A Holistic Approach to
CyberRisk Management
N I S T C y b e r S e c u r i t y H i g h L e v e l F u n c t i o n s
A Holistic Approach to CyberRisk
Management
Companies are faced with many risks and threats
while conducting their day-to-day business. One
must understand that risk cannot be eliminated, but
risk can be managed to an acceptable level.
To manage risks, a company needs to know what
the risks are and how each affects the organization
as well as its strategic objectives. A one size-fits-all
strategy does not apply to risk; each organization has
their own risk tolerance threshold.
According to Symantec Corporationโ€™s Internet Securi-
ty Threat Report 2014, โ€œUS companies paid $188 per
breached record over a period of two years. If the data
breach was caused by a malicious attack, then the
number rose to $277 per breached record over two
years. These expenses covered detection, escalation,
notification and after-the-fact response, such as offer-
ing data monitoring services to affected customers.โ€
SMART DEVINEโ€™s CyberRisk Management Service
(CMS) provides a holistic approach to manage cyber-
security risks faced by most organizations, and incor-
porates the NIST (National Institute of Standard and
Technology) cybersecurity framework as the guide-
line. NIST lists five functions which are basic security
activities organized at their highest level. Under each
function is a variety of activities that must be complet-
ed to minimize risk to your organization.
Vulnerability Assessment
A Vulnerability Assessment is the first step in under-
standing the cyber risks faced by your organization,
and will help identify all the strengths, weaknesses or
security gaps in the computer systems, network and
infrastructure. Unlike a penetration test, a Vulnerability
Assessment is not invasive and will only identify and
classify the vulnerabilities that are found. An assess-
ment can also help the organization identify and pri-
oritize gaps in their security risk management profile.
Conducting an assessment provides a company with
a solid understanding of the current state risk profile
and work on getting it to an optimal level of security.
Industry professionals recommend conducting a vul-
nerability assessment on a regular basis. This is an
important requirement of many of the regulations
and industry standards like Payment Card Industry โ€“
Data Security Standards (PCI-DSS), Health Insurance
Portability and Accountability Act (HIPAA), Gramm-
Leach-Bliley Act (GLBA) and others.
ยฉ 2014 SMART DEVINE; All rights reserved.
A VULNERABILITY ASSESSMENT WILL
DETERMINE AND VERIFY:
โ€ข Devices that are attached to the network
โ€ข Unused user accounts
โ€ข Unnecessary open ports
โ€ข Software that is not patched
โ€ข Incorrect permissions on important system files
Once vulnerabilities are found in the assets, which in-
clude hardware, software and network infrastructure,
they are identified and classified according to the or-
ganizationโ€™s risk tolerance. The next step is to protect
the assets from threats. Not all threats can be elimi-
nated; so after a study of the likelihood and impact a
threat can cause to a business, management should
devise procedures to protect high-risk assets from
threats. This can be accomplished by implementing
protective technology, securing data, controlling ac-
cess, creating policies, and user awareness training.
The initial time and effort dedicated to protect your
data does not mean your company is secure.
Cybersecurity is an ongoing project because vulnera-
bilities change, and so do the threats that persist. The
monitoring of critical events and incidents can help an
organization strengthen its posture. However, there
must be a way to detect what is going on in your
companyโ€™s environment with processes such as con-
tinuous monitoring, web application scanning
and a solid vulnerability management program.
smartdevine.com 267.670.7300
ยฉ 2014 SMART DEVINE; All rights reserved.
Crisis Management Plan
Many organizations learn how to respond to a se-
curity incident only after the attack has happened. A
proper Incident Response Plan should be an integral
part of every organizations security policy.
There are many benefits to being prepared; one such
benefit could be obtaining a premium discount on
cybersecurity insurance. A well thought out response
plan demonstrates that the organization takes infor-
mation security seriously and is prepared to handle
attacks quickly, thoroughly, and efficiently. A well-
conceived Incident Response Plan, proper training
for the incident response team, and rehearsing
the plan by conducting mock exercises are all very
important activities.
The last function in this type of CyberRisk manage-
ment approach is recover, which is about bringing
an organization back to a point before the attack took
place. Many organizations have a robust disaster
recovery and business continuity plan in place, how-
ever, management should consider looking into mod-
ifying their existing plan to include a cyber attack as a
valid threat. Recovery planning is essential because
the quicker management can get up and running after
an incident, the better your brand, image and other
assets are preserved.
Our Approach
We use a SMART approach which involves people,
process and technology. There is plenty of technol-
ogy available in the market to help detect intruders,
but that should not be the only driver for your security
strategy. An effective security program takes a holistic
approach and will involve people and processes in ad-
dition to the technology. Humans are often the weak-
est link in the equation. User awareness can make
a big difference to a security program. Proper user
awareness training includes educating employees of
cybersecurity risks and developing a risk-awareness
culture to help mitigate this issue.
