SlideShare a Scribd company logo
Cyber
Resilience
focussed on 3rd Party Risks in Financial Services
Kevin Duffey
Managing
Director
November
2020
Measurement, Mitigation & Management of Cyber Risk
should be as objective, timely & dynamic as for Market Risk
1. Measurement: obtain independent, objective, & timely
data on the cyber posture of your material suppliers, vs peers
Email Assistance@CyberRescue.co.uk with subject line “Cyber Resilience” for 100 days of online, real-time
reporting on all your suppliers, as a benefit of participating in this Marcus Evans conference.
Oct 2020: European IT services group Sopra Steria hit by Ransomware.
Supplier to HSBC, RBS, Bank of China and Crédit Agricole says it is "working hard for a return to
normal”
The firm issued a terse statement confirming a cyberattack on its IT network on 20th October.
2. Mitigation: engage your material Suppliers to show
what hackers can exploit, to reduce risks across suppliers
Email Assistance@CyberRescue.co.uk with subject line “Cyber Resilience” for 100 days of online, real-time
reporting on all your suppliers, as a benefit of participating in this Marcus Evans conference.
Microsoft
Finastra
Equifax
HIS Markit
3. Management: implement Governance dashboards that
show Execs how your firm compares with your competitors
Email Assistance@CyberRescue.co.uk with subject line “Cyber Resilience” for 100 days of online, real-time
reporting on all your suppliers, as a benefit of participating in this Marcus Evans conference.
Breach Response
Capability Maturity
Today’s Cyber Environment
“The NCSC handled over 3x as many ransomware incidents as last year”
3rd November Highlights of the year for UK’s National Cyber Security Centre
Example:
Ransomware hitting supplier of Covid vaccine
Email Assistance@CyberRescue.co.uk with subject line “Cyber Resilience” for 100 days of online, real-time
reporting on all your suppliers, as a benefit of participating in this Marcus Evans conference.
Oct 2020: Covid-19 vaccine manufacturing delayed by ransomware
Drug production by generics firm Dr Reddy “briefly” delayed by ransomware in USA, India, Russia &
UK
Dr. Reddy’s Laboratories isolated all data centres
and stopped some production, according to media reports on Friday, 23rd October.
COVID-19 Vaccine delayed by Ransomware attack in October
Astra Zeneca’s supplier of clinical trials, IQVIA, was hit when its supplier ERT was breached
On 4th October 2020, the New York Times reported that Astra Zeneca’s
supplier of clinical trials, IQVIA, had been impacted when its software supplier
ERT was breached by Ransomware. This graph shows IQVIA’s own failing
score on Patching Cadence over the months before the breach.
This graph shows ERT’s failing
score on Network Security over
the months before the breach.
Fiona van Echelpoel
Deputy Director General, European Central Bank, October 2020
During Covid19…
“The Covid-19
outbreak brought
ransomware attacks,
culminating in the
death of a patient
due to an attack on a
hospital.
“Ransomware
attacks have
tripled.”
October 2020:
Increased number of organizations are paying ransoms
Special Advisory from US Treasury Department:
“the severity & sophistication
of ransomware continues to rise”
Special Advisory from US Treasury Department:
“paying ransom may contravene US law,
including the Trading with the Enemy Act"
During Covid19…
“significant cyber
events have
impacted 3rd
party providers,
which highlights the
importance of
understanding the
operational
resilience of
key 3rd party
suppliers."
Nick Strange
Supervisory Risk Specialist, Bank of England, Oct 2020
Question for Delegates
What are the key 3rd party suppliers to the
UK’s Finance Sector, that either:
• have been breached in 2020, or
• you worry might be breached in 2021?
Question for Delegates
What are the key 3rd party suppliers to the
UK’s Finance Sector, that either:
• have been breached in 2020, or
• you worry might be breached in 2021?
Email Assistance@CyberRescue.co.uk with subject line “Cyber Resilience” for 100 days of online, real-time
reporting on all your suppliers, as a benefit of participating in this Marcus Evans conference.
Jan 2020: these banks hurt by Ransomware
Jan 2020: these banks hurt by Ransomware
The Ransomware hit their supplier, Travelex
Jan 2020: these banks hurt by Ransomware
The Ransomware hit their supplier, Travelex
Online, real-time reporting before breach
CurrencyFair
Transfast
Torfx
One World
MoneyCorp
PayPal
Travelex
Impact tolerances at a dozen UK Banks were breached in Jan 2020,
as their travel money provider Travelex was breached by cyber attack.
Travelex had said it “conforms to ISO27001” & has “robust data privacy”.
Leading CROs had the facts graphed above, before the breach. 19
Travelex was breached after a year of worse cyber posture than peers
Application
Security
Vs peers
Network
Security
Vs peers
Patching
Cadence
Vs peers
Finastra breached “while we
focused on emergency plans for
operating under Covid-19”
- CEO statement
Finastra’s security team had
pushed to fix known security
issues but were “over-ruled
by senior managers”
- Bloomberg
Leading CROs had real-time facts
before the breach.
Breach happened in March 2020
while “focused… on Covid-19”
21
Online, real-time reporting before breach
Online, real-time reporting during COVID
October 2020
37% are increasing
spend on Data Security
53% of those expect
their bigger spend on
security to outlast Covid
How suppliers are changing under Covid
The Good News
Published October 20202: survey of 330 organisations
How suppliers are changing under Covid
The Bad News
24% are decreasing spend on Data Security
Do you know which of your suppliers are doing that?
#1: = Supply Chains
October 2nd, 2020
So no surprise that Supply Chains are now focus
Richard F Smith, former CEO of Equifax
Engaging Key Colleagues is right start
Barrie Millett, Group Head of Operational Resilience, Wesleyan Group
27
March 8th, 2019
Engaging Key Colleagues is right start
Barrie Millett, Group Head of Operational Resilience, Wesleyan Group
March 8th, 2019
Equifax Used What their Internal Auditors Called
an ‘Honor System’ for Patching Vulnerabilities.
“Equifax had no formalized method of validating the successful installation
of patches. Audit referred to this approach as an ‘honor system’in which the
IT team would notify the security team once patches were complete.”
What does an
“honor system” for
patching look like?
What does an
“honor system” for
patching look like?
What does an
“honor system” for
patching look like?
Example Dashboards for Cyber Resilience
Email Assistance@CyberRescue.co.uk with subject line “Cyber Resilience” for 100 days of online, real-time
reporting on all your suppliers, as a benefit of participating in this Marcus Evans conference.
Question for Delegates
If you want to try the Cyber Risk
measurement Dashboards, write
your name.
Email Assistance@CyberRescue.co.uk with subject line “Cyber Resilience” for 100 days of online, real-time
reporting on all your suppliers, as a benefit of participating in this Marcus Evans conference.
The PRA Paper: CP30/10
34
The PRA Paper: context
35
The PRA Paper: context
36
Operational Resilience - Key Concepts
Operational Resilience is the ability to prevent, adapt, respond to, recover and learn from operational disruptions.
The PRA Paper: content
37
Responses are
requested by
October 2020
This CP is
relevant to
almost all UK
Firms
Complete
Outsourcing
Register by 31
Dec 2021
Builds on EBA &
EIOPA
Guidelines +
TSC reports
Proposals in SS
summarised:
Definitions &
Scope.
Proportionality,
Governance,
Record Keeping,
Materiality.
Due Diligence,
Agreements,
