SlideShare a Scribd company logo
A Holistic Approach to
CyberRisk Management
N I S T C y b e r S e c u r i t y H i g h L e v e l F u n c t i o n s
A Holistic Approach to CyberRisk
Management
Companies are faced with many risks and threats
while conducting their day-to-day business. One
must understand that risk cannot be eliminated, but
risk can be managed to an acceptable level.
To manage risks, a company needs to know what
the risks are and how each affects the organization
as well as its strategic objectives. A one size-fits-all
strategy does not apply to risk; each organization has
their own risk tolerance threshold.
According to Symantec Corporation’s Internet Securi-
ty Threat Report 2014, “US companies paid $188 per
breached record over a period of two years. If the data
breach was caused by a malicious attack, then the
number rose to $277 per breached record over two
years. These expenses covered detection, escalation,
notification and after-the-fact response, such as offer-
ing data monitoring services to affected customers.”
SMART DEVINE’s CyberRisk Management Service
(CMS) provides a holistic approach to manage cyber-
security risks faced by most organizations, and incor-
porates the NIST (National Institute of Standard and
Technology) cybersecurity framework as the guide-
line. NIST lists five functions which are basic security
activities organized at their highest level. Under each
function is a variety of activities that must be complet-
ed to minimize risk to your organization.
Vulnerability Assessment
A Vulnerability Assessment is the first step in under-
standing the cyber risks faced by your organization,
and will help identify all the strengths, weaknesses or
security gaps in the computer systems, network and
infrastructure. Unlike a penetration test, a Vulnerability
Assessment is not invasive and will only identify and
classify the vulnerabilities that are found. An assess-
ment can also help the organization identify and pri-
oritize gaps in their security risk management profile.
Conducting an assessment provides a company with
a solid understanding of the current state risk profile
and work on getting it to an optimal level of security.
Industry professionals recommend conducting a vul-
nerability assessment on a regular basis. This is an
important requirement of many of the regulations
and industry standards like Payment Card Industry –
Data Security Standards (PCI-DSS), Health Insurance
Portability and Accountability Act (HIPAA), Gramm-
Leach-Bliley Act (GLBA) and others.
© 2014 SMART DEVINE; All rights reserved.
A VULNERABILITY ASSESSMENT WILL
DETERMINE AND VERIFY:
• Devices that are attached to the network
• Unused user accounts
• Unnecessary open ports
• Software that is not patched
• Incorrect permissions on important system files
Once vulnerabilities are found in the assets, which in-
clude hardware, software and network infrastructure,
they are identified and classified according to the or-
ganization’s risk tolerance. The next step is to protect
the assets from threats. Not all threats can be elimi-
nated; so after a study of the likelihood and impact a
threat can cause to a business, management should
devise procedures to protect high-risk assets from
threats. This can be accomplished by implementing
protective technology, securing data, controlling ac-
cess, creating policies, and user awareness training.
The initial time and effort dedicated to protect your
data does not mean your company is secure.
Cybersecurity is an ongoing project because vulnera-
bilities change, and so do the threats that persist. The
monitoring of critical events and incidents can help an
organization strengthen its posture. However, there
must be a way to detect what is going on in your
company’s environment with processes such as con-
tinuous monitoring, web application scanning
and a solid vulnerability management program.
smartdevine.com 267.670.7300
© 2014 SMART DEVINE; All rights reserved.
Crisis Management Plan
Many organizations learn how to respond to a se-
curity incident only after the attack has happened. A
proper Incident Response Plan should be an integral
part of every organizations security policy.
There are many benefits to being prepared; one such
benefit could be obtaining a premium discount on
cybersecurity insurance. A well thought out response
plan demonstrates that the organization takes infor-
mation security seriously and is prepared to handle
attacks quickly, thoroughly, and efficiently. A well-
conceived Incident Response Plan, proper training
for the incident response team, and rehearsing
the plan by conducting mock exercises are all very
important activities.
The last function in this type of CyberRisk manage-
ment approach is recover, which is about bringing
an organization back to a point before the attack took
place. Many organizations have a robust disaster
recovery and business continuity plan in place, how-
ever, management should consider looking into mod-
ifying their existing plan to include a cyber attack as a
valid threat. Recovery planning is essential because
the quicker management can get up and running after
an incident, the better your brand, image and other
assets are preserved.
Our Approach
We use a SMART approach which involves people,
process and technology. There is plenty of technol-
ogy available in the market to help detect intruders,
but that should not be the only driver for your security
strategy. An effective security program takes a holistic
approach and will involve people and processes in ad-
dition to the technology. Humans are often the weak-
est link in the equation. User awareness can make
a big difference to a security program. Proper user
awareness training includes educating employees of
cybersecurity risks and developing a risk-awareness
culture to help mitigate this issue.
Our CMS approach uses automated tools as well as
manual validation to minimize the effort and maximize
the value for our clients.
Not sure your organization has a cybersecurity pro-
gram? Call us. If you believe you already have an ef-
fective program, consider putting it to a test with our
team. New threats to cyber security are frequent mak-
ing way for continuous improvement to your plan.
Benefits of a Holistic Approach to Cybersecurity
1.	 Plug Security Holes
2.	 Determine Security Requirements
3.	 Increase Security Awareness
4.	 Document Due Diligence
5.	 Justify Spending
CYBERRISK MANAGEMENT
SERVICE INCLUDES:
• Vulnerability Assessment
• Penetration Testing
• Regulatory Compliance
(PCI-DSS, HIPAA, GLBA and others)
• User Awareness Training
• Security Policy Review
• Disaster Recovery and Business
Continuity Planning
• Continuous Monitoring and Incidence Response
smartdevine.com 267.670.7300
A c c o u n t i n g T a x A d v i s o r y
Smart Devine provides a full range of accounting, advisory, tax and investigative forensic and litigation services
to organizations across a variety of industries.
Smart Devine | 1600 Market Street | 32nd Floor | Philadelphia, PA 19103 | T 267.670.7300 | info@smartdevine.com
© 2014 SMART DEVINE; All rights reserved.
INTEGRATED TEAM OF PROFESSIONALS
SMART DEVINE’s integrated team of business advisory and
consulting professionals draw upon experience from both
the public and private sectors. Our clients rely on us for our
skills, experience and the knowledge we offer in supporting
the critical operations of their businesses. For more infor-
mation, contact Anil Chacko, Managing Director at Smart
Devine’s Business Advisory Group. Anil has extensive ex-
perience as an IT Executive in the Financial Services and
Insurance industries. Contact Mr. Chacko at 267.670.7311
or achacko@smartdevine.com
Anil Chacko, MBA, CISM
Managing Director
SMART DEVINE OFFERS A FULL LINE OF SOLUTIONS
Also Read this White Paper:
CYBERSECURITY:
Is Your Business
Ready?
ACCOUNTING &AUDIT
•	 Audit, Reviews & Compilation
•	 Accounting & Tax Due Diligence
•	 Accounting Outsourcing
•	 Agreed Upon Procedures
•	 Business Valuation
•	 Finance Process & Reporting
	Optimization
•	 Forecasts & Projections
•	 ForensicAccounting & Litigation
	Support
•	 Internal Control Study &
	Evaluation
•	 Personal Financial Statements
•	 Retirement PlanAudits & Prep
•	 TrustAccounting
•	 SECAdvisory Services
•	 Special Project Coordination &
	Support
•	 TechnicalAccounting Consulting
•	 TransactionAdvisory Services
•	 SSAE 16/SOC 1 &
	 SOC 2 Reviews
BUSINESSADVISORY
•	 Business Process Outsourcing
•	 Business Performance & Profit Improvement
•	 FinancialAdvisory & Risk Services
•	 Technology & IT Security
RISK SERVICES
•	 Corporate Governance Regulatory
	Compliance
•	 Enterprise Risk Management
•	 Business RiskAssessment
•	 IT RiskAssessment
•	 InternalAudit Services
•	 IT InternalAuditing
•	 InternalAudit Transformation
•	 QualityAssessment Reviews
•	 Sarbanes Oxley/ModelAudit Rule/
	 NAIC Compliance
•	 SSAE 16/SOC 1 & SOC 2
	 ReadinessAssessments
INSURANCEADVISORY SERVICES
•	 Accounting & Financial Reporting
•	 Tax Services
•	 Claims Services
•	 Underwriting Services
•	 Litigation Support & ForensicAccounting
•	 RiskAdvisory
TAX
•	 Tax Return Compliance
•	 Accounting for Income Taxes
•	 ASC 740 (FAS 109) Tax
	 Provision Services
•	 International Taxation
•	IC-DISC
•	 Tax Planning &Advisory
•	 Tax Controversy
•	 Transfer Pricing
•	 Research & Development Tax Credit
•	 State & Local Taxation
FORENSIC & LITIGATION SERVICES
•	 Litigation Services
•	 Environmental Litigation
•	 Forensic Investigations
•	 Trustee & Monitoring Services
•	 Digital Forensics & eDiscovery

