SlideShare a Scribd company logo
1 of 20
What trends will
2018 likely bring for
business continuity professionals?
What trends will 2018 likely bring for business continuity professionals?Copyright © 2018 Deloitte Development LLC. All rights reserved
2
Introductions
David Feeney, CPP, PMP Andrea LeStarge, MS
Advisory /Consulting
Energy/Utilities
Private Sector
GSOC
Security Operations
Technology
Advisory / Consulting
National Lab
Federal & State Gov’t
Fusion Centers
Risk Assessments
Training
What trends will 2018 likely bring for business continuity professionals?Copyright © 2018 Deloitte Development LLC. All rights reserved
3
Baselining: Terminology 4
Looking deeper into likely trends: Who, what, how 5
Looking deeper into likely trends: New technologies 6
Looking deeper into likely trends: Cyber 7
Looking deeper into likely trends: Data breach 8-9
Looking deeper into likely trends: Internet of Things (IoT) 10-11
Looking deeper into likely trends: Physical 12
Impact on business continuity planning 13-15
Executive sponsorship, stakeholder buy-in 16
Top actions & questions for executives 17
Agenda
What trends will 2018 likely bring for business continuity professionals?Copyright © 2018 Deloitte Development LLC. All rights reserved
4
Baselining: Terminology
Vulnerabilities
Threats
Business Continuity
Risk Management
What trends will 2018 likely bring for business continuity professionals?Copyright © 2018 Deloitte Development LLC. All rights reserved
5
Looking deeper into likely trends:
Who, what, how • Cyber criminals
• Hacktivists (agenda
driven)
• Nation states
• Insiders / partners
• Competitors
• Skilled individual hacker
• Theft of intellectual
property
or strategic plans
• Financial fraud
• Reputation damage
• Business disruption
• Destruction of critical
infrastructure
• Threats to health & safety
Who might attack?
What are they after;
What are the key business risks I need to
mitigate?
What tactics might they use?
• Spear phishing, drive
by download, etc.
• Software or hardware
vulnerabilities
• Third-party
compromise
• Multi-channel attacks
• Stolen credentials
• … and others
Presentation title
[To edit, click View > Slide Master > Slide Master]
Member firms and DTTL: Insert appropriate copyright
[To edit, click View > Slide Master > Slide Master]
6
The digital revolution is driving business
innovation and growth, yet also exposing
users to new and emerging threats.
Exciting technological innovations bring
fantastic opportunities:
 Driving down costs;
 Increasing integration; and
 Driving efficiencies.
But opportunity brings risk:
New avenues of exploitation mean businesses
have a greater exposure to cyber attacks than
ever before.
Looking deeper into likely trends:
New technology
YOU
The increasing prevalence of cyber attacks means that new
techniques and tools are needed
New Technology = New Threats
What trends will 2018 likely bring for business continuity professionals?Copyright © 2018 Deloitte Development LLC. All rights reserved
7
Looking deeper into likely trends: Cyber
“63% of confirmed data
breaches leverage a
weak, default, or stolen
password.”
“30% of phishing emails are
opened. And ~12% of targets
go on to click the link or
attachment.”
“Crypto-style
ransomware grew 35
percent in 2015.”
“59% of employees
steal proprietary
corporate data when
they quit or are fired.”
“99% of computer users
are vulnerable to exploit
kits (software
vulnerabilities).”
BITSIGHT. 2018. 28 Data breach statistics that will inspire you (to protect
yourself). Retrieved from: https://www.bitsighttech.com/blog/data-breach-
statistics
What trends will 2018 likely bring for business continuity professionals?Copyright © 2018 Deloitte Development LLC. All rights reserved
8
Looking deeper into likely trends:
Data breach
“In 2016, there were
454 data breaches with
nearly 12.7 million
records exposed.”
“In 93% of breaches,
attackers take minutes
or less to compromise
systems.”
“4 out of 5 victims of a
breach don’t realize
they’ve been attacked
for a week or more.”
“The forecast average
loss for a breach of
1,000 records is
between $52,000 and
$87,000.”
BITSIGHT. 2018. 28 Data breach statistics that will inspire you (to protect
yourself). Retrieved from: https://www.bitsighttech.com/blog/data-breach-
statistics
What trends will 2018 likely bring for business continuity professionals?Copyright © 2018 Deloitte Development LLC. All rights reserved
9
Looking deeper into likely trends:
Data breach (Cont’d)
Ponemon Institute, Cybersponse, 2018.
Retrieved from: https://cybersponse.com/dont-
be-a-statistic-these-numbers-are-scary
$400B+
50%
90%
63%8%
11%
18%
Healthcare Financial Services Educational Government
229
99.9%
27.5%increase in the data
breaches in various
industries from
2013
15%
o f i n c i d e n t s
s t i l l t a k e
d a y s t o
d i s c o v e r
Average
number of
days attackers
maintained
presence after
infiltration and
before
detection
chance that at least one
person will fall prey to a
phishing campaign with just
10
emails
recipients open emails
and click on phishing
links within the first hour
of receiving them
$154
$201
$217
Global
Average
2014
2015
Per capita cost of data breach
was highest in US in 2015
$217
of the exploited
vulnerabilities were
compromised more
than a year after
CVE was published
Numbers denote industry wise breakup of 2014 data breach
incidents
is the annual cost
to the global
economy from
cybercrime
o f i n c i d e n t s
i n v o l v e a b u s e
o f p r i v i l e g e d
a c c e s s
55%
What trends will 2018 likely bring for business continuity professionals?Copyright © 2018 Deloitte Development LLC. All rights reserved
10
Looking deeper into likely trends:
IoT
“The number of
connected devices is
expected to grow
from 15.4 billion in
2015 to 30.7 billion
by 2020 and 75.4
billion by 2025.”
“Global spending on
IoT across all markets
is expected to grow
from $737 billion in
2016 to $1.29 trillion
by 2020.”
“In 2017, 60% of global
manufacturers will use
analytics data recorded
from connected devices to
analyze processes and
identify optimization
possibilities.”
VisionCritical. 2018. 13 stunning stats on the Internet of Things.
Retrieved from: https://www.visioncritical.com/internet-of-things-
stats/
What trends will 2018 likely bring for business continuity professionals?Copyright © 2018 Deloitte Development LLC. All rights reserved
11
Looking deeper into likely trends:
IoT (Cont’d)
Enable security by default through unique, hard to crack default user names and
passwords. User names and passwords for IoT devices supplied by the manufacturer are
often never changed by the user and are easily cracked. Botnets operate by continuously
scanning for IoT devices that are protected by known factory default user names and
passwords. Strong security controls should be something the industrial consumer has to
deliberately disable rather than deliberately enable
Build the device using the most recent operating system that is technically viable and
economically feasible. Many IoT devices use Linux operating systems, but may not use
the most up-to-date operating system. Using the current operating system ensures that
known vulnerabilities will have been mitigated
Use hardware that incorporates security features to strengthen the
protection and integrity of the device. For example, use computer chips that
integrate security at the transistor level, embedded in the processor, and
provide encryption and anonymity
Design with system and operational disruption in
mind. Understanding what consequences could flow from
the failure of a device will enable developers,
manufacturers, and service providers to make more
informed risk-based security decisions. Where feasible,
developers should build IoT devices to fail safely and
securely, so that the failure does not lead to greater
systemic disruption.
1
2
3
4
US DHS. 2016. Strategic Principles for Securing the IoT. Retrieved
from:
https://www.dhs.gov/sites/default/files/publications/Strategic_Princi
ples_for_Securing_the_Internet_of_Things-2016-1115-FINAL....pdf
