact on information security.
36%of respondents do not have a threat
intelligence program.
Page 28 Get ahead of cybercrime — EY’s Global Information Security Survey 2014
Company
one
Company
two
Collaboration
Climate
Collaboration within the ecosystem
Page 29
Share knowledge and skills with
your ecosystem
All organizations face the same challenges and are learning that
collaboration bears fruit, especially if done in a targeted fashion.
► Collaboration provides the organization with greater awareness
of its partners and supply chain, and the ability to influence and
learn from the whole ecosystem.
► Larger organizations’ security capabilities are often far more mature
than those of some of their suppliers, so knowledge-sharing around
cybersecurity, or coordinating cybersecurity activities with suppliers
can be much more effective than going it alone.
► A shared solution tightens the protective layers in and around your
ecosystem.
► Any incident response exercises should include third parties
and other players in your wider ecosystem.
Get ahead of cybercrime — EY’s Global Information Security Survey 2014
Page 30
Anticipate: take action - and get ahead
Get ahead of cybercrime — EY’s Global Information Security Survey 2014
1. Design and implement a cyber threat intelligence strategy
► Use threat intelligence to support strategic business decisions
2. Define and encompass the organization’s extended cybersecurity
ecosystem
► Define RACI and trust models and enact cooperation, sharing capabilities
where advantageous
3. Take a cyber economic approach
► Understand the value of your most vital cyber assets
4. Use forensics and analytics
► Use the latest technical tools to analyse where the likely threats are coming
from and when
5. Ensure everyone understands what’s happening
► Strong governance, user controls and regular communications
Page 31
Summary
Get ahead of cybercrime — EY’s Global Information Security Survey 2014
Page 32
Anticipate
Adapt
Activate
Cybersecurity system building blocks - the 3A’s
Get ahead of cybercrime — EY’s Global Information Security Survey 2014
What it is Cybersecurity system building blocks Status
Anticipate is about looking into
the unknown. Based on cyber
threat intelligence, potential
hacks are identified; measures
are taken before any damage
is done.
Anticipate is an emerging level.
More and more organizations
are using cyber threat
intelligence to get ahead of
cybercrime. It is an innovative
addition to the below.
Adapt is about change. The
cybersecurity system is
changing when the environment
is changing. It is focused on
protecting the business of
tomorrow.
Adapt is not broadly
implemented yet. It is not
common practice to assess the
cybersecurity implications every
time an organization makes
changes in the business.
Activate sets the stage. It is a
complex set of cybersecurity
measures focused on protecting
the business as it is today.
Activate is part of the
cybersecurity system of every
organization. Not all necessary
measures are taken yet; there is
still a lot to do.
Page 33
Want to learn more?
Get ahead of cybercrime — EY’s Global Information Security Survey 2014
Achieving resilience in the
cyber ecosystem
www.ey.com/cyberecosystem
Reducing risk with Cyber Threat
Intelligence
www.ey.com/CTI
Security Operations Centers:
- helping you get ahead of
cybercrime
www.ey.com/SOC
Privacy trends 2014: privacy
protection in the age of technology
www.ey.com/privacy2014
Identity and access
management:
beyond compliance
www.ey.com/IAM
Building trust in the cloud:
creating confidence in your cloud
ecosystem
www.ey.com/cloudtrust
Big data: changing the way
businesses compete and operate
www.ey.com/bigdatachange
Please visit our Insights on governance, risk and compliance series at www.ey.com/GRCinsights
Cyber program management:
identifying ways to get ahead of
cybercrime
www.ey.com/CPM
Page 34
Further information
Get ahead of cybercrime — EY’s Global Information Security Survey 2014
See the full report: Get ahead of cybercrime –
EY’s Global Information Security Survey 2014:
www.ey.com/giss2014
View more of EY’s insights on cybersecurity on:
www.ey.com/cybersecurity
For further GRC thought leadership, please refer
to our Insights on governance, risk and
compliance series on:
www.ey.com/GRCinsights
To discuss your cybersecurity issues further,
please contact your EY representative:
Ivan Dragaš, CISA
ivan.dragas@rs.ey.com
Page 35
Thank you for your attention!

Weitere ähnliche Inhalte

Was ist angesagt?

Talk1 esc7 muscl-dataprotection_v1_2
Talk1 esc7 muscl-dataprotection_v1_2Talk1 esc7 muscl-dataprotection_v1_2
Talk1 esc7 muscl-dataprotection_v1_2Sylvain Martinez
 
Solar winds supply chain breach - Insights from the trenches
Solar winds supply chain breach - Insights from the trenchesSolar winds supply chain breach - Insights from the trenches
Solar winds supply chain breach - Insights from the trenchesInfosec
 
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Cristian Garcia G.
 
PROGRAMMING AND CYBER SECURITY
PROGRAMMING AND CYBER SECURITYPROGRAMMING AND CYBER SECURITY
PROGRAMMING AND CYBER SECURITYSylvain Martinez
 
kill-chain-presentation-v3
kill-chain-presentation-v3kill-chain-presentation-v3
kill-chain-presentation-v3Shawn Croswell
 
Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...
Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...
Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...Kaspersky
 
Pactera - Cloud, Application, Cyber Security Trend 2016
Pactera - Cloud, Application, Cyber Security Trend 2016Pactera - Cloud, Application, Cyber Security Trend 2016
Pactera - Cloud, Application, Cyber Security Trend 2016Kyle Lai
 
VIRTUAL CISO AND OTHER KEY CYBER ROLES
VIRTUAL CISO AND OTHER KEY CYBER ROLESVIRTUAL CISO AND OTHER KEY CYBER ROLES
VIRTUAL CISO AND OTHER KEY CYBER ROLESSylvain Martinez
 
Exploring the Capabilities and Economics of Cybercrime
Exploring the Capabilities and Economics of CybercrimeExploring the Capabilities and Economics of Cybercrime
Exploring the Capabilities and Economics of CybercrimeCylance
 
Cybersecurity in Acquisition - Kristen J. Baldwin
Cybersecurity in Acquisition - Kristen J. BaldwinCybersecurity in Acquisition - Kristen J. Baldwin
Cybersecurity in Acquisition - Kristen J. Baldwinscoopnewsgroup
 
Porque las Amenazas avanzadas requieren de una Seguridad para Aplicaciones av...
Porque las Amenazas avanzadas requieren de una Seguridad para Aplicaciones av...Porque las Amenazas avanzadas requieren de una Seguridad para Aplicaciones av...
Porque las Amenazas avanzadas requieren de una Seguridad para Aplicaciones av...Cristian Garcia G.
 
Critical Infrastructure Protection from Terrorist Attacks
Critical Infrastructure Protection from Terrorist AttacksCritical Infrastructure Protection from Terrorist Attacks
Critical Infrastructure Protection from Terrorist AttacksBGA Cyber Security
 
Cloud Security Strategy by McAfee
Cloud Security Strategy by McAfeeCloud Security Strategy by McAfee
Cloud Security Strategy by McAfeeCristian Garcia G.
 
2019 CYBER SECURITY TRENDS REPORT REVIEW
2019 CYBER SECURITY TRENDS REPORT REVIEW2019 CYBER SECURITY TRENDS REPORT REVIEW
2019 CYBER SECURITY TRENDS REPORT REVIEWSylvain Martinez
 
The Internal Signs of Compromise
The Internal Signs of CompromiseThe Internal Signs of Compromise
The Internal Signs of CompromiseFireEye, Inc.
 