Data Security,
Info Rights.
Sub-Outsourcing
Business
Continuity &
Exit Plans
Systemic Risks
The PRA’s Duty
to Consult
PRA’s Objectives
Regulatory
Principles
Treasury Goals
1. Intro:
Set expectations
on Outsourcing
& 3rd Party Risk
This SSxx/20
Complements SS
on Operational
Resilence
4. Governance:
Robust info for
Board oversight
& challenge
Required
Contents of
Policy & of
Record Keeping
3. Proportionality:
Firms below
Category Two
can outsource IA
2. Definitions
A 3rd Party has
contract to
provide service
5. Pre Outsource:
Materiality (vs
Threshold
Conditions)
Automatically
Material if 3rd
Party could
impact TCs/FRs
Consider…
IT & cyber
security controls
+ breach impact
6. Agreements
Set… minimum
cybersecurity
requirements
Ongoing monitor
of effectiveness
of supplier’s
security controls
9. Sub-Outsourcing
At minimum,
monitor key sub-
outsourcing
providers.
10. Continuity
Consider
deliberate
cyber-attack.
Stressed Exits.
Governance
and Testing of
Plans
Contingency
Plan best
practices, eg
Step In Rights
Appendix
Guidance on
Outsourcing
Register.
8. Audit Rights
Online, real-time
reporting tools
are strongly
encouraged.
7. Data Security
Implement
protection of
outsourced data
The PRA Paper: content
38
The first third of the Consultation Paper provides context and
commentary for the draft Supervisory Statement that follows.
The second two-thirds of the Consultation Paper is the draft
Supervisory Statement to be published in 2021 after consultation.
The PRA Paper: content
39
The first third of the Consultation Paper provides context and
commentary for the draft Supervisory Statement that follows.
The second two-thirds of the Consultation Paper is the draft
Supervisory Statement to be published in 2021 after consultation.
21
Bank of England PRA Consultation Paper
on 3rd Party (Cyber) Risk Management
41
GDPR, Article 32
“Taking into account the state
of the art…
… Controllers must have a
process for regularly testing,
assessing & evaluating the
technical measures for
security at information
processors.”
Only leading firms are obeying existing law
Equinix Breached, after a year of poor cyber security
Sept 2020: Equinix - leading data centre provider - breached
Operating in 25 countries, Equinix was reported to have paid ransom on 16th Sept 2020
Marcus Evans delegates have an advantage, as you’re are entitled to
online, real-time reporting on all suppliers for 100 days.
Email: Assistance@CyberRescue.co.uk with subject line “Cyber Resilience”
Marcus Evans delegates have an advantage, as you’re are entitled to
online, real-time reporting on all suppliers for 100 days.
Email: Assistance@CyberRescue.co.uk with subject line “Cyber Resilience”
Oct 2020: European IT services group Sopra Steria hit by Ransomware.
Supplier to HSBC, RBS, Bank of China and Crédit Agricole says it is "working hard for a return to
normal”
The firm issued a terse statement confirming a cyberattack on its IT network on 20th October.
Question for Delegates
What are the job titles of colleagues
who share some responsibility for
cyber resilience?
Email Assistance@CyberRescue.co.uk with subject line “Cyber Resilience” for 100 days of online, real-time
reporting on all your suppliers, as a benefit of participating in this Marcus Evans conference.
Answers from previous Delegates
45
Answers from previous Delegates
46
CEO COO 3rd Party Oversight Provider Chair Risk Committee Product Commercial
CFO CRO
Compliance /
Financial Crime
Operational Resilience Contracts Procurement
CIO CTO Business + Operations Operational Risk DPO Supplier Relationship
CISO Auditor Communications Business Continuity Legal Project Manager
Answers from previous Delegates
11 people should be in your team, said Caleidoscope, See2020 & ScreamCastle.
Project Tango suggested 12 individuals, while Hawkeye said 8 individuals.
The 11 job titles that most experts thought should be in the Project Team were:
CRO; COO; CISO; CTO; DPO; Legal; Procurement/Contracts; Project Manager.
Operational Resilience; 3rd Party Oversight Provider; Communications.
Set your SMART goals for calendar 2021,
for Operational Resilience project on cyber risk across your supply chain
48
49
Discussion: How do you define your
Impact Tolerance for your suppliers?
50
Set your Risk Appetite for your suppliers
Categorisation: Suppliers are “material” if their
failure might challenge your firm’s “safety & soundness”
Key
(30%)
Material
(10%)
Transactional
(40%)
Strategic
(20%)
More difficult to exit from the relationship
Supplyingessentialservices
Email Assistance@CyberRescue.co.uk with subject line “Cyber Resilience” for 100 days of online, real-time
reporting on all your suppliers, as a benefit of participating in this Marcus Evans conference.
Categorisation: Suppliers are “material” if their
failure might challenge your firm’s “safety & soundness”
Email Assistance@CyberRescue.co.uk with subject line “Cyber Resilience” for 100 days of online, real-time
reporting on all your suppliers, as a benefit of participating in this Marcus Evans conference.
CQUEST is based on our favourite, NIST
CQUEST consists of multiple-choice questions:
• It is based on the 5 pillars of NIST
• It adds a “Governance” section, for a total of 48 questions
• In our online implementation below, external evidence is
provided to score questions like “do you patch appropriately?”
Cyber resilience assessment from PRA & FCA
53
CQUEST
CQUEST consists of multiple-choice questions covering all aspects of cyber resilience, such as:
• Does the firm have a board-approved cyber security strategy?
• How does it identify and protect its critical assets?
• How does it detect and respond to an incident, recover and learn from the experience?
Cyber resilience assessment from PRA & FCA
54
Continuous Monitoring of our key suppliers
Sending your Self Attestation Questionnaire – automated workflows
55
Continuous Monitoring of our key suppliers
Marking your Self Attestation Questionnaire – automated workflows
56
1. Measurement: obtain independent, objective, & timely
data on the cyber posture of your material suppliers, vs peers
Email Assistance@CyberRescue.co.uk with subject line “Cyber Resilience” for 100 days of online, real-time
reporting on all your suppliers, as a benefit of participating in this Marcus Evans conference.
Oct 2020: Serious cyber attack suffered by Hackney Council
UK’s National Cyber Security Centre (part of GCHQ) called in by North London local government
After months of having cyber security that was worse than at other councils , many
of the services and IT systems of Hackney Council were disrupted, on 13th October.
In March 2020, as remote-working began,
cyber security posture at Hackney fell badly.
2. Mitigation: engage your material Suppliers to show
what hackers can exploit, to reduce risks across suppliers
Email Assistance@CyberRescue.co.uk with subject line “Cyber Resilience” for 100 days of online, real-time
reporting on all your suppliers, as a benefit of participating in this Marcus Evans conference.
Microsoft
Finastra
Equifax
HIS Markit
3. Management: implement Governance dashboards that
show Execs how your firm compares with your competitors
Email Assistance@CyberRescue.co.uk with subject line “Cyber Resilience” for 100 days of online, real-time
reporting on all your suppliers, as a benefit of participating in this Marcus Evans conference.
Breach Response
Capability Maturity
Cyber
Resilience
Kevin Duffey
Managing
Director
November
2020
Email Assistance@CyberRescue.co.uk with subject line “Cyber Resilience”
for 100 days of online, real-time reporting on all your suppliers, as a benefit
of participating in this Marcus Evans conference.