Our CMS approach uses automated tools as well as
manual validation to minimize the effort and maximize
the value for our clients.
Not sure your organization has a cybersecurity pro-
gram? Call us. If you believe you already have an ef-
fective program, consider putting it to a test with our
team. New threats to cyber security are frequent mak-
ing way for continuous improvement to your plan.
Benefits of a Holistic Approach to Cybersecurity
1.	 Plug Security Holes
2.	 Determine Security Requirements
3.	 Increase Security Awareness
4.	 Document Due Diligence
5.	 Justify Spending
CYBERRISK MANAGEMENT
SERVICE INCLUDES:
โ€ข Vulnerability Assessment
โ€ข Penetration Testing
โ€ข Regulatory Compliance
(PCI-DSS, HIPAA, GLBA and others)
โ€ข User Awareness Training
โ€ข Security Policy Review
โ€ข Disaster Recovery and Business
Continuity Planning
โ€ข Continuous Monitoring and Incidence Response
smartdevine.com 267.670.7300
A c c o u n t i n g T a x A d v i s o r y
Smart Devine provides a full range of accounting, advisory, tax and investigative forensic and litigation services
to organizations across a variety of industries.
Smart Devine | 1600 Market Street | 32nd Floor | Philadelphia, PA 19103 | T 267.670.7300 | info@smartdevine.com
ยฉ 2014 SMART DEVINE; All rights reserved.
INTEGRATED TEAM OF PROFESSIONALS
SMART DEVINEโ€™s integrated team of business advisory and
consulting professionals draw upon experience from both
the public and private sectors. Our clients rely on us for our
skills, experience and the knowledge we offer in supporting
the critical operations of their businesses. For more infor-
mation, contact Anil Chacko, Managing Director at Smart
Devineโ€™s Business Advisory Group. Anil has extensive ex-
perience as an IT Executive in the Financial Services and
Insurance industries. Contact Mr. Chacko at 267.670.7311
or achacko@smartdevine.com
Anil Chacko, MBA, CISM
Managing Director
SMART DEVINE OFFERS A FULL LINE OF SOLUTIONS
Also Read this White Paper:
CYBERSECURITY:
Is Your Business
Ready?
ACCOUNTING &AUDIT
โ€ข	 Audit, Reviews & Compilation
โ€ข	 Accounting & Tax Due Diligence
โ€ข	 Accounting Outsourcing
โ€ข	 Agreed Upon Procedures
โ€ข	 Business Valuation
โ€ข	 Finance Process & Reporting
	Optimization
โ€ข	 Forecasts & Projections
โ€ข	 ForensicAccounting & Litigation
	Support
โ€ข	 Internal Control Study &
	Evaluation
โ€ข	 Personal Financial Statements
โ€ข	 Retirement PlanAudits & Prep
โ€ข	 TrustAccounting
โ€ข	 SECAdvisory Services
โ€ข	 Special Project Coordination &
	Support
โ€ข	 TechnicalAccounting Consulting
โ€ข	 TransactionAdvisory Services
โ€ข	 SSAE 16/SOC 1 &
	 SOC 2 Reviews
BUSINESSADVISORY
โ€ข	 Business Process Outsourcing
โ€ข	 Business Performance & Profit Improvement
โ€ข	 FinancialAdvisory & Risk Services
โ€ข	 Technology & IT Security
RISK SERVICES
โ€ข	 Corporate Governance Regulatory
	Compliance
โ€ข	 Enterprise Risk Management
โ€ข	 Business RiskAssessment
โ€ข	 IT RiskAssessment
โ€ข	 InternalAudit Services
โ€ข	 IT InternalAuditing
โ€ข	 InternalAudit Transformation
โ€ข	 QualityAssessment Reviews
โ€ข	 Sarbanes Oxley/ModelAudit Rule/
	 NAIC Compliance
โ€ข	 SSAE 16/SOC 1 & SOC 2
	 ReadinessAssessments
INSURANCEADVISORY SERVICES
โ€ข	 Accounting & Financial Reporting
โ€ข	 Tax Services
โ€ข	 Claims Services
โ€ข	 Underwriting Services
โ€ข	 Litigation Support & ForensicAccounting
โ€ข	 RiskAdvisory
TAX
โ€ข	 Tax Return Compliance
โ€ข	 Accounting for Income Taxes
โ€ข	 ASC 740 (FAS 109) Tax
	 Provision Services
โ€ข	 International Taxation
โ€ข	IC-DISC
โ€ข	 Tax Planning &Advisory
โ€ข	 Tax Controversy
โ€ข	 Transfer Pricing
โ€ข	 Research & Development Tax Credit
โ€ข	 State & Local Taxation
FORENSIC & LITIGATION SERVICES
โ€ข	 Litigation Services
โ€ข	 Environmental Litigation
โ€ข	 Forensic Investigations
โ€ข	 Trustee & Monitoring Services
โ€ข	 Digital Forensics & eDiscovery

Cyber risk management-white-paper-v8 (2) 2015

  • 1.