HPE Protect 2016 - Fearlessly Innovate
HPE Protect 2016 - Fearlessly InnovateHPE Protect 2016 - Fearlessly Innovate
HPE Protect 2016 - Fearlessly Innovatescoopnewsgroup
 

Was ist angesagt? (20)

Talk1 esc7 muscl-dataprotection_v1_2
Talk1 esc7 muscl-dataprotection_v1_2Talk1 esc7 muscl-dataprotection_v1_2
Talk1 esc7 muscl-dataprotection_v1_2
 
OFFICE 365 SECURITY
OFFICE 365 SECURITYOFFICE 365 SECURITY
OFFICE 365 SECURITY
 
Solar winds supply chain breach - Insights from the trenches
Solar winds supply chain breach - Insights from the trenchesSolar winds supply chain breach - Insights from the trenches
Solar winds supply chain breach - Insights from the trenches
 
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
 
PROGRAMMING AND CYBER SECURITY
PROGRAMMING AND CYBER SECURITYPROGRAMMING AND CYBER SECURITY
PROGRAMMING AND CYBER SECURITY
 
kill-chain-presentation-v3
kill-chain-presentation-v3kill-chain-presentation-v3
kill-chain-presentation-v3
 
Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...
Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...
Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...
 
Pactera - Cloud, Application, Cyber Security Trend 2016
Pactera - Cloud, Application, Cyber Security Trend 2016Pactera - Cloud, Application, Cyber Security Trend 2016
Pactera - Cloud, Application, Cyber Security Trend 2016
 
OFFENSIVE IDS
OFFENSIVE IDSOFFENSIVE IDS
OFFENSIVE IDS
 
VIRTUAL CISO AND OTHER KEY CYBER ROLES
VIRTUAL CISO AND OTHER KEY CYBER ROLESVIRTUAL CISO AND OTHER KEY CYBER ROLES
VIRTUAL CISO AND OTHER KEY CYBER ROLES
 
Exploring the Capabilities and Economics of Cybercrime
Exploring the Capabilities and Economics of CybercrimeExploring the Capabilities and Economics of Cybercrime
Exploring the Capabilities and Economics of Cybercrime
 
Cybersecurity in Acquisition - Kristen J. Baldwin
Cybersecurity in Acquisition - Kristen J. BaldwinCybersecurity in Acquisition - Kristen J. Baldwin
Cybersecurity in Acquisition - Kristen J. Baldwin
 
Porque las Amenazas avanzadas requieren de una Seguridad para Aplicaciones av...
Porque las Amenazas avanzadas requieren de una Seguridad para Aplicaciones av...Porque las Amenazas avanzadas requieren de una Seguridad para Aplicaciones av...
Porque las Amenazas avanzadas requieren de una Seguridad para Aplicaciones av...
 
Critical Infrastructure Protection from Terrorist Attacks
Critical Infrastructure Protection from Terrorist AttacksCritical Infrastructure Protection from Terrorist Attacks
Critical Infrastructure Protection from Terrorist Attacks
 
Cloud Security Strategy by McAfee
Cloud Security Strategy by McAfeeCloud Security Strategy by McAfee
Cloud Security Strategy by McAfee
 
2019 CYBER SECURITY TRENDS REPORT REVIEW
2019 CYBER SECURITY TRENDS REPORT REVIEW2019 CYBER SECURITY TRENDS REPORT REVIEW
2019 CYBER SECURITY TRENDS REPORT REVIEW
 
INFINITY Presentation
INFINITY PresentationINFINITY Presentation
INFINITY Presentation
 
The Internal Signs of Compromise
The Internal Signs of CompromiseThe Internal Signs of Compromise
The Internal Signs of Compromise
 
The Art of CTF
The Art of CTFThe Art of CTF
The Art of CTF
 
HPE Protect 2016 - Fearlessly Innovate
HPE Protect 2016 - Fearlessly InnovateHPE Protect 2016 - Fearlessly Innovate
HPE Protect 2016 - Fearlessly Innovate
 

Ähnlich wie Ivan dragas get ahead of cybercrime

Security Incident Response Readiness Survey
Security Incident Response Readiness Survey  Security Incident Response Readiness Survey
Security Incident Response Readiness Survey Rahul Neel Mani
 
Under cyber attack: EY's Global information security survey 2013
Under cyber attack: EY's Global information security survey 2013Under cyber attack: EY's Global information security survey 2013
Under cyber attack: EY's Global information security survey 2013EY
 
Cyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of CybercrimeCyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of CybercrimeErnst & Young
 
Cyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of CybercrimeCyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of CybercrimeNishantSisodiya
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...International Federation of Accountants
 
Data security: How a proactive C-suite can reduce cyber-risk for the enterprise
Data security: How a proactive C-suite can reduce cyber-risk for the enterpriseData security: How a proactive C-suite can reduce cyber-risk for the enterprise
Data security: How a proactive C-suite can reduce cyber-risk for the enterpriseThe Economist Media Businesses
 
Étude mondiale d'EY sur la cybersécurité (2018)
Étude mondiale d'EY sur la cybersécurité (2018)Étude mondiale d'EY sur la cybersécurité (2018)
Étude mondiale d'EY sur la cybersécurité (2018)Paperjam_redaction
 
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)Sarah Jarvis
 
SVB Cybersecurity Impact on Innovation Report
SVB Cybersecurity Impact on Innovation ReportSVB Cybersecurity Impact on Innovation Report
SVB Cybersecurity Impact on Innovation ReportSilicon Valley Bank
 
The Board and Cyber Security
The Board and Cyber SecurityThe Board and Cyber Security
The Board and Cyber SecurityFireEye, Inc.
 
Securing the Digital Future
Securing the Digital FutureSecuring the Digital Future
Securing the Digital FutureCognizant
 
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY IndiaGet Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY IndiaRahul Neel Mani
 
Digital trust and cyber challenge now extends beyond the Enterprise
Digital trust and cyber challenge now extends beyond the Enterprise Digital trust and cyber challenge now extends beyond the Enterprise
Digital trust and cyber challenge now extends beyond the Enterprise Mourad Khalil
 
Cisco Yıllık Güvenlik Raporu 2015
Cisco Yıllık Güvenlik Raporu 2015Cisco Yıllık Güvenlik Raporu 2015
Cisco Yıllık Güvenlik Raporu 2015Marketing Türkiye
 
SVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - OverviewSVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - OverviewSilicon Valley Bank
 
2015 Energy Industry Cybersecurity Research Update
2015 Energy Industry Cybersecurity Research Update2015 Energy Industry Cybersecurity Research Update
2015 Energy Industry Cybersecurity Research UpdateGridCyberSec
 
eCrime-report-2011-accessible
eCrime-report-2011-accessibleeCrime-report-2011-accessible
eCrime-report-2011-accessibleCharmaine Servado
 
Is cyber security now too hard for enterprises?
Is cyber security now too hard for enterprises? Is cyber security now too hard for enterprises?
Is cyber security now too hard for enterprises? Pierre Audoin Consultants
 