More Related Content

What's hot

An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)
Ahmad Haghighi
 
Cybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architectureCybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architecture
Priyanka Aash
 
IT Disaster Recovery & Business Continuity
IT Disaster Recovery & Business ContinuityIT Disaster Recovery & Business Continuity
IT Disaster Recovery & Business Continuity
mascot4u
 
7 Steps to Build a SOC with Limited Resources
7 Steps to Build a SOC with Limited Resources7 Steps to Build a SOC with Limited Resources
7 Steps to Build a SOC with Limited Resources
LogRhythm
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
Priyanka Aash
 
How To Present Cyber Security To Senior Management Complete Deck
How To Present Cyber Security To Senior Management Complete DeckHow To Present Cyber Security To Senior Management Complete Deck
How To Present Cyber Security To Senior Management Complete Deck
SlideTeam
 
Disaster Recovery Plan
Disaster Recovery PlanDisaster Recovery Plan
Disaster Recovery Plan
mhdpaknejad
 
SOC Cyber Security
SOC Cyber SecuritySOC Cyber Security
SOC Cyber Security
Steppa Cyber Security
 
Security operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیتSecurity operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیت
ReZa AdineH
 
Roadmap to security operations excellence
Roadmap to security operations excellenceRoadmap to security operations excellence
Roadmap to security operations excellence
Erik Taavila
 
Introduction - Trend Micro Deep Security
Introduction - Trend Micro Deep SecurityIntroduction - Trend Micro Deep Security
Introduction - Trend Micro Deep Security
Andrew Wong
 
Security operations center 5 security controls
 Security operations center 5 security controls Security operations center 5 security controls
Security operations center 5 security controls
AlienVault
 
Security Operations Center (SOC) Essentials for the SME
Security Operations Center (SOC) Essentials for the SMESecurity Operations Center (SOC) Essentials for the SME
Security Operations Center (SOC) Essentials for the SME
AlienVault
 
Strategies for Managing OT Cybersecurity Risk
Strategies for Managing OT Cybersecurity RiskStrategies for Managing OT Cybersecurity Risk
Strategies for Managing OT Cybersecurity Risk
Mighty Guides, Inc.
 
Enterprise Risk Management (ERM) Framework 2020
Enterprise Risk Management (ERM) Framework 2020 Enterprise Risk Management (ERM) Framework 2020
Enterprise Risk Management (ERM) Framework 2020
Richard Swartzbaugh
 
WHY SOC Services needed?
WHY SOC Services needed?WHY SOC Services needed?
WHY SOC Services needed?
manoharparakh
 
Building Security Operation Center
Building Security Operation CenterBuilding Security Operation Center
Building Security Operation Center
S.E. CTS CERT-GOV-MD
 
A Practical Example to Using SABSA Extended Security-in-Depth Strategy
A Practical Example to Using SABSA Extended Security-in-Depth Strategy A Practical Example to Using SABSA Extended Security-in-Depth Strategy
A Practical Example to Using SABSA Extended Security-in-Depth Strategy
Allen Baranov
 
Walk This Way: CIS CSC and NIST CSF is the 80 in the 80/20 rule
Walk This Way: CIS CSC and NIST CSF is the 80 in the 80/20 ruleWalk This Way: CIS CSC and NIST CSF is the 80 in the 80/20 rule
Walk This Way: CIS CSC and NIST CSF is the 80 in the 80/20 rule
EnterpriseGRC Solutions, Inc.
 
The Board and Cyber Security
The Board and Cyber SecurityThe Board and Cyber Security
The Board and Cyber Security
FireEye, Inc.
 

What's hot (20)

An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)
 
Cybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architectureCybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architecture
 
IT Disaster Recovery & Business Continuity
IT Disaster Recovery & Business ContinuityIT Disaster Recovery & Business Continuity
IT Disaster Recovery & Business Continuity
 
7 Steps to Build a SOC with Limited Resources
7 Steps to Build a SOC with Limited Resources7 Steps to Build a SOC with Limited Resources
7 Steps to Build a SOC with Limited Resources
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
 
How To Present Cyber Security To Senior Management Complete Deck
How To Present Cyber Security To Senior Management Complete DeckHow To Present Cyber Security To Senior Management Complete Deck
How To Present Cyber Security To Senior Management Complete Deck
 
Disaster Recovery Plan
Disaster Recovery PlanDisaster Recovery Plan
Disaster Recovery Plan
 
SOC Cyber Security
SOC Cyber SecuritySOC Cyber Security
SOC Cyber Security
 
Security operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیتSecurity operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیت
 
Roadmap to security operations excellence
Roadmap to security operations excellenceRoadmap to security operations excellence
Roadmap to security operations excellence
 
Introduction - Trend Micro Deep Security
Introduction - Trend Micro Deep SecurityIntroduction - Trend Micro Deep Security
Introduction - Trend Micro Deep Security
 
Security operations center 5 security controls
 Security operations center 5 security controls Security operations center 5 security controls
Security operations center 5 security controls
 
Security Operations Center (SOC) Essentials for the SME
Security Operations Center (SOC) Essentials for the SMESecurity Operations Center (SOC) Essentials for the SME
Security Operations Center (SOC) Essentials for the SME
 
Strategies for Managing OT Cybersecurity Risk
Strategies for Managing OT Cybersecurity RiskStrategies for Managing OT Cybersecurity Risk
Strategies for Managing OT Cybersecurity Risk
 
Enterprise Risk Management (ERM) Framework 2020
Enterprise Risk Management (ERM) Framework 2020 Enterprise Risk Management (ERM) Framework 2020
Enterprise Risk Management (ERM) Framework 2020
 
WHY SOC Services needed?
WHY SOC Services needed?WHY SOC Services needed?
WHY SOC Services needed?
 
Building Security Operation Center
Building Security Operation CenterBuilding Security Operation Center
Building Security Operation Center
 
A Practical Example to Using SABSA Extended Security-in-Depth Strategy
A Practical Example to Using SABSA Extended Security-in-Depth Strategy A Practical Example to Using SABSA Extended Security-in-Depth Strategy
A Practical Example to Using SABSA Extended Security-in-Depth Strategy
 
Walk This Way: CIS CSC and NIST CSF is the 80 in the 80/20 rule
Walk This Way: CIS CSC and NIST CSF is the 80 in the 80/20 ruleWalk This Way: CIS CSC and NIST CSF is the 80 in the 80/20 rule
Walk This Way: CIS CSC and NIST CSF is the 80 in the 80/20 rule
 
The Board and Cyber Security
The Board and Cyber SecurityThe Board and Cyber Security
The Board and Cyber Security
 

Similar to Cyber Resilience: managing 3rd Party Risks in Financial Services

Convince your board - cyber attack prevention is better than cure
Convince your board - cyber attack prevention is better than cureConvince your board - cyber attack prevention is better than cure
Convince your board - cyber attack prevention is better than cure
Dave James
 
Privacy & Security in Feb 2020: new Fintech regulations on Cyber Security at ...
Privacy & Security in Feb 2020: new Fintech regulations on Cyber Security at ...Privacy & Security in Feb 2020: new Fintech regulations on Cyber Security at ...
Privacy & Security in Feb 2020: new Fintech regulations on Cyber Security at ...
Kevin Duffey
 
Cyber Risk for Construction Industry
Cyber Risk for Construction Industry Cyber Risk for Construction Industry
Cyber Risk for Construction Industry
BrianHuntMSFCPACRISC
 
Ivanti threat thursday deck october v2
Ivanti threat thursday deck october v2Ivanti threat thursday deck october v2
Ivanti threat thursday deck october v2
Ivanti
 
Application Security: Safeguarding Data, Protecting Reputations
Application Security: Safeguarding Data, Protecting ReputationsApplication Security: Safeguarding Data, Protecting Reputations
Application Security: Safeguarding Data, Protecting Reputations
Cognizant
 
Emerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive AnalysisEmerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
IRJET Journal
 
Securing Fintech: Threats, Challenges & Best Practices
Securing Fintech: Threats, Challenges & Best PracticesSecuring Fintech: Threats, Challenges & Best Practices
Securing Fintech: Threats, Challenges & Best Practices
Ulf Mattsson
 
