SlideShare a Scribd company logo
1 of 34
Why enterprise IT security measures are
failing and what you can do to fix them
IDG CIO Summit
Melbourne
November 2016
Presentation by:
Rob Livingstone – Principal
© All rights reserved
1. Are organisations really failing at cybersecurity?
2. Challenges facing business leaders in ‘new world’ of IT
3. The changing role of the IT department
4. The diffusion of IT/Digital accountabilities
5. Some practical guidelines to build effective cybersecurity.
6. Open discussion
Agenda
1. Are organisations really failing at
cybersecurity?
• Fact is that the rate of successful cyber-
hacks and data breaches is increasing.
• A recent global industry survey ranks
cyber incidents as the third highest
Global Business Risks for 2016.
• This has jumped by 17% on the previous
year
Allianz Risk Barometer 2016
1. Are organisations really failing at
cybersecurity?
A wide range of authoritative assessments have been published
that report on known adverse cyber incidents. Some of these
include:
• Verizon’s 2016 Data Breach Investigations Report,
• Ponemon’s 2016 Cost of Data Breach study,
• The 2015 US Association of Corporate Counsel’s State of Cyber Security
report,
• The Defender’s Dilemma – RAND Corporation’s 2015
• The SANS 2016 State of ICS Security Survey
• ….. And the list goes on!
All share the same theme ……
1. Are organisations really failing at
cybersecurity?
Fact is Data breaches are almost a daily occurrence
Let’s look inside some of the published industry reports
Causes of actual Data Breaches include:
• Use of legitimate user credentials associated
with most data breaches. [63% using weak,
default, or stolen passwords]
• 33% by end users with access to sensitive data to
do their jobs
• Equal 14% were Executives and privileged IT staff
(Administrators, Developers, etc)
Source: 2016 Verizon Data Breach Investigations Report (DBIR)
1. Are organisations really failing at
cybersecurity?
http://www.informationisbeautiful.net/
visualizations/worlds-biggest-data-
breaches-hacks/
Data Breaches
larger that 30k
records
2016
2006
ExternalSelf Inflicted
1. Are organisations really failing at
cybersecurity?
Let’s look at some of the published industry reports
Source: Ponemon Institute:
Managing Insider Risk through Training &
Culture (2016)
Let’s look at some of the published industry reports
1. Are organisations really failing at
cybersecurity?
The evidence is both compelling and worrying:
• Irrespective of the cause – Water-tight
Information security is a pipe dream in many –
if not most organisations.
• The complexity and breadth of enterprise
digital and IT footprint in increasing.
• IT is also becoming more fragmented and
complex.
Let’s consider the influences of IoT + Shadow IT.
1. Are organisations really failing at
cybersecurity?
2. Challenges facing business leaders
in ‘new world’ of IT
http://www.crm-daily.com/
For many organisations,
1. IoT is a fact of life – and a security risk
2. Shadow IT is a fact of live – and a security risk
3. The corporate IT department’s remit over both 1 and 2 are, on
average, limited to nil.
Consequence:
The corporate IT department’s capability of assuring and ensuring
enterprise-wide information security is being seriously
compromised.
http://www.crm-daily.com/
For many organisations,
1. IoT is a fact of life – and a security risk
2. Shadow IT is a fact of live – and a security risk
3. The corporate IT department’s remit over both 1 and 2 are, on
average, limited to nil.
Consequence:
The corporate IT department’s capability of assuring and ensuring
enterprise-wide information security is being seriously
compromised.
2. Challenges facing business leaders
in ‘new world’ of IT
2. Challenges facing business leaders
in ‘new world’ of IT IoT
https://krebsonsecurity.com
2. Challenges facing business leaders
in ‘new world’ of IT IoT
http://www.crm-daily.com/
Up to about 2005…………. After about 2005
You must use this application! I’ve just installed this great cloud
application – without IT’s
involvement!
2. Challenges facing business leaders
in ‘new world’ of Shadow IT
2. Challenges facing business leaders
in ‘new world’ of Shadow IT
M Silic, A Back. Computers &
Security 45, 274-283, 2014
The challenge facing modern business
leaders is in striking the optimal balance
between the business cost, value and
risk resulting from any IT initiatives –
then maintaining this balance in the
face of constant change.
2. Challenges facing business leaders
in ‘new world’ of IT
Let’s look through the lens of perceived certainty by the
business of:
IT Cost: Can be determined with relative accuracy.
IT’s Value: Can be validated by modelling, testing,
prototyping, comparative scenario analyses,
operations research, etc.
Business risk related to IT: Open to interpretation
2. Challenges facing business leaders
in ‘new world’ of IT
Question: How can or should business define IT related risk?
2. Challenges facing business leaders
in ‘new world’ of IT
Most common approach:
• Risk appetite and profile is not constant over time.
• Identification, categorization and ranking of
technical and functional risks is most widely used
approach
i.e.: Risk of a specific event =
(Impact x Probability of that event occurring) +
Risk Adjustment
• Underpins methodologies behind risk certification
– eg ISO 2700x
2. Challenges facing business leaders
in ‘new world’ of IT
• The risk register approach does not cater for the dynamic interaction
between risks effectively.
• It is this interaction between risks that defines the systemic risks
• Systemic risks are those with the greatest potential impact as they
affect the entire system (ie: Your organisation, its customers and
other stakeholders)
• Systemic risks are also the hardest to identify – especially for siloed
organisations
Question: How can or should business define IT related risk?
2. Challenges facing business leaders
in ‘new world’ of IT
• Governance processes that are well integrated and orchestrated
across the organisation are key to the identification of systemic
risks.
• Info Sec is only one aspect of this governance
• Test the validity of centralised or federated governance for Info Sec
• Get this balance wrong, and you could either miss key controls over
key cross-functional dependencies, or overload the organisation
with unwarranted, ineffective and costly governance processes.
Question: How can or should business manage systemic risk?
3. The changing role of the IT department
3. The changing role of the IT department
The new IT: From Cost Center to Value Driver
If the IT department is seen primarily as an expense in the eyes
of the business, the focus will be on cost reduction.
• In many instances, the ‘value’ of IT cannot be clearly and
precisely defined in the eyes of the business.
IT bears the ‘cost’ – Business drive ‘value’
Question is:
• If IT is seen as ‘accountable’ for Information Security, who else
is actively interested in Info Sec across the organisation?
3. The changing role of the IT department
Build it Broker Drive value
1990s 2000s 2010s
Speed of
delivery /
User
impatience /
Market
agility
© All rights reserved – Rob Livingstone Advisory Pty Ltd
• ‘The digital world, however,
runs faster than the typical
IT department’s default
speed.’
• ‘The IT crowd worry that
haste has hidden costs’
• ‘Corporate budgets
everywhere are under
strain, and IT is often still
seen as a cost rather than as
a source of new business
models and revenues’
https://goo.gl/wz8PIZ
3. The changing role of the IT department
Fact: Majority of established organisations structured along
functional lines
Fact: The interdependencies between differing systems, technologies,
information taxonomies, governance and risk profiles
enterprise-wide are not well understood at the leadership level.
Result: Defining accountability parameters and boundaries
increasingly blurred due to these interdependencies – many of
which are situational and vary over time.
Question: When things change tomorrow, how does this shift
accountabilities?
4. The Diffusion of IT/Digital
accountabilities
4. The Diffusion of IT/Digital
accountabilities
Question:
In your organisation,
who exactly is
ultimately accountable
for Information
Security?
#1: Enterprise Governance should be seen as a business ASSET
and not a cost or imposition.
Adapt and adopt only appropriate elements of proven InfoSec
governance frameworks that:
• Add value / mandated
• Can be tested and based in evidence
• Make commercial sense
• Are visible / reportable / measurable
• Are adaptable, not bureaucratic.
4. Some practical guidelines to build
effective cybersecurity
#2: Information security is not just the CIO/ CISOs job
• Effective information security and digital asset protection
relies on effective collaboration across the organisation.
• Adopting a multidisciplinary approach is key.
• Adjust incentive schemes to ‘share the pain / gain’
#3: Get on top of Shadow IT - now
• Both Business and IT leaders should ensure that they develop
a collaborative culture supported by appropriate business
processes that encourages ‘shadow IT’ in a controlled
environment
4. Some practical guidelines to build
effective cybersecurity
#4: Acknowledge the shared security responsibility model.
• Can your Executives (& key business stakeholders) describe, in
plain language, their specific contributions to ensuring
information security measures?
• Are their explanations aligned or not?
• How are business executives incentivized for their contribution
to effective Info Sec controls?
4. Some practical guidelines to build
effective cybersecurity
#5: Where appropriate, key IT vendor contracts should be on ‘gain-
share, pain-share’ basis, not buck passing.
• Ensure that your key vendors are able to collaboratively and
proactively work across and within your technology ecosystem as
needed.
#6: Visit DevSecOps.org
4. Some practical guidelines to build
effective cybersecurity
#7: Recognise that your staff, not technology - are the real and
present InfoSec risk
4. Some practical guidelines to build
effective cybersecurity
https://goo.gl/262ByN
#7: Recognise that your staff, not technology - are the real and
present InfoSec risk
• How ‘engaged’ are your staff?
• What are your staff satisfaction levels?
• Have a revolving door of part timers, contractors and
consultants?
• How well ‘educated’ are your staff / contractors in ‘best
practice’ of Info Sec, and how do you measure its relevance
and value across your organisation?
4. Some practical guidelines to build
effective cybersecurity
#8: Ensure your Info Sec regime is responsive to rapid change
• Change can come from anywhere: Innovative cybercriminals,
business policy shifts, technology change, disruptive
competitor, internal innovation, etc
4. Some practical guidelines to build
effective cybersecurity
Q&A