More Related Content

What's hot

Linked in misti_rs_1.0
Linked in misti_rs_1.0Linked in misti_rs_1.0
Linked in misti_rs_1.0
Vincent Toms
 
How to measure your cybersecurity performance
How to measure your cybersecurity performanceHow to measure your cybersecurity performance
How to measure your cybersecurity performance
Abhishek Sood
 
Simplifying Security for Cloud Adoption - Defining your game plan
Simplifying Security for Cloud Adoption - Defining your game planSimplifying Security for Cloud Adoption - Defining your game plan
Simplifying Security for Cloud Adoption - Defining your game plan
Securestorm
 
Integrating-Cyber-Security-for-Increased-Effectiveness
Integrating-Cyber-Security-for-Increased-EffectivenessIntegrating-Cyber-Security-for-Increased-Effectiveness
Integrating-Cyber-Security-for-Increased-EffectivenessAyham Kochaji
 
Security Framework for Digital Risk Managment
Security Framework for Digital Risk ManagmentSecurity Framework for Digital Risk Managment
Security Framework for Digital Risk Managment
Securestorm
 
Ch2 cism 2014
Ch2 cism 2014Ch2 cism 2014
Ch2 cism 2014
Aladdin Dandis
 
Module 4 disaster recovery student slides ver 1.0
Module 4 disaster recovery   student slides ver 1.0Module 4 disaster recovery   student slides ver 1.0
Module 4 disaster recovery student slides ver 1.0
Aladdin Dandis
 
Information Security Risk Management
Information Security Risk ManagementInformation Security Risk Management
Information Security Risk Management
Nikhil Soni
 
How close is your organization to being breached | Safe Security
How close is your organization to being breached | Safe SecurityHow close is your organization to being breached | Safe Security
How close is your organization to being breached | Safe Security
Rahul Tyagi
 