What trends will 2018 likely bring for business continuity professionals?Copyright © 2018 Deloitte Development LLC. All rights reserved
12
Looking deeper into likely trends: Physical
It is important to understand the actual physical threats for specific
organizations, and specifically for individual lines of business or support
functions.
Active Shooter
Workplace Violence
Improvised
Explosive Devices
Insider Threat
Physical security is changing for many of our Nation’s critical infrastructure sectors and the need for assistance is growing at a
tremendous rate.
Companies are feeling the strain traditional risk mitigation measures place on human resources. Security officers that used to
work 9-to-5 are being replaced with automated security measures that are 24/7 and provide enhanced security technologies.
With these advanced technologies, company policies and procedures are in need of updating to account for the technology
and mechanisms that are in place to protect against a wide variety of both internal and external threats.
Strong BIA strategies help organizations have strong security management and corporate governance of the organization.
With well planned and developed business continuity programs, liabilities, and costs can be reduced in numerous areas.
Growing Need for Structural Safeguarding
What trends will 2018 likely bring for business continuity professionals?Copyright © 2018 Deloitte Development LLC. All rights reserved
13
Convergence(s)
• Renaissance of physical & cyber convergence
• Integrate business continuity into all organizational functions (not just IT).
• Business continuity practitioners should engage asset owners as a trusted advisor
Impact on business continuity planning
Physical
Threats
Cyber
Threats
What trends will 2018 likely bring for business continuity professionals?Copyright © 2018 Deloitte Development LLC. All rights reserved
14
 Enterprise Security Risk Management (ESRM)
 Business continuity (BC) across the
enterprise
 Asset owner is stakeholder
 BC is trusted advisor
Impact on business continuity planning
(Cont’d)
 ESRM Process
 Identify asset
 Identify risk
 Prioritize risk
 Plan for risk
What trends will 2018 likely bring for business continuity professionals?Copyright © 2018 Deloitte Development LLC. All rights reserved
15
 Focus on resilience vs impenetrability
 Resilience: Having the ability to recover from and reduce the impact of cyber incidents
 Resilience accepts to some degree that mitigation strategies are not impenetrable
Impact on business continuity planning
(Cont’d)
What trends will 2018 likely bring for business continuity professionals?Copyright © 2018 Deloitte Development LLC. All rights reserved
16
Executive sponsorship,
stakeholder buy-in
Board & CEO
Senior
Management
(COO, CAO, CRO)
IT Leadership
(CIO)
IT Risk Leadership
(CISO / CITRO)
Tone at the top, establish
senior management
accountability and a Business
Continuity (BC)-aware culture
Define the organization’s
risk appetite and be
accountable for BC
Program. Empower the
extended leadership team.
Lead (not delegate) in
defining and executing the
strategy to execute the BC
Program. Establish an
effective interaction model
with cyber and physical
branches.
Define the right balance
between threat-centric
vs. compliance-centric
programs. Be a business
enabler, without shying
away from the role of BC
Program custodian.
Line of Business
Leaders
Support integration of BC
Program processes into
business growth and
development activities.
Appoint line-of-business
BC Program officers.
Architecture
&
Engineering
Infrastructure
Application
Development
Security
Operations
IT DOMAINS Manage
and report on risks
Execute on
strategy
Other
functions…
GOVERNANCE
Fully integrate BC into cyber
and physical disciplines –
design for Six Sigma, not
quality control. Integrate
current technologies and
people processes to address
the latest threats per the
business impact analysis
results.
What trends will 2018 likely bring for business continuity professionals?Copyright © 2018 Deloitte Development LLC. All rights reserved
17
Top actions and questions for
executives
• Put a senior executive at the helm.
He or she must be able to lead in a crisis, and
also guide the program and enlist collaboration
across diverse functions.
• Map threats to the business assets
that matter.
Set direction, purpose, and risk appetite for the
program. Establish priorities, and ensure funding
and resourcing.
• Drive early “wins.”
Establish momentum by focusing on pilot
initiatives that measurably impact business
success. Use these to plant the seeds of long-
term cultural change.
• Accelerate behavior change.
Create active learning scenarios that instill
awareness of the impact of daily activity on cyber
risk. Embed cyber risk management goals into
evaluation of Top 100 executives.
• Trust but verify.
Conduct monthly or quarterly reviews about key
risks and risk metrics, and address roadblocks.
Key actions you
should own
Key questions
you should ask
• Are we focused on the right things?
Often said, but hard to execute. Understand how value is
created in your organization, where your critical assets
are, how they are vulnerable to key threats. Practice
defense-in-depth.
• Do we have the right talent?
Quality over quantity. There is not enough talent to do
everything in-house, so take a strategic approach to
sourcing decisions.
• Are we proactive or reactive?
Retrofitting for security is very expensive. Build it upfront
in your management processes, applications and
infrastructure.
• Are we incentivizing openness and
collaboration?
Build strong relationships with partners, law
enforcement, regulators, and vendors. Foster internal
cooperation across groups and functions, and ensure that
people aren’t hiding risks to protect themselves.
• Are we adapting to change?
Policy reviews, assessments, and rehearsals of crisis
response processes must be regularized to establish a
culture of perpetual adaptation to the threat and risk
landscape.
About Deloitte
Deloitte refers to one or more of Deloitte Touche Tohmatsu Limited, a UK private company limited by guarantee (“DTTL”), its network
of member firms, and their related entities. DTTL and each of its member firms are legally separate and independent entities. DTTL
(also referred to as “Deloitte Global”) does not provide services to clients. In the United States, Deloitte refers to one or more of the US
member firms of DTTL, their related entities that operate using the “Deloitte” name in the United States and their respective
affiliates. Certain services may not be available to attest clients under the rules and regulations of public accounting. Please see
www.deloitte.com/about to learn more about our global network of member firms.
Copyright © 2018 Deloitte Development LLC. All rights reserved.
36 USC 220506
This presentation contains general information only and Deloitte is not, by means
of this presentation, rendering accounting, business, financial, investment, legal,
tax, or other professional advice or services. This presentation is not a substitute
for such professional advice or services, nor should it be used as a basis for any
decision or action that may affect your business. Before making any decision or
taking any action that may affect your business, you should consult a qualified
professional advisor.
Deloitte shall not be responsible for any loss sustained by any person who relies
on this presentation.
What trends will 2018 likely bring for business continuity professionals?Copyright © 2018 Deloitte Development LLC. All rights reserved
19
ISO 22301
Training Courses
ISO 22301 Introduction
1 Day Course
ISO 22301 Foundation
2 Days Course
ISO 22301 Lead Implementer
5 Days Course
ISO 22301 Lead Auditor
5 Days Course
Exam and certification fees are included in the training
price.
https://pecb.com/iso-22301-training-courses
www.pecb.com/events
What trends will 2018 likely bring for business continuity professionals?Copyright © 2018 Deloitte Development LLC. All rights reserved
20
THANK YOU
?
www.deloitte.com
https://www.linkedin.com/in/davidfeeney/
https://www.linkedin.com/in/andrea-lestarge-
1b64a7a9/

