SlideShare a Scribd company logo
1 of 13
EDAYS INTERNATIONAL E-COMMERCE CONFERENCE
M O S C O W , J U N E 4 - 5 , 2 0 1 5
Cybersecurity challenges in an
interconnected world
PwC Global State of information security survey results for Retail industry
Cyber risks: A severe and present danger
E D A Y S I N T E R N A T I O N A L E - C O M M E R C E C O N F E R E N C E – M O S C O W , J U N E 4 - 5 , 2 0 1 5 2
In 2014 Verizon counted 524 security incidents in
retailers industries around the world in its annual
Data Breach Investigations Report, noting that
points of sale were the primary targets in 70% of
incidents within the retail industry.
Over the past year, the phrase “data
breach” has become closely associated
with the word “retailer” as attacks
reached epic levels.
PwC GSISS 2015: Retail incidents statistic
E D A Y S I N T E R N A T I O N A L E - C O M M E R C E C O N F E R E N C E – M O S C O W , J U N E 4 - 5 , 2 0 1 5 3
The Global State of Information Security®
Survey (GSISS) shows that, among 836
worldwide retail and consumer goods
respondents, the number of detected
incidents in 2014 increased 19% over 2013.
Current and former
employees, third-party
service providers,
contractors, suppliers, and
business partners are most
frequently mentioned as the
cause of incidents
PwC GSISS 2015: Retail incidents statistic
E D A Y S I N T E R N A T I O N A L E - C O M M E R C E C O N F E R E N C E – M O S C O W , J U N E 4 - 5 , 2 0 1 5 4
Personal data including
payment and purchase
information as well as
Intellectual property
are the main targets for
thefts.
Another purpose of
cyberattack is fraud.
PwC GSISS 2015: Retail security issues
E D A Y S I N T E R N A T I O N A L E - C O M M E R C E C O N F E R E N C E – M O S C O W , J U N E 4 - 5 , 2 0 1 5 5
Data governance is lacking
Have
secure-
access
control
measures
Have
centralize
d user
data store
Have an
accurate
inventory
of
personal
data
Limit
access to
the
minimum
necessar
y
Have
privileged
user
access
tools
Have a
written
security
policy
Retailers, in particular, often take a
compliance-checklist approach to
information security, focusing on
Payment Card Industry Data Security
Standard (PCI DSS) requirements
while disregarding implementation of
adequate data governance to protect
valuable information assets.
Good data governance will require that
businesses develop a framework and
policies for the creation, use, storage, and
deletion of information. It will also demand
that retail and consumer companies know
where their data is stored, manage access
to sensitive information, and govern the use
and security of valuable data by third-party
partners.
PwC GSISS 2015: Increasing third-party threats
E D A Y S I N T E R N A T I O N A L E - C O M M E R C E C O N F E R E N C E – M O S C O W , J U N E 4 - 5 , 2 0 1 5 6
Data breaches often start with the
compromise of suppliers,
contractors, and vendors.
Only 29% say they have this type of monitoring
program in place, and 37% say they plan to add one.
But one in five say they have no plans to
implement a program to monitor third parties.
PwC GSISS 2015: New technologies and risks
E D A Y S I N T E R N A T I O N A L E - C O M M E R C E C O N F E R E N C E – M O S C O W , J U N E 4 - 5 , 2 0 1 5 7
Retail and consumer goods companies are
embracing new technologies to connect with
customers, build operational efficiencies, and
enable collaboration.
The trouble is, many businesses adopt these
technologies before they effectively secure
them.
Yet only 45% of respondents have a security
strategy for cloud computing—an astonishing
finding—and just 33% say they are “very prepared”
to protect sensitive data in the cloud. Given that 29%
of respondents say they use cloud services for e-