Building an effective Information Security Roadmap
Building an effective Information Security RoadmapBuilding an effective Information Security Roadmap
Building an effective Information Security Roadmap
Elliott Franklin
 
Cyber Risk Quantification | Safe Security
Cyber Risk Quantification | Safe SecurityCyber Risk Quantification | Safe Security
Cyber Risk Quantification | Safe Security
Rahul Tyagi
 
Module 2 information security risk management student slides ver 1.0
Module 2 information security risk management    student slides ver 1.0Module 2 information security risk management    student slides ver 1.0
Module 2 information security risk management student slides ver 1.0
Aladdin Dandis
 
New technologies - Amer Haza'a
New technologies - Amer Haza'aNew technologies - Amer Haza'a
New technologies - Amer Haza'a
Fahmi Albaheth
 
Cybersecurity Consulting Services flyer
Cybersecurity Consulting Services flyerCybersecurity Consulting Services flyer
Cybersecurity Consulting Services flyerJohn Anderson
 
4 Cyber Security KPIs
4 Cyber Security KPIs4 Cyber Security KPIs
4 Cyber Security KPIs
Steven Aiello
 
Business case for information security program
Business case for information security programBusiness case for information security program
Business case for information security programWilliam Godwin
 
Cybertopic_1security
Cybertopic_1securityCybertopic_1security
Cybertopic_1security
Anne Starr
 
Information Security Benchmarking 2015
Information Security Benchmarking 2015Information Security Benchmarking 2015
Information Security Benchmarking 2015
Capgemini
 
Cyber Security Risk Management
Cyber Security Risk ManagementCyber Security Risk Management
Cyber Security Risk ManagementShaun Sloan
 
Does audit make us more secure
Does audit make us more secureDoes audit make us more secure
Does audit make us more secure
EnterpriseGRC Solutions, Inc.
 

What's hot (20)

Linked in misti_rs_1.0
Linked in misti_rs_1.0Linked in misti_rs_1.0
Linked in misti_rs_1.0
 
How to measure your cybersecurity performance
How to measure your cybersecurity performanceHow to measure your cybersecurity performance
How to measure your cybersecurity performance
 
Simplifying Security for Cloud Adoption - Defining your game plan
Simplifying Security for Cloud Adoption - Defining your game planSimplifying Security for Cloud Adoption - Defining your game plan
Simplifying Security for Cloud Adoption - Defining your game plan
 
Integrating-Cyber-Security-for-Increased-Effectiveness
Integrating-Cyber-Security-for-Increased-EffectivenessIntegrating-Cyber-Security-for-Increased-Effectiveness
Integrating-Cyber-Security-for-Increased-Effectiveness
 
Security Framework for Digital Risk Managment
Security Framework for Digital Risk ManagmentSecurity Framework for Digital Risk Managment
Security Framework for Digital Risk Managment
 
Ch2 cism 2014
Ch2 cism 2014Ch2 cism 2014
Ch2 cism 2014
 
Module 4 disaster recovery student slides ver 1.0
Module 4 disaster recovery   student slides ver 1.0Module 4 disaster recovery   student slides ver 1.0
Module 4 disaster recovery student slides ver 1.0
 
Information Security Risk Management
Information Security Risk ManagementInformation Security Risk Management
Information Security Risk Management
 
How close is your organization to being breached | Safe Security
How close is your organization to being breached | Safe SecurityHow close is your organization to being breached | Safe Security
How close is your organization to being breached | Safe Security
 
Building an effective Information Security Roadmap
Building an effective Information Security RoadmapBuilding an effective Information Security Roadmap
Building an effective Information Security Roadmap
 
Cyber Risk Quantification | Safe Security
Cyber Risk Quantification | Safe SecurityCyber Risk Quantification | Safe Security
Cyber Risk Quantification | Safe Security
 
Module 2 information security risk management student slides ver 1.0
Module 2 information security risk management    student slides ver 1.0Module 2 information security risk management    student slides ver 1.0
Module 2 information security risk management student slides ver 1.0
 
New technologies - Amer Haza'a
New technologies - Amer Haza'aNew technologies - Amer Haza'a
New technologies - Amer Haza'a
 
Cybersecurity Consulting Services flyer
Cybersecurity Consulting Services flyerCybersecurity Consulting Services flyer
Cybersecurity Consulting Services flyer
 
4 Cyber Security KPIs
4 Cyber Security KPIs4 Cyber Security KPIs
4 Cyber Security KPIs
 
Business case for information security program
Business case for information security programBusiness case for information security program
Business case for information security program
 
Cybertopic_1security
Cybertopic_1securityCybertopic_1security
Cybertopic_1security
 
Information Security Benchmarking 2015
Information Security Benchmarking 2015Information Security Benchmarking 2015
Information Security Benchmarking 2015
 
Cyber Security Risk Management
Cyber Security Risk ManagementCyber Security Risk Management
Cyber Security Risk Management
 
Does audit make us more secure
Does audit make us more secureDoes audit make us more secure
Does audit make us more secure
 

Similar to Cyber risk management-white-paper-v8 (2) 2015

Cybersecurity: Quick Preparedness Assessment
Cybersecurity: Quick Preparedness AssessmentCybersecurity: Quick Preparedness Assessment
Cybersecurity: Quick Preparedness Assessment
CBIZ, Inc.
 
