SlideShare a Scribd company logo
1 of 50
TRUST
Competence Character
Capability
Results
Intent
Integrity
“ A c c e p t i t … t h e y a r e g o i n g t o g e t i n . ”
C I S O P a n e l – I S S A L o s A n g e l e s , M a y 2 0 1 7
T O D AY ’ S R E A L I T Y
ISSA Thru the Eyes of Cyber Professionals – Part 2
 ½ significantly vulnerable
 ½ somewhat vulnerable
World Economic Forum Risk Report - Feb 2017
 Technology is a source of disruption & polarization
 Top 5 risk trends
 Income/Wealth Disparity
 Climate Change
 Polarization of Societies
 Cyber Dependence
 Aging Population
TO D AY ’ S R E AL I T Y
Edelman Trust Report – Feb 2017
 Implosion of Trust – 2/3 distrusters
 We are in treacherous seas without
a firm mooring
Europol - Internet Crime Report – Oct 2016
 Acceleration of previous trends
 APT & cybercrime boundaries blur
 Majority of attacks are neither sophisticated
or advanced
TO D AY ’ S R E AL I T Y – C O N T.
9 B O X O F C O N T R O L S : R I S K M I T I G AT I O N
Where most of the
industry is focusedControlTypes
Respond
Detect
Prevent
Automated Semi-Automated Manual
Control Approaches
Source: Managing Risk and Information Security 2nd Edition Malcolm Harkins
TO D AY ’ S R E AL I T Y
Information security is an economic inefficiency.
Economic efficiency implies an economic state in which
every resource is optimally allocated to serve each
individual or entity in the best way while minimizing waste
and inefficiency.
The ideal state is related to the welfare of the population as
a whole with peak efficiency also resulting in the highest
level of welfare possible based on the resources available.
W H AT I S E C O N O M I C E F F I C I E N C Y ?
Our approach to information
security is the cause of
economic inefficiency.
TO D AY ’ S R E AL I T Y
TO D AY ’ S R E AL I T Y
We are not resistant to, nor are we resilient from, cyber risks.
T E M P O R AL AD VA N TA G E
To put it simply: threat actors have had
a temporal advantage over us. We have
been playing catch-up for decades.
74.1% correlation between
breach activity and security
industry revenue growth.*
TO D AY ’ S R E AL I T Y
*Piper Jaffray, Breacher Report – 10.16
 Cybersecurity stocks boom
after ransomware attack
 The market capitalizations of
the five biggest cybersecurity
related companies in the
industry rose by more than
$5.9 billion*
TO D AY S R E AL I T Y
WA N N A C RY M AY ‘ 1 7
* The Gaurdian and Fortune – May 2017
* Harvard Business School – Sept 2016
 America’s economic performance
peaked in the late 1990s
 America’s economic challenges
are structural, not cyclical
 Divisive political rhetoric and an
uninformed national debate have
confused the average American
about what the country needs to
do to restore the economy
 This confusion is a serious obstacle
to America’s ability to make progress
T H E S TAT E O F U S
C O M P E T I T I V E N E S S *
 There is almost a complete
disconnect between the national
discourse and the reality of what is
causing our problems and what to do
about them
 This misunderstanding of facts and
reality is dangerous, and the
resulting divisions make an already
challenging agenda for America even
more daunting
T H E S TAT E O F U S
C O M P E T I T I V E N E S S *
* Harvard Business School – Sept 2016
H U G E O P P O R T U N I T I E S I N AL L AR E A S O F L I F E
AC H I E V I N G E C O N O M I C E F F I C I E N C Y
Where most of the
industry is focusedControlTypes
Respond
Detect
Prevent
Automated Semi-Automated Manual
Control Approaches
Source: Managing Risk and Information Security 2nd Edition Malcolm Harkins
BUSINESS VELOCITY
BUSINESS CONTORL
V S
T H E 1 9 7 1 F O R D P I N TO
FAI L U R E TO I N C L U D E AN $ 11 PAR T
1911 SOUTH POLE EXPEDITION
1st to the Pole, led by Roald Amundsen 2nd to the Pole, led by Robert Scott
“…wait for the spring. To risk men and animals
by continuing stubbornly once we have set off,
is something I couldn't consider. If we are to
win the game, the pieces must be moved