commerce, that’s certainly disquieting.
More than half of respondents say they use some
form of cloud computing for file storage and sharing,
and hosting of databases, applications, e-mail, and
websites.
PwC GSISS 2015: New technologies and risks
E D A Y S I N T E R N A T I O N A L E - C O M M E R C E C O N F E R E N C E – M O S C O W , J U N E 4 - 5 , 2 0 1 5 8
Attrition in safeguards for new technologies 69% of respondents either plan to allow or already do allow
use of employee-owned devices to access the corporate
network
One quarter (25%) of retail and consumer respondents say
they have implemented systems for digital wallets, and an
additional 36% say they plan to implement them in the
future.
PwC GSISS 2015: Retail need strategic approach
E D A Y S I N T E R N A T I O N A L E - C O M M E R C E C O N F E R E N C E – M O S C O W , J U N E 4 - 5 , 2 0 1 5 9
More than ever, senior executives
should proactively ensure that the
Board understands how the
organization will detect, defend against,
and respond to cyber threats.
Before resources can be allocated, however, it will be
necessary to first identify the organization’s most valuable
assets and determine who owns responsibility for them.
A senior executive
communicates
importance of security
to entire enterprise
Information security
strategy is aligned with
specific business
needs
Program to identify
sensitive assets
Collaborate with others
to improve security
Have cyber insurance Have employee
security training and
awareness program
PwC GSISS 2015: Linking security and risk
E D A Y S I N T E R N A T I O N A L E - C O M M E R C E C O N F E R E N C E – M O S C O W , J U N E 4 - 5 , 2 0 1 5 10
As incidents continue to
proliferate, it’s becoming
clear that cyber risks can
never be completely
eliminated.
Today’s interconnected business ecosystem requires a shift from
security that focuses on prevention and controls to a risk-based
approach that prioritizes an organization’s most valuable assets
and its most relevant threats.
It also will be critical to focus on rapid detection of security
intrusions and an effective, timely response.
PwC GSISS 2016
E D A Y S I N T E R N A T I O N A L E - C O M M E R C E C O N F E R E N C E – M O S C O W , J U N E 4 - 5 , 2 0 1 5 11
We invite you to participate in
our survey
www.pwc.ru/gsiss2016
End of the survey June 12, 2015
PwC helps clients manage modern cyberrisks
E D A Y S I N T E R N A T I O N A L E - C O M M E R C E C O N F E R E N C E – M O S C O W , J U N E 4 - 5 , 2 0 1 5 12
PwC applies its local and global experience
and resources equally to create value for
clients when carrying out diverse projects,
ranging from strategy development to
implementation.
180,000
PwC
staff worldwide
38,000
PwC
consultants worldwide
9,600
PwC
IT consultants worldwide
Our global network of firms includes
776 offices in 158 countries worldwide
Leader in IT-enabled
business transformation
Forrester, 3Q 2012
PwC has broad experience
in providing consulting
services to universities and
higher educational
institutions
Leader in
business consulting
IDC Marketscape, 2012
PwC CEE has a highly
talented pool of certified
Cyber security consulting
staff with a full range of
skills:
CISA – 39 people
CISM– 7 people
CRISC – 5 people
CISSP – 4 peopl
ISO 27001– 12 people
and others
2,000
PwC
Cyber security
consultants worldwide
Let’s keep in touch!
E D A Y S I N T E R N A T I O N A L E - C O M M E R C E C O N F E R E N C E – M O S C O W , J U N E 4 - 5 , 2 0 1 5 13
Thank you for your attention!
Roman Chaplygin
Director,
Cybersecurity leader, PwC Russia
Tel: +7 (495) 967 6056
Mob: +7 (903) 272 1620
E-mail: roman.chaplygin@ru.pwc.com
PwC CyberSecurity Club
on Facebook