Strategic Insights on IT & Cyber Risk Assessments.pdf
Strategic Insights on IT & Cyber Risk Assessments.pdfStrategic Insights on IT & Cyber Risk Assessments.pdf
Strategic Insights on IT & Cyber Risk Assessments.pdf
lilabroughton259
 
Small Business Playbook for Security and Compliance Success.pdf
Small Business Playbook for Security and Compliance Success.pdfSmall Business Playbook for Security and Compliance Success.pdf
Small Business Playbook for Security and Compliance Success.pdf
elizabethrdusek
 
Small Business Playbook for Security and Compliance Success.pptx
Small Business Playbook for Security and Compliance Success.pptxSmall Business Playbook for Security and Compliance Success.pptx
Small Business Playbook for Security and Compliance Success.pptx
elizabethrdusek
 
7 Steps To Developing A Cloud Security Plan
7 Steps To Developing A Cloud Security Plan7 Steps To Developing A Cloud Security Plan
7 Steps To Developing A Cloud Security Plan
Envision Technology Advisors
 
2016 Risk Management Workshop
2016 Risk Management Workshop2016 Risk Management Workshop
2016 Risk Management Workshop
Stacy Willis
 
Cyber Defence - Service portfolio
Cyber Defence - Service portfolioCyber Defence - Service portfolio
Cyber Defence - Service portfolio
Kaloyan Krastev
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
Anil
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
Anil
 
CISO as a service in India | Senselearner
CISO as a service in India | SenselearnerCISO as a service in India | Senselearner
CISO as a service in India | Senselearner
Sense Learner Technologies Pvt Ltd
 
A CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk ManagementA CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk ManagementDaren Dunkel
 
Cybersecurity.pdf
Cybersecurity.pdfCybersecurity.pdf
Cybersecurity.pdf
PetaBytz Technologies
 
Risk monitoring and response
Risk monitoring and responseRisk monitoring and response
Risk monitoring and response
ZyrellLalaguna
 
Cyber presentation spet 2019 v8sentfor upload
Cyber presentation spet 2019 v8sentfor uploadCyber presentation spet 2019 v8sentfor upload
Cyber presentation spet 2019 v8sentfor upload
savassociates1
 
Weakest links of an organization's Cybersecurity chain
Weakest links of an organization's Cybersecurity chainWeakest links of an organization's Cybersecurity chain
Weakest links of an organization's Cybersecurity chain
Sanjay Chadha, CPA, CA
 
Credit Union Cyber Security
Credit Union Cyber SecurityCredit Union Cyber Security
Credit Union Cyber Security
Stacy Willis
 
What CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber SecurityWhat CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber Security
Karyl Scott
 
S sdlc datasheet q1-2015 v fnl
S sdlc datasheet q1-2015 v fnlS sdlc datasheet q1-2015 v fnl
S sdlc datasheet q1-2015 v fnl
Sally Chan
 
Risk & Advisory Services: Quarterly Risk Advisor Feb. 2016
Risk & Advisory Services: Quarterly Risk Advisor Feb. 2016Risk & Advisory Services: Quarterly Risk Advisor Feb. 2016
Risk & Advisory Services: Quarterly Risk Advisor Feb. 2016
CBIZ, Inc.
 
MCGlobalTech Service Presentation
MCGlobalTech Service PresentationMCGlobalTech Service Presentation
MCGlobalTech Service Presentation
William McBorrough
 

Similar to Cyber risk management-white-paper-v8 (2) 2015 (20)

Cybersecurity: Quick Preparedness Assessment
Cybersecurity: Quick Preparedness AssessmentCybersecurity: Quick Preparedness Assessment
Cybersecurity: Quick Preparedness Assessment
 
Strategic Insights on IT & Cyber Risk Assessments.pdf
Strategic Insights on IT & Cyber Risk Assessments.pdfStrategic Insights on IT & Cyber Risk Assessments.pdf
Strategic Insights on IT & Cyber Risk Assessments.pdf
 
Small Business Playbook for Security and Compliance Success.pdf
Small Business Playbook for Security and Compliance Success.pdfSmall Business Playbook for Security and Compliance Success.pdf
Small Business Playbook for Security and Compliance Success.pdf
 
Small Business Playbook for Security and Compliance Success.pptx
Small Business Playbook for Security and Compliance Success.pptxSmall Business Playbook for Security and Compliance Success.pptx
Small Business Playbook for Security and Compliance Success.pptx
 
7 Steps To Developing A Cloud Security Plan
7 Steps To Developing A Cloud Security Plan7 Steps To Developing A Cloud Security Plan
7 Steps To Developing A Cloud Security Plan
 
2016 Risk Management Workshop
2016 Risk Management Workshop2016 Risk Management Workshop
2016 Risk Management Workshop
 
Cyber Defence - Service portfolio
Cyber Defence - Service portfolioCyber Defence - Service portfolio
Cyber Defence - Service portfolio
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
 
CISO as a service in India | Senselearner
CISO as a service in India | SenselearnerCISO as a service in India | Senselearner
CISO as a service in India | Senselearner
 
A CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk ManagementA CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk Management
 
Cybersecurity.pdf
Cybersecurity.pdfCybersecurity.pdf
Cybersecurity.pdf
 
Risk monitoring and response
Risk monitoring and responseRisk monitoring and response
Risk monitoring and response
 
Cyber presentation spet 2019 v8sentfor upload
Cyber presentation spet 2019 v8sentfor uploadCyber presentation spet 2019 v8sentfor upload
Cyber presentation spet 2019 v8sentfor upload
 
