Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

PwC Point of View on Cybersecurity Management

2,446 views

Published on

During this session, participants will learn about PwC’s Cybersecurity Management framework that assists enterprises in identifying crown jewels, threats & risks in the environment, architectural gaps, and assists in building cyber resilience program.

For more information, please visit http://cainc.to/Nv2VOe

Published in: Technology

PwC Point of View on Cybersecurity Management

  1. 1. PwC Point of View on Cybersecurity Management Prakash Venkata - Principal Gautam Sehgal - Director Security PwC Cybersecurity and Privacy SCT35S #CAWorld
  2. 2. 2 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD © 2015 CA. All rights reserved. All trademarks referenced herein belong to their respective companies. The content provided in this CA World 2015 presentation is intended for informational purposes only and does not form any type of warranty. The information provided by a CA partner and/or CA customer has not been reviewed for accuracy by CA. For Informational Purposes Only Terms of this Presentation
  3. 3. 3 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Abstract During this session, participants will learn about PwC’s Cybersecurity Management framework that assists enterprises in identifying crown jewels, threats & risks in the environment, architectural gaps, and assists in building cyber resilience program. Prakash Venkata PwC Principal Gautam Sehgal PwC Director
  4. 4. 4 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Agenda THE CHANGING NATURE OF THREATS REGULATORY AND COMPLIANCE FORCES ON THE INDUSTRY PWC’S CYBERSECURITY FRAMEWORK PWC’S APPROACH TO SOLVING CLIENTS’ CYBERSECURITY CHALLENGES HOW SOME OF CA SECURITY SOLUTIONS COMPLEMENT PWC’S APPROACH 1 2 3 4 5
  5. 5. 5 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD The Changing Nature of Threats Today’s Cybersecurity Challenges TodaysPervasiveChallenges Source: PwC Global State of Information Security Survey 2016 PwC 2015 US CEO Survey
  6. 6. 6 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Source: PwC Global State of Information Security Survey 2016 The Changing Nature of Threats How Business is Solving the Problem HowBusinessisSolvingtheProblem In 2015, organization’s across the globe increased Cybersecurity spending by and average of 24%
  7. 7. 7 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Regulatory and Compliance Forces on the Industry Data Security Across the Globe Heavy Robust Moderate Limited Data Security Regulation and Enforcement 20 28 2 0 2* 0 1 10 3 Data security and privacy challenges have forced cybersecurity and legal experts to better strategize how data is stored, secured, and used throughout the world. With nations maintaining disjointed security laws, it becomes difficult to ensure security and privacy compliance in every jurisdiction. The United States alone has roughly 20 sector specific or medium-specific national privacy or data security laws. Federally Enforced Security Laws Source: US Data Protection and Privacy Group 2014 *Does Not Include Individual EU Member Regulations Breach Notification Authority Collection & Processing Transfer Enforcement Electronic Marketing Online Privacy Data Security Regulation Coverage Security 0 [1] [1]
  8. 8. 8 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD PwC’s Cybersecurity Framework PwC’s Strategic Threat Analysis identifies high-level threat actors, the likelihood of exploitation for identified vectors, and the development of a threat model and associated threat matrix to identify potential attack combinations. Strategic Threat Analysis IT Security Architecture Cyber Resiliency Analysis PwC’s IT Security Architecture offering assesses the technologies and relationships between technologies to identify whether services are fully executed, partially executed, missing, or not used. PwC’s Cyber Resiliency Analysis identifies organizational, process, and technology controls used to protect, detect, and respond to potential threats to the environment. Strategy, Governance & Management Emerging Technologies & Market Trends Risk & Compliance Management Information & Privacy Protection Identity & Access Management Threat, Intelligence & Vulnerability Management Security Architecture & Services Security Domains
  9. 9. 9 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD PwC’s Approach to Solving Client’s Cybersecurity Challenges Align with the business Adapt to the future Manage risk and regulations Anticipate and respond to security crises Address threats and weaknesses Enable secure access Safeguard critical assets Secure by design Strategy, Governance & Management Emerging Technologies & Market Trends Risk & Compliance Management Incident & Crisis Management Information & Privacy Protection Identity & Access Management Threat, Intelligence & Vulnerability Management Security Architecture & Services
  10. 10. 10 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD How some of CA Security solutions Complement PwC’s approach Identity & Access Management Emerging Trends & Innovation Strategy, Governance & Management CA Data Protection CA Network Flow Analysis API Management & Security CA Cloud Service Management Identity Management & Governance CA Privileged Identity Management CA Advanced Authentication CA Single Sign-On (PKA CA SiteMinder) Mobile Security Payment Security Security Domains CA Solutions CA Project & Portfolio Management Threat, Intelligence & Vulnerability Management Information & Privacy Protection Security Architecture & Services
  11. 11. 11 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Q & A
  12. 12. 12 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD For More Information To learn more, please visit: http://cainc.to/Nv2VOe CA World ’15

×