More Related Content

Similar to Chaplygin Roman Cybersecurity challanges in an interconnected world

Securing the C-Suite: Cybersecurity Perspectives from the Boardroom
Securing the C-Suite: Cybersecurity Perspectives from the BoardroomSecuring the C-Suite: Cybersecurity Perspectives from the Boardroom
Securing the C-Suite: Cybersecurity Perspectives from the Boardroom
IBM Security
 
Ransomware Bootcamp with CTEK and GroupSense
Ransomware Bootcamp with CTEK and GroupSenseRansomware Bootcamp with CTEK and GroupSense
Ransomware Bootcamp with CTEK and GroupSense
SophiaPalmira1
 
Meraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldMeraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless world
nooralmousa
 
eCrime-report-2011-accessible
eCrime-report-2011-accessibleeCrime-report-2011-accessible
eCrime-report-2011-accessible
Charmaine Servado
 
Is cyber security now too hard for enterprises?
Is cyber security now too hard for enterprises? Is cyber security now too hard for enterprises?
Is cyber security now too hard for enterprises?
Pierre Audoin Consultants
 
Data and Analytics In The Digital Age
Data and Analytics In The Digital AgeData and Analytics In The Digital Age
Data and Analytics In The Digital Age
Nigel Wright Group
 

Similar to Chaplygin Roman Cybersecurity challanges in an interconnected world (20)

Information Security Benchmarking 2015
Information Security Benchmarking 2015Information Security Benchmarking 2015
Information Security Benchmarking 2015
 
Digital trust and cyber challenge now extends beyond the Enterprise
Digital trust and cyber challenge now extends beyond the Enterprise Digital trust and cyber challenge now extends beyond the Enterprise
Digital trust and cyber challenge now extends beyond the Enterprise
 
Embracing the Risk and Opportunity of AI & Cloud.pptx
Embracing the Risk and Opportunity of AI & Cloud.pptxEmbracing the Risk and Opportunity of AI & Cloud.pptx
Embracing the Risk and Opportunity of AI & Cloud.pptx
 
Breaches Are Bad for Business. How Will You Detect and Respond to Your Next C...
Breaches Are Bad for Business. How Will You Detect and Respond to Your Next C...Breaches Are Bad for Business. How Will You Detect and Respond to Your Next C...
Breaches Are Bad for Business. How Will You Detect and Respond to Your Next C...
 
Securing the C-Suite: Cybersecurity Perspectives from the Boardroom
Securing the C-Suite: Cybersecurity Perspectives from the BoardroomSecuring the C-Suite: Cybersecurity Perspectives from the Boardroom
Securing the C-Suite: Cybersecurity Perspectives from the Boardroom
 
Ransomware Bootcamp with CTEK and GroupSense
Ransomware Bootcamp with CTEK and GroupSenseRansomware Bootcamp with CTEK and GroupSense
Ransomware Bootcamp with CTEK and GroupSense
 
CynergisTek’s Ransomware Bootcamp
CynergisTek’s Ransomware BootcampCynergisTek’s Ransomware Bootcamp
CynergisTek’s Ransomware Bootcamp
 
IDG 2020 Security Priorities Research
IDG 2020 Security Priorities ResearchIDG 2020 Security Priorities Research
IDG 2020 Security Priorities Research
 
PWC 2014 Global Digital IQ Survey
PWC 2014 Global Digital IQ SurveyPWC 2014 Global Digital IQ Survey
PWC 2014 Global Digital IQ Survey
 
Etude PwC Digital IQ (2014)
Etude PwC Digital IQ (2014)Etude PwC Digital IQ (2014)
Etude PwC Digital IQ (2014)
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
 
Cyber security investments 2021
Cyber security investments 2021Cyber security investments 2021
Cyber security investments 2021
 
Deliver the ‘Right’ Customer Experience without Compromising Data Security
Deliver the ‘Right’ Customer Experience without Compromising Data SecurityDeliver the ‘Right’ Customer Experience without Compromising Data Security
Deliver the ‘Right’ Customer Experience without Compromising Data Security
 
Meraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldMeraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless world
 
Vodafone cyber ready barometer 2018
Vodafone cyber ready barometer 2018Vodafone cyber ready barometer 2018
Vodafone cyber ready barometer 2018
 
eCrime-report-2011-accessible
eCrime-report-2011-accessibleeCrime-report-2011-accessible
eCrime-report-2011-accessible
 
The State of Cybersecurity and Digital Trust 2016
The State of Cybersecurity and Digital Trust 2016The State of Cybersecurity and Digital Trust 2016
The State of Cybersecurity and Digital Trust 2016
 
Is cyber security now too hard for enterprises?
Is cyber security now too hard for enterprises? Is cyber security now too hard for enterprises?
Is cyber security now too hard for enterprises?
 