    A Holistic Approachto CyberRisk Management
  • 2.
    N I ST C y b e r S e c u r i t y H i g h L e v e l F u n c t i o n s A Holistic Approach to CyberRisk Management Companies are faced with many risks and threats while conducting their day-to-day business. One must understand that risk cannot be eliminated, but risk can be managed to an acceptable level. To manage risks, a company needs to know what the risks are and how each affects the organization as well as its strategic objectives. A one size-fits-all strategy does not apply to risk; each organization has their own risk tolerance threshold. According to Symantec Corporationโ€™s Internet Securi- ty Threat Report 2014, โ€œUS companies paid $188 per breached record over a period of two years. If the data breach was caused by a malicious attack, then the number rose to $277 per breached record over two years. These expenses covered detection, escalation, notification and after-the-fact response, such as offer- ing data monitoring services to affected customers.โ€ SMART DEVINEโ€™s CyberRisk Management Service (CMS) provides a holistic approach to manage cyber- security risks faced by most organizations, and incor- porates the NIST (National Institute of Standard and Technology) cybersecurity framework as the guide- line. NIST lists five functions which are basic security activities organized at their highest level. Under each function is a variety of activities that must be complet- ed to minimize risk to your organization. Vulnerability Assessment A Vulnerability Assessment is the first step in under- standing the cyber risks faced by your organization, and will help identify all the strengths, weaknesses or security gaps in the computer systems, network and infrastructure. Unlike a penetration test, a Vulnerability Assessment is not invasive and will only identify and classify the vulnerabilities that are found. An assess- ment can also help the organization identify and pri- oritize gaps in their security risk management profile. Conducting an assessment provides a company with a solid understanding of the current state risk profile and work on getting it to an optimal level of security. Industry professionals recommend conducting a vul- nerability assessment on a regular basis. This is an important requirement of many of the regulations and industry standards like Payment Card Industry โ€“ Data Security Standards (PCI-DSS), Health Insurance Portability and Accountability Act (HIPAA), Gramm- Leach-Bliley Act (GLBA) and others. ยฉ 2014 SMART DEVINE; All rights reserved. A VULNERABILITY ASSESSMENT WILL DETERMINE AND VERIFY: โ€ข Devices that are attached to the network โ€ข Unused user accounts โ€ข Unnecessary open ports โ€ข Software that is not patched โ€ข Incorrect permissions on important system files Once vulnerabilities are found in the assets, which in- clude hardware, software and network infrastructure, they are identified and classified according to the or- ganizationโ€™s risk tolerance. The next step is to protect the assets from threats. Not all threats can be elimi- nated; so after a study of the likelihood and impact a threat can cause to a business, management should devise procedures to protect high-risk assets from threats. This can be accomplished by implementing protective technology, securing data, controlling ac- cess, creating policies, and user awareness training. The initial time and effort dedicated to protect your data does not mean your company is secure. Cybersecurity is an ongoing project because vulnera- bilities change, and so do the threats that persist. The monitoring of critical events and incidents can help an organization strengthen its posture. However, there must be a way to detect what is going on in your companyโ€™s environment with processes such as con- tinuous monitoring, web application scanning and a solid vulnerability management program.
  • 3.