More Related Content

What's hot

Exploring the opportunities and pitfalls of new and emerging technologies in ...
Exploring the opportunities and pitfalls of new and emerging technologies in ...Exploring the opportunities and pitfalls of new and emerging technologies in ...
Exploring the opportunities and pitfalls of new and emerging technologies in ...Livingstone Advisory
 
Cloud: Fuelling the crisis of confidence in corporate IT?
Cloud: Fuelling the crisis of confidence in corporate IT?Cloud: Fuelling the crisis of confidence in corporate IT?
Cloud: Fuelling the crisis of confidence in corporate IT?Livingstone Advisory
 
Cloud computing: What you need to know as an Australian Finance Director
Cloud computing: What you need to know as an Australian Finance DirectorCloud computing: What you need to know as an Australian Finance Director
Cloud computing: What you need to know as an Australian Finance DirectorLivingstone Advisory
 
Rob Livingstone Advisory - The risks of a fractured cloud strategy within th...
Rob Livingstone Advisory  - The risks of a fractured cloud strategy within th...Rob Livingstone Advisory  - The risks of a fractured cloud strategy within th...
Rob Livingstone Advisory - The risks of a fractured cloud strategy within th...Livingstone Advisory
 
Where worlds collide: Agile, Project Management, Risk and Cloud?
Where worlds collide: Agile, Project Management, Risk and Cloud?Where worlds collide: Agile, Project Management, Risk and Cloud?
Where worlds collide: Agile, Project Management, Risk and Cloud?Livingstone Advisory
 