Cybersecurity Landscape for Canadian Business
Cybersecurity Landscape for Canadian BusinessCybersecurity Landscape for Canadian Business
Cybersecurity Landscape for Canadian Business
Infinity Network Solutions
 
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
PECB
 
Open Source Insight: CVE–2017-9805, Equifax Breach & Wacky Open Source Licenses
Open Source Insight: CVE–2017-9805, Equifax Breach & Wacky Open Source LicensesOpen Source Insight: CVE–2017-9805, Equifax Breach & Wacky Open Source Licenses
Open Source Insight: CVE–2017-9805, Equifax Breach & Wacky Open Source Licenses
Black Duck by Synopsys
 
Who is the next target proactive approaches to data security
Who is the next target   proactive approaches to data securityWho is the next target   proactive approaches to data security
Who is the next target proactive approaches to data security
Ulf Mattsson
 
Edgescan 2022 Vulnerability Statistics Report
Edgescan 2022 Vulnerability Statistics ReportEdgescan 2022 Vulnerability Statistics Report
Edgescan 2022 Vulnerability Statistics Report
Eoin Keary
 
2022 Vulnerability Statistics Report.pdf
2022 Vulnerability Statistics Report.pdf2022 Vulnerability Statistics Report.pdf
2022 Vulnerability Statistics Report.pdf
ssuserc3d7ec1
 
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)Sarah Jarvis
 
Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.
Vertex Holdings
 
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
RakeshPatel583282
 
Cybersecurity Disrupters and Cybersecurity Insurance in the COVID-19 Era – Is...
Cybersecurity Disrupters and Cybersecurity Insurance in the COVID-19 Era – Is...Cybersecurity Disrupters and Cybersecurity Insurance in the COVID-19 Era – Is...
Cybersecurity Disrupters and Cybersecurity Insurance in the COVID-19 Era – Is...
Citrin Cooperman
 
Key note in nyc the next breach target and how oracle can help - nyoug
Key note in nyc   the next breach target and how oracle can help - nyougKey note in nyc   the next breach target and how oracle can help - nyoug
Key note in nyc the next breach target and how oracle can help - nyoug
Ulf Mattsson
 
What is Importance of Cyber Security
What is Importance of Cyber Security What is Importance of Cyber Security
What is Importance of Cyber Security
Wee Tang
 
The 10 Fastest Growing Cyber Security Companies of 2017
The 10 Fastest Growing Cyber Security Companies of 2017The 10 Fastest Growing Cyber Security Companies of 2017
The 10 Fastest Growing Cyber Security Companies of 2017
Insights success media and technology pvt ltd
 

Similar to Cyber Resilience: managing 3rd Party Risks in Financial Services (20)

Convince your board - cyber attack prevention is better than cure
Convince your board - cyber attack prevention is better than cureConvince your board - cyber attack prevention is better than cure
Convince your board - cyber attack prevention is better than cure
 
Privacy & Security in Feb 2020: new Fintech regulations on Cyber Security at ...
Privacy & Security in Feb 2020: new Fintech regulations on Cyber Security at ...Privacy & Security in Feb 2020: new Fintech regulations on Cyber Security at ...
Privacy & Security in Feb 2020: new Fintech regulations on Cyber Security at ...
 
Cyber Risk for Construction Industry
Cyber Risk for Construction Industry Cyber Risk for Construction Industry
Cyber Risk for Construction Industry
 
Ivanti threat thursday deck october v2
Ivanti threat thursday deck october v2Ivanti threat thursday deck october v2
Ivanti threat thursday deck october v2
 
Application Security: Safeguarding Data, Protecting Reputations
Application Security: Safeguarding Data, Protecting ReputationsApplication Security: Safeguarding Data, Protecting Reputations
Application Security: Safeguarding Data, Protecting Reputations
 
Emerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive AnalysisEmerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
 
Securing Fintech: Threats, Challenges & Best Practices
Securing Fintech: Threats, Challenges & Best PracticesSecuring Fintech: Threats, Challenges & Best Practices
Securing Fintech: Threats, Challenges & Best Practices
 
Cybersecurity Landscape for Canadian Business
Cybersecurity Landscape for Canadian BusinessCybersecurity Landscape for Canadian Business
Cybersecurity Landscape for Canadian Business
 
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
 
Open Source Insight: CVE–2017-9805, Equifax Breach & Wacky Open Source Licenses
Open Source Insight: CVE–2017-9805, Equifax Breach & Wacky Open Source LicensesOpen Source Insight: CVE–2017-9805, Equifax Breach & Wacky Open Source Licenses
Open Source Insight: CVE–2017-9805, Equifax Breach & Wacky Open Source Licenses
 
Who is the next target proactive approaches to data security
Who is the next target   proactive approaches to data securityWho is the next target   proactive approaches to data security
Who is the next target proactive approaches to data security
 
Edgescan 2022 Vulnerability Statistics Report
Edgescan 2022 Vulnerability Statistics ReportEdgescan 2022 Vulnerability Statistics Report
Edgescan 2022 Vulnerability Statistics Report
 
2022 Vulnerability Statistics Report.pdf
2022 Vulnerability Statistics Report.pdf2022 Vulnerability Statistics Report.pdf
2022 Vulnerability Statistics Report.pdf
 
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
 
Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.
 
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
 
Cybersecurity Disrupters and Cybersecurity Insurance in the COVID-19 Era – Is...
Cybersecurity Disrupters and Cybersecurity Insurance in the COVID-19 Era – Is...Cybersecurity Disrupters and Cybersecurity Insurance in the COVID-19 Era – Is...
Cybersecurity Disrupters and Cybersecurity Insurance in the COVID-19 Era – Is...
 
Key note in nyc the next breach target and how oracle can help - nyoug
Key note in nyc   the next breach target and how oracle can help - nyougKey note in nyc   the next breach target and how oracle can help - nyoug
Key note in nyc the next breach target and how oracle can help - nyoug
 
What is Importance of Cyber Security
What is Importance of Cyber Security What is Importance of Cyber Security
What is Importance of Cyber Security
 
The 10 Fastest Growing Cyber Security Companies of 2017
The 10 Fastest Growing Cyber Security Companies of 2017The 10 Fastest Growing Cyber Security Companies of 2017
The 10 Fastest Growing Cyber Security Companies of 2017
 

More from Kevin Duffey

Cyber Insights from 100 surveys
Cyber Insights from 100 surveysCyber Insights from 100 surveys
Cyber Insights from 100 surveys
Kevin Duffey
 
Cyber TPRM - the journey ahead
Cyber TPRM - the journey aheadCyber TPRM - the journey ahead
Cyber TPRM - the journey ahead
Kevin Duffey
 
Ensuring Cyber Resilience in the Finance Sector
Ensuring Cyber Resilience in the Finance SectorEnsuring Cyber Resilience in the Finance Sector
Ensuring Cyber Resilience in the Finance Sector
Kevin Duffey
 
Breaches Anticipated in 2022 - November 1st, 2022
Breaches Anticipated in 2022 - November 1st, 2022Breaches Anticipated in 2022 - November 1st, 2022
Breaches Anticipated in 2022 - November 1st, 2022
Kevin Duffey
 
Best Cyber Insights of 2022, from over 200 surveys
Best Cyber Insights of 2022, from over 200 surveysBest Cyber Insights of 2022, from over 200 surveys
Best Cyber Insights of 2022, from over 200 surveys
Kevin Duffey
 
Breaches Anticipated in 2022 as Cyber Security Posture so Low
Breaches Anticipated in 2022 as Cyber Security Posture so LowBreaches Anticipated in 2022 as Cyber Security Posture so Low
Breaches Anticipated in 2022 as Cyber Security Posture so Low
Kevin Duffey
 
