Session 3.4 - Cyber Security Risk
Session 3.4 - Cyber Security Risk
Session 3.4 - Cyber Security Risk
MANAGEMENT
IASA Ohio Chapter Fall Conference
November 21, 2016
Page 2
Today’s Threat Landscape
Regulatory Requirements
Cybersecurity Mitigation
Conclusion
Page 3
TODAY’S
THREAT
LANDSCAPE
Page 4
CYBERSECURITY TODAY
COMPUTER INTRUSIONS:
This year, companies that had
data breaches involving less than 10,000 records, the
average cost of data breach was $4.9 million and
those companies with the loss or theft of more than
50,000 records had a cost of data
breach of $13.1 million.
TODAY’S
BUSINESS E-MAIL COMPROMISE: Between January 2015
• Intel Security Report, Grand Theft Data: Data exfiltration study: Actors, tactics, and detection
• 2016 Data Breach Study: United States, Benchmark research sponsored by IBM Independently
conducted by Ponemon Institute LLC, June 2016
• FBI Public Service Announcement, June 14, 2016; Alert Number I-061416-PSA
Page 5 • Understanding the Depth of the Global Ransomware Problem, Osterman Research Survey Report,
Published August 2016, Sponsored by Malwarebytes
CYBERSECURITY TODAY
TODAY’S
THREAT
LANDSCAPE
Page 6
• Intel Security Report, Grand Theft Data: Data exfiltration study: Actors, tactics, and detection
• Intel Security Report, Dissecting the Top Five Network Attack Methods: A Thief’s Perspective
TODAY’S LANDSCAPE: DATA
BREACHES BY THE NUMBERS
Page 7 2016 Data Breach Study: Global Analysis, Benchmark research sponsored by IBM Independently
conducted by Ponemon Institute LLC
June 2016
CYBER INTRUSIONS INCREASING
2016
2015
2014 HackingTeam
2013
2012
2011
2010
Rate of breaches increasing since 2005
2009
Cross-industry impact: healthcare,
2008 retail, insurance, technology, financial
services
2007 Multiple types of breaches/threats
Page 8
CYBER THREATS CANNOT
BE ELIMINATED. THEY CAN
ONLY BE MITIGATED.
“I always tell [our workers], ‘Don't ever forget that
at the end, we’re dealing with a choice that some
human made on a keyboard somewhere else in the
world … There was a man or woman on the other
end of this.’” – Admiral Michael Rogers, Director,
TODAY’S NSA and Cyber Command
THREAT
“The Russians hack our systems all the time, not just
LANDSCAPE government, but also corporate and personal systems.
And so do the Chinese and others, including non-state
actors. The point is, cyber will continue to be a huge
problem for the next Presidential administration, as it
has been a challenge for this one.” – Hon. James R.
Clapper, Director of National Intelligence
Page 9
ANATOMY OF A HACK
Page 10
INSURANCE COMPANY
BREACHES
TODAY’S
THREAT
LANDSCAPE
Page 11
REGULATORY
REQUIREMENTS
Page 12
Laws imposing civil or Laws requiring
criminal liability for implementation of
hacking security measures
Page 13
PROPOSED NEW YORK STATE
DEPARTMENT OF FINANCIAL SERVICES
REGULATION
REGULATORY
REQUIREMENTS
Page 14
NYDFS ESTABLISHMENT OF A
CYBERSEUCURITY PROGRAM
Page 15
NYDFS ADOPTION OF A
CYBERSECURITY POLICY
REGULATORY
Information security.
Data governance and
Systems and network
monitoring.
Page 18
NYDFS ADDITIONAL REQUIREMENTS
Page 19
NYDFS ADDITIONAL
REQUIREMENTS, CONT.
Multi-factor authentication for individuals accessing internal
systems who have privileged access or to support functions
including remote access.
Page 20
NAIC RAMPS UP
CYBERSECURITY EFFORTS
REGULATORY
REQUIREMENTS
Page 21
NAIC MODEL LAW
Page 22
NAIC MODEL LAW, CONT.
Page 23
NAIC MODEL LAW, CONT.
Page 24
NAIC MODEL LAW, CONT.