properly; a false move and everything could be
lost.“ - Roald Amundsen, Norwegian Explorer
“Victory awaits him who has everything in order.
Defeat is certain for him who has neglected to
take all the necessary precautions in time.”
Roald Amundsen, on the South Pole
 Fanatical Discipline
 Productive Paranoia
 Empirical Creativity
 Limitless Ambition
Different Behaviors NOT
Different Circumstances
* Great by Choice
KEY LEARNINGS FROM
AMUNDSEN & 10XERS:
What about a
Formula One
racecar?
Designed for Speed and Safety.
Discipline, control,
communication,
and collaboration
between the driver
and the pit crew.
BUSINESS VELOCITY
BUSINESS CONTORL
A N D
T H E M O D E R N E N T E R P R I S E :
N E E D TO T U N E TO T H E TAR G E T
COST AND
MAINTENANCE
PRODUCTIVITY
AND USER EXP.
RISK AND
COMPLIANCE
MARKET
OBJECTIVES
CUSTOMER
NEEDS
P R E V E N T I O N
& PAN A M A
In 1879, the French started building
the Panama Canal.
Torrential rains averaging
200 inches a year washed away
much of the work.
H O W I T B E G AN
The Solution? Quinine…
…but the quinine used to treat
malaria left many workers deaf.
A TO X I C C O N T R O L
T H E T I M E L I N E
1903
• Panama declares itself
a country. US gains
construction rights.
Feb 1904
• US Congress
officially created the
Panama Canal Zone.
1909
• Work on canal
locks begins.
1913
• US Congress officially
created the Panama
Canal Zone.
Aug 15 1914
• Canal officially
opens in August.
Major Ronald Ross discovered that malaria
was transmitted by mosquitoes.
The control of malaria was vital for the
construction of the Panama Canal.
P R O B L E M ? S O L U T I O N .
Experts on sanitation.
Col. W.C. Gorgas, along
with others in 1904, formed
the sanitary department for
the canal zone.
A M AN . . .
H I S P L AN …
AN D A C AN A L .
 Eradication of yellow fever
 Death rate dropped in workers
from 11.59 per 1000 in
November 1906 to 1.23 per
1000 in December 1909
 Death rate dropped in total
population from 16.21 per 1000
in July 1906 to 2.58 per 1000 in
December 1909
M AL A R I A C O N T R O L
P R O G R AM R E S U LT S
The construction of the panama
canal was made possible only
after yellow fever and malaria
were controlled.
E C O N O M I C E F F I C I E N C Y
Malaria wasn’t eliminated but
the root causes were identified,
the source of problems were
prevented, and construction
was completed, leading to
dramatic worldwide social
and economic benefit.
L E S S O N S F O R S E C U R I T Y
“The greatest danger for most of us is not that
our aim is too high and we miss it, but that it is
too low and we reach it.”
Michelangelo
Italian Renaissance Man
“ A c c e p t i t … t h e y a r e g o i n g t o g e t i n . ”
C I S O P a n e l – I S S A L o s A n g e l e s , M a y 2 0 1 7
P R I VAC Y S H O U L D
B E I N C L U D E D I N
D E S I G N – N O T AS
AN AF T E R T H O U G H T.
“The ultimate measure of a man is not where he
stands in moments of comfort and convenience,
but where he stands at times of challenge and
controversy.”
Martin Luther King, Jr.
Times of Challenge and Controversy
E D E L M AN T R U S T R E P O R T 2 0 1 7
Onus is on business to prove that it’s possible to
act in the interest of shareholders and society.
“…where our interests are clear and our values
are at stake and we can make a difference, we
must act and we must lead.”
Madeline Albright, “Doability Doctrine”
Statement before SFRC January 8th 1997, Stockholm Sweden
C O M P U T I N G
D O N E R I G H T
Risk Reduction.
Economic Expansion.
Societal Benefit.
The list goes on…
ISO 27001 Training Courses
 ISO/IEC 27001 Introduction
1 Day Course
 ISO/IEC 27001 Foundation
2 Days Course
 ISO/IEC 27001 Lead Implementer
5 Days Course
 ISO/IEC 27001 Lead Auditor
5 Days Course
Exam and certification fees are included in the training price.
https://www.pecb.com/iso-iec-27032-training-courses| www.pecb.com/events
THANK YOU
?
mharkins@cylance.com
www.cylance.com
https://www.linkedin.com/in/malcolmharkins/
(888) 893-4743
Questions?