Cyber Insurance - Best Insights of June 2022.pptx
Cyber Insurance - Best Insights of June 2022.pptxCyber Insurance - Best Insights of June 2022.pptx
Cyber Insurance - Best Insights of June 2022.pptx
Kevin Duffey
 
Best Cyber Risk Insights from 100 reports published in year to March 2022
Best Cyber Risk Insights from 100 reports published in year to March 2022Best Cyber Risk Insights from 100 reports published in year to March 2022
Best Cyber Risk Insights from 100 reports published in year to March 2022
Kevin Duffey
 
Breaches Anticipated - because firms have weak cyber security visible to hac...
Breaches Anticipated  - because firms have weak cyber security visible to hac...Breaches Anticipated  - because firms have weak cyber security visible to hac...
Breaches Anticipated - because firms have weak cyber security visible to hac...
Kevin Duffey
 
Cyber insurance insights - 17th feb 2022
Cyber insurance insights - 17th feb 2022Cyber insurance insights - 17th feb 2022
Cyber insurance insights - 17th feb 2022
Kevin Duffey
 
Breaches anticipated in 2021 - Published 14th Jjune 2021
Breaches anticipated in 2021 - Published 14th Jjune 2021Breaches anticipated in 2021 - Published 14th Jjune 2021
Breaches anticipated in 2021 - Published 14th Jjune 2021
Kevin Duffey
 
Cyber Risk Measurement: what 25 CISOs & CROs plan for 2020
Cyber Risk Measurement: what 25 CISOs & CROs plan for 2020Cyber Risk Measurement: what 25 CISOs & CROs plan for 2020
Cyber Risk Measurement: what 25 CISOs & CROs plan for 2020
Kevin Duffey
 
Keynote at Operational Resilience summit - Financial Services - 18th Nov 2019
Keynote at Operational Resilience summit - Financial Services - 18th Nov 2019Keynote at Operational Resilience summit - Financial Services - 18th Nov 2019
Keynote at Operational Resilience summit - Financial Services - 18th Nov 2019
Kevin Duffey
 
Cyber Resilience across Subsidiaries and Suppliers
Cyber Resilience across Subsidiaries and SuppliersCyber Resilience across Subsidiaries and Suppliers
Cyber Resilience across Subsidiaries and Suppliers
Kevin Duffey
 
London First - cyber attack simulation - 22nd May 2018
London First - cyber attack simulation - 22nd May 2018London First - cyber attack simulation - 22nd May 2018
London First - cyber attack simulation - 22nd May 2018
Kevin Duffey
 
Cyber Attack Simulation for 450 Executives
Cyber Attack Simulation for 450 ExecutivesCyber Attack Simulation for 450 Executives
Cyber Attack Simulation for 450 Executives
Kevin Duffey
 
Equifax Breach - Lessons - Cyber Rescue - 16th may 2018
Equifax Breach - Lessons - Cyber Rescue - 16th may 2018Equifax Breach - Lessons - Cyber Rescue - 16th may 2018
Equifax Breach - Lessons - Cyber Rescue - 16th may 2018
Kevin Duffey
 
Cyber attack response from the CEO perspective - Tallinn Estonia - Short Simu...
Cyber attack response from the CEO perspective - Tallinn Estonia - Short Simu...Cyber attack response from the CEO perspective - Tallinn Estonia - Short Simu...
Cyber attack response from the CEO perspective - Tallinn Estonia - Short Simu...
Kevin Duffey
 
Equifax breach - how to lose friends and customers...
Equifax breach - how to lose friends and customers...Equifax breach - how to lose friends and customers...
Equifax breach - how to lose friends and customers...
Kevin Duffey
 
The Security Director's Practical Guide to Cyber Security
The Security Director's Practical Guide to Cyber SecurityThe Security Director's Practical Guide to Cyber Security
The Security Director's Practical Guide to Cyber Security
Kevin Duffey
 

More from Kevin Duffey (20)

Cyber Insights from 100 surveys
Cyber Insights from 100 surveysCyber Insights from 100 surveys
Cyber Insights from 100 surveys
 
Cyber TPRM - the journey ahead
Cyber TPRM - the journey aheadCyber TPRM - the journey ahead
Cyber TPRM - the journey ahead
 
Ensuring Cyber Resilience in the Finance Sector
Ensuring Cyber Resilience in the Finance SectorEnsuring Cyber Resilience in the Finance Sector
Ensuring Cyber Resilience in the Finance Sector
 
Breaches Anticipated in 2022 - November 1st, 2022
Breaches Anticipated in 2022 - November 1st, 2022Breaches Anticipated in 2022 - November 1st, 2022
Breaches Anticipated in 2022 - November 1st, 2022
 
Best Cyber Insights of 2022, from over 200 surveys
Best Cyber Insights of 2022, from over 200 surveysBest Cyber Insights of 2022, from over 200 surveys
Best Cyber Insights of 2022, from over 200 surveys
 
Breaches Anticipated in 2022 as Cyber Security Posture so Low
Breaches Anticipated in 2022 as Cyber Security Posture so LowBreaches Anticipated in 2022 as Cyber Security Posture so Low
Breaches Anticipated in 2022 as Cyber Security Posture so Low
 
Cyber Insurance - Best Insights of June 2022.pptx
Cyber Insurance - Best Insights of June 2022.pptxCyber Insurance - Best Insights of June 2022.pptx
Cyber Insurance - Best Insights of June 2022.pptx
 
Best Cyber Risk Insights from 100 reports published in year to March 2022
Best Cyber Risk Insights from 100 reports published in year to March 2022Best Cyber Risk Insights from 100 reports published in year to March 2022
Best Cyber Risk Insights from 100 reports published in year to March 2022
 
Breaches Anticipated - because firms have weak cyber security visible to hac...
Breaches Anticipated  - because firms have weak cyber security visible to hac...Breaches Anticipated  - because firms have weak cyber security visible to hac...
Breaches Anticipated - because firms have weak cyber security visible to hac...
 
Cyber insurance insights - 17th feb 2022
Cyber insurance insights - 17th feb 2022Cyber insurance insights - 17th feb 2022
Cyber insurance insights - 17th feb 2022
 
Breaches anticipated in 2021 - Published 14th Jjune 2021
Breaches anticipated in 2021 - Published 14th Jjune 2021Breaches anticipated in 2021 - Published 14th Jjune 2021
Breaches anticipated in 2021 - Published 14th Jjune 2021
 
Cyber Risk Measurement: what 25 CISOs & CROs plan for 2020
Cyber Risk Measurement: what 25 CISOs & CROs plan for 2020Cyber Risk Measurement: what 25 CISOs & CROs plan for 2020
Cyber Risk Measurement: what 25 CISOs & CROs plan for 2020
 
Keynote at Operational Resilience summit - Financial Services - 18th Nov 2019
Keynote at Operational Resilience summit - Financial Services - 18th Nov 2019Keynote at Operational Resilience summit - Financial Services - 18th Nov 2019
Keynote at Operational Resilience summit - Financial Services - 18th Nov 2019
 
Cyber Resilience across Subsidiaries and Suppliers
Cyber Resilience across Subsidiaries and SuppliersCyber Resilience across Subsidiaries and Suppliers
Cyber Resilience across Subsidiaries and Suppliers
 
London First - cyber attack simulation - 22nd May 2018
London First - cyber attack simulation - 22nd May 2018London First - cyber attack simulation - 22nd May 2018
London First - cyber attack simulation - 22nd May 2018
 
Cyber Attack Simulation for 450 Executives
Cyber Attack Simulation for 450 ExecutivesCyber Attack Simulation for 450 Executives
Cyber Attack Simulation for 450 Executives
 
Equifax Breach - Lessons - Cyber Rescue - 16th may 2018
Equifax Breach - Lessons - Cyber Rescue - 16th may 2018Equifax Breach - Lessons - Cyber Rescue - 16th may 2018
Equifax Breach - Lessons - Cyber Rescue - 16th may 2018
 
Cyber attack response from the CEO perspective - Tallinn Estonia - Short Simu...
Cyber attack response from the CEO perspective - Tallinn Estonia - Short Simu...Cyber attack response from the CEO perspective - Tallinn Estonia - Short Simu...
Cyber attack response from the CEO perspective - Tallinn Estonia - Short Simu...
 