Ähnlich wie Ivan dragas get ahead of cybercrime (20)

Security Incident Response Readiness Survey
Security Incident Response Readiness Survey  Security Incident Response Readiness Survey
Security Incident Response Readiness Survey
 
Ey giss-under-cyber-attack
Ey giss-under-cyber-attackEy giss-under-cyber-attack
Ey giss-under-cyber-attack
 
Under cyber attack: EY's Global information security survey 2013
Under cyber attack: EY's Global information security survey 2013Under cyber attack: EY's Global information security survey 2013
Under cyber attack: EY's Global information security survey 2013
 
Cyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of CybercrimeCyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of Cybercrime
 
Cyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of CybercrimeCyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of Cybercrime
 
Breaches Are Bad for Business. How Will You Detect and Respond to Your Next C...
Breaches Are Bad for Business. How Will You Detect and Respond to Your Next C...Breaches Are Bad for Business. How Will You Detect and Respond to Your Next C...
Breaches Are Bad for Business. How Will You Detect and Respond to Your Next C...
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
 
Data security: How a proactive C-suite can reduce cyber-risk for the enterprise
Data security: How a proactive C-suite can reduce cyber-risk for the enterpriseData security: How a proactive C-suite can reduce cyber-risk for the enterprise
Data security: How a proactive C-suite can reduce cyber-risk for the enterprise
 
Étude mondiale d'EY sur la cybersécurité (2018)
Étude mondiale d'EY sur la cybersécurité (2018)Étude mondiale d'EY sur la cybersécurité (2018)
Étude mondiale d'EY sur la cybersécurité (2018)
 
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
 
SVB Cybersecurity Impact on Innovation Report
SVB Cybersecurity Impact on Innovation ReportSVB Cybersecurity Impact on Innovation Report
SVB Cybersecurity Impact on Innovation Report
 
The Board and Cyber Security
The Board and Cyber SecurityThe Board and Cyber Security
The Board and Cyber Security
 
Securing the Digital Future
Securing the Digital FutureSecuring the Digital Future
Securing the Digital Future
 
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY IndiaGet Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
 
Digital trust and cyber challenge now extends beyond the Enterprise
Digital trust and cyber challenge now extends beyond the Enterprise Digital trust and cyber challenge now extends beyond the Enterprise
Digital trust and cyber challenge now extends beyond the Enterprise
 
Cisco Yıllık Güvenlik Raporu 2015
Cisco Yıllık Güvenlik Raporu 2015Cisco Yıllık Güvenlik Raporu 2015
Cisco Yıllık Güvenlik Raporu 2015
 
SVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - OverviewSVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - Overview
 
2015 Energy Industry Cybersecurity Research Update
2015 Energy Industry Cybersecurity Research Update2015 Energy Industry Cybersecurity Research Update
2015 Energy Industry Cybersecurity Research Update
 
eCrime-report-2011-accessible
eCrime-report-2011-accessibleeCrime-report-2011-accessible
eCrime-report-2011-accessible
 
Is cyber security now too hard for enterprises?
Is cyber security now too hard for enterprises? Is cyber security now too hard for enterprises?
Is cyber security now too hard for enterprises?
 

Mehr von Dejan Jeremic

Konferencija 09.12. ​Maja Ilic
Konferencija 09.12. ​Maja IlicKonferencija 09.12. ​Maja Ilic
Konferencija 09.12. ​Maja IlicDejan Jeremic
 
Konferencija 09.12. ph d Dragan Djurdjevic
Konferencija 09.12. ph d Dragan DjurdjevicKonferencija 09.12. ph d Dragan Djurdjevic
Konferencija 09.12. ph d Dragan DjurdjevicDejan Jeremic
 
Konferencija 09.12. ph d Nenad Kaludjerovic
Konferencija 09.12. ph d Nenad KaludjerovicKonferencija 09.12. ph d Nenad Kaludjerovic
Konferencija 09.12. ph d Nenad KaludjerovicDejan Jeremic
 
Konferencija 09.12. ph d Nenad Kaludjerovic
Konferencija 09.12. ph d Nenad KaludjerovicKonferencija 09.12. ph d Nenad Kaludjerovic
Konferencija 09.12. ph d Nenad KaludjerovicDejan Jeremic
 
Konferencija 09.12. ph d Nenad Kaludjerovic
Konferencija 09.12. ph d Nenad KaludjerovicKonferencija 09.12. ph d Nenad Kaludjerovic
Konferencija 09.12. ph d Nenad KaludjerovicDejan Jeremic
 
Konferencija 09.12. Hilda Milenković
Konferencija 09.12. Hilda MilenkovićKonferencija 09.12. Hilda Milenković
Konferencija 09.12. Hilda MilenkovićDejan Jeremic
 
Konferencija 9 12 - Biljana Simic
Konferencija 9 12 - Biljana SimicKonferencija 9 12 - Biljana Simic
Konferencija 9 12 - Biljana SimicDejan Jeremic
 
Asistivna tehnologija
Asistivna tehnologija Asistivna tehnologija
Asistivna tehnologija Dejan Jeremic
 
Podrska razvoja siblinskih odnosa
Podrska razvoja siblinskih odnosaPodrska razvoja siblinskih odnosa
Podrska razvoja siblinskih odnosaDejan Jeremic
 
Beskucnistvo i usluga socijalnog rada
Beskucnistvo i usluga socijalnog radaBeskucnistvo i usluga socijalnog rada
Beskucnistvo i usluga socijalnog radaDejan Jeremic
 
Lokalne usluge GCSR Beograd
Lokalne usluge  GCSR BeogradLokalne usluge  GCSR Beograd
Lokalne usluge GCSR BeogradDejan Jeremic
 
Postupanje GCSR u obezbedjivanju podrske maloletne dece migranata
Postupanje GCSR u obezbedjivanju podrske maloletne dece migranataPostupanje GCSR u obezbedjivanju podrske maloletne dece migranata
Postupanje GCSR u obezbedjivanju podrske maloletne dece migranataDejan Jeremic
 
Deinstitucionalizacija
DeinstitucionalizacijaDeinstitucionalizacija
DeinstitucionalizacijaDejan Jeremic
 
Centar za porodicni smestaj i usvojenje Novi Sad
Centar za porodicni smestaj i usvojenje Novi SadCentar za porodicni smestaj i usvojenje Novi Sad
Centar za porodicni smestaj i usvojenje Novi SadDejan Jeremic
 
Podrsak EU inkluzionom drustvu
Podrsak EU inkluzionom drustvuPodrsak EU inkluzionom drustvu
Podrsak EU inkluzionom drustvuDejan Jeremic
 
Povremeni porodicni smeštaj - sajam socijalnih usluga 2016
Povremeni porodicni smeštaj - sajam socijalnih usluga 2016Povremeni porodicni smeštaj - sajam socijalnih usluga 2016
Povremeni porodicni smeštaj - sajam socijalnih usluga 2016Dejan Jeremic
 
Forenzička revizija
Forenzička revizijaForenzička revizija
Forenzička revizijaDejan Jeremic
 
Analiza ljudskih potencijala
Analiza ljudskih potencijalaAnaliza ljudskih potencijala
Analiza ljudskih potencijalaDejan Jeremic
 