More Related Content

Similar to Trust and the Economics in the Age of Information Security

Udn vision studio_t_hu_presentation_2015 (final)
Udn vision studio_t_hu_presentation_2015 (final)Udn vision studio_t_hu_presentation_2015 (final)
Udn vision studio_t_hu_presentation_2015 (final)Thomas Hu
 
Eianz how good is science.. as good as the humans who perceive it michele h...
Eianz  how good is science.. as good as the humans who perceive it  michele h...Eianz  how good is science.. as good as the humans who perceive it  michele h...
Eianz how good is science.. as good as the humans who perceive it michele h...MicheleHartz
 
HR summit 2013 - Role of HR in Crisis Management & Organizational Sustainability
HR summit 2013 - Role of HR in Crisis Management & Organizational SustainabilityHR summit 2013 - Role of HR in Crisis Management & Organizational Sustainability
HR summit 2013 - Role of HR in Crisis Management & Organizational SustainabilityMarc Ronez
 
Crisis communication & the Austin Bombings
Crisis communication & the Austin BombingsCrisis communication & the Austin Bombings
Crisis communication & the Austin BombingsCorinne Weisgerber
 
Data and journalism: A pot of gold at the end of the rainbow?
Data and journalism: A pot of gold at the end of the rainbow?Data and journalism: A pot of gold at the end of the rainbow?
Data and journalism: A pot of gold at the end of the rainbow?Mirko Lorenz
 
Copyrighted Material 1 Shrink the Targets Disasters .docx
Copyrighted Material 1 Shrink the Targets Disasters .docxCopyrighted Material 1 Shrink the Targets Disasters .docx
Copyrighted Material 1 Shrink the Targets Disasters .docxvanesaburnand
 
Winning the Cybersecurity Battle
Winning the Cybersecurity BattleWinning the Cybersecurity Battle
Winning the Cybersecurity BattleGovLoop
 
Le Must-Read by Boostzone - April 2013
Le Must-Read by Boostzone - April 2013Le Must-Read by Boostzone - April 2013
Le Must-Read by Boostzone - April 2013Boostzone Institute
 
2015 august presentation stockholm mba programm
2015 august presentation stockholm mba programm2015 august presentation stockholm mba programm
2015 august presentation stockholm mba programmhan mesters
 
Royal Institution: Investing As If The Long Term Matters
Royal Institution: Investing As If The Long Term MattersRoyal Institution: Investing As If The Long Term Matters
Royal Institution: Investing As If The Long Term MattersDr Raj Thamotheram
 
2015 liquidity days ipb
2015 liquidity days ipb2015 liquidity days ipb
2015 liquidity days ipbhan mesters
 
Public Engagement In The Conversation Age
Public Engagement In The Conversation AgePublic Engagement In The Conversation Age
Public Engagement In The Conversation AgePiaras Kelly
 
Public Engagement in the Conversation Age - 2008
Public Engagement in the Conversation Age - 2008Public Engagement in the Conversation Age - 2008
Public Engagement in the Conversation Age - 2008Edelman Digital
 
Leadership and innovation presentation to UiO Green IT School
Leadership and innovation presentation to UiO Green IT SchoolLeadership and innovation presentation to UiO Green IT School
Leadership and innovation presentation to UiO Green IT SchoolRick Wheatley
 
ABUSE OF POWER AND WHITE COLLAR.pptx
ABUSE OF POWER AND WHITE COLLAR.pptxABUSE OF POWER AND WHITE COLLAR.pptx
ABUSE OF POWER AND WHITE COLLAR.pptxauthentic5
 
Free Printable Chinese Character Writing Grids Wr
Free Printable Chinese Character Writing Grids WrFree Printable Chinese Character Writing Grids Wr
Free Printable Chinese Character Writing Grids WrJennifer Perry
 

Similar to Trust and the Economics in the Age of Information Security (20)

Udn vision studio_t_hu_presentation_2015 (final)
Udn vision studio_t_hu_presentation_2015 (final)Udn vision studio_t_hu_presentation_2015 (final)
Udn vision studio_t_hu_presentation_2015 (final)
 
Eianz how good is science.. as good as the humans who perceive it michele h...
Eianz  how good is science.. as good as the humans who perceive it  michele h...Eianz  how good is science.. as good as the humans who perceive it  michele h...
Eianz how good is science.. as good as the humans who perceive it michele h...
 