Equifax breach - how to lose friends and customers...
Equifax breach - how to lose friends and customers...Equifax breach - how to lose friends and customers...
Equifax breach - how to lose friends and customers...
 
The Security Director's Practical Guide to Cyber Security
The Security Director's Practical Guide to Cyber SecurityThe Security Director's Practical Guide to Cyber Security
The Security Director's Practical Guide to Cyber Security
 

Recently uploaded

Affordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n PrintAffordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n Print
Navpack & Print
 
Unveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdfUnveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdf
Sam H
 
Kseniya Leshchenko: Shared development support service model as the way to ma...
Kseniya Leshchenko: Shared development support service model as the way to ma...Kseniya Leshchenko: Shared development support service model as the way to ma...
Kseniya Leshchenko: Shared development support service model as the way to ma...
Lviv Startup Club
 
amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05
marketing317746
 
Improving profitability for small business
Improving profitability for small businessImproving profitability for small business
Improving profitability for small business
Ben Wann
 
CADAVER AS OUR FIRST TEACHER anatomt in your.pptx
CADAVER AS OUR FIRST TEACHER anatomt in your.pptxCADAVER AS OUR FIRST TEACHER anatomt in your.pptx
CADAVER AS OUR FIRST TEACHER anatomt in your.pptx
fakeloginn69
 
anas about venice for grade 6f about venice
anas about venice for grade 6f about veniceanas about venice for grade 6f about venice
anas about venice for grade 6f about venice
anasabutalha2013
 
Brand Analysis for an artist named Struan
Brand Analysis for an artist named StruanBrand Analysis for an artist named Struan
Brand Analysis for an artist named Struan
sarahvanessa51503
 
What are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdfWhat are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdf
HumanResourceDimensi1
 
Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)
Lviv Startup Club
 
Attending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learnersAttending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learners
Erika906060
 
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdfikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
agatadrynko
 
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
BBPMedia1
 
Sustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & EconomySustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & Economy
Operational Excellence Consulting
 
FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134
LR1709MUSIC
 
BeMetals Presentation_May_22_2024 .pdf
BeMetals Presentation_May_22_2024   .pdfBeMetals Presentation_May_22_2024   .pdf
BeMetals Presentation_May_22_2024 .pdf
DerekIwanaka1
 
Business Valuation Principles for Entrepreneurs
Business Valuation Principles for EntrepreneursBusiness Valuation Principles for Entrepreneurs
Business Valuation Principles for Entrepreneurs
Ben Wann
 
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdfikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
agatadrynko
 
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdfModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
fisherameliaisabella
 
Exploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social DreamingExploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social Dreaming
Nicola Wreford-Howard
 

Recently uploaded (20)

Affordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n PrintAffordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n Print
 
Unveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdfUnveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdf
 
Kseniya Leshchenko: Shared development support service model as the way to ma...
Kseniya Leshchenko: Shared development support service model as the way to ma...Kseniya Leshchenko: Shared development support service model as the way to ma...
Kseniya Leshchenko: Shared development support service model as the way to ma...
 
amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05
 
Improving profitability for small business
Improving profitability for small businessImproving profitability for small business
Improving profitability for small business
 
CADAVER AS OUR FIRST TEACHER anatomt in your.pptx
CADAVER AS OUR FIRST TEACHER anatomt in your.pptxCADAVER AS OUR FIRST TEACHER anatomt in your.pptx
CADAVER AS OUR FIRST TEACHER anatomt in your.pptx
 
anas about venice for grade 6f about venice
anas about venice for grade 6f about veniceanas about venice for grade 6f about venice
anas about venice for grade 6f about venice
 
Brand Analysis for an artist named Struan
Brand Analysis for an artist named StruanBrand Analysis for an artist named Struan
Brand Analysis for an artist named Struan
 
What are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdfWhat are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdf
 
Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)
 
Attending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learnersAttending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learners
 
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdfikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
 
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
 
Sustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & EconomySustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & Economy
 
FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134
 
BeMetals Presentation_May_22_2024 .pdf
BeMetals Presentation_May_22_2024   .pdfBeMetals Presentation_May_22_2024   .pdf
BeMetals Presentation_May_22_2024 .pdf
 
Business Valuation Principles for Entrepreneurs
Business Valuation Principles for EntrepreneursBusiness Valuation Principles for Entrepreneurs
Business Valuation Principles for Entrepreneurs
 
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdfikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
 
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdfModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
 
Exploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social DreamingExploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social Dreaming
 