More Related Content

What's hot

Cybersecurity Risks for Businesses
Cybersecurity Risks for BusinessesCybersecurity Risks for Businesses
Cybersecurity Risks for BusinessesAlex Rudie
 
Top Cyber Threat Predictions for 2019
Top Cyber Threat Predictions for 2019Top Cyber Threat Predictions for 2019
Top Cyber Threat Predictions for 2019PECB
 
CSE 2016 Future of Cyber Security by Matthew Rosenquist
CSE 2016 Future of Cyber Security by Matthew RosenquistCSE 2016 Future of Cyber Security by Matthew Rosenquist
CSE 2016 Future of Cyber Security by Matthew RosenquistMatthew Rosenquist
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsUlf Mattsson
 
Top 10 cybersecurity predictions for 2016 by Matthew Rosenquist
Top 10 cybersecurity predictions for 2016 by Matthew RosenquistTop 10 cybersecurity predictions for 2016 by Matthew Rosenquist
Top 10 cybersecurity predictions for 2016 by Matthew RosenquistMatthew Rosenquist
 
Tripwire University: Cyberwar Boot Camp – Introduction and Overview
Tripwire University: Cyberwar Boot Camp – Introduction and OverviewTripwire University: Cyberwar Boot Camp – Introduction and Overview
Tripwire University: Cyberwar Boot Camp – Introduction and OverviewTripwire
 
Thinking like a criminal – Cybersecurity 101
Thinking like a criminal – Cybersecurity 101Thinking like a criminal – Cybersecurity 101
Thinking like a criminal – Cybersecurity 101PECB
 
Strategies to combat new, innovative cyber threats in 2019
Strategies to combat new, innovative cyber threats in 2019Strategies to combat new, innovative cyber threats in 2019
Strategies to combat new, innovative cyber threats in 2019SrikanthRaju7
 
ICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security GovernanceICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security GovernanceCharles Lim
 
Cyber Security Transformation - A New Approach for 2015 & Beyond - Daryl Pereira
Cyber Security Transformation - A New Approach for 2015 & Beyond - Daryl PereiraCyber Security Transformation - A New Approach for 2015 & Beyond - Daryl Pereira
Cyber Security Transformation - A New Approach for 2015 & Beyond - Daryl PereiraKnowledge Group
 
Future of Cybersecurity 2016 - M.Rosenquist
Future of Cybersecurity 2016 - M.RosenquistFuture of Cybersecurity 2016 - M.Rosenquist
Future of Cybersecurity 2016 - M.RosenquistMatthew Rosenquist
 
Cyber Secuirty Visualization
Cyber Secuirty VisualizationCyber Secuirty Visualization
Cyber Secuirty VisualizationDoug Cogswell
 
Summer internship - Cybersecurity
Summer internship - CybersecuritySummer internship - Cybersecurity
Summer internship - CybersecurityAbhilashYadav14
 
Symantec Intelligence Report - October 2014
Symantec Intelligence Report - October 2014Symantec Intelligence Report - October 2014
Symantec Intelligence Report - October 2014Symantec
 
Securing the Cloud by Matthew Rosenquist 2016
Securing the Cloud by Matthew Rosenquist 2016Securing the Cloud by Matthew Rosenquist 2016
Securing the Cloud by Matthew Rosenquist 2016Matthew Rosenquist
 

What's hot (20)

Must Know Cyber Security Stats of 2016
Must Know Cyber Security Stats of 2016Must Know Cyber Security Stats of 2016
Must Know Cyber Security Stats of 2016
 
Cybersecurity Risks for Businesses
Cybersecurity Risks for BusinessesCybersecurity Risks for Businesses
Cybersecurity Risks for Businesses
 
Top Cyber Threat Predictions for 2019
Top Cyber Threat Predictions for 2019Top Cyber Threat Predictions for 2019
Top Cyber Threat Predictions for 2019
 
2019 Cyber Security Trends
2019 Cyber Security Trends2019 Cyber Security Trends
2019 Cyber Security Trends
 
CSE 2016 Future of Cyber Security by Matthew Rosenquist
CSE 2016 Future of Cyber Security by Matthew RosenquistCSE 2016 Future of Cyber Security by Matthew Rosenquist
CSE 2016 Future of Cyber Security by Matthew Rosenquist
 
True Cost of Data Breaches
True Cost of Data BreachesTrue Cost of Data Breaches
True Cost of Data Breaches
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & Recommendations
 
Top 10 cybersecurity predictions for 2016 by Matthew Rosenquist
Top 10 cybersecurity predictions for 2016 by Matthew RosenquistTop 10 cybersecurity predictions for 2016 by Matthew Rosenquist
Top 10 cybersecurity predictions for 2016 by Matthew Rosenquist
 
Tripwire University: Cyberwar Boot Camp – Introduction and Overview
Tripwire University: Cyberwar Boot Camp – Introduction and OverviewTripwire University: Cyberwar Boot Camp – Introduction and Overview
Tripwire University: Cyberwar Boot Camp – Introduction and Overview
 
Thinking like a criminal – Cybersecurity 101
Thinking like a criminal – Cybersecurity 101Thinking like a criminal – Cybersecurity 101
Thinking like a criminal – Cybersecurity 101
 
Strategies to combat new, innovative cyber threats in 2019
Strategies to combat new, innovative cyber threats in 2019Strategies to combat new, innovative cyber threats in 2019
Strategies to combat new, innovative cyber threats in 2019
 
ICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security GovernanceICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security Governance
 
Cyber Security Transformation - A New Approach for 2015 & Beyond - Daryl Pereira
Cyber Security Transformation - A New Approach for 2015 & Beyond - Daryl PereiraCyber Security Transformation - A New Approach for 2015 & Beyond - Daryl Pereira
Cyber Security Transformation - A New Approach for 2015 & Beyond - Daryl Pereira
 
Future of Cybersecurity 2016 - M.Rosenquist
Future of Cybersecurity 2016 - M.RosenquistFuture of Cybersecurity 2016 - M.Rosenquist
Future of Cybersecurity 2016 - M.Rosenquist
 
The State of Cyber
The State of CyberThe State of Cyber
The State of Cyber
 
Cyber Threats
Cyber ThreatsCyber Threats
Cyber Threats
 
Cyber Secuirty Visualization
Cyber Secuirty VisualizationCyber Secuirty Visualization
Cyber Secuirty Visualization
 
Summer internship - Cybersecurity
Summer internship - CybersecuritySummer internship - Cybersecurity
Summer internship - Cybersecurity
 
Symantec Intelligence Report - October 2014
Symantec Intelligence Report - October 2014Symantec Intelligence Report - October 2014
Symantec Intelligence Report - October 2014
 
Securing the Cloud by Matthew Rosenquist 2016
Securing the Cloud by Matthew Rosenquist 2016Securing the Cloud by Matthew Rosenquist 2016
Securing the Cloud by Matthew Rosenquist 2016
 

Similar to What trends will 2018 bring for Business Continuity Professionals?