Exploring the opportunities and pitfalls of Cloud Computing in Australian loc...
Exploring the opportunities and pitfalls of Cloud Computing in Australian loc...Exploring the opportunities and pitfalls of Cloud Computing in Australian loc...
Exploring the opportunities and pitfalls of Cloud Computing in Australian loc...Livingstone Advisory
 
Navigating through the Cloud - 7 feb 2012 at Institute for Information Manage...
Navigating through the Cloud - 7 feb 2012 at Institute for Information Manage...Navigating through the Cloud - 7 feb 2012 at Institute for Information Manage...
Navigating through the Cloud - 7 feb 2012 at Institute for Information Manage...Livingstone Advisory
 
Your Leadership Brand - The CIO as Business Strategist driving innovation. CI...
Your Leadership Brand - The CIO as Business Strategist driving innovation. CI...Your Leadership Brand - The CIO as Business Strategist driving innovation. CI...
Your Leadership Brand - The CIO as Business Strategist driving innovation. CI...Livingstone Advisory
 
Cloud computing implications for project management methodologies
Cloud computing implications for project management methodologiesCloud computing implications for project management methodologies
Cloud computing implications for project management methodologiesLivingstone Advisory
 
Career resilience is the name of the game
Career resilience is the name of the gameCareer resilience is the name of the game
Career resilience is the name of the gameLivingstone Advisory
 
Will the Cloud be your disaster, or will Cloud be your disaster recovery?
Will the Cloud be your disaster, or will Cloud be your disaster recovery?Will the Cloud be your disaster, or will Cloud be your disaster recovery?
Will the Cloud be your disaster, or will Cloud be your disaster recovery?Livingstone Advisory
 
Rob livingstone CIO Strategy Summit - Park Hyatt Melbourne 17th feb 2012
Rob livingstone  CIO Strategy Summit - Park Hyatt Melbourne 17th feb 2012Rob livingstone  CIO Strategy Summit - Park Hyatt Melbourne 17th feb 2012
Rob livingstone CIO Strategy Summit - Park Hyatt Melbourne 17th feb 2012Livingstone Advisory
 
CIA Trifecta ISACA Boise 2016 Watson
CIA Trifecta ISACA Boise 2016 WatsonCIA Trifecta ISACA Boise 2016 Watson
CIA Trifecta ISACA Boise 2016 WatsonPatricia M Watson
 
A future history of content management
A future history of content managementA future history of content management
A future history of content managementJohn Mancini
 
IT summit 2014-program
IT summit 2014-programIT summit 2014-program
IT summit 2014-programPaige Rasid
 
How Infosec Can Become a Business Enabler: Interview with: Dr Tim Redhead, Di...
How Infosec Can Become a Business Enabler: Interview with: Dr Tim Redhead, Di...How Infosec Can Become a Business Enabler: Interview with: Dr Tim Redhead, Di...
How Infosec Can Become a Business Enabler: Interview with: Dr Tim Redhead, Di...IT Network marcus evans
 
A Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise SecurityA Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise SecurityТранслируем.бел
 
It staff augmentation before and after covid 19
It staff augmentation  before and after covid 19It staff augmentation  before and after covid 19
It staff augmentation before and after covid 19Katy Slemon
 
I Own Your Building (Management System)
I Own Your Building (Management System)I Own Your Building (Management System)
I Own Your Building (Management System)Zero Science Lab
 
Fast IT Mariano O'Kon, Cisco Live Cancun 2014
Fast IT Mariano O'Kon, Cisco Live Cancun 2014Fast IT Mariano O'Kon, Cisco Live Cancun 2014
Fast IT Mariano O'Kon, Cisco Live Cancun 2014Felipe Lamus
 

What's hot (20)

Exploring the opportunities and pitfalls of new and emerging technologies in ...
Exploring the opportunities and pitfalls of new and emerging technologies in ...Exploring the opportunities and pitfalls of new and emerging technologies in ...
Exploring the opportunities and pitfalls of new and emerging technologies in ...
 
Cloud: Fuelling the crisis of confidence in corporate IT?
Cloud: Fuelling the crisis of confidence in corporate IT?Cloud: Fuelling the crisis of confidence in corporate IT?
Cloud: Fuelling the crisis of confidence in corporate IT?
 
Cloud computing: What you need to know as an Australian Finance Director
Cloud computing: What you need to know as an Australian Finance DirectorCloud computing: What you need to know as an Australian Finance Director
Cloud computing: What you need to know as an Australian Finance Director
 
Rob Livingstone Advisory - The risks of a fractured cloud strategy within th...
Rob Livingstone Advisory  - The risks of a fractured cloud strategy within th...Rob Livingstone Advisory  - The risks of a fractured cloud strategy within th...
Rob Livingstone Advisory - The risks of a fractured cloud strategy within th...
 
Where worlds collide: Agile, Project Management, Risk and Cloud?
Where worlds collide: Agile, Project Management, Risk and Cloud?Where worlds collide: Agile, Project Management, Risk and Cloud?
Where worlds collide: Agile, Project Management, Risk and Cloud?
 
Exploring the opportunities and pitfalls of Cloud Computing in Australian loc...
Exploring the opportunities and pitfalls of Cloud Computing in Australian loc...Exploring the opportunities and pitfalls of Cloud Computing in Australian loc...
Exploring the opportunities and pitfalls of Cloud Computing in Australian loc...
 
Navigating through the Cloud - 7 feb 2012 at Institute for Information Manage...
Navigating through the Cloud - 7 feb 2012 at Institute for Information Manage...Navigating through the Cloud - 7 feb 2012 at Institute for Information Manage...
Navigating through the Cloud - 7 feb 2012 at Institute for Information Manage...
 
Your Leadership Brand - The CIO as Business Strategist driving innovation. CI...
Your Leadership Brand - The CIO as Business Strategist driving innovation. CI...Your Leadership Brand - The CIO as Business Strategist driving innovation. CI...
Your Leadership Brand - The CIO as Business Strategist driving innovation. CI...
 