Data and Analytics In The Digital Age
Data and Analytics In The Digital AgeData and Analytics In The Digital Age
Data and Analytics In The Digital Age
 
ACCA Smart Finance Series - Trust in the Digital Age Presented by PwC
ACCA Smart Finance Series - Trust in the Digital AgePresented by PwCACCA Smart Finance Series - Trust in the Digital AgePresented by PwC
ACCA Smart Finance Series - Trust in the Digital Age Presented by PwC
 

More from East-West Digital News

More from East-West Digital News (20)

China-to-Russia e-commerce: Key facts and figures, by Adrien Henni (EWDN)
China-to-Russia e-commerce: Key facts and figures, by Adrien Henni (EWDN)China-to-Russia e-commerce: Key facts and figures, by Adrien Henni (EWDN)
China-to-Russia e-commerce: Key facts and figures, by Adrien Henni (EWDN)
 
Event book of The China-Russian E-Commerce Summit
Event book of The China-Russian E-Commerce SummitEvent book of The China-Russian E-Commerce Summit
Event book of The China-Russian E-Commerce Summit
 
B2C logistics management (Delivia)
B2C logistics management (Delivia) B2C logistics management (Delivia)
B2C logistics management (Delivia)
 
E-commerce delivery methods, by Edvin Lukanov (Qiwi)
E-commerce delivery methods, by Edvin Lukanov (Qiwi) E-commerce delivery methods, by Edvin Lukanov (Qiwi)
E-commerce delivery methods, by Edvin Lukanov (Qiwi)
 
Tools to increase conversion, by Nadezhda Romanova (PickPoint)
Tools to increase conversion, by Nadezhda Romanova (PickPoint) Tools to increase conversion, by Nadezhda Romanova (PickPoint)
Tools to increase conversion, by Nadezhda Romanova (PickPoint)
 
CDEK in China, by Sergey Egorov (CDEK)
CDEK in China, by Sergey Egorov (CDEK)CDEK in China, by Sergey Egorov (CDEK)
CDEK in China, by Sergey Egorov (CDEK)
 
Russian e-shoppers' preferences and Chinese challenges (IML)
Russian e-shoppers' preferences and Chinese challenges (IML)Russian e-shoppers' preferences and Chinese challenges (IML)
Russian e-shoppers' preferences and Chinese challenges (IML)
 
Cross-border e-commerce according to Russian Post
Cross-border e-commerce according to Russian PostCross-border e-commerce according to Russian Post
Cross-border e-commerce according to Russian Post
 
Mobile acquiring data by Life Pay
Mobile acquiring data by Life Pay Mobile acquiring data by Life Pay
Mobile acquiring data by Life Pay
 
Online marketplaces in Russia, by Alexey Petrovsky (Price.ru)
Online marketplaces in Russia, by Alexey Petrovsky (Price.ru) Online marketplaces in Russia, by Alexey Petrovsky (Price.ru)
Online marketplaces in Russia, by Alexey Petrovsky (Price.ru)
 
About Obuv Rossii’s online activity, by Irina Poddubnaya (Obuv Rossii)
About Obuv Rossii’s online activity, by Irina Poddubnaya (Obuv Rossii) About Obuv Rossii’s online activity, by Irina Poddubnaya (Obuv Rossii)
About Obuv Rossii’s online activity, by Irina Poddubnaya (Obuv Rossii)
 
How to deal with the Chinese, by Marx Chzhan (Rufavor)
How to deal with the Chinese, by Marx Chzhan (Rufavor) How to deal with the Chinese, by Marx Chzhan (Rufavor)
How to deal with the Chinese, by Marx Chzhan (Rufavor)
 
B2B e-commerce, by Ekaterina Ilvovskaya (B2B-Center.ru)
B2B e-commerce, by Ekaterina Ilvovskaya (B2B-Center.ru) B2B e-commerce, by Ekaterina Ilvovskaya (B2B-Center.ru)
B2B e-commerce, by Ekaterina Ilvovskaya (B2B-Center.ru)
 