UNITED NATIONS HIGH LEVEL POLITICAL 2018
UNITED NATIONS HIGH LEVEL POLITICAL 2018UNITED NATIONS HIGH LEVEL POLITICAL 2018
UNITED NATIONS HIGH LEVEL POLITICAL 2018
 
HR summit 2013 - Role of HR in Crisis Management & Organizational Sustainability
HR summit 2013 - Role of HR in Crisis Management & Organizational SustainabilityHR summit 2013 - Role of HR in Crisis Management & Organizational Sustainability
HR summit 2013 - Role of HR in Crisis Management & Organizational Sustainability
 
MEMEnomics 2010
MEMEnomics 2010  MEMEnomics 2010
MEMEnomics 2010
 
Crisis communication & the Austin Bombings
Crisis communication & the Austin BombingsCrisis communication & the Austin Bombings
Crisis communication & the Austin Bombings
 
Data and journalism: A pot of gold at the end of the rainbow?
Data and journalism: A pot of gold at the end of the rainbow?Data and journalism: A pot of gold at the end of the rainbow?
Data and journalism: A pot of gold at the end of the rainbow?
 
Copyrighted Material 1 Shrink the Targets Disasters .docx
Copyrighted Material 1 Shrink the Targets Disasters .docxCopyrighted Material 1 Shrink the Targets Disasters .docx
Copyrighted Material 1 Shrink the Targets Disasters .docx
 
Winning the Cybersecurity Battle
Winning the Cybersecurity BattleWinning the Cybersecurity Battle
Winning the Cybersecurity Battle
 
Le Must-Read by Boostzone - April 2013
Le Must-Read by Boostzone - April 2013Le Must-Read by Boostzone - April 2013
Le Must-Read by Boostzone - April 2013
 
observe_issue_4
observe_issue_4observe_issue_4
observe_issue_4
 
2015 august presentation stockholm mba programm
2015 august presentation stockholm mba programm2015 august presentation stockholm mba programm
2015 august presentation stockholm mba programm
 
Jems201302 dl
Jems201302 dlJems201302 dl
Jems201302 dl
 
Royal Institution: Investing As If The Long Term Matters
Royal Institution: Investing As If The Long Term MattersRoyal Institution: Investing As If The Long Term Matters
Royal Institution: Investing As If The Long Term Matters
 
2015 liquidity days ipb
2015 liquidity days ipb2015 liquidity days ipb
2015 liquidity days ipb
 
Public Engagement In The Conversation Age
Public Engagement In The Conversation AgePublic Engagement In The Conversation Age
Public Engagement In The Conversation Age
 
Public Engagement in the Conversation Age - 2008
Public Engagement in the Conversation Age - 2008Public Engagement in the Conversation Age - 2008
Public Engagement in the Conversation Age - 2008
 
Leadership and innovation presentation to UiO Green IT School
Leadership and innovation presentation to UiO Green IT SchoolLeadership and innovation presentation to UiO Green IT School
Leadership and innovation presentation to UiO Green IT School
 
ABUSE OF POWER AND WHITE COLLAR.pptx
ABUSE OF POWER AND WHITE COLLAR.pptxABUSE OF POWER AND WHITE COLLAR.pptx
ABUSE OF POWER AND WHITE COLLAR.pptx
 
Free Printable Chinese Character Writing Grids Wr
Free Printable Chinese Character Writing Grids WrFree Printable Chinese Character Writing Grids Wr
Free Printable Chinese Character Writing Grids Wr
 

More from PECB

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of CybersecurityDORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of CybersecurityPECB
 
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernanceSecuring the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernancePECB
 
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...PECB
 
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...PECB
 
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyPECB
 
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...PECB
 
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital TransformationISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital TransformationPECB
 
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsManaging ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsPECB
 