Selekcija kadrova i njihova uloga u inzinjeringu protivteroristicke odbrane
Selekcija kadrova i njihova uloga u inzinjeringu protivteroristicke odbraneSelekcija kadrova i njihova uloga u inzinjeringu protivteroristicke odbrane
Selekcija kadrova i njihova uloga u inzinjeringu protivteroristicke odbraneDejan Jeremic
 
Razvoj lokalnih usluga socijalne zastite grada Pancevo
Razvoj lokalnih usluga socijalne zastite grada PancevoRazvoj lokalnih usluga socijalne zastite grada Pancevo
Razvoj lokalnih usluga socijalne zastite grada PancevoDejan Jeremic
 

Mehr von Dejan Jeremic (20)

Konferencija 09.12. ​Maja Ilic
Konferencija 09.12. ​Maja IlicKonferencija 09.12. ​Maja Ilic
Konferencija 09.12. ​Maja Ilic
 
Konferencija 09.12. ph d Dragan Djurdjevic
Konferencija 09.12. ph d Dragan DjurdjevicKonferencija 09.12. ph d Dragan Djurdjevic
Konferencija 09.12. ph d Dragan Djurdjevic
 
Konferencija 09.12. ph d Nenad Kaludjerovic
Konferencija 09.12. ph d Nenad KaludjerovicKonferencija 09.12. ph d Nenad Kaludjerovic
Konferencija 09.12. ph d Nenad Kaludjerovic
 
Konferencija 09.12. ph d Nenad Kaludjerovic
Konferencija 09.12. ph d Nenad KaludjerovicKonferencija 09.12. ph d Nenad Kaludjerovic
Konferencija 09.12. ph d Nenad Kaludjerovic
 
Konferencija 09.12. ph d Nenad Kaludjerovic
Konferencija 09.12. ph d Nenad KaludjerovicKonferencija 09.12. ph d Nenad Kaludjerovic
Konferencija 09.12. ph d Nenad Kaludjerovic
 
Konferencija 09.12. Hilda Milenković
Konferencija 09.12. Hilda MilenkovićKonferencija 09.12. Hilda Milenković
Konferencija 09.12. Hilda Milenković
 
Konferencija 9 12 - Biljana Simic
Konferencija 9 12 - Biljana SimicKonferencija 9 12 - Biljana Simic
Konferencija 9 12 - Biljana Simic
 
Asistivna tehnologija
Asistivna tehnologija Asistivna tehnologija
Asistivna tehnologija
 
Podrska razvoja siblinskih odnosa
Podrska razvoja siblinskih odnosaPodrska razvoja siblinskih odnosa
Podrska razvoja siblinskih odnosa
 
Beskucnistvo i usluga socijalnog rada
Beskucnistvo i usluga socijalnog radaBeskucnistvo i usluga socijalnog rada
Beskucnistvo i usluga socijalnog rada
 
Lokalne usluge GCSR Beograd
Lokalne usluge  GCSR BeogradLokalne usluge  GCSR Beograd
Lokalne usluge GCSR Beograd
 
Postupanje GCSR u obezbedjivanju podrske maloletne dece migranata
Postupanje GCSR u obezbedjivanju podrske maloletne dece migranataPostupanje GCSR u obezbedjivanju podrske maloletne dece migranata
Postupanje GCSR u obezbedjivanju podrske maloletne dece migranata
 
Deinstitucionalizacija
DeinstitucionalizacijaDeinstitucionalizacija
Deinstitucionalizacija
 
Centar za porodicni smestaj i usvojenje Novi Sad
Centar za porodicni smestaj i usvojenje Novi SadCentar za porodicni smestaj i usvojenje Novi Sad
Centar za porodicni smestaj i usvojenje Novi Sad
 
Podrsak EU inkluzionom drustvu
Podrsak EU inkluzionom drustvuPodrsak EU inkluzionom drustvu
Podrsak EU inkluzionom drustvu
 
Povremeni porodicni smeštaj - sajam socijalnih usluga 2016
Povremeni porodicni smeštaj - sajam socijalnih usluga 2016Povremeni porodicni smeštaj - sajam socijalnih usluga 2016
Povremeni porodicni smeštaj - sajam socijalnih usluga 2016
 
Forenzička revizija
Forenzička revizijaForenzička revizija
Forenzička revizija
 
Analiza ljudskih potencijala
Analiza ljudskih potencijalaAnaliza ljudskih potencijala
Analiza ljudskih potencijala
 
Selekcija kadrova i njihova uloga u inzinjeringu protivteroristicke odbrane
Selekcija kadrova i njihova uloga u inzinjeringu protivteroristicke odbraneSelekcija kadrova i njihova uloga u inzinjeringu protivteroristicke odbrane
Selekcija kadrova i njihova uloga u inzinjeringu protivteroristicke odbrane
 
Razvoj lokalnih usluga socijalne zastite grada Pancevo
Razvoj lokalnih usluga socijalne zastite grada PancevoRazvoj lokalnih usluga socijalne zastite grada Pancevo
Razvoj lokalnih usluga socijalne zastite grada Pancevo
 

Kürzlich hochgeladen

Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxDyna Gilbert
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Paul Calvano
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhimiss dipika
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa494f574xmv
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书rnrncn29
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书zdzoqco
 
Elevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New OrleansElevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New Orleanscorenetworkseo
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书rnrncn29
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一Fs
 
Q4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxQ4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxeditsforyah
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMartaLoveguard
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一Fs
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITMgdsc13
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predieusebiomeyer
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一Fs
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一z xss
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Sonam Pathan
 
NSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentationNSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentationMarko4394
 

Kürzlich hochgeladen (20)

Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptx
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhi
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
 
Elevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New OrleansElevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New Orleans
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
 
Q4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxQ4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptx
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptx
 
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITM
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predi
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
 
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170
 
NSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentationNSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentation
 