Cloud computing implications for project management methodologies
Cloud computing implications for project management methodologiesCloud computing implications for project management methodologies
Cloud computing implications for project management methodologies
 
Career resilience is the name of the game
Career resilience is the name of the gameCareer resilience is the name of the game
Career resilience is the name of the game
 
Will the Cloud be your disaster, or will Cloud be your disaster recovery?
Will the Cloud be your disaster, or will Cloud be your disaster recovery?Will the Cloud be your disaster, or will Cloud be your disaster recovery?
Will the Cloud be your disaster, or will Cloud be your disaster recovery?
 
Rob livingstone CIO Strategy Summit - Park Hyatt Melbourne 17th feb 2012
Rob livingstone  CIO Strategy Summit - Park Hyatt Melbourne 17th feb 2012Rob livingstone  CIO Strategy Summit - Park Hyatt Melbourne 17th feb 2012
Rob livingstone CIO Strategy Summit - Park Hyatt Melbourne 17th feb 2012
 
CIA Trifecta ISACA Boise 2016 Watson
CIA Trifecta ISACA Boise 2016 WatsonCIA Trifecta ISACA Boise 2016 Watson
CIA Trifecta ISACA Boise 2016 Watson
 
A future history of content management
A future history of content managementA future history of content management
A future history of content management
 
IT summit 2014-program
IT summit 2014-programIT summit 2014-program
IT summit 2014-program
 
How Infosec Can Become a Business Enabler: Interview with: Dr Tim Redhead, Di...
How Infosec Can Become a Business Enabler: Interview with: Dr Tim Redhead, Di...How Infosec Can Become a Business Enabler: Interview with: Dr Tim Redhead, Di...
How Infosec Can Become a Business Enabler: Interview with: Dr Tim Redhead, Di...
 
A Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise SecurityA Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise Security
 
It staff augmentation before and after covid 19
It staff augmentation  before and after covid 19It staff augmentation  before and after covid 19
It staff augmentation before and after covid 19
 
I Own Your Building (Management System)
I Own Your Building (Management System)I Own Your Building (Management System)
I Own Your Building (Management System)
 
Fast IT Mariano O'Kon, Cisco Live Cancun 2014
Fast IT Mariano O'Kon, Cisco Live Cancun 2014Fast IT Mariano O'Kon, Cisco Live Cancun 2014
Fast IT Mariano O'Kon, Cisco Live Cancun 2014
 

Viewers also liked

Dealing Data Leaks: Creating Your Data Breach Response Plan
Dealing Data Leaks: Creating Your Data Breach Response PlanDealing Data Leaks: Creating Your Data Breach Response Plan
Dealing Data Leaks: Creating Your Data Breach Response Planbenefitexpress
 
Build a Brand From scratch
Build a Brand From scratchBuild a Brand From scratch
Build a Brand From scratchEthan Chazin MBA
 
Consumer behavior week2_valuesculture
Consumer behavior week2_valuescultureConsumer behavior week2_valuesculture
Consumer behavior week2_valuescultureEthan Chazin MBA
 
A career in_entrepreneurship_ethan_chazin_31oct2013
A career in_entrepreneurship_ethan_chazin_31oct2013A career in_entrepreneurship_ethan_chazin_31oct2013
A career in_entrepreneurship_ethan_chazin_31oct2013Ethan Chazin MBA
 
Master your marketing PNC talk 19 September 2013
Master your marketing PNC talk 19 September 2013Master your marketing PNC talk 19 September 2013
Master your marketing PNC talk 19 September 2013Ethan Chazin MBA
 
20121131 i week liepaja 2012, Art of Resilience
20121131 i week liepaja 2012, Art of Resilience20121131 i week liepaja 2012, Art of Resilience
20121131 i week liepaja 2012, Art of ResilienceAlbert van der Kooij
 
Exposing the systemic risks in enterprise cloud computing
Exposing the systemic risks in enterprise cloud computingExposing the systemic risks in enterprise cloud computing
Exposing the systemic risks in enterprise cloud computingLivingstone Advisory
 
Consumer behavior week4_attributes
Consumer behavior week4_attributesConsumer behavior week4_attributes
Consumer behavior week4_attributesEthan Chazin MBA
 
Get connected socialmedia_nyu_18april15_part1
Get connected socialmedia_nyu_18april15_part1Get connected socialmedia_nyu_18april15_part1
Get connected socialmedia_nyu_18april15_part1Ethan Chazin MBA
 
UTSpeaks Public Lecture: Clearing up the Cloud -19th July 2011 - Rob Living...
UTSpeaks Public Lecture:  Clearing up the Cloud  -19th July 2011 - Rob Living...UTSpeaks Public Lecture:  Clearing up the Cloud  -19th July 2011 - Rob Living...
UTSpeaks Public Lecture: Clearing up the Cloud -19th July 2011 - Rob Living...Livingstone Advisory
 
Get connected socialmedia_nyu_18april15_part2
Get connected socialmedia_nyu_18april15_part2Get connected socialmedia_nyu_18april15_part2
Get connected socialmedia_nyu_18april15_part2Ethan Chazin MBA
 
Map of the Cloud minefield - Banktech Sydney Summit 17 july 2012
Map of the Cloud minefield - Banktech Sydney Summit 17 july 2012 Map of the Cloud minefield - Banktech Sydney Summit 17 july 2012
Map of the Cloud minefield - Banktech Sydney Summit 17 july 2012 Livingstone Advisory
 

Viewers also liked (15)

Dealing Data Leaks: Creating Your Data Breach Response Plan
Dealing Data Leaks: Creating Your Data Breach Response PlanDealing Data Leaks: Creating Your Data Breach Response Plan
Dealing Data Leaks: Creating Your Data Breach Response Plan
 