Weakest links of an organization's Cybersecurity chain
Weakest links of an organization's Cybersecurity chainWeakest links of an organization's Cybersecurity chain
Weakest links of an organization's Cybersecurity chain
 
Credit Union Cyber Security
Credit Union Cyber SecurityCredit Union Cyber Security
Credit Union Cyber Security
 
What CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber SecurityWhat CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber Security
 
S sdlc datasheet q1-2015 v fnl
S sdlc datasheet q1-2015 v fnlS sdlc datasheet q1-2015 v fnl
S sdlc datasheet q1-2015 v fnl
 
Risk & Advisory Services: Quarterly Risk Advisor Feb. 2016
Risk & Advisory Services: Quarterly Risk Advisor Feb. 2016Risk & Advisory Services: Quarterly Risk Advisor Feb. 2016
Risk & Advisory Services: Quarterly Risk Advisor Feb. 2016
 
MCGlobalTech Service Presentation
MCGlobalTech Service PresentationMCGlobalTech Service Presentation
MCGlobalTech Service Presentation
 

More from Accounting_Whitepapers

Why Data Standards?
Why Data Standards?Why Data Standards?
Why Data Standards?
Accounting_Whitepapers
 
Permanent Establishment May Not Be So Permanent (Prepare for Change)
Permanent Establishment May Not Be So Permanent (Prepare for Change)Permanent Establishment May Not Be So Permanent (Prepare for Change)
Permanent Establishment May Not Be So Permanent (Prepare for Change)
Accounting_Whitepapers
 
The Continuing Evolution of Tax Law, at Home and Abroad
The Continuing Evolution of Tax Law, at Home and AbroadThe Continuing Evolution of Tax Law, at Home and Abroad
The Continuing Evolution of Tax Law, at Home and Abroad
Accounting_Whitepapers
 
Reinsurance commutation 0315
Reinsurance commutation 0315Reinsurance commutation 0315
Reinsurance commutation 0315
Accounting_Whitepapers
 
Quest for tax reform-white paper - 8-2014
Quest for tax reform-white paper - 8-2014Quest for tax reform-white paper - 8-2014
Quest for tax reform-white paper - 8-2014
Accounting_Whitepapers
 
Form 8300-compliance - smart devine
Form 8300-compliance - smart devineForm 8300-compliance - smart devine
Form 8300-compliance - smart devine
Accounting_Whitepapers
 
Faculty workload analysis by Mary Lynn Kudey
Faculty workload analysis by Mary Lynn Kudey Faculty workload analysis by Mary Lynn Kudey
Faculty workload analysis by Mary Lynn Kudey
Accounting_Whitepapers
 
Smart devine-act now before its too late-0313-v6
Smart devine-act now before its too late-0313-v6Smart devine-act now before its too late-0313-v6
Smart devine-act now before its too late-0313-v6
Accounting_Whitepapers
 
Re engineering-0313-v10
Re engineering-0313-v10Re engineering-0313-v10
Re engineering-0313-v10
Accounting_Whitepapers
 
Non profit-role-review-0213
Non profit-role-review-0213Non profit-role-review-0213
Non profit-role-review-0213
Accounting_Whitepapers
 
Non profit-9-questions #3 5-2013
Non profit-9-questions #3 5-2013Non profit-9-questions #3 5-2013
Non profit-9-questions #3 5-2013
Accounting_Whitepapers
 
Gaining assurance over 3rd party soc 1 and soc 2 reporting 7-2014
Gaining assurance over 3rd party soc 1 and soc 2   reporting 7-2014Gaining assurance over 3rd party soc 1 and soc 2   reporting 7-2014
Gaining assurance over 3rd party soc 1 and soc 2 reporting 7-2014
Accounting_Whitepapers
 
How the new asu will impact your organization by christopher niwinski
How the new asu will impact your organization by christopher niwinskiHow the new asu will impact your organization by christopher niwinski
How the new asu will impact your organization by christopher niwinski
Accounting_Whitepapers
 
Hiring Household Employees Regulatory Requirements 2015
Hiring Household Employees Regulatory Requirements 2015Hiring Household Employees Regulatory Requirements 2015
Hiring Household Employees Regulatory Requirements 2015
Accounting_Whitepapers
 

More from Accounting_Whitepapers (14)

Why Data Standards?
Why Data Standards?Why Data Standards?
Why Data Standards?
 
Permanent Establishment May Not Be So Permanent (Prepare for Change)
Permanent Establishment May Not Be So Permanent (Prepare for Change)Permanent Establishment May Not Be So Permanent (Prepare for Change)
Permanent Establishment May Not Be So Permanent (Prepare for Change)
 
The Continuing Evolution of Tax Law, at Home and Abroad
The Continuing Evolution of Tax Law, at Home and AbroadThe Continuing Evolution of Tax Law, at Home and Abroad
The Continuing Evolution of Tax Law, at Home and Abroad
 
Reinsurance commutation 0315
Reinsurance commutation 0315Reinsurance commutation 0315
Reinsurance commutation 0315
 
Quest for tax reform-white paper - 8-2014
Quest for tax reform-white paper - 8-2014Quest for tax reform-white paper - 8-2014
Quest for tax reform-white paper - 8-2014
 
Form 8300-compliance - smart devine
Form 8300-compliance - smart devineForm 8300-compliance - smart devine
Form 8300-compliance - smart devine
 
Faculty workload analysis by Mary Lynn Kudey
Faculty workload analysis by Mary Lynn Kudey Faculty workload analysis by Mary Lynn Kudey
Faculty workload analysis by Mary Lynn Kudey
 