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?PECB
 
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...PECB
 
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...PECB
 
Student Information Session University KTMC
Student Information Session University KTMC Student Information Session University KTMC
Student Information Session University KTMC PECB
 
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...PECB
 
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...PECB
 
Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA PECB
 
IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?PECB
 
Information Session University Egybyte.pptx
Information Session University Egybyte.pptxInformation Session University Egybyte.pptx
Information Session University Egybyte.pptxPECB
 
Student Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptxStudent Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptxPECB
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023PECB
 

More from PECB (20)

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of CybersecurityDORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
 
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernanceSecuring the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
 
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
 
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
 
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
 
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
 
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital TransformationISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
 
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsManaging ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
 
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
 
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
 
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
 
Student Information Session University KTMC
Student Information Session University KTMC Student Information Session University KTMC
Student Information Session University KTMC
 
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
 
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
 
Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA
 
IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?
 
Information Session University Egybyte.pptx
Information Session University Egybyte.pptxInformation Session University Egybyte.pptx
Information Session University Egybyte.pptx
 
Student Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptxStudent Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptx
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023
 

Recently uploaded

Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 

Recently uploaded (20)

Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 

Trust and the Economics in the Age of Information Security

  • 1.
  • 3. “ A c c e p t i t … t h e y a r e g o i n g t o g e t i n . ” C I S O P a n e l – I S S A L o s A n g e l e s , M a y 2 0 1 7
  • 4.
  • 5. T O D AY ’ S R E A L I T Y
  • 6. ISSA Thru the Eyes of Cyber Professionals – Part 2  ½ significantly vulnerable  ½ somewhat vulnerable World Economic Forum Risk Report - Feb 2017  Technology is a source of disruption & polarization  Top 5 risk trends  Income/Wealth Disparity  Climate Change  Polarization of Societies  Cyber Dependence  Aging Population TO D AY ’ S R E AL I T Y
  • 7. Edelman Trust Report – Feb 2017  Implosion of Trust – 2/3 distrusters  We are in treacherous seas without a firm mooring Europol - Internet Crime Report – Oct 2016  Acceleration of previous trends  APT & cybercrime boundaries blur  Majority of attacks are neither sophisticated or advanced TO D AY ’ S R E AL I T Y – C O N T.
  • 8. 9 B O X O F C O N T R O L S : R I S K M I T I G AT I O N Where most of the industry is focusedControlTypes Respond Detect Prevent Automated Semi-Automated Manual Control Approaches Source: Managing Risk and Information Security 2nd Edition Malcolm Harkins
  • 9. TO D AY ’ S R E AL I T Y Information security is an economic inefficiency.
  • 10. Economic efficiency implies an economic state in which every resource is optimally allocated to serve each individual or entity in the best way while minimizing waste and inefficiency. The ideal state is related to the welfare of the population as a whole with peak efficiency also resulting in the highest level of welfare possible based on the resources available. W H AT I S E C O N O M I C E F F I C I E N C Y ?
  • 11. Our approach to information security is the cause of economic inefficiency. TO D AY ’ S R E AL I T Y
  • 12. TO D AY ’ S R E AL I T Y We are not resistant to, nor are we resilient from, cyber risks.
  • 13. T E M P O R AL AD VA N TA G E To put it simply: threat actors have had a temporal advantage over us. We have been playing catch-up for decades.
  • 14. 74.1% correlation between breach activity and security industry revenue growth.* TO D AY ’ S R E AL I T Y *Piper Jaffray, Breacher Report – 10.16
  • 15.  Cybersecurity stocks boom after ransomware attack  The market capitalizations of the five biggest cybersecurity related companies in the industry rose by more than $5.9 billion* TO D AY S R E AL I T Y WA N N A C RY M AY ‘ 1 7 * The Gaurdian and Fortune – May 2017