Build a Brand From scratch
Build a Brand From scratchBuild a Brand From scratch
Build a Brand From scratch
 
Consumer behavior week2_valuesculture
Consumer behavior week2_valuescultureConsumer behavior week2_valuesculture
Consumer behavior week2_valuesculture
 
A career in_entrepreneurship_ethan_chazin_31oct2013
A career in_entrepreneurship_ethan_chazin_31oct2013A career in_entrepreneurship_ethan_chazin_31oct2013
A career in_entrepreneurship_ethan_chazin_31oct2013
 
Master your marketing PNC talk 19 September 2013
Master your marketing PNC talk 19 September 2013Master your marketing PNC talk 19 September 2013
Master your marketing PNC talk 19 September 2013
 
20121131 i week liepaja 2012, Art of Resilience
20121131 i week liepaja 2012, Art of Resilience20121131 i week liepaja 2012, Art of Resilience
20121131 i week liepaja 2012, Art of Resilience
 
Exposing the systemic risks in enterprise cloud computing
Exposing the systemic risks in enterprise cloud computingExposing the systemic risks in enterprise cloud computing
Exposing the systemic risks in enterprise cloud computing
 
Consumer behavior week4_attributes
Consumer behavior week4_attributesConsumer behavior week4_attributes
Consumer behavior week4_attributes
 
Get connected socialmedia_nyu_18april15_part1
Get connected socialmedia_nyu_18april15_part1Get connected socialmedia_nyu_18april15_part1
Get connected socialmedia_nyu_18april15_part1
 
Mktg sales week2_part2
Mktg sales week2_part2Mktg sales week2_part2
Mktg sales week2_part2
 
UTSpeaks Public Lecture: Clearing up the Cloud -19th July 2011 - Rob Living...
UTSpeaks Public Lecture:  Clearing up the Cloud  -19th July 2011 - Rob Living...UTSpeaks Public Lecture:  Clearing up the Cloud  -19th July 2011 - Rob Living...
UTSpeaks Public Lecture: Clearing up the Cloud -19th July 2011 - Rob Living...
 
Get connected socialmedia_nyu_18april15_part2
Get connected socialmedia_nyu_18april15_part2Get connected socialmedia_nyu_18april15_part2
Get connected socialmedia_nyu_18april15_part2
 
Mktg sales week2_part1
Mktg sales week2_part1Mktg sales week2_part1
Mktg sales week2_part1
 
Mktg sales week2_part2
Mktg sales week2_part2Mktg sales week2_part2
Mktg sales week2_part2
 
Map of the Cloud minefield - Banktech Sydney Summit 17 july 2012
Map of the Cloud minefield - Banktech Sydney Summit 17 july 2012 Map of the Cloud minefield - Banktech Sydney Summit 17 july 2012
Map of the Cloud minefield - Banktech Sydney Summit 17 july 2012
 

Similar to Current enterprise information security measures continue to fail us. Why is this and what can you do to fix it?

A CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk ManagementA CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk ManagementDaren Dunkel
 
Norman Broadbent Cybersecurity Report - How should boards respond
Norman Broadbent Cybersecurity Report - How should boards respondNorman Broadbent Cybersecurity Report - How should boards respond
Norman Broadbent Cybersecurity Report - How should boards respondLydia Shepherd
 
Best practices to mitigate data breach risk
Best practices to mitigate data breach riskBest practices to mitigate data breach risk
Best practices to mitigate data breach riskLivingstone Advisory
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...International Federation of Accountants
 
4th Digital Finance Forum, Simon Brady
4th Digital Finance Forum, Simon Brady4th Digital Finance Forum, Simon Brady
4th Digital Finance Forum, Simon BradyStarttech Ventures
 
Metrics & Reporting - A Failure in Communication
Metrics & Reporting - A Failure in CommunicationMetrics & Reporting - A Failure in Communication
Metrics & Reporting - A Failure in CommunicationChris Ross
 
01-Build-an-IT-Risk-Management-Program--Phases-1-3.pptx
01-Build-an-IT-Risk-Management-Program--Phases-1-3.pptx01-Build-an-IT-Risk-Management-Program--Phases-1-3.pptx
01-Build-an-IT-Risk-Management-Program--Phases-1-3.pptxjamiejohngianna
 
IT Risk assessment and Audit Planning
IT Risk assessment and Audit PlanningIT Risk assessment and Audit Planning
IT Risk assessment and Audit Planninggoreankush1
 
Ciso organizational priorities to build a resilient bimodal it
Ciso organizational priorities to build a resilient bimodal itCiso organizational priorities to build a resilient bimodal it
Ciso organizational priorities to build a resilient bimodal itChandra Sekhar Tondepu
 
How to Connect Your Server Room to the Board Room – Before a Data Breach Occurs
How to Connect Your Server Room to the Board Room – Before a Data Breach OccursHow to Connect Your Server Room to the Board Room – Before a Data Breach Occurs
How to Connect Your Server Room to the Board Room – Before a Data Breach OccursSurfWatch Labs
 
Cybersecurity in the Boardroom
Cybersecurity in the BoardroomCybersecurity in the Boardroom
Cybersecurity in the BoardroomMarko Suswanto
 
Digital trust and cyber challenge now extends beyond the Enterprise
Digital trust and cyber challenge now extends beyond the Enterprise Digital trust and cyber challenge now extends beyond the Enterprise
Digital trust and cyber challenge now extends beyond the Enterprise Mourad Khalil
 
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016FERMA
 
Four mistakes to avoid when hiring your next security chief (print version ...
Four mistakes to avoid when hiring your next security chief (print version   ...Four mistakes to avoid when hiring your next security chief (print version   ...
Four mistakes to avoid when hiring your next security chief (print version ...Niren Thanky
 