Smart devine-act now before its too late-0313-v6
Smart devine-act now before its too late-0313-v6Smart devine-act now before its too late-0313-v6
Smart devine-act now before its too late-0313-v6
 
Re engineering-0313-v10
Re engineering-0313-v10Re engineering-0313-v10
Re engineering-0313-v10
 
Non profit-role-review-0213
Non profit-role-review-0213Non profit-role-review-0213
Non profit-role-review-0213
 
Non profit-9-questions #3 5-2013
Non profit-9-questions #3 5-2013Non profit-9-questions #3 5-2013
Non profit-9-questions #3 5-2013
 
Gaining assurance over 3rd party soc 1 and soc 2 reporting 7-2014
Gaining assurance over 3rd party soc 1 and soc 2   reporting 7-2014Gaining assurance over 3rd party soc 1 and soc 2   reporting 7-2014
Gaining assurance over 3rd party soc 1 and soc 2 reporting 7-2014
 
How the new asu will impact your organization by christopher niwinski
How the new asu will impact your organization by christopher niwinskiHow the new asu will impact your organization by christopher niwinski
How the new asu will impact your organization by christopher niwinski
 
Hiring Household Employees Regulatory Requirements 2015
Hiring Household Employees Regulatory Requirements 2015Hiring Household Employees Regulatory Requirements 2015
Hiring Household Employees Regulatory Requirements 2015
 

Recently uploaded

What are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdfWhat are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdf
HumanResourceDimensi1
 
Set off and carry forward of losses and assessment of individuals.pptx
Set off and carry forward of losses and assessment of individuals.pptxSet off and carry forward of losses and assessment of individuals.pptx
Set off and carry forward of losses and assessment of individuals.pptx
HARSHITHV26
 
Digital Transformation in PLM - WHAT and HOW - for distribution.pdf
Digital Transformation in PLM - WHAT and HOW - for distribution.pdfDigital Transformation in PLM - WHAT and HOW - for distribution.pdf
Digital Transformation in PLM - WHAT and HOW - for distribution.pdf
Jos Voskuil
 
Role of Remote Sensing and Monitoring in Mining
Role of Remote Sensing and Monitoring in MiningRole of Remote Sensing and Monitoring in Mining
Role of Remote Sensing and Monitoring in Mining
Naaraayani Minerals Pvt.Ltd
 
India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...
India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...
India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...
Kumar Satyam
 
April 2024 Nostalgia Products Newsletter
April 2024 Nostalgia Products NewsletterApril 2024 Nostalgia Products Newsletter
April 2024 Nostalgia Products Newsletter
NathanBaughman3
 
Accpac to QuickBooks Conversion Navigating the Transition with Online Account...
Accpac to QuickBooks Conversion Navigating the Transition with Online Account...Accpac to QuickBooks Conversion Navigating the Transition with Online Account...
Accpac to QuickBooks Conversion Navigating the Transition with Online Account...
PaulBryant58
 
chapter 10 - excise tax of transfer and business taxation
chapter 10 - excise tax of transfer and business taxationchapter 10 - excise tax of transfer and business taxation
chapter 10 - excise tax of transfer and business taxation
AUDIJEAngelo
 
Attending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learnersAttending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learners
Erika906060
 
Lookback Analysis
Lookback AnalysisLookback Analysis
Lookback Analysis
Safe PaaS
 
The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...
awaisafdar
 
PriyoShop Celebration Pohela Falgun Mar 20, 2024
PriyoShop Celebration Pohela Falgun Mar 20, 2024PriyoShop Celebration Pohela Falgun Mar 20, 2024
PriyoShop Celebration Pohela Falgun Mar 20, 2024
PriyoShop.com LTD
 
Brand Analysis for an artist named Struan
Brand Analysis for an artist named StruanBrand Analysis for an artist named Struan
Brand Analysis for an artist named Struan
sarahvanessa51503
 
BeMetals Presentation_May_22_2024 .pdf
BeMetals Presentation_May_22_2024   .pdfBeMetals Presentation_May_22_2024   .pdf
BeMetals Presentation_May_22_2024 .pdf
DerekIwanaka1
 
Buy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star ReviewsBuy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star Reviews
usawebmarket
 
FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134
LR1709MUSIC
 
Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)
Lviv Startup Club
 
3.0 Project 2_ Developing My Brand Identity Kit.pptx
3.0 Project 2_ Developing My Brand Identity Kit.pptx3.0 Project 2_ Developing My Brand Identity Kit.pptx
3.0 Project 2_ Developing My Brand Identity Kit.pptx
tanyjahb
 
falcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-indiafalcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-india
Falcon Invoice Discounting
 
Taurus Zodiac Sign_ Personality Traits and Sign Dates.pptx
Taurus Zodiac Sign_ Personality Traits and Sign Dates.pptxTaurus Zodiac Sign_ Personality Traits and Sign Dates.pptx
Taurus Zodiac Sign_ Personality Traits and Sign Dates.pptx
my Pandit
 

Recently uploaded (20)

What are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdfWhat are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdf
 
Set off and carry forward of losses and assessment of individuals.pptx
Set off and carry forward of losses and assessment of individuals.pptxSet off and carry forward of losses and assessment of individuals.pptx
Set off and carry forward of losses and assessment of individuals.pptx
 
Digital Transformation in PLM - WHAT and HOW - for distribution.pdf
Digital Transformation in PLM - WHAT and HOW - for distribution.pdfDigital Transformation in PLM - WHAT and HOW - for distribution.pdf
Digital Transformation in PLM - WHAT and HOW - for distribution.pdf
 
Role of Remote Sensing and Monitoring in Mining
Role of Remote Sensing and Monitoring in MiningRole of Remote Sensing and Monitoring in Mining
Role of Remote Sensing and Monitoring in Mining
 
India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...
India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...
India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...
 