Cyber Resilience: managing 3rd Party Risks in Financial Services

  • 1. Cyber Resilience focussed on 3rd Party Risks in Financial Services Kevin Duffey Managing Director November 2020
  • 2. Measurement, Mitigation & Management of Cyber Risk should be as objective, timely & dynamic as for Market Risk
  • 3. 1. Measurement: obtain independent, objective, & timely data on the cyber posture of your material suppliers, vs peers Email Assistance@CyberRescue.co.uk with subject line “Cyber Resilience” for 100 days of online, real-time reporting on all your suppliers, as a benefit of participating in this Marcus Evans conference. Oct 2020: European IT services group Sopra Steria hit by Ransomware. Supplier to HSBC, RBS, Bank of China and Crédit Agricole says it is "working hard for a return to normal” The firm issued a terse statement confirming a cyberattack on its IT network on 20th October.
  • 4. 2. Mitigation: engage your material Suppliers to show what hackers can exploit, to reduce risks across suppliers Email Assistance@CyberRescue.co.uk with subject line “Cyber Resilience” for 100 days of online, real-time reporting on all your suppliers, as a benefit of participating in this Marcus Evans conference. Microsoft Finastra Equifax HIS Markit
  • 5. 3. Management: implement Governance dashboards that show Execs how your firm compares with your competitors Email Assistance@CyberRescue.co.uk with subject line “Cyber Resilience” for 100 days of online, real-time reporting on all your suppliers, as a benefit of participating in this Marcus Evans conference. Breach Response Capability Maturity
  • 6. Today’s Cyber Environment “The NCSC handled over 3x as many ransomware incidents as last year” 3rd November Highlights of the year for UK’s National Cyber Security Centre
  • 7. Example: Ransomware hitting supplier of Covid vaccine Email Assistance@CyberRescue.co.uk with subject line “Cyber Resilience” for 100 days of online, real-time reporting on all your suppliers, as a benefit of participating in this Marcus Evans conference. Oct 2020: Covid-19 vaccine manufacturing delayed by ransomware Drug production by generics firm Dr Reddy “briefly” delayed by ransomware in USA, India, Russia & UK Dr. Reddy’s Laboratories isolated all data centres and stopped some production, according to media reports on Friday, 23rd October.
  • 8. COVID-19 Vaccine delayed by Ransomware attack in October Astra Zeneca’s supplier of clinical trials, IQVIA, was hit when its supplier ERT was breached On 4th October 2020, the New York Times reported that Astra Zeneca’s supplier of clinical trials, IQVIA, had been impacted when its software supplier ERT was breached by Ransomware. This graph shows IQVIA’s own failing score on Patching Cadence over the months before the breach. This graph shows ERT’s failing score on Network Security over the months before the breach.
  • 9. Fiona van Echelpoel Deputy Director General, European Central Bank, October 2020 During Covid19… “The Covid-19 outbreak brought ransomware attacks, culminating in the death of a patient due to an attack on a hospital. “Ransomware attacks have tripled.”
  • 10. October 2020: Increased number of organizations are paying ransoms
  • 11. Special Advisory from US Treasury Department: “the severity & sophistication of ransomware continues to rise”
  • 12. Special Advisory from US Treasury Department: “paying ransom may contravene US law, including the Trading with the Enemy Act"
  • 13. During Covid19… “significant cyber events have impacted 3rd party providers, which highlights the importance of understanding the operational resilience of key 3rd party suppliers." Nick Strange Supervisory Risk Specialist, Bank of England, Oct 2020
  • 14. Question for Delegates What are the key 3rd party suppliers to the UK’s Finance Sector, that either: • have been breached in 2020, or • you worry might be breached in 2021?
  • 15. Question for Delegates What are the key 3rd party suppliers to the UK’s Finance Sector, that either: • have been breached in 2020, or • you worry might be breached in 2021? Email Assistance@CyberRescue.co.uk with subject line “Cyber Resilience” for 100 days of online, real-time reporting on all your suppliers, as a benefit of participating in this Marcus Evans conference.
  • 16. Jan 2020: these banks hurt by Ransomware
  • 17. Jan 2020: these banks hurt by Ransomware The Ransomware hit their supplier, Travelex
  • 18. Jan 2020: these banks hurt by Ransomware The Ransomware hit their supplier, Travelex
  • 19. Online, real-time reporting before breach CurrencyFair Transfast Torfx One World MoneyCorp PayPal Travelex Impact tolerances at a dozen UK Banks were breached in Jan 2020, as their travel money provider Travelex was breached by cyber attack. Travelex had said it “conforms to ISO27001” & has “robust data privacy”. Leading CROs had the facts graphed above, before the breach. 19 Travelex was breached after a year of worse cyber posture than peers
  • 20.
  • 21. Application Security Vs peers Network Security Vs peers Patching Cadence Vs peers Finastra breached “while we focused on emergency plans for operating under Covid-19” - CEO statement Finastra’s security team had pushed to fix known security issues but were “over-ruled by senior managers” - Bloomberg Leading CROs had real-time facts before the breach. Breach happened in March 2020 while “focused… on Covid-19” 21 Online, real-time reporting before breach
  • 23. October 2020 37% are increasing spend on Data Security 53% of those expect their bigger spend on security to outlast Covid How suppliers are changing under Covid The Good News
  • 24. Published October 20202: survey of 330 organisations How suppliers are changing under Covid The Bad News 24% are decreasing spend on Data Security Do you know which of your suppliers are doing that?
  • 25. #1: = Supply Chains October 2nd, 2020 So no surprise that Supply Chains are now focus
  • 26. Richard F Smith, former CEO of Equifax
  • 27. Engaging Key Colleagues is right start Barrie Millett, Group Head of Operational Resilience, Wesleyan Group 27 March 8th, 2019
  • 28. Engaging Key Colleagues is right start Barrie Millett, Group Head of Operational Resilience, Wesleyan Group March 8th, 2019 Equifax Used What their Internal Auditors Called an ‘Honor System’ for Patching Vulnerabilities. “Equifax had no formalized method of validating the successful installation of patches. Audit referred to this approach as an ‘honor system’in which the IT team would notify the security team once patches were complete.”
  • 29. What does an “honor system” for patching look like?
  • 30. What does an “honor system” for patching look like?
  • 31. What does an “honor system” for patching look like?
  • 32. Example Dashboards for Cyber Resilience Email Assistance@CyberRescue.co.uk with subject line “Cyber Resilience” for 100 days of online, real-time reporting on all your suppliers, as a benefit of participating in this Marcus Evans conference.
  • 33. Question for Delegates If you want to try the Cyber Risk measurement Dashboards, write your name. Email Assistance@CyberRescue.co.uk with subject line “Cyber Resilience” for 100 days of online, real-time reporting on all your suppliers, as a benefit of participating in this Marcus Evans conference.
  • 34. The PRA Paper: CP30/10 34
  • 35. The PRA Paper: context 35
  • 36. The PRA Paper: context 36 Operational Resilience - Key Concepts Operational Resilience is the ability to prevent, adapt, respond to, recover and learn from operational disruptions.
  • 37. The PRA Paper: content 37 Responses are requested by October 2020 This CP is relevant to almost all UK Firms Complete Outsourcing Register by 31 Dec 2021 Builds on EBA & EIOPA Guidelines + TSC reports Proposals in SS summarised: Definitions & Scope. Proportionality, Governance, Record Keeping, Materiality. Due Diligence, Agreements, Data Security, Info Rights. Sub-Outsourcing Business Continuity & Exit Plans Systemic Risks The PRA’s Duty to Consult PRA’s Objectives Regulatory Principles Treasury Goals 1. Intro: Set expectations on Outsourcing & 3rd Party Risk This SSxx/20 Complements SS on Operational Resilence 4. Governance: Robust info for Board oversight & challenge Required Contents of Policy & of Record Keeping 3. Proportionality: Firms below Category Two can outsource IA 2. Definitions A 3rd Party has contract to provide service 5. Pre Outsource: Materiality (vs Threshold Conditions) Automatically Material if 3rd Party could impact TCs/FRs Consider… IT & cyber security controls + breach impact 6. Agreements Set… minimum cybersecurity requirements Ongoing monitor of effectiveness of supplier’s security controls 9. Sub-Outsourcing At minimum, monitor key sub- outsourcing providers. 10. Continuity Consider deliberate cyber-attack. Stressed Exits. Governance and Testing of Plans Contingency Plan best practices, eg Step In Rights Appendix Guidance on Outsourcing Register. 8. Audit Rights Online, real-time reporting tools are strongly encouraged. 7. Data Security Implement protection of outsourced data
  • 38. The PRA Paper: content 38 The first third of the Consultation Paper provides context and commentary for the draft Supervisory Statement that follows. The second two-thirds of the Consultation Paper is the draft Supervisory Statement to be published in 2021 after consultation.
  • 39. The PRA Paper: content 39 The first third of the Consultation Paper provides context and commentary for the draft Supervisory Statement that follows. The second two-thirds of the Consultation Paper is the draft Supervisory Statement to be published in 2021 after consultation.
  • 40. 21 Bank of England PRA Consultation Paper on 3rd Party (Cyber) Risk Management
  • 41. 41 GDPR, Article 32 “Taking into account the state of the art… … Controllers must have a process for regularly testing, assessing & evaluating the technical measures for security at information processors.” Only leading firms are obeying existing law
  • 42. Equinix Breached, after a year of poor cyber security Sept 2020: Equinix - leading data centre provider - breached Operating in 25 countries, Equinix was reported to have paid ransom on 16th Sept 2020 Marcus Evans delegates have an advantage, as you’re are entitled to online, real-time reporting on all suppliers for 100 days. Email: Assistance@CyberRescue.co.uk with subject line “Cyber Resilience”
  • 43. Marcus Evans delegates have an advantage, as you’re are entitled to online, real-time reporting on all suppliers for 100 days. Email: Assistance@CyberRescue.co.uk with subject line “Cyber Resilience” Oct 2020: European IT services group Sopra Steria hit by Ransomware. Supplier to HSBC, RBS, Bank of China and Crédit Agricole says it is "working hard for a return to normal” The firm issued a terse statement confirming a cyberattack on its IT network on 20th October.
  • 44. Question for Delegates What are the job titles of colleagues who share some responsibility for cyber resilience? Email Assistance@CyberRescue.co.uk with subject line “Cyber Resilience” for 100 days of online, real-time reporting on all your suppliers, as a benefit of participating in this Marcus Evans conference.
  • 45. Answers from previous Delegates 45
  • 46. Answers from previous Delegates 46 CEO COO 3rd Party Oversight Provider Chair Risk Committee Product Commercial CFO CRO Compliance / Financial Crime Operational Resilience Contracts Procurement CIO CTO Business + Operations Operational Risk DPO Supplier Relationship CISO Auditor Communications Business Continuity Legal Project Manager
  • 47. Answers from previous Delegates 11 people should be in your team, said Caleidoscope, See2020 & ScreamCastle. Project Tango suggested 12 individuals, while Hawkeye said 8 individuals. The 11 job titles that most experts thought should be in the Project Team were: CRO; COO; CISO; CTO; DPO; Legal; Procurement/Contracts; Project Manager. Operational Resilience; 3rd Party Oversight Provider; Communications.
  • 48. Set your SMART goals for calendar 2021, for Operational Resilience project on cyber risk across your supply chain 48
  • 49. 49 Discussion: How do you define your Impact Tolerance for your suppliers?
  • 50. 50 Set your Risk Appetite for your suppliers
  • 51. Categorisation: Suppliers are “material” if their failure might challenge your firm’s “safety & soundness” Key (30%) Material (10%) Transactional (40%) Strategic (20%) More difficult to exit from the relationship Supplyingessentialservices Email Assistance@CyberRescue.co.uk with subject line “Cyber Resilience” for 100 days of online, real-time reporting on all your suppliers, as a benefit of participating in this Marcus Evans conference.
  • 52. Categorisation: Suppliers are “material” if their failure might challenge your firm’s “safety & soundness” Email Assistance@CyberRescue.co.uk with subject line “Cyber Resilience” for 100 days of online, real-time reporting on all your suppliers, as a benefit of participating in this Marcus Evans conference.
  • 53. CQUEST is based on our favourite, NIST CQUEST consists of multiple-choice questions: • It is based on the 5 pillars of NIST • It adds a “Governance” section, for a total of 48 questions • In our online implementation below, external evidence is provided to score questions like “do you patch appropriately?” Cyber resilience assessment from PRA & FCA 53
  • 54. CQUEST CQUEST consists of multiple-choice questions covering all aspects of cyber resilience, such as: • Does the firm have a board-approved cyber security strategy? • How does it identify and protect its critical assets? • How does it detect and respond to an incident, recover and learn from the experience? Cyber resilience assessment from PRA & FCA 54
  • 55. Continuous Monitoring of our key suppliers Sending your Self Attestation Questionnaire – automated workflows 55
  • 56. Continuous Monitoring of our key suppliers Marking your Self Attestation Questionnaire – automated workflows 56
  • 57. 1. Measurement: obtain independent, objective, & timely data on the cyber posture of your material suppliers, vs peers Email Assistance@CyberRescue.co.uk with subject line “Cyber Resilience” for 100 days of online, real-time reporting on all your suppliers, as a benefit of participating in this Marcus Evans conference. Oct 2020: Serious cyber attack suffered by Hackney Council UK’s National Cyber Security Centre (part of GCHQ) called in by North London local government After months of having cyber security that was worse than at other councils , many of the services and IT systems of Hackney Council were disrupted, on 13th October. In March 2020, as remote-working began, cyber security posture at Hackney fell badly.
  • 58. 2. Mitigation: engage your material Suppliers to show what hackers can exploit, to reduce risks across suppliers Email Assistance@CyberRescue.co.uk with subject line “Cyber Resilience” for 100 days of online, real-time reporting on all your suppliers, as a benefit of participating in this Marcus Evans conference. Microsoft Finastra Equifax HIS Markit
  • 59. 3. Management: implement Governance dashboards that show Execs how your firm compares with your competitors Email Assistance@CyberRescue.co.uk with subject line “Cyber Resilience” for 100 days of online, real-time reporting on all your suppliers, as a benefit of participating in this Marcus Evans conference. Breach Response Capability Maturity
  • 60. Cyber Resilience Kevin Duffey Managing Director November 2020 Email Assistance@CyberRescue.co.uk with subject line “Cyber Resilience” for 100 days of online, real-time reporting on all your suppliers, as a benefit of participating in this Marcus Evans conference.

