B12 Glen Siriano - Continuity Insights
Transcription
B12 Glen Siriano - Continuity Insights
Cyber Security From The Front Lines Glenn A Siriano October 2015 Agenda Setting the Context Business Considerations The Path Forward Q&A Cyber Security Context Cyber Has Become a Boardroom Conversation June 2011 – Electronic transaction processing company target of Cyber attack. Global Payments reported that its servers housing personal information collected from merchants were attacked impacting between 1.5 million and 7 million customers. The company confirmed that expenses associated with the breach totaled more than $92 million including professional services fees, credit monitoring, identity protection insurance, fraud charges, and fines. Source: Bank Info Security July 2013 – Hackers use malware over several year period to steal more than 160 million credit card numbers. Cyber attackers from Russia and Ukraine collaborated in a scheme to target major corporate networks including NASDAQ, Dow Jones, and Heartland Payment Systems and were able to steal more than 160 million credit card numbers between 2005 and 2012. In total, the separate and devious operations spanned the globe, resulting in at least $300 million in losses to companies and individuals. Source: NY Daily News January 2015 – Anthem breach thought to impact between 69 – 80 million customer records. The second-largest health-insurer reported that hackers compromised its network using a stolen password to access a database containing personal information from current and former customers. Initial estimates indicate the breach could result in more than $100 million in financial consequences. Source: C-Net Cyber Risk “Perfect Storm” Growing Threat Level ’Bad Actors’ have evolved, Retail is 5th worst sector and 75% of data loss incidents in Retail are hacking related (2012)* Changing Technology Landscape Consumerization of IT, Cloud and ‘eroding perimeter’ Compliance Pressure Compliant does not necessarily mean sustainably (cyber) resilient * KPMG’s 2012 Data Loss Barometer; a global insight into lost and stolen information. Major market forces for Cyber in 2015 and Beyond Every day increasingly sophisticated and intelligent attackers are targeting the crown jewel information assets of organizations. Business impacts include lost revenues, operational disruption, remediation costs, claims and fines. EVOLVING THREAT ACTORS Smarter attackers with more resources, better tooling, and advanced goals. Drumbeat of fear, uncertainty, and doubt – especially about embedded systems / industrial control systems. Total information security spending is expected to reach $76.9bn in 2015 (source: Gartner). Marketing departments have taken note. New IT capabilities – from BYOD to cloud to big data – have serious impact on the security controls we need and can use. Our top security risk: misallocation of scarce resources – both time and money. CHANGING IT DELIVERY MODELS TOP CYBER RISKS IN 2015 INCREDIBLE VENDOR CLAIMS ! HEIGHTENED MEDIA COVERAGE 2015 Cyber by the Numbers: Audit Committee Research and KPMG AC Focus Area 55% of Audit Committee respondents feel that they should devote “more time” or “significantly more time” on Cyber for their agenda 50% of Boards have assigned Cyber oversight responsibilities to the Full Board or Audit Committee Organizations with structured leadership and strategy reduce average per record cost of a breach by $6.59/record lost) Brand Damage Loss of customer data can result in reputational risk and organizational brand damage (Companies average $3.32 million in brand damage per breach) Training & Awareness Organizations must invest in Cyber training and awareness for All employees, including C-Level Executives. It only takes One employee opening an email attachment to open the door for cyber criminals Cyber Oversight Improving Oversight of Cyber is No Longer Leading Practice…It’s Required Over recent years many global organizations have been victims of cybercrime. Investors, governments, and global regulators are increasingly challenging board members to actively demonstrate diligence in this area. Regulators expect personal information to be protected and systems to be resilient to both accidents and deliberate attacks. Potential impacts and possible implications for the board Intellectual property losses including patented and trademarked material, client lists and commercially sensitive data Reputational losses causing your market value to decline; loss of goodwill and confidence by customers and suppliers Penalties, w hich may be legal or regulatory fines such as regulatory fines, e.g., for data privacy breaches, and customer and contractual compensation, for delays Time lost due to investigating the losses, keeping shareholders advised and supporting regulatory authorities (financial, fiscal, and legal) Property losses of stock or information leading to delays or failure to deliver Administrative resource to correct the impact such as restoring client