Securing the Digital Future
Securing the Digital FutureSecuring the Digital Future
Securing the Digital FutureCognizant
 
How close is your organization to being breached | Safe Security
How close is your organization to being breached | Safe SecurityHow close is your organization to being breached | Safe Security
How close is your organization to being breached | Safe SecurityRahul Tyagi
 

Similar to Current enterprise information security measures continue to fail us. Why is this and what can you do to fix it? (20)

A CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk ManagementA CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk Management
 
Norman Broadbent Cybersecurity Report - How should boards respond
Norman Broadbent Cybersecurity Report - How should boards respondNorman Broadbent Cybersecurity Report - How should boards respond
Norman Broadbent Cybersecurity Report - How should boards respond
 
Best practices to mitigate data breach risk
Best practices to mitigate data breach riskBest practices to mitigate data breach risk
Best practices to mitigate data breach risk
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
 
4th Digital Finance Forum, Simon Brady
4th Digital Finance Forum, Simon Brady4th Digital Finance Forum, Simon Brady
4th Digital Finance Forum, Simon Brady
 
Metrics & Reporting - A Failure in Communication
Metrics & Reporting - A Failure in CommunicationMetrics & Reporting - A Failure in Communication
Metrics & Reporting - A Failure in Communication
 
ACFN vISO eBook
ACFN vISO eBookACFN vISO eBook
ACFN vISO eBook
 
01-Build-an-IT-Risk-Management-Program--Phases-1-3.pptx
01-Build-an-IT-Risk-Management-Program--Phases-1-3.pptx01-Build-an-IT-Risk-Management-Program--Phases-1-3.pptx
01-Build-an-IT-Risk-Management-Program--Phases-1-3.pptx
 
IT Risk assessment and Audit Planning
IT Risk assessment and Audit PlanningIT Risk assessment and Audit Planning
IT Risk assessment and Audit Planning
 
Ciso organizational priorities to build a resilient bimodal it
Ciso organizational priorities to build a resilient bimodal itCiso organizational priorities to build a resilient bimodal it
Ciso organizational priorities to build a resilient bimodal it
 
How to Connect Your Server Room to the Board Room – Before a Data Breach Occurs
How to Connect Your Server Room to the Board Room – Before a Data Breach OccursHow to Connect Your Server Room to the Board Room – Before a Data Breach Occurs
How to Connect Your Server Room to the Board Room – Before a Data Breach Occurs
 
Cybersecurity in the Boardroom
Cybersecurity in the BoardroomCybersecurity in the Boardroom
Cybersecurity in the Boardroom
 
The path to self-disruption
The path to self-disruptionThe path to self-disruption
The path to self-disruption
 
Digital trust and cyber challenge now extends beyond the Enterprise
Digital trust and cyber challenge now extends beyond the Enterprise Digital trust and cyber challenge now extends beyond the Enterprise
Digital trust and cyber challenge now extends beyond the Enterprise
 
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
 
Four mistakes to avoid when hiring your next security chief (print version ...
Four mistakes to avoid when hiring your next security chief (print version   ...Four mistakes to avoid when hiring your next security chief (print version   ...
Four mistakes to avoid when hiring your next security chief (print version ...
 
Websense
WebsenseWebsense
Websense
 
Securing the Digital Future
Securing the Digital FutureSecuring the Digital Future
Securing the Digital Future
 
How close is your organization to being breached | Safe Security
How close is your organization to being breached | Safe SecurityHow close is your organization to being breached | Safe Security
How close is your organization to being breached | Safe Security
 
5 Questions Executives Should Be Asking Their Security Teams
5 Questions Executives Should Be Asking Their Security Teams 5 Questions Executives Should Be Asking Their Security Teams
5 Questions Executives Should Be Asking Their Security Teams
 

More from Livingstone Advisory

How to setup and lead digital transformation capability (CIOs perspectives)
How to setup and lead digital transformation capability (CIOs perspectives)How to setup and lead digital transformation capability (CIOs perspectives)
How to setup and lead digital transformation capability (CIOs perspectives)Livingstone Advisory
 
Influence, Power, Integrity and your career in IT
Influence, Power, Integrity and your career in ITInfluence, Power, Integrity and your career in IT
Influence, Power, Integrity and your career in ITLivingstone Advisory
 
Rob livingstone Canberra Cloud Security Conference Nov 2011
Rob livingstone Canberra Cloud Security Conference Nov 2011 Rob livingstone Canberra Cloud Security Conference Nov 2011
Rob livingstone Canberra Cloud Security Conference Nov 2011 Livingstone Advisory
 
Rob livingstone - Australian Payroll Association's Annual Conference May 2011
Rob livingstone  - Australian Payroll Association's Annual Conference May 2011Rob livingstone  - Australian Payroll Association's Annual Conference May 2011
Rob livingstone - Australian Payroll Association's Annual Conference May 2011Livingstone Advisory
 
Australian Not-for-Profit CIO Forum March 2011 - Rob Livingstone
Australian Not-for-Profit CIO Forum March 2011 - Rob LivingstoneAustralian Not-for-Profit CIO Forum March 2011 - Rob Livingstone
Australian Not-for-Profit CIO Forum March 2011 - Rob LivingstoneLivingstone Advisory
 
Navigating through the cloud SPUSC 2011 -Rob Livingstone Keynote
Navigating through the cloud   SPUSC 2011 -Rob Livingstone KeynoteNavigating through the cloud   SPUSC 2011 -Rob Livingstone Keynote
Navigating through the cloud SPUSC 2011 -Rob Livingstone KeynoteLivingstone Advisory
 

More from Livingstone Advisory (6)