Editor's Notes

  1. Cyber Attacks threaten operational resilience & reputation. So Chief Risk Officers need timely and objective insights, to drive evidence-based discussions in the Boardroom. Today is an opportunity to to share insights with our peers. Today we look at: Implementing the PRA paper on 3rd Party Risk Management, focussing on online reports of Cyber Risk in Outsourcing Register. We include lessons from the Travelex breach, and a live demonstration of the new kind of “online, real-time reporting tools” that are “strongly encouraged” in PRA paper of 5th Dec 2020.
  2. Here’s Richard F. Smith, the former CEO of Equifax, testifying before the US Senate about his response to the Equifax breach. There’s emotion in his face, but beyond that emotion, there’s a specific lesson in the report the Senate then published.
  3. Here’s the Senate report. It was published earlier this year. It went to the root cause of why Equifax suffered ”a devastating data breach.” The reason they weren’t safe was because they weren’t measuring how safe they were. Instead of measuring, instead of relying on objective, external and timely data about their cyber resilience, Equifax relied on “honor.” Here’s what the Seate investigation said:
  4. Equifax used what their own Internal Auditors called an ‘Honor System’ for patching vulnerabilities. The Senate report made clear: “Equifax had no formalized method of validating the successful installation of patches.” They simply trusted their IT team, who were often external contractors. Trust is good. But verification is better! The second line, and indeed the third line of defence failed at Equifax. Catastrophically. Think about it. What does an “honor system” of cyber risk management look like? It looks like this… .
  5. … at first. Then this… .
  6. Then this… .
  7. Then this. As Chief Risk Officers, as heads of Operational Resilience, as second and even third line defence against cyber attacks, we must do better than this. We must trust, but also verify. So we need to bring our own data about cyber hygiene to discussions with colleagues and suppliers. I agree with Kevin O’Rourke, that we need to drive evidence based discussions based on external, objective data. No dashboard is ever complete, but having a dashboard drives the conversations that lead to action. What gets measured gets managed.
  8. We’ve just started using the automated workflows that come with the dashboard, to - send our bespoke questionnaire - to all the key individuals - as frequently as we need - with automated reminders and scoring
  9. This is a preview of the new Bank of England, PRA/FCA questionnaire, CQUEST in the platform. For all of the 48 questions, we and our suppliers can just indicate on the left, the level of maturity we have against that particular control. A for a high maturity. D for a low maturity. But the fabulous thing is that the questionnaire provides external measurement to supplement the self-reported score. I won’t go into the detail now, but the point is that it’s possible to move to evidenced-based discussion, relying on objective measurement rather than just an honor system. We’re all on a journey to improve operational resilience, so let me hand back to Kevin Duffey, to drive our conversation forward.
  10. Cyber Attacks threaten operational resilience & reputation. So Chief Risk Officers need timely and objective insights, to drive evidence-based discussions in the Boardroom. Today is an opportunity to to share insights with our peers. Today we look at: Implementing the PRA paper on 3rd Party Risk Management, focussing on online reports of Cyber Risk in Outsourcing Register. We include lessons from the Travelex breach, and a live demonstration of the new kind of “online, real-time reporting tools” that are “strongly encouraged” in PRA paper of 5th Dec 2020.