confidence, communications to authorities, replacing property, and restoring the organization business to its previous levels Typical Key Drivers of Cyber Mergers and acquisitions Launch of new services Complex regulatory requirements Big Data Technology automation Consumer trust and brand protection Third party management Cyber Defined Confusion in the Market… Business Issue Data People Theft Criticality Threats Board-Level Issue Compliance Security Insecurity Reporting & Metrics Confidentiality Global Competitive Advantage Transformation Technology Availability Top of Mind Security Information Financial Loss Integrity Data Loss Approach Complexity Value Breach Dynamic Process Disaster Threat Intelligence Governance Forensic Privacy Challenge Evolving Compliance Personal Technology KPMG Cyber Services… Risk-based protection of information in alignment with its value to the organization Information that is available to the business in the right way, at the right time, and to the right people Risk Business Resilience Cybersecurity …Complexity Strategic Cyber Security and Information Protection Services Breach Response & Investigation Services Vulnerability …A streamlined approach to accessible, protected Information Business Considerations Top Industry Issues/Challenges Market trends ■ Continued increase in regulations and regulatory enforcement (with greater global cooperation) across all industries ■ Increased expectations of technology and offshore resources to increase the efficiency and effectiveness of delivery ■ Cost pressures coupled with regulatory pressure to standardize technology and processes across disparate parts of the organization. ■ The rising external threat is demanding a proactive intelligence based approach to anticipating and reacting to the external threat. ■ Regulator focus and recent media attention on insider based incidents have increased attention on insider threat. ■ Regulators and Boards have demanded accountability across all lines of defense with the need for centralized ownership of Cyber within the second line of defense Market trends ■ The explosion of data across the organization, especially in unstructured data stores has demanded a refined approach to identification and protection of critical data across the enterprise. ■ Managing identity across the enterprise continues to be a common regulatory and audit finding. Risk is increased with the influx of temporary and contingent work-force. Some, with elevated or privileged levels of access. Emerging Cyber Risks Insider Threats: Data loss caused by negligent or malicious actions of authorized internal users. Data security incidents can be caused by employees or contingent workers with data access as a result of negligent behavior or malicious acts. Additionally, given the transient nature of the contingent workforce, it also presents challenges to help ensure the data stays within the organization upon individual’s departure. Data Proliferation: An expanding data footprint increases the risk of data loss or disclosure. As we have seen in most of financial services institutions unstructured data represents a large percentage of the total data within the environment. Because of the heavy business reliance on data analytics and the mobilization of data across various devices and platforms, multiple copies of data are being generated. Since there are limited options to control unstructured data access, unstructured data represents serious risks to data confidentiality, integrity, and availability. New & Emerging Technology: Adopting new technology introduces potential vulnerabilities. As more business is conducted online to improve customer experience, and IT plans to leverage cloud services, mobile technologies and technology outsourcing to provide services that offer flexibility, scalability, and achieve cost savings, these initiatives can lead to new risks to organization’s overall information security posture. Cyber Attacks & Malware: Business operations and connectivity opens infrastructure to risks. As the business seek to provide customers with more timely and accurate data, expanded offerings and programs, more interfaces, and more opportunities for access to information, perimeter and access control standards should be in line with the level of data criticality and confidentiality. Regulatory Developments and Priorities In April 2015, the PCI Security Standards Council released v3.1 of it Data Security Standard (DSS) in response to several high-profile vulnerabilities related to the Secure Sockets Layer (SSL) protocol (i.e., POODLE, Heartbleed, BERserk, FREAK, Logjam, RC4, etc.). As a result, SSL and early versions of the Transport Layer Security (TLS) protocol are no longer considered to be strong cryptography and cannot be used as a security control after June 30, 2016. Comptroller of the Currency Thomas J. Curry recently referred to cyber threats as “the foremost risk facing banks today” and “one of the major, if not the major, risk facing businesses of