Ivan dragas get ahead of cybercrime

  • 1. Get ahead of cybercrime EY’s Global Information Security Survey
  • 2. Page 2 Agenda ► The cyber threat landscape ► The journey to cybersecurity maturity ► Activate ► Adapt ► Anticipate ► Summary Get ahead of cybercrime — EY’s Global Information Security Survey 2014
  • 3. Page 3 The cyber threat landscape Get ahead of cybercrime — EY’s Global Information Security Survey 2014
  • 4. Page 4 Cyber attacks are headline news ► It is no longer possible to prevent attacks or breaches ► With organizations increasingly relying on vast amounts of digital data to do business, cybercrime is growing ever more damaging to an organization and its brands. ► The interconnectivity of people, devices and organizations opens up new vulnerabilities. ► New technologies, regulatory pressure and changing business requirements call for more security measures. ► What companies used to know and do to protect their most valued information is no longer enough. What everyone wants to know is “what can companies do about cybercrime?” Get ahead of cybercrime — EY’s Global Information Security Survey 2014
  • 5. Page 5 The growing attacking power of cyber criminals Cybercrime is big business. Today’s attackers: ► Are more organized – they are not just opportunists ► Have significant funding ► Are patient and sophisticated – they will often gain access and wait until the right moment to pounce Cybercrime is an organization-wide issue ► Attackers take advantage of vulnerabilities in the whole operating environment – including people and process. ► Due to the relative ease of access via IP-addresses, operational technology systems are often targets for cyber criminals Get ahead of cybercrime — EY’s Global Information Security Survey 2014
  • 6. Page 6 GISS 2014 results: “Who or what do you consider the most likely source of an attack?” Get ahead of cybercrime — EY’s Global Information Security Survey 2014 41% 46% 27% 53% 14% 12% 10% 35% 57% Lone wolf hacker Hacktivists State sponsored attacker Criminal syndicates Other business partner Supplier Customer External contractor working on our site Employee Respondents were asked to choose all that apply.
  • 7. Page 7 The roadblocks facing today’s organizations ► Roadblock 1 — Lack of agility ► Organizations admit there are still known vulnerabilities in their cyber defences and they are not moving fast enough to mitigate these. They are therefore lagging behind in establishing foundational cybersecurity. ► 65% tell us that they lack real-time insight on cyber risks ► Roadblock 2 — Lack of budget ► For the first time, we see more organizations reporting that their information security budgets will not increase. There is a need for more money and resources to face the growing threats effectively. ► Roadblock 3 — Lack of cybersecurity skills ► The lack of specialists is a constant and growing issue. Organizations also need to build skills in non-technical disciplines (like analytics) to integrate cybersecurity into the core business. Get ahead of cybercrime — EY’s Global Information Security Survey 2014
  • 8. Page 8 GISS 2014 results: Roadblocks Get ahead of cybercrime — EY’s Global Information Security Survey 2014 43%of respondents say that their organization’s total information security budget will stay approximately the same in the coming 12 months and a further 5% said that their budget will actually decrease. 53%of organizations say that lack of skilled resources is one of the main obstacles that challenge their information security.
  • 9. Page 9 The journey to cybersecurity maturity - Activate > Adapt > Anticipate Get ahead of cybercrime — EY’s Global Information Security Survey 2014
  • 10. Page 10 How do you get ahead of cybercrime? Focus on the three As. Get ahead of cybercrime — EY’s Global Information Security Survey 2014
  • 11. Page 11 A 3-stage improvement process To get ahead of cybercrime we suggest that organizations adopt a 3-stage improvement process: ► Activate (a foundational approach) ► Organizations need to establish and improve the solid foundations of their cybersecurity ► Adapt (a dynamic approach) ► Because organizations are constantly changing and cyber threats are evolving, cybersecurity needs to be able to adapt to changing requirements ► Anticipate (a proactive approach) ► Organizations need to make efforts to predict what is coming so they can be better prepared for the inevitable cyber attacks Get ahead of cybercrime — EY’s Global Information Security Survey 2014
  • 12. Page 12 Activate Get ahead of cybercrime — EY’s Global Information Security Survey 2014
  • 13. Page 13 Activate: the need to establish foundations Organizations in this level can only deal with threats in a world without change. They will typically have these capability shortfalls: ► Bolt-on cybersecurity ► Cybersecurity has been added on to current business processes and activities, but it has not yet been integrated into the business. ► A focus on safeguarding the current environment ► Cybersecurity starts with looking at the risks the organization is already aware of based on prior experience; the focus is on risk assessments, controls efficiency and risk mitigation ► A static approach ► Cybersecurity aims to enable the business to carry out its known and regular day-to-day functions securely. It will be rule-based and compliance-driven, relying on metric-driven reporting. Get ahead of cybercrime — EY’s Global Information Security Survey 2014
  • 14. Page 14 GISS 2014 results: improvement needed Get ahead of cybercrime — EY’s Global Information Security Survey 2014 Across almost every cybersecurity process, between 35% and 45% of respondents rated themselves “still a lot to improve.” Nearly two thirds of organizations do not have well-defined and automated Identity and Access Management programs.
  • 15. Page 15 GISS 2014 results: lack of real time insight on cyber risk Get ahead of cybercrime — EY’s Global Information Security Survey 2014 37%say that real time insight on cyber risk is not available. 42%of organizations do not have a SOC.
  • 16. Page 16 GISS 2014 results: How long on average does it take for your SOC to initiate an investigation on discovered/ alerted incidents? Get ahead of cybercrime — EY’s Global Information Security Survey 2014 33% 4% 13% 13% 25% 12% Unknown Longer than 1 day Within 1 day Within 4 hours Within 1 hour Within 10 minutes Respondents were asked to choose one.
  • 17. Page 17 Foundational activities all organizations need to “activate” 1. Conduct a cyber threat assessment and design an implementation roadmap 2. Get Board-level support for a security transformation 3. Review and update security policies, procedures and supporting standards ► Implement an information security management system 4. Establish a Security Operations Center (SOC) ► Develop monitoring and incident response procedures 5. Design and implement cybersecurity controls ► Assess the effectiveness of data loss prevention and identity and access management processes. ► Harden the security of IT assets. 6. Test business continuity plans and incident response procedures Get ahead of cybercrime — EY’s Global Information Security Survey 2014
  • 18. Page 18 Adapt Get ahead of cybercrime — EY’s Global Information Security Survey 2014
  • 19. Page 19 Adapt: a dynamic approach If an organization doesn’t adapt, its cybersecurity foundation will quickly be obsolete. The Adapt stage adds: ► Built-in security ► Cybersecurity is considered and involved in everything the organization does and cybersecurity requirements are built in to all business processes ► A focus on the changing environment ► Cybersecurity continuously adapts to ongoing changes in the business and its environment. Increased situational awareness enables the organization to react to expected changes in the threat landscape. ► A dynamic approach ► Cybersecurity is flexible, agile and under constant revision. It continually adapts to better protect the business. Get ahead of cybercrime — EY’s Global Information Security Survey 2014
  • 20. Page 20 The need to be adaptable Organizations are undergoing constant change: ► The necessity to integrate new technologies into business processes ► Mobile devices blurring the lines between the business and personal world ► The growth in managed services and remote hosting ► The integration of process control infrastructure with the back office and the outside world ► Rapidly changing regulatory environment and requirements As a result, organizations have to cope with a never-ending cycle of new threats and challenges requiring the adoption of a never- ending cycle of improvement and re-evaluation of the changing cybersecurity capabilities. Get ahead of cybercrime — EY’s Global Information Security Survey 2014