Booz Allen's 10 Cyber Priorities for Boards of Directors
Booz Allen's 10 Cyber Priorities for Boards of DirectorsBooz Allen's 10 Cyber Priorities for Boards of Directors
Booz Allen's 10 Cyber Priorities for Boards of DirectorsBooz Allen Hamilton
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...International Federation of Accountants
 
The Security Challenge: What's Next?
The Security Challenge: What's Next?The Security Challenge: What's Next?
The Security Challenge: What's Next?Cognizant
 
Maintain data privacy during software development
Maintain data privacy during software developmentMaintain data privacy during software development
Maintain data privacy during software developmentMuhammadArif823
 
2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurityMatthew Rosenquist
 
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data AssetsFS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data AssetsPuneet Kukreja
 
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...Enterprise Management Associates
 
Cyber security investments 2021
Cyber security investments 2021Cyber security investments 2021
Cyber security investments 2021Management Events
 
Proactive Risk Management and Compliance in a World of Digital Disruption
Proactive Risk Management and Compliance in a World of Digital DisruptionProactive Risk Management and Compliance in a World of Digital Disruption
Proactive Risk Management and Compliance in a World of Digital DisruptionMike Wons
 
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)Sarah Jarvis
 
Five principles for improving your cyber security
Five principles for improving your cyber securityFive principles for improving your cyber security
Five principles for improving your cyber securityWGroup
 
Accenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber ResilienceAccenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber Resilienceaccenture
 
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoftHow Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoftOSIsoft, LLC
 
Cybersecurity through the Deloitte lens
Cybersecurity through the Deloitte lensCybersecurity through the Deloitte lens
Cybersecurity through the Deloitte lensaakash malhotra
 
Protecting the brand—cyber-attacks and the reputation of the enterprise
Protecting the brand—cyber-attacks and the reputation of the enterprise Protecting the brand—cyber-attacks and the reputation of the enterprise
Protecting the brand—cyber-attacks and the reputation of the enterprise The Economist Media Businesses
 
Accenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber ResilienceAccenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber Resilienceaccenture
 
Corporate Cybersecurity: A Serious Game
Corporate Cybersecurity: A Serious GameCorporate Cybersecurity: A Serious Game
Corporate Cybersecurity: A Serious GameTatainteractive1
 
Securing the C-Suite: Cybersecurity Perspectives from the Boardroom
Securing the C-Suite: Cybersecurity Perspectives from the BoardroomSecuring the C-Suite: Cybersecurity Perspectives from the Boardroom
Securing the C-Suite: Cybersecurity Perspectives from the BoardroomIBM Security
 
Cybersecurity Improvement eBook
Cybersecurity Improvement eBookCybersecurity Improvement eBook
Cybersecurity Improvement eBookPablo Junco
 

Similar to What trends will 2018 bring for Business Continuity Professionals? (20)

Booz Allen's 10 Cyber Priorities for Boards of Directors
Booz Allen's 10 Cyber Priorities for Boards of DirectorsBooz Allen's 10 Cyber Priorities for Boards of Directors
Booz Allen's 10 Cyber Priorities for Boards of Directors
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
 
The Security Challenge: What's Next?
The Security Challenge: What's Next?The Security Challenge: What's Next?
The Security Challenge: What's Next?
 
Maintain data privacy during software development
Maintain data privacy during software developmentMaintain data privacy during software development
Maintain data privacy during software development
 
2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity
 
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data AssetsFS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
 
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
 
Cyber security investments 2021
Cyber security investments 2021Cyber security investments 2021
Cyber security investments 2021
 
Proactive Risk Management and Compliance in a World of Digital Disruption
Proactive Risk Management and Compliance in a World of Digital DisruptionProactive Risk Management and Compliance in a World of Digital Disruption
Proactive Risk Management and Compliance in a World of Digital Disruption
 
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
 
Five principles for improving your cyber security
Five principles for improving your cyber securityFive principles for improving your cyber security
Five principles for improving your cyber security
 
Accenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber ResilienceAccenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber Resilience
 
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoftHow Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
 
Top cybersecurity trends to adapt in 2022
Top cybersecurity trends to adapt in 2022Top cybersecurity trends to adapt in 2022
Top cybersecurity trends to adapt in 2022
 
Cybersecurity through the Deloitte lens
Cybersecurity through the Deloitte lensCybersecurity through the Deloitte lens
Cybersecurity through the Deloitte lens
 
Protecting the brand—cyber-attacks and the reputation of the enterprise
Protecting the brand—cyber-attacks and the reputation of the enterprise Protecting the brand—cyber-attacks and the reputation of the enterprise
Protecting the brand—cyber-attacks and the reputation of the enterprise
 
Accenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber ResilienceAccenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber Resilience
 
Corporate Cybersecurity: A Serious Game
Corporate Cybersecurity: A Serious GameCorporate Cybersecurity: A Serious Game
Corporate Cybersecurity: A Serious Game
 
Securing the C-Suite: Cybersecurity Perspectives from the Boardroom
Securing the C-Suite: Cybersecurity Perspectives from the BoardroomSecuring the C-Suite: Cybersecurity Perspectives from the Boardroom
Securing the C-Suite: Cybersecurity Perspectives from the Boardroom
 
Cybersecurity Improvement eBook
Cybersecurity Improvement eBookCybersecurity Improvement eBook
Cybersecurity Improvement eBook
 

More from PECB

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of CybersecurityDORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of CybersecurityPECB
 
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernanceSecuring the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernancePECB
 
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...PECB
 
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...PECB
 
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyPECB
 
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...PECB
 
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital TransformationISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital TransformationPECB
 
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsManaging ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsPECB
 
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?PECB
 
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...PECB
 
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...PECB
 
Student Information Session University KTMC
Student Information Session University KTMC Student Information Session University KTMC
Student Information Session University KTMC PECB
 
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...PECB
 
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...PECB
 
Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA PECB
 
IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?PECB
 
Information Session University Egybyte.pptx
Information Session University Egybyte.pptxInformation Session University Egybyte.pptx
Information Session University Egybyte.pptxPECB
 
Student Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptxStudent Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptxPECB
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023PECB
 

More from PECB (20)

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of CybersecurityDORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
 
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernanceSecuring the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
 
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
 
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
 
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
 
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
 
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital TransformationISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
 
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsManaging ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
 
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
 
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
 
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
 
Student Information Session University KTMC
Student Information Session University KTMC Student Information Session University KTMC
Student Information Session University KTMC
 
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
 
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
 
Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA
 
IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?
 