all sorts.”1 In the OCC’s 2015 Semiannual Risk Perspective, cyber threats and operational risk (i.e., information security, data protection, and third-party risk management) were listed as top supervisory priorities for community and midsize banks over the next 12 months. In the summer of 2014, the FFIEC piloted a cybersecurity examination work program that focused on cybersecurity inherent risk and preparedness and emphasized the need for information sharing. Drawing on the results of this pilot, the FFIEC released a Cybersecurity Assessment Tool in June 2015 to help banks evaluate their cybersecurity inherent risk profile and determine their level of cybersecurity maturity. Payment Card Industry (PCI) Standard Updates Increasing Supervision by the Office of the Comptroller of the Currency (OCC) Federal Financial Institutions Examination Council (FFIEC) Cybersecurity Assessment 1Remarks by Thomas J. Curry Comptroller of the Currency Before the New England Council Boston, Massachusetts July 24, 2015 Regulatory Focus Areas and Industry Activities Regulatory Focus Areas Industry Activities ■ Evaluation of Cybersecurity Inherent Risk ■ Top-Down Enterprise Risk Assessments ■ Enterprise Risk Management and Oversight ■ Cybersecurity Assessments and Benchmarking ■ Threat Intelligence and Collaboration ■ Refresh Information Governance Model ■ Data Classification and Risk-Based Controls ■ ■ External Dependency and Vendor Risk Management Revamp Identity Management and Access Control ■ Cyber Incident Management and Resilience (BCP/DR) Review Impact of Emerging Technology (Cloud, Social Media, etc.) and Products ■ Enhance Application Security/SDLC Integration ■ Data and Network Protection Practices ■ Enhance Data & Information Protection ■ Payment System and Data Hardening ■ ■ Information Sharing Improve Security Monitoring and Incident Management ■ Cloud Security ■ Participate in the Financial Services Information Sharing and Analysis Center (FS-ISAC) ■ Social Engineering and Insider Threats ■ Infrastructure Obsolescence Management ■ Application Security ■ Develop and Revise Policy & Standards ■ Data Loss Prevention (DLP) ■ ■ Privileged Access Management Maintain an Effective End-User Awareness Program ■ Change Management ■ Improve Third-Party Vendor Security Assessment Program ■ The Path Forward Cyber as Cost-Efficient Risk Management At the heart of KPMG’s approach to Cyber Security is the objective of helping clients maximize the value of their cyber security investment. Information Risk becomes Security as an IT Cost Business Advantage Security as a Business Investment Technology platform centric Target operating model–centric Bottom-line focused Strategically aligned with business objectives Driven by IT Business led Automation focused Process focused Success measured by timely deployment of technology Value added service delivery Technology is always the answer Success measured by achieving business value Poor ROI from many programs Technology is one enabler of transformation Starts with data (report on what I have, not what I need) Considers the security needs within the larger technology portfolio Analytics enabled Reduce time to value Six Key Aspects of Cyber Key domain layers Leadership and Governance Layer Describes how Boards and Executive Management demonstrate due diligence, ownership, and effective management of risk. People Layer Describes the level and integration of a security culture that empowers and helps ensure the right people, skills, culture, and knowledge. Business Continuity Layer Describes preparations for a security event and ability to prevent or lessen the impact through successful crisis and stakeholder management. Operations and Technology Layer The level of control measures implemented to address identified risks and reduce the impact of compromise. Information Risk Management Layer Details the approach to achieve thorough and effective risk management of information throughout the organization and its delivery and supply partners. Legal and Compliance Layer Meeting regulatory and compliance obligations as relevant. Comprehensive View to Cyber Maturity Cyber maturity address the following: The Result – End-to-End Cyber Protection PREVENT • DETECT RESPOND IMPROVE The approach is designed to be simple and effective, and most importantly, aligned with business needs. KPMG has aligned how we deliver our core cyber services accordingly: Helps the company understand how to align their cyber agenda with their dynamic business and compliance priorities. Helps the business maintain their cyber agenda as business and technology programs evolve, providing greater visibility and understanding of changing risks. Helps the company effectively and efficiently respond to cyber Incidents and conduct forensic analysis and detailed investigations. Helps the company build and improve their programs and processes, supported by the right organization and technology, to improve their cyber agenda. CYBER DEFENSE DIGITAL RESPONSE SERVICES