  • 21. Page 21 Cybersecurity not aligned to the business In order to get ahead of cybercrime, it is essential to keep your cybersecurity measures 100% aligned with your business. Get ahead of cybercrime — EY’s Global Information Security Survey 2014 Organizations are continuing to improve their cybersecurity, but the changes in the threat are travelling at an even faster rate, meaning they are effectively going backwards. 2013 2104 Instead of an expected increase in the number of organizations reporting that their Information Security function fully meets the needs of their organization, our survey found a decrease. 2013 2104 Instead of an increase in the number of organizations reporting that their Information Security function partially meets their needs and that improvements are under way, there has been a decrease of 5%.
  • 22. Page 22 GISS 2014 results: Cybersecurity not meeting the needs of many organizations Get ahead of cybercrime — EY’s Global Information Security Survey 2014 GISS 2014 explored why cybersecurity measures are not meeting the needs of so many organizations, for example in breach detection: Respondents were asked to choose one. 9% 20% 24% 31% 16% We have a formal and advanced detection function that brings together each category of modern technology (host-based malware detection, antivirus, network- based malware detection, DLP, IDS, next-gen firewalls, log aggregation) and uses sophisticated data analytics to identify anomalies, trends and correlations. We have formal processes for threat collection, dissemination, integration, response, escalation and prediction of attacks We have a formal detection program that leverages modern technologies (host- based and network-based malware detection, behavioral anomaly detection, etc.) to monitor both internal and external traffic. We use ad hoc processes for threat collection, integration, response and escalation We utilize a security information and event management (SIEM) solution to actively monitor network, IDS/IPS and system logs. We have an informal response and escalation processes in place We have perimeter network security devices (i.e., IDS). We do not have formal processes in place for response and escalation We do not have a detection program
  • 23. Page 23 GISS 2014 results: How do you ensure that your external partners, vendors or contractors are protecting your organization’s information? Get ahead of cybercrime — EY’s Global Information Security Survey 2014 13% 8% 24% 34% 27% 27% 27% 56% No reviews or assessments performed Fourth parties (also known as sub-service organizations) are identified and assessments performed (e.g., questionnaires issued, reliance placed on your vendor's assessment processes) Only critical or high-risk third parties are assessed Self-assessments or other certifications performed by partners, vendors or contractors Independent external assessments of partners, vendors or contractors (e.g., SSAE 16, ISAE-3402) Accurate inventory of all third-party providers, network connections and data transfers is maintained and regularly updated All third parties are risk-rated and appropriate diligence is applied Assessments performed by your organization’s information security, IT risk, procurement or internal audit function (e.g., questionnaires, site visits, security testing) Respondents were asked to choose all that apply.
  • 24. Page 24 Adapt - take action to improve and transform 1. Design and implement a transformation program ► Get external help in designing the program, and providing program management. 2. Decide what to keep in-house and what to outsource 3. Define a RACI matrix for cybersecurity 4. Define the organization’s ecosystem ► Make moves to eliminate or lessen potential security gaps in your interaction with third parties 5. Introduce cybersecurity awareness training for employees Get ahead of cybercrime — EY’s Global Information Security Survey 2014
  • 25. Page 25 Anticipate Get ahead of cybercrime — EY’s Global Information Security Survey 2014
  • 26. Page 26 Anticipate: a proactive state of readiness ‘Anticipate’ means embracing cybersecurity as a core aspect of the business and being in a proactive state of readiness: ► Built-beyond security ► Cybersecurity capabilities are part of a dynamic decision process ► Prioritize your “crown jewels” - understand the impact of a breach ► A focus on the future environment ► Understand the wider threat landscape and how it relates to the organization – use cyber threat intelligence ► Continually learn and evolve in a cycle of continual improvement ► A proactive approach ► Be confident in your incident response and crisis response mechanisms ► Regularly rehearse your incident response capabilities Get ahead of cybercrime — EY’s Global Information Security Survey 2014
  • 27. Page 27 GISS 2014 results: Organizations are not planning for the future Get ahead of cybercrime — EY’s Global Information Security Survey 2014 58%of organizations do not have a role or department focused on emerging technologies and their impact on information security. 36%of respondents do not have a threat intelligence program.
  • 28. Page 28 Get ahead of cybercrime — EY’s Global Information Security Survey 2014 Company one Company two Collaboration Climate Collaboration within the ecosystem
  • 29. Page 29 Share knowledge and skills with your ecosystem All organizations face the same challenges and are learning that collaboration bears fruit, especially if done in a targeted fashion. ► Collaboration provides the organization with greater awareness of its partners and supply chain, and the ability to influence and learn from the whole ecosystem. ► Larger organizations’ security capabilities are often far more mature than those of some of their suppliers, so knowledge-sharing around cybersecurity, or coordinating cybersecurity activities with suppliers can be much more effective than going it alone. ► A shared solution tightens the protective layers in and around your ecosystem. ► Any incident response exercises should include third parties and other players in your wider ecosystem. Get ahead of cybercrime — EY’s Global Information Security Survey 2014
  • 30. Page 30 Anticipate: take action - and get ahead Get ahead of cybercrime — EY’s Global Information Security Survey 2014 1. Design and implement a cyber threat intelligence strategy ► Use threat intelligence to support strategic business decisions 2. Define and encompass the organization’s extended cybersecurity ecosystem ► Define RACI and trust models and enact cooperation, sharing capabilities where advantageous 3. Take a cyber economic approach ► Understand the value of your most vital cyber assets 4. Use forensics and analytics ► Use the latest technical tools to analyse where the likely threats are coming from and when 5. Ensure everyone understands what’s happening ► Strong governance, user controls and regular communications
  • 31. Page 31 Summary Get ahead of cybercrime — EY’s Global Information Security Survey 2014
  • 32. Page 32 Anticipate Adapt Activate Cybersecurity system building blocks - the 3A’s Get ahead of cybercrime — EY’s Global Information Security Survey 2014 What it is Cybersecurity system building blocks Status Anticipate is about looking into the unknown. Based on cyber threat intelligence, potential hacks are identified; measures are taken before any damage is done. Anticipate is an emerging level. More and more organizations are using cyber threat intelligence to get ahead of cybercrime. It is an innovative addition to the below. Adapt is about change. The cybersecurity system is changing when the environment is changing. It is focused on protecting the business of tomorrow. Adapt is not broadly implemented yet. It is not common practice to assess the cybersecurity implications every time an organization makes changes in the business. Activate sets the stage. It is a complex set of cybersecurity measures focused on protecting the business as it is today. Activate is part of the cybersecurity system of every organization. Not all necessary measures are taken yet; there is still a lot to do.
  • 33. Page 33 Want to learn more? Get ahead of cybercrime — EY’s Global Information Security Survey 2014 Achieving resilience in the cyber ecosystem www.ey.com/cyberecosystem Reducing risk with Cyber Threat Intelligence www.ey.com/CTI Security Operations Centers: - helping you get ahead of cybercrime www.ey.com/SOC Privacy trends 2014: privacy protection in the age of technology www.ey.com/privacy2014 Identity and access management: beyond compliance www.ey.com/IAM Building trust in the cloud: creating confidence in your cloud ecosystem www.ey.com/cloudtrust Big data: changing the way businesses compete and operate www.ey.com/bigdatachange Please visit our Insights on governance, risk and compliance series at www.ey.com/GRCinsights Cyber program management: identifying ways to get ahead of cybercrime www.ey.com/CPM
  • 34. Page 34 Further information Get ahead of cybercrime — EY’s Global Information Security Survey 2014 See the full report: Get ahead of cybercrime – EY’s Global Information Security Survey 2014: www.ey.com/giss2014 View more of EY’s insights on cybersecurity on: www.ey.com/cybersecurity For further GRC thought leadership, please refer to our Insights on governance, risk and compliance series on: www.ey.com/GRCinsights To discuss your cybersecurity issues further, please contact your EY representative: Ivan Dragaš, CISA ivan.dragas@rs.ey.com
  • 35. Page 35 Thank you for your attention!