  • 16. * Harvard Business School – Sept 2016  America’s economic performance peaked in the late 1990s  America’s economic challenges are structural, not cyclical  Divisive political rhetoric and an uninformed national debate have confused the average American about what the country needs to do to restore the economy  This confusion is a serious obstacle to America’s ability to make progress T H E S TAT E O F U S C O M P E T I T I V E N E S S *
  • 17.  There is almost a complete disconnect between the national discourse and the reality of what is causing our problems and what to do about them  This misunderstanding of facts and reality is dangerous, and the resulting divisions make an already challenging agenda for America even more daunting T H E S TAT E O F U S C O M P E T I T I V E N E S S * * Harvard Business School – Sept 2016
  • 18.
  • 19. H U G E O P P O R T U N I T I E S I N AL L AR E A S O F L I F E
  • 20. AC H I E V I N G E C O N O M I C E F F I C I E N C Y Where most of the industry is focusedControlTypes Respond Detect Prevent Automated Semi-Automated Manual Control Approaches Source: Managing Risk and Information Security 2nd Edition Malcolm Harkins
  • 22. T H E 1 9 7 1 F O R D P I N TO
  • 23. FAI L U R E TO I N C L U D E AN $ 11 PAR T
  • 24. 1911 SOUTH POLE EXPEDITION 1st to the Pole, led by Roald Amundsen 2nd to the Pole, led by Robert Scott “…wait for the spring. To risk men and animals by continuing stubbornly once we have set off, is something I couldn't consider. If we are to win the game, the pieces must be moved properly; a false move and everything could be lost.“ - Roald Amundsen, Norwegian Explorer
  • 25. “Victory awaits him who has everything in order. Defeat is certain for him who has neglected to take all the necessary precautions in time.” Roald Amundsen, on the South Pole
  • 26.  Fanatical Discipline  Productive Paranoia  Empirical Creativity  Limitless Ambition Different Behaviors NOT Different Circumstances * Great by Choice KEY LEARNINGS FROM AMUNDSEN & 10XERS:
  • 27. What about a Formula One racecar?
  • 28. Designed for Speed and Safety.
  • 31. T H E M O D E R N E N T E R P R I S E : N E E D TO T U N E TO T H E TAR G E T COST AND MAINTENANCE PRODUCTIVITY AND USER EXP. RISK AND COMPLIANCE MARKET OBJECTIVES CUSTOMER NEEDS
  • 32. P R E V E N T I O N & PAN A M A
  • 33. In 1879, the French started building the Panama Canal. Torrential rains averaging 200 inches a year washed away much of the work. H O W I T B E G AN
  • 34. The Solution? Quinine… …but the quinine used to treat malaria left many workers deaf. A TO X I C C O N T R O L
  • 35. T H E T I M E L I N E 1903 • Panama declares itself a country. US gains construction rights. Feb 1904 • US Congress officially created the Panama Canal Zone. 1909 • Work on canal locks begins. 1913 • US Congress officially created the Panama Canal Zone. Aug 15 1914 • Canal officially opens in August.
  • 36. Major Ronald Ross discovered that malaria was transmitted by mosquitoes. The control of malaria was vital for the construction of the Panama Canal. P R O B L E M ? S O L U T I O N .
  • 37. Experts on sanitation. Col. W.C. Gorgas, along with others in 1904, formed the sanitary department for the canal zone. A M AN . . . H I S P L AN … AN D A C AN A L .
  • 38.  Eradication of yellow fever  Death rate dropped in workers from 11.59 per 1000 in November 1906 to 1.23 per 1000 in December 1909  Death rate dropped in total population from 16.21 per 1000 in July 1906 to 2.58 per 1000 in December 1909 M AL A R I A C O N T R O L P R O G R AM R E S U LT S
  • 39. The construction of the panama canal was made possible only after yellow fever and malaria were controlled. E C O N O M I C E F F I C I E N C Y
  • 40. Malaria wasn’t eliminated but the root causes were identified, the source of problems were prevented, and construction was completed, leading to dramatic worldwide social and economic benefit. L E S S O N S F O R S E C U R I T Y
  • 41. “The greatest danger for most of us is not that our aim is too high and we miss it, but that it is too low and we reach it.” Michelangelo Italian Renaissance Man
  • 42.
  • 43. “ A c c e p t i t … t h e y a r e g o i n g t o g e t i n . ” C I S O P a n e l – I S S A L o s A n g e l e s , M a y 2 0 1 7
  • 44. P R I VAC Y S H O U L D B E I N C L U D E D I N D E S I G N – N O T AS AN AF T E R T H O U G H T.
  • 45. “The ultimate measure of a man is not where he stands in moments of comfort and convenience, but where he stands at times of challenge and controversy.” Martin Luther King, Jr. Times of Challenge and Controversy
  • 46. E D E L M AN T R U S T R E P O R T 2 0 1 7 Onus is on business to prove that it’s possible to act in the interest of shareholders and society.
  • 47. “…where our interests are clear and our values are at stake and we can make a difference, we must act and we must lead.” Madeline Albright, “Doability Doctrine” Statement before SFRC January 8th 1997, Stockholm Sweden
  • 48. C O M P U T I N G D O N E R I G H T Risk Reduction. Economic Expansion. Societal Benefit. The list goes on…
  • 49. ISO 27001 Training Courses  ISO/IEC 27001 Introduction 1 Day Course  ISO/IEC 27001 Foundation 2 Days Course  ISO/IEC 27001 Lead Implementer 5 Days Course  ISO/IEC 27001 Lead Auditor 5 Days Course Exam and certification fees are included in the training price. https://www.pecb.com/iso-iec-27032-training-courses| www.pecb.com/events