Fedorov 220volt
Fedorov 220voltFedorov 220volt
Fedorov 220volt
 
JD com
JD comJD com
JD com
 
JD com
JD comJD com
JD com
 
China, the new driving force of the Russian e-commerce - Henni Adrien EWDN
China, the new driving force of the Russian e-commerce - Henni Adrien EWDNChina, the new driving force of the Russian e-commerce - Henni Adrien EWDN
China, the new driving force of the Russian e-commerce - Henni Adrien EWDN
 
E-commerce DIY and Fashion 2015
E-commerce DIY and Fashion 2015E-commerce DIY and Fashion 2015
E-commerce DIY and Fashion 2015
 
Fedor Virin Интернет-торговля 2015: сегменты DIY & Fashion
Fedor Virin  Интернет-торговля 2015: сегменты DIY & FashionFedor Virin  Интернет-торговля 2015: сегменты DIY & Fashion
Fedor Virin Интернет-торговля 2015: сегменты DIY & Fashion
 
Gleb Nikulin api
Gleb Nikulin apiGleb Nikulin api
Gleb Nikulin api
 

Recently uploaded

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 

Chaplygin Roman Cybersecurity challanges in an interconnected world

  • 1. EDAYS INTERNATIONAL E-COMMERCE CONFERENCE M O S C O W , J U N E 4 - 5 , 2 0 1 5 Cybersecurity challenges in an interconnected world PwC Global State of information security survey results for Retail industry
  • 2. Cyber risks: A severe and present danger E D A Y S I N T E R N A T I O N A L E - C O M M E R C E C O N F E R E N C E – M O S C O W , J U N E 4 - 5 , 2 0 1 5 2 In 2014 Verizon counted 524 security incidents in retailers industries around the world in its annual Data Breach Investigations Report, noting that points of sale were the primary targets in 70% of incidents within the retail industry. Over the past year, the phrase “data breach” has become closely associated with the word “retailer” as attacks reached epic levels.
  • 3. PwC GSISS 2015: Retail incidents statistic E D A Y S I N T E R N A T I O N A L E - C O M M E R C E C O N F E R E N C E – M O S C O W , J U N E 4 - 5 , 2 0 1 5 3 The Global State of Information Security® Survey (GSISS) shows that, among 836 worldwide retail and consumer goods respondents, the number of detected incidents in 2014 increased 19% over 2013. Current and former employees, third-party service providers, contractors, suppliers, and business partners are most frequently mentioned as the cause of incidents
  • 4. PwC GSISS 2015: Retail incidents statistic E D A Y S I N T E R N A T I O N A L E - C O M M E R C E C O N F E R E N C E – M O S C O W , J U N E 4 - 5 , 2 0 1 5 4 Personal data including payment and purchase information as well as Intellectual property are the main targets for thefts. Another purpose of cyberattack is fraud.
  • 5. PwC GSISS 2015: Retail security issues E D A Y S I N T E R N A T I O N A L E - C O M M E R C E C O N F E R E N C E – M O S C O W , J U N E 4 - 5 , 2 0 1 5 5 Data governance is lacking Have secure- access control measures Have centralize d user data store Have an accurate inventory of personal data Limit access to the minimum necessar y Have privileged user access tools Have a written security policy Retailers, in particular, often take a compliance-checklist approach to information security, focusing on Payment Card Industry Data Security Standard (PCI DSS) requirements while disregarding implementation of adequate data governance to protect valuable information assets. Good data governance will require that businesses develop a framework and policies for the creation, use, storage, and deletion of information. It will also demand that retail and consumer companies know where their data is stored, manage access to sensitive information, and govern the use and security of valuable data by third-party partners.
  • 6. PwC GSISS 2015: Increasing third-party threats E D A Y S I N T E R N A T I O N A L E - C O M M E R C E C O N F E R E N C E – M O S C O W , J U N E 4 - 5 , 2 0 1 5 6 Data breaches often start with the compromise of suppliers, contractors, and vendors. Only 29% say they have this type of monitoring program in place, and 37% say they plan to add one. But one in five say they have no plans to implement a program to monitor third parties.