Information Session University Egybyte.pptx
Information Session University Egybyte.pptxInformation Session University Egybyte.pptx
Information Session University Egybyte.pptx
 
Student Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptxStudent Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptx
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023
 

Recently uploaded

How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 

Recently uploaded (20)

How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 

What trends will 2018 bring for Business Continuity Professionals?

  • 1. What trends will 2018 likely bring for business continuity professionals?
  • 2. What trends will 2018 likely bring for business continuity professionals?Copyright © 2018 Deloitte Development LLC. All rights reserved 2 Introductions David Feeney, CPP, PMP Andrea LeStarge, MS Advisory /Consulting Energy/Utilities Private Sector GSOC Security Operations Technology Advisory / Consulting National Lab Federal & State Gov’t Fusion Centers Risk Assessments Training
  • 3. What trends will 2018 likely bring for business continuity professionals?Copyright © 2018 Deloitte Development LLC. All rights reserved 3 Baselining: Terminology 4 Looking deeper into likely trends: Who, what, how 5 Looking deeper into likely trends: New technologies 6 Looking deeper into likely trends: Cyber 7 Looking deeper into likely trends: Data breach 8-9 Looking deeper into likely trends: Internet of Things (IoT) 10-11 Looking deeper into likely trends: Physical 12 Impact on business continuity planning 13-15 Executive sponsorship, stakeholder buy-in 16 Top actions & questions for executives 17 Agenda
  • 4. What trends will 2018 likely bring for business continuity professionals?Copyright © 2018 Deloitte Development LLC. All rights reserved 4 Baselining: Terminology Vulnerabilities Threats Business Continuity Risk Management
  • 5. What trends will 2018 likely bring for business continuity professionals?Copyright © 2018 Deloitte Development LLC. All rights reserved 5 Looking deeper into likely trends: Who, what, how • Cyber criminals • Hacktivists (agenda driven) • Nation states • Insiders / partners • Competitors • Skilled individual hacker • Theft of intellectual property or strategic plans • Financial fraud • Reputation damage • Business disruption • Destruction of critical infrastructure • Threats to health & safety Who might attack? What are they after; What are the key business risks I need to mitigate? What tactics might they use? • Spear phishing, drive by download, etc. • Software or hardware vulnerabilities • Third-party compromise • Multi-channel attacks • Stolen credentials • … and others
  • 6. Presentation title [To edit, click View > Slide Master > Slide Master] Member firms and DTTL: Insert appropriate copyright [To edit, click View > Slide Master > Slide Master] 6 The digital revolution is driving business innovation and growth, yet also exposing users to new and emerging threats. Exciting technological innovations bring fantastic opportunities:  Driving down costs;  Increasing integration; and  Driving efficiencies. But opportunity brings risk: New avenues of exploitation mean businesses have a greater exposure to cyber attacks than ever before. Looking deeper into likely trends: New technology YOU The increasing prevalence of cyber attacks means that new techniques and tools are needed New Technology = New Threats
  • 7. What trends will 2018 likely bring for business continuity professionals?Copyright © 2018 Deloitte Development LLC. All rights reserved 7 Looking deeper into likely trends: Cyber “63% of confirmed data breaches leverage a weak, default, or stolen password.” “30% of phishing emails are opened. And ~12% of targets go on to click the link or attachment.” “Crypto-style ransomware grew 35 percent in 2015.” “59% of employees steal proprietary corporate data when they quit or are fired.” “99% of computer users are vulnerable to exploit kits (software vulnerabilities).” BITSIGHT. 2018. 28 Data breach statistics that will inspire you (to protect yourself). Retrieved from: https://www.bitsighttech.com/blog/data-breach- statistics
  • 8. What trends will 2018 likely bring for business continuity professionals?Copyright © 2018 Deloitte Development LLC. All rights reserved 8 Looking deeper into likely trends: Data breach “In 2016, there were 454 data breaches with nearly 12.7 million records exposed.” “In 93% of breaches, attackers take minutes or less to compromise systems.” “4 out of 5 victims of a breach don’t realize they’ve been attacked for a week or more.” “The forecast average loss for a breach of 1,000 records is between $52,000 and $87,000.” BITSIGHT. 2018. 28 Data breach statistics that will inspire you (to protect yourself). Retrieved from: https://www.bitsighttech.com/blog/data-breach- statistics
  • 9. What trends will 2018 likely bring for business continuity professionals?Copyright © 2018 Deloitte Development LLC. All rights reserved 9 Looking deeper into likely trends: Data breach (Cont’d) Ponemon Institute, Cybersponse, 2018. Retrieved from: https://cybersponse.com/dont- be-a-statistic-these-numbers-are-scary $400B+ 50% 90% 63%8% 11% 18% Healthcare Financial Services Educational Government 229 99.9% 27.5%increase in the data breaches in various industries from 2013 15% o f i n c i d e n t s s t i l l t a k e d a y s t o d i s c o v e r Average number of days attackers maintained presence after infiltration and before detection chance that at least one person will fall prey to a phishing campaign with just 10 emails recipients open emails and click on phishing links within the first hour of receiving them $154 $201 $217 Global Average 2014 2015 Per capita cost of data breach was highest in US in 2015 $217 of the exploited vulnerabilities were compromised more than a year after CVE was published Numbers denote industry wise breakup of 2014 data breach incidents is the annual cost to the global economy from cybercrime o f i n c i d e n t s i n v o l v e a b u s e o f p r i v i l e g e d a c c e s s 55%
  • 10. What trends will 2018 likely bring for business continuity professionals?Copyright © 2018 Deloitte Development LLC. All rights reserved 10 Looking deeper into likely trends: IoT “The number of connected devices is expected to grow from 15.4 billion in 2015 to 30.7 billion by 2020 and 75.4 billion by 2025.” “Global spending on IoT across all markets is expected to grow from $737 billion in 2016 to $1.29 trillion by 2020.” “In 2017, 60% of global manufacturers will use analytics data recorded from connected devices to analyze processes and identify optimization possibilities.” VisionCritical. 2018. 13 stunning stats on the Internet of Things. Retrieved from: https://www.visioncritical.com/internet-of-things- stats/
  • 11. What trends will 2018 likely bring for business continuity professionals?Copyright © 2018 Deloitte Development LLC. All rights reserved 11 Looking deeper into likely trends: IoT (Cont’d) Enable security by default through unique, hard to crack default user names and passwords. User names and passwords for IoT devices supplied by the manufacturer are often never changed by the user and are easily cracked. Botnets operate by continuously scanning for IoT devices that are protected by known factory default user names and passwords. Strong security controls should be something the industrial consumer has to deliberately disable rather than deliberately enable Build the device using the most recent operating system that is technically viable and economically feasible. Many IoT devices use Linux operating systems, but may not use the most up-to-date operating system. Using the current operating system ensures that known vulnerabilities will have been mitigated Use hardware that incorporates security features to strengthen the protection and integrity of the device. For example, use computer chips that integrate security at the transistor level, embedded in the processor, and provide encryption and anonymity Design with system and operational disruption in mind. Understanding what consequences could flow from the failure of a device will enable developers, manufacturers, and service providers to make more informed risk-based security decisions. Where feasible, developers should build IoT devices to fail safely and securely, so that the failure does not lead to greater systemic disruption. 1 2 3 4 US DHS. 2016. Strategic Principles for Securing the IoT. Retrieved from: https://www.dhs.gov/sites/default/files/publications/Strategic_Princi ples_for_Securing_the_Internet_of_Things-2016-1115-FINAL....pdf