How to setup and lead digital transformation capability (CIOs perspectives)
How to setup and lead digital transformation capability (CIOs perspectives)How to setup and lead digital transformation capability (CIOs perspectives)
How to setup and lead digital transformation capability (CIOs perspectives)
 
Influence, Power, Integrity and your career in IT
Influence, Power, Integrity and your career in ITInfluence, Power, Integrity and your career in IT
Influence, Power, Integrity and your career in IT
 
Rob livingstone Canberra Cloud Security Conference Nov 2011
Rob livingstone Canberra Cloud Security Conference Nov 2011 Rob livingstone Canberra Cloud Security Conference Nov 2011
Rob livingstone Canberra Cloud Security Conference Nov 2011
 
Rob livingstone - Australian Payroll Association's Annual Conference May 2011
Rob livingstone  - Australian Payroll Association's Annual Conference May 2011Rob livingstone  - Australian Payroll Association's Annual Conference May 2011
Rob livingstone - Australian Payroll Association's Annual Conference May 2011
 
Australian Not-for-Profit CIO Forum March 2011 - Rob Livingstone
Australian Not-for-Profit CIO Forum March 2011 - Rob LivingstoneAustralian Not-for-Profit CIO Forum March 2011 - Rob Livingstone
Australian Not-for-Profit CIO Forum March 2011 - Rob Livingstone
 
Navigating through the cloud SPUSC 2011 -Rob Livingstone Keynote
Navigating through the cloud   SPUSC 2011 -Rob Livingstone KeynoteNavigating through the cloud   SPUSC 2011 -Rob Livingstone Keynote
Navigating through the cloud SPUSC 2011 -Rob Livingstone Keynote
 

Recently uploaded

Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 

Recently uploaded (20)

Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 

Current enterprise information security measures continue to fail us. Why is this and what can you do to fix it?