Editor's Notes

  1. Malcolm Harkins, Cylance’s CISO (previously Intel’s CISO and Chief Security and Privacy Officer) developed this “9-Box slide” for his upcoming book, Managing Risk and Information Security, 2nd Edition. Axis: These are abstracted to some extent from products Y-axis describes products whose features range from Prevention to Response. X-axis describes products whose operational modes range from Automated to Manual Most of the industry is focused toward the upper right Cylance is focused near the lower left Most of the entire industry is in the upper left because they make more money there. The industry profits from the insecurity of computing so most in the industry has no economic incentive to do what is really needed which is to be in the lower left.  If the total costs of controls shrank then the industry which shrink.
  2. Malcolm Harkins, Cylance’s CISO (previously Intel’s CISO and Chief Security and Privacy Officer) developed this “9-Box slide” for his upcoming book, Managing Risk and Information Security, 2nd Edition. Axis: These are abstracted to some extent from products Y-axis describes products whose features range from Prevention to Response. X-axis describes products whose operational modes range from Automated to Manual Most of the industry is focused toward the upper right Cylance is focused near the lower left Most of the entire industry is in the upper left because they make more money there. The industry profits from the insecurity of computing so most in the industry has no economic incentive to do what is really needed which is to be in the lower left.  If the total costs of controls shrank then the industry which shrink.
  3. In October 1911, two teams of adventurers made their final preparations in their quest to be the first people in modern history to reach the south pole. For one team it would be a race to victory and a safe return home. For members of the other team a devastating defeat reaching the pole only to find their rivals planted a flag 34 days earlier followed by a race for their lives to return. Unfortunately all 5 members of the 2nd team perished. What separated these men and these teams? Why did one achieve success in such extreme conditions and one failed even to survive? Amundsen built systematically enormous buffers for unforeseen events, he designed the entire journey to systematically reduce the role of big forces and chance events. He presumed bad events might strike and he prepared for them developing contingency plans
  4. so how do race car drivers stay safe doing something so risky and at a similar pace of computing?
  5. Back in 1534, King Charles V of Spain had sought a passage across the Panamanian isthmus to speed the arduous months-long journey undertaken by ships traveling between Peru and Spain. Three hundred and eighty years later, the route hadn’t become that much easier or faster for ships carrying goods from coast to coast. In 1879, the French started building the Panama Canal. Torrential rains averaging 200 inches a year washed away much of the work. Over the next 20 years, between 16,000 and 22,000 workers died from malaria, yellow fever, typhoid, and accidents. Malaria was so abundant that it was estimated that 1/6 of the population of the workers in camps was suffering from malarial attacks each week
  6. In 1903, Panama officially declared itself an independent country, giving the United States construction rights for the canal.   In February of 1904, the US Congress officially created the Panama Canal Zone.   The Panama Canal was built by the United States between 1904 and 1914 work.   The Panama Canal was completed by the US on August 15, 1914.   Shipping traffic started using the canal from its unofficial opening on 15 August 1914   The canal transformed world trade by facilitating shipping from the West Coast of the Americas to Europe and from Asia to the East Coast, but its biggest impact was on the U.S. economy.