  • 12. What trends will 2018 likely bring for business continuity professionals?Copyright © 2018 Deloitte Development LLC. All rights reserved 12 Looking deeper into likely trends: Physical It is important to understand the actual physical threats for specific organizations, and specifically for individual lines of business or support functions. Active Shooter Workplace Violence Improvised Explosive Devices Insider Threat Physical security is changing for many of our Nation’s critical infrastructure sectors and the need for assistance is growing at a tremendous rate. Companies are feeling the strain traditional risk mitigation measures place on human resources. Security officers that used to work 9-to-5 are being replaced with automated security measures that are 24/7 and provide enhanced security technologies. With these advanced technologies, company policies and procedures are in need of updating to account for the technology and mechanisms that are in place to protect against a wide variety of both internal and external threats. Strong BIA strategies help organizations have strong security management and corporate governance of the organization. With well planned and developed business continuity programs, liabilities, and costs can be reduced in numerous areas. Growing Need for Structural Safeguarding
  • 13. What trends will 2018 likely bring for business continuity professionals?Copyright © 2018 Deloitte Development LLC. All rights reserved 13 Convergence(s) • Renaissance of physical & cyber convergence • Integrate business continuity into all organizational functions (not just IT). • Business continuity practitioners should engage asset owners as a trusted advisor Impact on business continuity planning Physical Threats Cyber Threats
  • 14. What trends will 2018 likely bring for business continuity professionals?Copyright © 2018 Deloitte Development LLC. All rights reserved 14  Enterprise Security Risk Management (ESRM)  Business continuity (BC) across the enterprise  Asset owner is stakeholder  BC is trusted advisor Impact on business continuity planning (Cont’d)  ESRM Process  Identify asset  Identify risk  Prioritize risk  Plan for risk
  • 15. What trends will 2018 likely bring for business continuity professionals?Copyright © 2018 Deloitte Development LLC. All rights reserved 15  Focus on resilience vs impenetrability  Resilience: Having the ability to recover from and reduce the impact of cyber incidents  Resilience accepts to some degree that mitigation strategies are not impenetrable Impact on business continuity planning (Cont’d)
  • 16. What trends will 2018 likely bring for business continuity professionals?Copyright © 2018 Deloitte Development LLC. All rights reserved 16 Executive sponsorship, stakeholder buy-in Board & CEO Senior Management (COO, CAO, CRO) IT Leadership (CIO) IT Risk Leadership (CISO / CITRO) Tone at the top, establish senior management accountability and a Business Continuity (BC)-aware culture Define the organization’s risk appetite and be accountable for BC Program. Empower the extended leadership team. Lead (not delegate) in defining and executing the strategy to execute the BC Program. Establish an effective interaction model with cyber and physical branches. Define the right balance between threat-centric vs. compliance-centric programs. Be a business enabler, without shying away from the role of BC Program custodian. Line of Business Leaders Support integration of BC Program processes into business growth and development activities. Appoint line-of-business BC Program officers. Architecture & Engineering Infrastructure Application Development Security Operations IT DOMAINS Manage and report on risks Execute on strategy Other functions… GOVERNANCE Fully integrate BC into cyber and physical disciplines – design for Six Sigma, not quality control. Integrate current technologies and people processes to address the latest threats per the business impact analysis results.
  • 17. What trends will 2018 likely bring for business continuity professionals?Copyright © 2018 Deloitte Development LLC. All rights reserved 17 Top actions and questions for executives • Put a senior executive at the helm. He or she must be able to lead in a crisis, and also guide the program and enlist collaboration across diverse functions. • Map threats to the business assets that matter. Set direction, purpose, and risk appetite for the program. Establish priorities, and ensure funding and resourcing. • Drive early “wins.” Establish momentum by focusing on pilot initiatives that measurably impact business success. Use these to plant the seeds of long- term cultural change. • Accelerate behavior change. Create active learning scenarios that instill awareness of the impact of daily activity on cyber risk. Embed cyber risk management goals into evaluation of Top 100 executives. • Trust but verify. Conduct monthly or quarterly reviews about key risks and risk metrics, and address roadblocks. Key actions you should own Key questions you should ask • Are we focused on the right things? Often said, but hard to execute. Understand how value is created in your organization, where your critical assets are, how they are vulnerable to key threats. Practice defense-in-depth. • Do we have the right talent? Quality over quantity. There is not enough talent to do everything in-house, so take a strategic approach to sourcing decisions. • Are we proactive or reactive? Retrofitting for security is very expensive. Build it upfront in your management processes, applications and infrastructure. • Are we incentivizing openness and collaboration? Build strong relationships with partners, law enforcement, regulators, and vendors. Foster internal cooperation across groups and functions, and ensure that people aren’t hiding risks to protect themselves. • Are we adapting to change? Policy reviews, assessments, and rehearsals of crisis response processes must be regularized to establish a culture of perpetual adaptation to the threat and risk landscape.
  • 18. About Deloitte Deloitte refers to one or more of Deloitte Touche Tohmatsu Limited, a UK private company limited by guarantee (“DTTL”), its network of member firms, and their related entities. DTTL and each of its member firms are legally separate and independent entities. DTTL (also referred to as “Deloitte Global”) does not provide services to clients. In the United States, Deloitte refers to one or more of the US member firms of DTTL, their related entities that operate using the “Deloitte” name in the United States and their respective affiliates. Certain services may not be available to attest clients under the rules and regulations of public accounting. Please see www.deloitte.com/about to learn more about our global network of member firms. Copyright © 2018 Deloitte Development LLC. All rights reserved. 36 USC 220506 This presentation contains general information only and Deloitte is not, by means of this presentation, rendering accounting, business, financial, investment, legal, tax, or other professional advice or services. This presentation is not a substitute for such professional advice or services, nor should it be used as a basis for any decision or action that may affect your business. Before making any decision or taking any action that may affect your business, you should consult a qualified professional advisor. Deloitte shall not be responsible for any loss sustained by any person who relies on this presentation.
  • 19. What trends will 2018 likely bring for business continuity professionals?Copyright © 2018 Deloitte Development LLC. All rights reserved 19 ISO 22301 Training Courses ISO 22301 Introduction 1 Day Course ISO 22301 Foundation 2 Days Course ISO 22301 Lead Implementer 5 Days Course ISO 22301 Lead Auditor 5 Days Course Exam and certification fees are included in the training price. https://pecb.com/iso-22301-training-courses www.pecb.com/events
  • 20. What trends will 2018 likely bring for business continuity professionals?Copyright © 2018 Deloitte Development LLC. All rights reserved 20 THANK YOU ? www.deloitte.com https://www.linkedin.com/in/davidfeeney/ https://www.linkedin.com/in/andrea-lestarge- 1b64a7a9/