April 2024 Nostalgia Products Newsletter
April 2024 Nostalgia Products NewsletterApril 2024 Nostalgia Products Newsletter
April 2024 Nostalgia Products Newsletter
 
Accpac to QuickBooks Conversion Navigating the Transition with Online Account...
Accpac to QuickBooks Conversion Navigating the Transition with Online Account...Accpac to QuickBooks Conversion Navigating the Transition with Online Account...
Accpac to QuickBooks Conversion Navigating the Transition with Online Account...
 
chapter 10 - excise tax of transfer and business taxation
chapter 10 - excise tax of transfer and business taxationchapter 10 - excise tax of transfer and business taxation
chapter 10 - excise tax of transfer and business taxation
 
Attending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learnersAttending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learners
 
Lookback Analysis
Lookback AnalysisLookback Analysis
Lookback Analysis
 
The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...
 
PriyoShop Celebration Pohela Falgun Mar 20, 2024
PriyoShop Celebration Pohela Falgun Mar 20, 2024PriyoShop Celebration Pohela Falgun Mar 20, 2024
PriyoShop Celebration Pohela Falgun Mar 20, 2024
 
Brand Analysis for an artist named Struan
Brand Analysis for an artist named StruanBrand Analysis for an artist named Struan
Brand Analysis for an artist named Struan
 
BeMetals Presentation_May_22_2024 .pdf
BeMetals Presentation_May_22_2024   .pdfBeMetals Presentation_May_22_2024   .pdf
BeMetals Presentation_May_22_2024 .pdf
 
Buy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star ReviewsBuy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star Reviews
 
FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134
 
Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)
 
3.0 Project 2_ Developing My Brand Identity Kit.pptx
3.0 Project 2_ Developing My Brand Identity Kit.pptx3.0 Project 2_ Developing My Brand Identity Kit.pptx
3.0 Project 2_ Developing My Brand Identity Kit.pptx
 
falcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-indiafalcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-india
 
Taurus Zodiac Sign_ Personality Traits and Sign Dates.pptx
Taurus Zodiac Sign_ Personality Traits and Sign Dates.pptxTaurus Zodiac Sign_ Personality Traits and Sign Dates.pptx
Taurus Zodiac Sign_ Personality Traits and Sign Dates.pptx
 