  • 7. PwC GSISS 2015: New technologies and risks E D A Y S I N T E R N A T I O N A L E - C O M M E R C E C O N F E R E N C E – M O S C O W , J U N E 4 - 5 , 2 0 1 5 7 Retail and consumer goods companies are embracing new technologies to connect with customers, build operational efficiencies, and enable collaboration. The trouble is, many businesses adopt these technologies before they effectively secure them. Yet only 45% of respondents have a security strategy for cloud computing—an astonishing finding—and just 33% say they are “very prepared” to protect sensitive data in the cloud. Given that 29% of respondents say they use cloud services for e- commerce, that’s certainly disquieting. More than half of respondents say they use some form of cloud computing for file storage and sharing, and hosting of databases, applications, e-mail, and websites.
  • 8. PwC GSISS 2015: New technologies and risks E D A Y S I N T E R N A T I O N A L E - C O M M E R C E C O N F E R E N C E – M O S C O W , J U N E 4 - 5 , 2 0 1 5 8 Attrition in safeguards for new technologies 69% of respondents either plan to allow or already do allow use of employee-owned devices to access the corporate network One quarter (25%) of retail and consumer respondents say they have implemented systems for digital wallets, and an additional 36% say they plan to implement them in the future.
  • 9. PwC GSISS 2015: Retail need strategic approach E D A Y S I N T E R N A T I O N A L E - C O M M E R C E C O N F E R E N C E – M O S C O W , J U N E 4 - 5 , 2 0 1 5 9 More than ever, senior executives should proactively ensure that the Board understands how the organization will detect, defend against, and respond to cyber threats. Before resources can be allocated, however, it will be necessary to first identify the organization’s most valuable assets and determine who owns responsibility for them. A senior executive communicates importance of security to entire enterprise Information security strategy is aligned with specific business needs Program to identify sensitive assets Collaborate with others to improve security Have cyber insurance Have employee security training and awareness program
  • 10. PwC GSISS 2015: Linking security and risk E D A Y S I N T E R N A T I O N A L E - C O M M E R C E C O N F E R E N C E – M O S C O W , J U N E 4 - 5 , 2 0 1 5 10 As incidents continue to proliferate, it’s becoming clear that cyber risks can never be completely eliminated. Today’s interconnected business ecosystem requires a shift from security that focuses on prevention and controls to a risk-based approach that prioritizes an organization’s most valuable assets and its most relevant threats. It also will be critical to focus on rapid detection of security intrusions and an effective, timely response.
  • 11. PwC GSISS 2016 E D A Y S I N T E R N A T I O N A L E - C O M M E R C E C O N F E R E N C E – M O S C O W , J U N E 4 - 5 , 2 0 1 5 11 We invite you to participate in our survey www.pwc.ru/gsiss2016 End of the survey June 12, 2015
  • 12. PwC helps clients manage modern cyberrisks E D A Y S I N T E R N A T I O N A L E - C O M M E R C E C O N F E R E N C E – M O S C O W , J U N E 4 - 5 , 2 0 1 5 12 PwC applies its local and global experience and resources equally to create value for clients when carrying out diverse projects, ranging from strategy development to implementation. 180,000 PwC staff worldwide 38,000 PwC consultants worldwide 9,600 PwC IT consultants worldwide Our global network of firms includes 776 offices in 158 countries worldwide Leader in IT-enabled business transformation Forrester, 3Q 2012 PwC has broad experience in providing consulting services to universities and higher educational institutions Leader in business consulting IDC Marketscape, 2012 PwC CEE has a highly talented pool of certified Cyber security consulting staff with a full range of skills: CISA – 39 people CISM– 7 people CRISC – 5 people CISSP – 4 peopl ISO 27001– 12 people and others 2,000 PwC Cyber security consultants worldwide
  • 13. Let’s keep in touch! E D A Y S I N T E R N A T I O N A L E - C O M M E R C E C O N F E R E N C E – M O S C O W , J U N E 4 - 5 , 2 0 1 5 13 Thank you for your attention! Roman Chaplygin Director, Cybersecurity leader, PwC Russia Tel: +7 (495) 967 6056 Mob: +7 (903) 272 1620 E-mail: roman.chaplygin@ru.pwc.com PwC CyberSecurity Club on Facebook