TRANSFORMATION STRATEGY AND GOVERNANCE Attributes: Prevention Comprehensive in breadth (Target Operating Model) Benefits driven from strategy through execution Information driven approach Attributes: Detection End-to-end configuration Security Operations and Monitoring Security analytics Attributes: Response Digital evidence preservation and cyber investigations services Post-Breach analysis and mitigation Aligned with business priorities and compliance needs Attributes: Improvement Informed by technology strategy Long-term engagement delivery Business Outcome Focused High-level board oversight questions Based on our board outreach and education programs, these are the three most common questions at the executive management and board levels today: KPMG’s Global Cyber Maturity Framework Domains 1. What are the new cybersecurity threats and risks and how do they affect our organization? 2. Is our organization’s cybersecurity program ready to meet the challenges of today’s (and tomorrow ’s) cyber threat landscape? Board Engagement & Oversight 3. What key risk indicators should I be review ing at the executive management and board levels to perform effective risk management in this area? We designed a Global Cyber M aturity Framework specifically to assist organizations in addressing these critical questions by combining the most relevant aspects of international cybersecurity frameworks (e.g., NIST, ISO, AU35, ANSI, SANS, etc.). Cyber risk management A framework for exercising oversight responsibility LEGAL AND COM PLIANCE LEADERSHIP AND GOVERNANCE Regulatory and international certification standards as relevant OPERATIONS AND TECHNOLOGY The level of control measures implemented to address identified risks and reduce the impact of compromise M anagement demonstrating due diligence, ow nership, and effective management of risk Board Engagement & Oversight HUM AN FACTORS The level and integration of a security culture that empowers and helps to ensure the right people, skills, culture, and know ledge BUSINESS CONTINUITY AND CRISIS M ANAGEM ENT INFORM ATION RISK M ANAGEM ENT Preparations for a security event and ability to prevent or reduce the impact through successful crisis and stakeholder management The approach to achieve thorough and effective risk management of information throughout the organization and its delivery and supply partners Board oversight and engagement summary – Key performance indicators Leadership and Governance Understand governance structure and meet team Review output of capability assessment Review and approve strategy and funding Participate in general board education Request periodic updates of program Human Factors How Does the Board Gain Comfort? (Key Performance Indicators) Set the tone for the culture Review patterns/trends of personnel issues Understand training & awareness protocols Percentage of employee/contractors attending training Trends related to cyber from w histleblower or ethics Information Risk M gmt How Should the Board Engage? Understand risk management approach and risk Review and approve risk tolerance Understand third-party supplier program Review and question program metrics Security spend as a percent of overall IT budget Capability maturity review output Certifications w ithin key leadership positions Number of board education sessions (frequency) Risk Assessment output / linkage to ERM program Risk tolerance measures and metrics Number of “ high risk” third-party suppliers and review Review metric output (see other sections) Board oversight and engagement summary – Key performance indicators Legal & Compliance Operations & Business Continuity How Should the Board Engage? How Does the Board Gain Comfort? (Key Performance Indicators) Understand current response capability Review status of overall plan maturity M eet w ith communications personnel Participate in table-top exercises Number of mission critical business processes w ith Number of table top exercises (frequency) and results Understand current maturity of control Review relevancy of selected control Review relevant incident trend metrics M eet w ith CIO or equivalent to understand and information technology trends Percentage of “ crow n-jewel” assets included in Risk rating of security vulnerabilities (considering asset Cyber incident trends metrics Understand regulatory landscape impacting Clarify audit committee requirements for Review litigating inventory trends Review and approve cyber insurance Open regulatory and/or litigation matters Cyber insurance policy benchmarking w ith peer Thank you • Presentation by Glenn Siriano • KPMG LLP • gsiriano@kpmg.com • 203-521-8129 • © 2015 KPMG LLP, a Delaware limited liability partnership and the U.S. member firm of the KPMG network of independent member firms affiliated with KPMG International Cooperative (“KPMG International”), a Swiss entity. All rights reserved. • The KPMG name, logo and “cutting through complexity” are registered trademarks or trademarks of KPMG International.