Cyber risk management-white-paper-v8 (2) 2015

  • 1. A Holistic Approach to CyberRisk Management
  • 2. N I S T C y b e r S e c u r i t y H i g h L e v e l F u n c t i o n s A Holistic Approach to CyberRisk Management Companies are faced with many risks and threats while conducting their day-to-day business. One must understand that risk cannot be eliminated, but risk can be managed to an acceptable level. To manage risks, a company needs to know what the risks are and how each affects the organization as well as its strategic objectives. A one size-fits-all strategy does not apply to risk; each organization has their own risk tolerance threshold. According to Symantec Corporation’s Internet Securi- ty Threat Report 2014, “US companies paid $188 per breached record over a period of two years. If the data breach was caused by a malicious attack, then the number rose to $277 per breached record over two years. These expenses covered detection, escalation, notification and after-the-fact response, such as offer- ing data monitoring services to affected customers.” SMART DEVINE’s CyberRisk Management Service (CMS) provides a holistic approach to manage cyber- security risks faced by most organizations, and incor- porates the NIST (National Institute of Standard and Technology) cybersecurity framework as the guide- line. NIST lists five functions which are basic security activities organized at their highest level. Under each function is a variety of activities that must be complet- ed to minimize risk to your organization. Vulnerability Assessment A Vulnerability Assessment is the first step in under- standing the cyber risks faced by your organization, and will help identify all the strengths, weaknesses or security gaps in the computer systems, network and infrastructure. Unlike a penetration test, a Vulnerability Assessment is not invasive and will only identify and classify the vulnerabilities that are found. An assess- ment can also help the organization identify and pri- oritize gaps in their security risk management profile. Conducting an assessment provides a company with a solid understanding of the current state risk profile and work on getting it to an optimal level of security. Industry professionals recommend conducting a vul- nerability assessment on a regular basis. This is an important requirement of many of the regulations and industry standards like Payment Card Industry – Data Security Standards (PCI-DSS), Health Insurance Portability and Accountability Act (HIPAA), Gramm- Leach-Bliley Act (GLBA) and others. © 2014 SMART DEVINE; All rights reserved. A VULNERABILITY ASSESSMENT WILL DETERMINE AND VERIFY: • Devices that are attached to the network • Unused user accounts • Unnecessary open ports • Software that is not patched • Incorrect permissions on important system files Once vulnerabilities are found in the assets, which in- clude hardware, software and network infrastructure, they are identified and classified according to the or- ganization’s risk tolerance. The next step is to protect the assets from threats. Not all threats can be elimi- nated; so after a study of the likelihood and impact a threat can cause to a business, management should devise procedures to protect high-risk assets from threats. This can be accomplished by implementing protective technology, securing data, controlling ac- cess, creating policies, and user awareness training. The initial time and effort dedicated to protect your data does not mean your company is secure. Cybersecurity is an ongoing project because vulnera- bilities change, and so do the threats that persist. The monitoring of critical events and incidents can help an organization strengthen its posture. However, there must be a way to detect what is going on in your company’s environment with processes such as con- tinuous monitoring, web application scanning and a solid vulnerability management program.
  • 3. smartdevine.com 267.670.7300 © 2014 SMART DEVINE; All rights reserved. Crisis Management Plan Many organizations learn how to respond to a se- curity incident only after the attack has happened. A proper Incident Response Plan should be an integral part of every organizations security policy. There are many benefits to being prepared; one such benefit could be obtaining a premium discount on cybersecurity insurance. A well thought out response plan demonstrates that the organization takes infor- mation security seriously and is prepared to handle attacks quickly, thoroughly, and efficiently. A well- conceived Incident Response Plan, proper training for the incident response team, and rehearsing the plan by conducting mock exercises are all very important activities. The last function in this type of CyberRisk manage- ment approach is recover, which is about bringing an organization back to a point before the attack took place. Many organizations have a robust disaster recovery and business continuity plan in place, how- ever, management should consider looking into mod- ifying their existing plan to include a cyber attack as a valid threat. Recovery planning is essential because the quicker management can get up and running after an incident, the better your brand, image and other assets are preserved. Our Approach We use a SMART approach which involves people, process and technology. There is plenty of technol- ogy available in the market to help detect intruders, but that should not be the only driver for your security strategy. An effective security program takes a holistic approach and will involve people and processes in ad- dition to the technology. Humans are often the weak- est link in the equation. User awareness can make a big difference to a security program. Proper user awareness training includes educating employees of cybersecurity risks and developing a risk-awareness culture to help mitigate this issue. Our CMS approach uses automated tools as well as manual validation to minimize the effort and maximize the value for our clients. Not sure your organization has a cybersecurity pro- gram? Call us. If you believe you already have an ef- fective program, consider putting it to a test with our team. New threats to cyber security are frequent mak- ing way for continuous improvement to your plan. Benefits of a Holistic Approach to Cybersecurity 1. Plug Security Holes 2. Determine Security Requirements 3. Increase Security Awareness 4. Document Due Diligence 5. Justify Spending CYBERRISK MANAGEMENT SERVICE INCLUDES: • Vulnerability Assessment • Penetration Testing • Regulatory Compliance (PCI-DSS, HIPAA, GLBA and others) • User Awareness Training • Security Policy Review • Disaster Recovery and Business Continuity Planning • Continuous Monitoring and Incidence Response
  • 4. smartdevine.com 267.670.7300 A c c o u n t i n g T a x A d v i s o r y Smart Devine provides a full range of accounting, advisory, tax and investigative forensic and litigation services to organizations across a variety of industries. Smart Devine | 1600 Market Street | 32nd Floor | Philadelphia, PA 19103 | T 267.670.7300 | info@smartdevine.com © 2014 SMART DEVINE; All rights reserved. INTEGRATED TEAM OF PROFESSIONALS SMART DEVINE’s integrated team of business advisory and consulting professionals draw upon experience from both the public and private sectors. Our clients rely on us for our skills, experience and the knowledge we offer in supporting the critical operations of their businesses. For more infor- mation, contact Anil Chacko, Managing Director at Smart Devine’s Business Advisory Group. Anil has extensive ex- perience as an IT Executive in the Financial Services and Insurance industries. Contact Mr. Chacko at 267.670.7311 or achacko@smartdevine.com Anil Chacko, MBA, CISM Managing Director SMART DEVINE OFFERS A FULL LINE OF SOLUTIONS Also Read this White Paper: CYBERSECURITY: Is Your Business Ready? ACCOUNTING &AUDIT • Audit, Reviews & Compilation • Accounting & Tax Due Diligence • Accounting Outsourcing • Agreed Upon Procedures • Business Valuation • Finance Process & Reporting Optimization • Forecasts & Projections • ForensicAccounting & Litigation Support • Internal Control Study & Evaluation • Personal Financial Statements • Retirement PlanAudits & Prep • TrustAccounting • SECAdvisory Services • Special Project Coordination & Support • TechnicalAccounting Consulting • TransactionAdvisory Services • SSAE 16/SOC 1 & SOC 2 Reviews BUSINESSADVISORY • Business Process Outsourcing • Business Performance & Profit Improvement • FinancialAdvisory & Risk Services • Technology & IT Security RISK SERVICES • Corporate Governance Regulatory Compliance • Enterprise Risk Management • Business RiskAssessment • IT RiskAssessment • InternalAudit Services • IT InternalAuditing • InternalAudit Transformation • QualityAssessment Reviews • Sarbanes Oxley/ModelAudit Rule/ NAIC Compliance • SSAE 16/SOC 1 & SOC 2 ReadinessAssessments INSURANCEADVISORY SERVICES • Accounting & Financial Reporting • Tax Services • Claims Services • Underwriting Services • Litigation Support & ForensicAccounting • RiskAdvisory TAX • Tax Return Compliance • Accounting for Income Taxes • ASC 740 (FAS 109) Tax Provision Services • International Taxation • IC-DISC • Tax Planning &Advisory • Tax Controversy • Transfer Pricing • Research & Development Tax Credit • State & Local Taxation FORENSIC & LITIGATION SERVICES • Litigation Services • Environmental Litigation • Forensic Investigations • Trustee & Monitoring Services • Digital Forensics & eDiscovery