    smartdevine.com 267.670.7300 ยฉ 2014SMART DEVINE; All rights reserved. Crisis Management Plan Many organizations learn how to respond to a se- curity incident only after the attack has happened. A proper Incident Response Plan should be an integral part of every organizations security policy. There are many benefits to being prepared; one such benefit could be obtaining a premium discount on cybersecurity insurance. A well thought out response plan demonstrates that the organization takes infor- mation security seriously and is prepared to handle attacks quickly, thoroughly, and efficiently. A well- conceived Incident Response Plan, proper training for the incident response team, and rehearsing the plan by conducting mock exercises are all very important activities. The last function in this type of CyberRisk manage- ment approach is recover, which is about bringing an organization back to a point before the attack took place. Many organizations have a robust disaster recovery and business continuity plan in place, how- ever, management should consider looking into mod- ifying their existing plan to include a cyber attack as a valid threat. Recovery planning is essential because the quicker management can get up and running after an incident, the better your brand, image and other assets are preserved. Our Approach We use a SMART approach which involves people, process and technology. There is plenty of technol- ogy available in the market to help detect intruders, but that should not be the only driver for your security strategy. An effective security program takes a holistic approach and will involve people and processes in ad- dition to the technology. Humans are often the weak- est link in the equation. User awareness can make a big difference to a security program. Proper user awareness training includes educating employees of cybersecurity risks and developing a risk-awareness culture to help mitigate this issue. Our CMS approach uses automated tools as well as manual validation to minimize the effort and maximize the value for our clients. Not sure your organization has a cybersecurity pro- gram? Call us. If you believe you already have an ef- fective program, consider putting it to a test with our team. New threats to cyber security are frequent mak- ing way for continuous improvement to your plan. Benefits of a Holistic Approach to Cybersecurity 1. Plug Security Holes 2. Determine Security Requirements 3. Increase Security Awareness 4. Document Due Diligence 5. Justify Spending CYBERRISK MANAGEMENT SERVICE INCLUDES: โ€ข Vulnerability Assessment โ€ข Penetration Testing โ€ข Regulatory Compliance (PCI-DSS, HIPAA, GLBA and others) โ€ข User Awareness Training โ€ข Security Policy Review โ€ข Disaster Recovery and Business Continuity Planning โ€ข Continuous Monitoring and Incidence Response
  • 4.
    smartdevine.com 267.670.7300 A cc o u n t i n g T a x A d v i s o r y Smart Devine provides a full range of accounting, advisory, tax and investigative forensic and litigation services to organizations across a variety of industries. Smart Devine | 1600 Market Street | 32nd Floor | Philadelphia, PA 19103 | T 267.670.7300 | info@smartdevine.com ยฉ 2014 SMART DEVINE; All rights reserved. INTEGRATED TEAM OF PROFESSIONALS SMART DEVINEโ€™s integrated team of business advisory and consulting professionals draw upon experience from both the public and private sectors. Our clients rely on us for our skills, experience and the knowledge we offer in supporting the critical operations of their businesses. For more infor- mation, contact Anil Chacko, Managing Director at Smart Devineโ€™s Business Advisory Group. Anil has extensive ex- perience as an IT Executive in the Financial Services and Insurance industries. Contact Mr. Chacko at 267.670.7311 or achacko@smartdevine.com Anil Chacko, MBA, CISM Managing Director SMART DEVINE OFFERS A FULL LINE OF SOLUTIONS Also Read this White Paper: CYBERSECURITY: Is Your Business Ready? ACCOUNTING &AUDIT โ€ข Audit, Reviews & Compilation โ€ข Accounting & Tax Due Diligence โ€ข Accounting Outsourcing โ€ข Agreed Upon Procedures โ€ข Business Valuation โ€ข Finance Process & Reporting Optimization โ€ข Forecasts & Projections โ€ข ForensicAccounting & Litigation Support โ€ข Internal Control Study & Evaluation โ€ข Personal Financial Statements โ€ข Retirement PlanAudits & Prep โ€ข TrustAccounting โ€ข SECAdvisory Services โ€ข Special Project Coordination & Support โ€ข TechnicalAccounting Consulting โ€ข TransactionAdvisory Services โ€ข SSAE 16/SOC 1 & SOC 2 Reviews BUSINESSADVISORY โ€ข Business Process Outsourcing โ€ข Business Performance & Profit Improvement โ€ข FinancialAdvisory & Risk Services โ€ข Technology & IT Security RISK SERVICES โ€ข Corporate Governance Regulatory Compliance โ€ข Enterprise Risk Management โ€ข Business RiskAssessment โ€ข IT RiskAssessment โ€ข InternalAudit Services โ€ข IT InternalAuditing โ€ข InternalAudit Transformation โ€ข QualityAssessment Reviews โ€ข Sarbanes Oxley/ModelAudit Rule/ NAIC Compliance โ€ข SSAE 16/SOC 1 & SOC 2 ReadinessAssessments INSURANCEADVISORY SERVICES โ€ข Accounting & Financial Reporting โ€ข Tax Services โ€ข Claims Services โ€ข Underwriting Services โ€ข Litigation Support & ForensicAccounting โ€ข RiskAdvisory TAX โ€ข Tax Return Compliance โ€ข Accounting for Income Taxes โ€ข ASC 740 (FAS 109) Tax Provision Services โ€ข International Taxation โ€ข IC-DISC โ€ข Tax Planning &Advisory โ€ข Tax Controversy โ€ข Transfer Pricing โ€ข Research & Development Tax Credit โ€ข State & Local Taxation FORENSIC & LITIGATION SERVICES โ€ข Litigation Services โ€ข Environmental Litigation โ€ข Forensic Investigations โ€ข Trustee & Monitoring Services โ€ข Digital Forensics & eDiscovery