PWC - Cyber Security and Business Continuity Management
PWC - Cyber Security and Business Continuity Management
com/ca
EPICC
Definition:
Cyber security is not just about technology
and computers. It involves people,
information systems, processes, culture and
physical surroundings as well as
technology.
It aims to create a secure environment
where businesses can remain resilient in
the event of a cyber breach.
True False
True False
True False
True False
Malicious Software
Laptops, desktops and handheld devices are being hacked using malicious
software resulting in exfiltration of sensitive and confidential corporate
documents / intellectual property.
Internal Attacks
Disgruntled employees sabotaging information systems impacting the
companys business operations.
PricewaterhouseCoopers LLP 9
Organizations today face four main types of cyber
adversaries
Adversary Motives Targets Impact
Economic, political, Trade secrets Loss of competitive
and/or military advantage Sensitive business advantage
Nation State information Regulatory inquiry/penalty
M&A information Disruption to critical
Critical financial systems infrastructure
PricewaterhouseCoopers LLP 10
The Global State of Information Security Survey
2016
10,000 17
Respondents Industries represented Reported annual revenues
51% C-suite level Top 5 34% at least US$1B
15% Director level 22% Technology 48% US$25 to $999M
34% Other (e.g. Manager, 10% Financial Services 26% less than US$100M
Analyst, etc.)
8% Consulting/Prof. Services 3% non-profit
39% Business and 61% IT
7% Engineering/ Construction
(18% increase compared to
2014) 7% Consumer Products &
Retail
160% increase in Incidents attributed Customer Attacks on IoT Security spending Average financial
detected to foreign nation- records continue devices and increased by 82% loss due to detected
incidents in states increased the to be the most systems are on over 2014, currently incidents is $1M
Canada (over most ( up 67% over targeted data the rise at 5% of IT spend (18% decrease from
2014) 2014) while (36%) 2014)
employees continue
to be the most cited
source of incidents
(66%)
Improving
organizational
resilience
+ -
Clarity
Efficiency Level of detail
Risk Management Organizational silos
Objective:
2 Continuity requirements
What resources does our organization need
3 Risk assessment
Limit the impact of disruptions on an organizations key services
1 Analysis
Identification of, crown jewels, information assets
Engaging IT resources early
Performing an explicit cyber risk assessment
Identification of operational controls gaps
Objective:
Identifies and selects appropriate tactics to determine how
continuity and recovery from disruptions will be achieved.
1 Design
Is the BCP program team a cyber security threat?
Are appropriate security resources included in the BCP program?
Is there appropriate physical security for facilities and logical
security over data?
Objective:
Executes the agreed strategies and tactics through the process of
developing the Business Continuity Plan.
1 Implementation
Do you need more than one incident management process?
Consider controls required to protect Personally Identifiable
Information (PII)
Consider requirements to control where/how information is posted
during a crisis
Ensure that leadership and IT response teams have regular
touchpoints
Ensure that crisis communications for cyber incidents is aligned
with the overall program
Recording activities
Objective:
Confirms that the BCM programme meets the objectives set in
the BC policy and that the organizations BCP is fit for purpose.
1 Validation
Use cybersecurity incident as an exercise scenario
Integrate audit / reviews / post incident reviews
Consider impact on maintenance update frequency
Objective:
Is the start of BCM lifecycle. It is the professional practice that defines
the organizational policy relating to BC and how that policy will be
implemented, controlled, and validated through a BCM programme.
Policy alignment
Integration
Use of cyber resources on program team
Objective:
Ongoing activity resulting from the BCM policy and programme
management stage of the BCM lifecycle. It seeks to integrate BC into
day-to-day business activities and organizational culture.
This publication has been prepared for general guidance on matters of interest only, and does not constitute professional advice. You should not act upon the
information contained in this publication without obtaining specific professional advice. No representation or warranty (express or implied) is given as to the
accuracy or completeness of the information contained in this publication, and, to the extent permitted by law, PricewaterhouseCoopers LLP, its members,
employees and agents do not accept or assume any liability, responsibility or duty of care for any consequences of you or anyone else acting, or refraining to
act, in reliance on the information contained in this publication or for any decision based on it.
2014 PricewaterhouseCoopers LLP. All rights reserved. In this document, PwC refers to PricewaterhouseCoopers LLP which is a member firm of
PricewaterhouseCoopers International Limited, each member firm of which is a separate legal entity.