  • 1. Why enterprise IT security measures are failing and what you can do to fix them IDG CIO Summit Melbourne November 2016 Presentation by: Rob Livingstone – Principal © All rights reserved
  • 2. 1. Are organisations really failing at cybersecurity? 2. Challenges facing business leaders in ‘new world’ of IT 3. The changing role of the IT department 4. The diffusion of IT/Digital accountabilities 5. Some practical guidelines to build effective cybersecurity. 6. Open discussion Agenda
  • 3. 1. Are organisations really failing at cybersecurity? • Fact is that the rate of successful cyber- hacks and data breaches is increasing. • A recent global industry survey ranks cyber incidents as the third highest Global Business Risks for 2016. • This has jumped by 17% on the previous year Allianz Risk Barometer 2016
  • 4. 1. Are organisations really failing at cybersecurity? A wide range of authoritative assessments have been published that report on known adverse cyber incidents. Some of these include: • Verizon’s 2016 Data Breach Investigations Report, • Ponemon’s 2016 Cost of Data Breach study, • The 2015 US Association of Corporate Counsel’s State of Cyber Security report, • The Defender’s Dilemma – RAND Corporation’s 2015 • The SANS 2016 State of ICS Security Survey • ….. And the list goes on! All share the same theme ……
  • 5. 1. Are organisations really failing at cybersecurity? Fact is Data breaches are almost a daily occurrence
  • 6. Let’s look inside some of the published industry reports Causes of actual Data Breaches include: • Use of legitimate user credentials associated with most data breaches. [63% using weak, default, or stolen passwords] • 33% by end users with access to sensitive data to do their jobs • Equal 14% were Executives and privileged IT staff (Administrators, Developers, etc) Source: 2016 Verizon Data Breach Investigations Report (DBIR) 1. Are organisations really failing at cybersecurity?
  • 7. http://www.informationisbeautiful.net/ visualizations/worlds-biggest-data- breaches-hacks/ Data Breaches larger that 30k records 2016 2006 ExternalSelf Inflicted 1. Are organisations really failing at cybersecurity? Let’s look at some of the published industry reports
  • 8. Source: Ponemon Institute: Managing Insider Risk through Training & Culture (2016) Let’s look at some of the published industry reports 1. Are organisations really failing at cybersecurity?
  • 9. The evidence is both compelling and worrying: • Irrespective of the cause – Water-tight Information security is a pipe dream in many – if not most organisations. • The complexity and breadth of enterprise digital and IT footprint in increasing. • IT is also becoming more fragmented and complex. Let’s consider the influences of IoT + Shadow IT. 1. Are organisations really failing at cybersecurity?
  • 10. 2. Challenges facing business leaders in ‘new world’ of IT http://www.crm-daily.com/ For many organisations, 1. IoT is a fact of life – and a security risk 2. Shadow IT is a fact of live – and a security risk 3. The corporate IT department’s remit over both 1 and 2 are, on average, limited to nil. Consequence: The corporate IT department’s capability of assuring and ensuring enterprise-wide information security is being seriously compromised.
  • 11. http://www.crm-daily.com/ For many organisations, 1. IoT is a fact of life – and a security risk 2. Shadow IT is a fact of live – and a security risk 3. The corporate IT department’s remit over both 1 and 2 are, on average, limited to nil. Consequence: The corporate IT department’s capability of assuring and ensuring enterprise-wide information security is being seriously compromised. 2. Challenges facing business leaders in ‘new world’ of IT
  • 12. 2. Challenges facing business leaders in ‘new world’ of IT IoT https://krebsonsecurity.com
  • 13. 2. Challenges facing business leaders in ‘new world’ of IT IoT http://www.crm-daily.com/
  • 14. Up to about 2005…………. After about 2005 You must use this application! I’ve just installed this great cloud application – without IT’s involvement! 2. Challenges facing business leaders in ‘new world’ of Shadow IT
  • 15. 2. Challenges facing business leaders in ‘new world’ of Shadow IT M Silic, A Back. Computers & Security 45, 274-283, 2014
  • 16. The challenge facing modern business leaders is in striking the optimal balance between the business cost, value and risk resulting from any IT initiatives – then maintaining this balance in the face of constant change. 2. Challenges facing business leaders in ‘new world’ of IT
  • 17. Let’s look through the lens of perceived certainty by the business of: IT Cost: Can be determined with relative accuracy. IT’s Value: Can be validated by modelling, testing, prototyping, comparative scenario analyses, operations research, etc. Business risk related to IT: Open to interpretation 2. Challenges facing business leaders in ‘new world’ of IT
  • 18. Question: How can or should business define IT related risk? 2. Challenges facing business leaders in ‘new world’ of IT Most common approach: • Risk appetite and profile is not constant over time. • Identification, categorization and ranking of technical and functional risks is most widely used approach i.e.: Risk of a specific event = (Impact x Probability of that event occurring) + Risk Adjustment • Underpins methodologies behind risk certification – eg ISO 2700x
  • 19. 2. Challenges facing business leaders in ‘new world’ of IT • The risk register approach does not cater for the dynamic interaction between risks effectively. • It is this interaction between risks that defines the systemic risks • Systemic risks are those with the greatest potential impact as they affect the entire system (ie: Your organisation, its customers and other stakeholders) • Systemic risks are also the hardest to identify – especially for siloed organisations Question: How can or should business define IT related risk?
  • 20. 2. Challenges facing business leaders in ‘new world’ of IT • Governance processes that are well integrated and orchestrated across the organisation are key to the identification of systemic risks. • Info Sec is only one aspect of this governance • Test the validity of centralised or federated governance for Info Sec • Get this balance wrong, and you could either miss key controls over key cross-functional dependencies, or overload the organisation with unwarranted, ineffective and costly governance processes. Question: How can or should business manage systemic risk?
  • 21. 3. The changing role of the IT department
  • 22. 3. The changing role of the IT department The new IT: From Cost Center to Value Driver If the IT department is seen primarily as an expense in the eyes of the business, the focus will be on cost reduction. • In many instances, the ‘value’ of IT cannot be clearly and precisely defined in the eyes of the business. IT bears the ‘cost’ – Business drive ‘value’ Question is: • If IT is seen as ‘accountable’ for Information Security, who else is actively interested in Info Sec across the organisation?
  • 23. 3. The changing role of the IT department Build it Broker Drive value 1990s 2000s 2010s Speed of delivery / User impatience / Market agility
  • 24. © All rights reserved – Rob Livingstone Advisory Pty Ltd • ‘The digital world, however, runs faster than the typical IT department’s default speed.’ • ‘The IT crowd worry that haste has hidden costs’ • ‘Corporate budgets everywhere are under strain, and IT is often still seen as a cost rather than as a source of new business models and revenues’ https://goo.gl/wz8PIZ 3. The changing role of the IT department
  • 25. Fact: Majority of established organisations structured along functional lines Fact: The interdependencies between differing systems, technologies, information taxonomies, governance and risk profiles enterprise-wide are not well understood at the leadership level. Result: Defining accountability parameters and boundaries increasingly blurred due to these interdependencies – many of which are situational and vary over time. Question: When things change tomorrow, how does this shift accountabilities? 4. The Diffusion of IT/Digital accountabilities
  • 26. 4. The Diffusion of IT/Digital accountabilities Question: In your organisation, who exactly is ultimately accountable for Information Security?
  • 27. #1: Enterprise Governance should be seen as a business ASSET and not a cost or imposition. Adapt and adopt only appropriate elements of proven InfoSec governance frameworks that: • Add value / mandated • Can be tested and based in evidence • Make commercial sense • Are visible / reportable / measurable • Are adaptable, not bureaucratic. 4. Some practical guidelines to build effective cybersecurity
  • 28. #2: Information security is not just the CIO/ CISOs job • Effective information security and digital asset protection relies on effective collaboration across the organisation. • Adopting a multidisciplinary approach is key. • Adjust incentive schemes to ‘share the pain / gain’ #3: Get on top of Shadow IT - now • Both Business and IT leaders should ensure that they develop a collaborative culture supported by appropriate business processes that encourages ‘shadow IT’ in a controlled environment 4. Some practical guidelines to build effective cybersecurity
  • 29. #4: Acknowledge the shared security responsibility model. • Can your Executives (& key business stakeholders) describe, in plain language, their specific contributions to ensuring information security measures? • Are their explanations aligned or not? • How are business executives incentivized for their contribution to effective Info Sec controls? 4. Some practical guidelines to build effective cybersecurity
  • 30. #5: Where appropriate, key IT vendor contracts should be on ‘gain- share, pain-share’ basis, not buck passing. • Ensure that your key vendors are able to collaboratively and proactively work across and within your technology ecosystem as needed. #6: Visit DevSecOps.org 4. Some practical guidelines to build effective cybersecurity
  • 31. #7: Recognise that your staff, not technology - are the real and present InfoSec risk 4. Some practical guidelines to build effective cybersecurity https://goo.gl/262ByN
  • 32. #7: Recognise that your staff, not technology - are the real and present InfoSec risk • How ‘engaged’ are your staff? • What are your staff satisfaction levels? • Have a revolving door of part timers, contractors and consultants? • How well ‘educated’ are your staff / contractors in ‘best practice’ of Info Sec, and how do you measure its relevance and value across your organisation? 4. Some practical guidelines to build effective cybersecurity
  • 33. #8: Ensure your Info Sec regime is responsive to rapid change • Change can come from anywhere: Innovative cybercriminals, business policy shifts, technology change, disruptive competitor, internal innovation, etc 4. Some practical guidelines to build effective cybersecurity
  • 34. Q&A