Hinweis der Redaktion

  1. Reports in the media regularly illustrate that cyber threats are increasing. As we discussed in the GISS 2013 report, even if you have not experienced an attack yet, you should assume that your organization will have been targeted, or that your security has already been breached. Cyber threats will continue to multiply and the damage caused by a cyber attack can severely impact a business. The advent of the digital world, and the inherent interconnectivity of people, devices and organizations, opens up a whole new playing field of vulnerabilities. In our Global Information Security Surveys of 2012 (Fighting to close the gap) and 2013 (Under Cyber Attack) we described this trend. What companies used to know and do to protect their most valued information (‘their crown jewels’) is no longer enough. What everyone wants to know is “what can companies do about cybercrime?”
  2. Attackers have access to significant funding; they are more patient and sophisticated than ever before; and they are looking for vulnerabilities in the whole operating environment — including people and processes. The resilience of operational technology systems (OT systems, such as power generators, transportation systems, flight control systems and gas distribution systems) becomes more and more important and more and more challenging at the same time. New technologies, regulatory pressure and changing business requirements call for more cybersecurity. However, securing OT is not an easy task due to the complexities of the OT environments, legacy systems, different vendor architectures, and cultural differences between OT and IT teams. Due to the relative ease of access via IP-addresses, OT systems are often targets for cyber criminals and should be included in an organization’s approach to improving cyber maturity. Examples of attacks have included: Infection by a worm virus of process control systems that ran a railway network, causing the unreliable usage of the railway tracks Access to a bank’s facility management system and manipulation of the building’s internal air conditioning system that caused servers to shut down due to over-heating Malware that destroyed the controls systems of a nuclear power plant, or process controls over the upstream installation of an oil and gas company
  3. In our previous surveys, employees were seen as the most likely source of an attack. In this year’s GISS, employees are still seen as a significant risk. However, for the first time, we found that when the different types of external attacker were combined (criminal syndicates, state sponsored attackers, hacktivists and lone wolf hackers) these threats were considered to be significantly more likely as a risk source. And nearly all our respondents have one or more external attackers included in their rating.
  4. What are the roadblocks that need to be removed before an organization can successfully get ahead of cybercrime? Roadblock 1 — Lack of agility Our survey respondents also tell us that there are still known vulnerabilities in their cyber defenses. In other words, it is understood that there is a clear and present danger, but organizations are not moving fast enough to mitigate the known vulnerabilities — 65% tell us that they lack real-time insight on cyber risks. As a result, organizations are lagging behind in establishing foundational cybersecurity. Roadblock 2 — Lack of budget In former years, we have been relatively positive about the difference between the available budget for cybersecurity and the amount of budget that was necessary, as we have seen a year-on-year increase of cybersecurity budgets. Now, for the first time, we see more organizations reporting that their budgets will remain flat. Although we are experiencing ever greater attention on cybercrime in the boardroom and from non-executive directors around the globe, it seems that this interest doesn’t translate into additional money. Nevertheless, there is still a need for more money and resources to face the growing threats effectively. Roadblock 3 — Lack of cybersecurity skills The most important roadblock is the lack of cybersecurity skills. While the need for specialists deepens, every year our survey shows that the lack of specialists is a constant and growing issue. Also there is the need to build skills in non-technical disciplines to integrate cybersecurity into the core business. Our survey points out that it is very difficult to hire the specialists necessary to perform analysis on threat intelligence data, draw relevant and actionable conclusions, and enable decisions and responses to be taken.
  5. There are different stages of the journey to cybersecurity maturity — which need to be executed in a tight sequence (and consistently recurring) to deliver state-of-the-art cybersecurity: Activate, Adapt and Anticipate (the three As). We have found that organizations’ responses to cybercrime fall into these three distinct stages, and the aim should be to implement ever more advanced cybersecurity measures at each stage.
  6. Activate Organizations need to have a solid foundation of cybersecurity. This comprises a comprehensive set of information security measures which will provide basic (but not good) defense against cyber attacks. At this stage, organizations establish their fundamentals — i.e., they “activate” their cybersecurity. Adapt Organizations change — whether for survival or for growth. Threats also change. Therefore, the foundation of information security measures must adapt to keep pace and match the changing business requirements and dynamics otherwise they will become less and less effective over time. At this stage, organizations work to keep their cybersecurity up-to-date; i.e., they ‘adapt’ to changing requirements. Anticipate Organizations need to develop tactics to detect and detract potential cyber attacks. They must know exactly what they need to protect (their ‘crown jewels’), and rehearse appropriate responses to likely attack/ incident scenarios (including accidents): this requires a mature cyber threat intelligence capability, a robust risk assessment methodology, an experienced incident response mechanism, and an informed organization. At this stage, organizations are more confident about their ability to handle more predictable threats and unexpected attacks; i.e., they ‘anticipate’ cyber attacks.
  7. Every organization needs a solid foundation of cybersecurity. Putting this foundation in place is not an easy task and the specifics of exactly what is needed will depend on industry sector and geography. This is not new: in our Global Information Security Survey report of 2012 (Fighting to close the gap) we explored the gap between the actual cybersecurity measures taken and the necessary foundational cybersecurity components that should be in place.
  8. Organizations in this level can only deal with threats in a world without change. Organizations that have activated the foundations for cybersecurity but not moved beyond this will typically display the following three shortfalls in their capabilities, demonstrating why the journey must continue. 1. Bolt-on cybersecurity The organization’s cybersecurity has been added on to business processes and activities. It has not yet been integrated into the business, it is not seen as an added-value activity and is viewed as a cost factor which needs to be limited as much as possible. If application development is all about security certification approval after development or at major gates, the organization is stuck here … with bolt-on security. 2. A focus on safeguarding the current environment This foundation level for cybersecurity starts with looking at the risks the organization is already aware of based on prior experience; the goal is to make sure the measures are in place that will solve any weaknesses. If conversations are just around risk assessments, controls efficiency and risk mitigation, the organization remains in the Activate level. 3. A static approach This level of cybersecurity capability is aimed at enabling the business to carry out its known and regular day-to-day functions securely. The organization will be rule-based and compliance-driven, relying on metric-driven reporting — it can only deal with known threats.
  9. Organizations that have not yet reached the foundational level of cybersecurity need to act fast. To help them, here are six of the most frequently overlooked yet critical actions to be considered urgently: 1. Security assessment and roadmap Conduct a cyber threat assessment, current state maturity assessment, target state definition, gap analysis and design of implementation roadmap, alignment with leading practices such as ISO 27001. 2. Get Board-level support for a security transformation Redefine cybersecurity governance, e.g., realigning cybersecurity outside of the IT function and ensure that the Board understand processes. 3. Review and update security policies, procedures and supporting standards Implement an information security management system (ISMS) 4. Establish a Security Operations Center (SOC) Develop monitoring of known cases and incident response procedures. 5. Design and implement cybersecurity controls. Assess the effectiveness of data loss prevention processes and IAM. Harden the security of IT assets, such as servers and firewalls, network components and databases. 6. Test business continuity plans and incident response procedures Instigate regular penetration testing of the network perimeter, ingress points and software applications; and identify exploitable weaknesses.
  10. Organizations that have established the foundation of cybersecurity have commenced the journey, but to remain competitive, a business must constantly change and adapt to a changing business environment and to the evolving threats that come along with those changes. As a result, the organizations’ cybersecurity requirements will need to change as well — changing the control infrastructure and technology capability/usage to support the improved situational awareness of known risks.