Page 25
UNDERSTANDING
YOUR RISK
Page 26
THREAT
VULNERABILITY
UNDERSTANDING + CONSEQUENCE
YOUR RISK
RISK
Page 27
TARGETED DATA
Defense,
National Business
PII PCI PHI Security, IP Intelligence
Critical MNPI
Infrastructure
Page 28
CYBERSECURITY RISKS
A set of scenarios based on impacts to Assets by
potential Threats and their ability to leverage
Vulnerabilities
ASSETS
Processes, Information, and Systems
with varying degrees of value to the
organization
UNDERSTANDING
YOUR RISK THREATS
Actors that are motivated to attack or
misuse your assets
VULNERABILITIES
Flaws, control weaknesses or
exposures of an asset to compromise
Page 29
DIGITIAL ASSET VALUATION
Page 30
DATA CLASSIFICATION
UNDERSTANDING DATA
YOUR RISK CLASSIFICATION
Classify Plan
Create classification
framework
Develop protection
profiles
Page 31
LIFE CYCLE OF DATA PRIVACY AND
PROTECTION
Creation /
Collection
YOUR RISK
Duration Use
Page 32
MOTIVATIONS AND INCENTIVES
Page 33
EMPLOYEE RISKS
Employees as cyber targets Negligent Employees
Phishing
Non-compliant Employees
Spearphishing / Social
Engineering
Email spoofing and
hijacking
UNDERSTANDING
YOUR RISK
Page 34
VULNERABILITIES
SOFTWARE PATCHING
Lack of software updates
ACCESS CONTROL
Who has access to your
system and do they really
need it?
UNDERSTANDING
YOUR RISK
THIRD PARTY VENDORS
Are your third party vendors
secure?
PEOPLE
Internal actors up to no good
or being exploited
Page 35
CYBERSECURITY
RISK
MANAGEMENT
OVERVIEW
Page 36
WHAT IS “CYBERSECURITY RISK
MANAGEMENT PROGRAM”?
Integrated set of policies, processes,
technologies and controls that minimize
vulnerabilities and protect against
threat to support
CYBERSECURITY Confidentiality – information kept
private and secure
RISK
Integrity – data not inappropriately
MANAGEMENT modified, deleted or added
Page 37
A HOLISTIC APPROACH
CYBERSECURITY
RISK
MANAGEMENT
OVERVIEW
Page 38
CYBERSECURITY
MITIGATION
Page 39
BDO CYBERSECURITY FRAMEWORK
Page 40
RECOMMENDED STEPS FOR
MITIGATION
AWARENESS AND CONFIGURATION
TRAINING
MITIGATION
ANTI-VIRUS and APP WHITELISTING
MALWARE
Page 41
RECOMMENDED STEPS FOR
REMEDIATION
ISOLATE
Affected computers
IMPLEMENT
Incident Response and BC Plans
Page 42
THREAT INTELLIGENCE
Intelligence
Page 43
INFORMATION SHARING
CHANNELS
CYBERSECURITY
MITIGATION
Page 44
CONCLUSION
Page 45
Cyber Risk Management Strategy &
Program Design
Cyber Risk Assessment & Security Testing
Data Privacy & Protection
Security Architecture & Transformation
Incident Response Planning
OUR
Business Continuity Planning & Disaster
CYBERSECURITY Recovery
SERVICES Digital Forensics & Cyber Investigations
Cyber Insurance Claim Preparation &
Coverage Adequacy Evaluation
Page 46
JUDY SELBY
Managing Director
BDO Consulting
Technology Advisory Services
Page 47
About BDO Consulting
BDO Consulting, a division of BDO USA, LLP, provides clients with Financial
Advisory, Business Advisory and Technology Services in the U.S. and around the
world, leveraging BDO’s global network of more than 64,000 professionals.
Having a depth of industry expertise, we provide rapid, strategic guidance in
the most challenging of environments to achieve exceptional client service.
BDO is the brand name for BDO USA, LLP, a U.S. professional services firm
providing assurance, tax, advisory and consulting services to a wide range of
publicly traded and privately held companies. BDO USA, LLP, a Delaware
limited liability partnership, is the U.S. member of BDO International Limited,
a UK company limited by guarantee, and forms part of the international BDO
network of independent member firms. BDO is the brand name for the BDO
network and for each of the BDO Member Firms. For more information please
visit: www.bdo.com.