  11. The Adapt stage adds the following features to the Activate level: 1. Built-in security Cybersecurity is considered and involved in everything the organization does: whether that is the development of a new business process, opening a new plant, an acquisition or the introduction of a new product. Changes in the business are immediately assessed from a cybersecurity perspective (it is not an afterthought) and changing cybersecurity requirements are built in to all business processes. As a result, cybersecurity will be up-to-date continuously. 2. A focus on the changing environment A more mature cybersecurity continuously adapts to ongoing changes in the business and its environment. For instance: going digital or using cloud services can introduce risks the organization was not facing before. Increased situational awareness enables the risk assessment to incorporate internal changes, and to be able to react to expected changes in the threat landscape. 3. A dynamic approach The organization’s cybersecurity is flexible, agile and under constant revision. It continually adapts to better protect the business.
  12. Organizations are undergoing constant change. The necessity to integrate new technologies (social media, cloud, digital, big data, etc.) into business processes The exponential rise of mobile devices (BYOD, etc.), blurring the lines between the business and personal world The growth in managed services and remote hosting, with greater reliance on complex apps (many hosted remotely) The integration of process control infrastructure with the back office and the outside world Rapidly changing regulatory environment and requirements As a result, organizations have to cope with a never-ending cycle of new threats and challenges requiring the adoption of a never-ending cycle of improvement and re-evaluation of the changing cybersecurity capabilities.
  13. In order to get ahead of cybercrime, it s essential to keep your cybersecurity measures 100% aligned with your business. This challenge has been high on the agenda for several years, and improvement has been made year on year. However, for the first time in five years, the GISS survey shows us that organizations are effectively going backwards. Organizations are continuing to improve their cybersecurity, but the changes in the threat are travelling at an even faster rate. This also indicates that organizations are becoming more aware of the reality of threats — from the news or personal experience. These results show that organizations need to get more serious about cybersecurity. Using the improvement cycle will help them get back on track.
  14. The current state.
  15. Organizations that have not yet reached the foundational level of cybersecurity need to act fast. To help them, here are six of the most frequently overlooked yet critical actions to be considered urgently: 1. Security assessment and roadmap Conduct a cyber threat assessment, current state maturity assessment, target state definition, gap analysis and design of implementation roadmap, alignment with leading practices such as ISO 27001. 2. Get Board-level support for a security transformation Redefine cybersecurity governance, e.g., realigning cybersecurity outside of the IT function and ensure that the Board understand processes. 3. Review and update security policies, procedures and supporting standards Implement an information security management system (ISMS) 4. Establish a Security Operations Center (SOC) Develop monitoring of known cases and incident response procedures. 5. Design and implement cybersecurity controls. Assess the effectiveness of data loss prevention processes and IAM. Harden the security of IT assets, such as servers and firewalls, network components and databases. 6. Test business continuity plans and incident response procedures Instigate regular penetration testing of the network perimeter, ingress points and software applications; and identify exploitable weaknesses.
  16. There is only so much an organization can do to respond to threats that have already arisen. But an organization that can only react to new threats once they have become active may well find out that it has acted too late. The only way to get ahead in this complex and dynamic environment is to grasp the challenges head on — embrace cybersecurity as a core aspect of the business, and as an integral capability to survive and thrive. Becoming successful and staying successful is a never-ending journey, and building and maintaining the organization’s cybersecurity capability is part of this. The ambition should be to move to a state of readiness — to be able to anticipate what is likely to happen and to prepare, act and respond accordingly. To do this means shedding the “victim” mindset of operating in a perpetual state of uncertainty (and anxiety) about unknown cyber threats, leaving the organization open to unpleasant and damaging surprises. It means building awareness and advanced capabilities, developing a compelling strategy and installing cybersecurity components throughout the business: it means promoting confidence in the organization’s ability to deal with cybercrime.
  17. To be at the Anticipate stage, the following characteristics need to be added: 1. Built-beyond security • Be alert, ready to act and respond quickly, in a balanced manner. Leadership accepts cyber threats/risks as a core business issue, and cybersecurity capabilities are part of a dynamic decision process. This enables preventative action and response mechanisms to operate smoothly and quickly. • Know your “crown jewels.” The organization cannot be ready for attacks if it does not know the assets most valuable to the business. It must be able to prioritize these assets and understand the impact of them being breached, compromised or made unavailable in any way; then link this into the threat assessment process. 2. A focus on the future environment • Know your environment, inside and out. Comprehensive, yet targeted, situational awareness is critical to understanding the wider threat landscape and how it relates to the organization. Cyber threat intelligence can bring this knowledge — it incorporates both external and internal sources of risk, and covers both the present and future, while learning from the past. • Continually learn and evolve. Nothing is static — not the criminals, not the organization or any part of its operating environment — therefore the cycle of continual improvement remains. Become a learning organization: study data (including forensics); maintain and explore new collaborative relationships; refresh the strategy regularly and evolve cybersecurity capabilities. 3. A proactive approach • Be confident in your incident response and crisis response mechanisms. Organizations that are in a state of anticipation regularly rehearse their incident response capabilities. This includes war gaming and table top exercises, through to enacting complex incident scenarios that really test the organization’s capabilities.
  18. The sharing of information across a business ecosystem in a larger group (whether adhoc, semi-formal, or a moderated formal environment), is the secret ingredient for organizations that have the most success at understanding, scoping and mitigating intrusions in their networks.
  19. Collaboration provides the organization with greater awareness of its partners and supply chain, and the ability to influence and learn from the whole ecosystem. Our survey highlights the current lack of collaboration. Larger organizations need to understand that their security capabilities are often far more mature than those of some of their suppliers, so knowledge-sharing around cybersecurity, or coordinating cybersecurity activities with suppliers can be much more effective than going it alone. A shared solution tightens the protective layers in and around your ecosystem. However, it would require an organization to develop a “trust model,” however, based around authentication, assurance agreements, etc. Any incident response exercises should include third parties and other players in your wider ecosystem.
  20. If your organization is ready to move into the Anticipate level, here are five vital actions we suggest you should take: 1. Design and implement a cyber threat intelligence strategy The Information Security function should work with the Board to help them understand how to use threat intelligence to support strategic business decisions and leverage the value of cybersecurity. 2. Define and encompass the organization’s extended cybersecurity ecosystem Work with others in the organization’s extended ecosystem to define RACI and trust models and enact cooperation, sharing capabilities where advantageous. 3. Take a cyber economic approach Understand which are the organization’s most vital cyber assets and their value to the cyber criminals, then re-evaluate plans to invest in security. 4. Use forensics and analytics Take advantage of the latest technical tools to analyze where the likely threats are coming from and when, increasing your ability to combat them. 5. Ensure everyone understands what’s happening Strong governance, user controls and regular communications will update employees and keep then acting as the eyes and ears of the entire organization.
  21. To summarize – the 3A’s. Anticipate is about looking into the unknown. Based on cyber threat intelligence, potential hacks are identified; measures are taken before any damage is done. Adapt is about change. The cybersecurity system is changing when the environment is changing. It is focused on protecting the business of tomorrow. Activate sets the stage. It is a complex set of cybersecurity measures focused on protecting the business as it is today. Where are you on the cybersecurity maturity journey? How can we help you to move to the next level?