Editor's Notes

  1. {Dave will go first; Andrea second.} Hello everyone. My name is Andrea LeStarge. I am a Manager at Deloitte and I have been with the Firm for almost three years. Within the Firm, my specialty is to advise clients on cyber and physical risk components (and that encompasses threats, vulnerabilities, impacts, mitigation measures). I work primarily in the Energy sector. My secondary industry is the public sector where I advise clients on strategic and operational plans aimed at responding to significant cyber events. Prior to joining the Firm, I worked in the Federal and State landscape. I taught physical and cyber risk, how to conduct assessments, how to analyze and create / disseminate intelligence products, and other homeland security topics like suspicious activity reporting. I specifically entered into this landscape as an intelligence analyst and eventually grew to managing a statewide fusion center. Fusion centers were created in every state after the terrorist attacks on the world trade center in September 11, 2001. Fusion Centers are basically security operational centers that house several professionals from various Federal, State, local govts and critical infrastructure sectors – all focused on sharing information and investigating leads and possibly cases in an effort to protect the homeland. I’m excited to be with you for the next hour and look forward to your questions and comments.
  2. {Dave} Today’s presentation is titled “Trends;” specifically we’re concentrating on some of the threats that are trends within BC. Everything we’ll be talking about is, in our opinion, an emerging or persistent trend to BC. With that said, today’s topics will include (review) *Please note, throughout this presentation, we do refer to statistics centered on North America, and specifically the United States; we don’t anticipate that these numbers are far-off from other country’s experiences.
  3. {Andrea} So to begin, let’s level set on our terminology. As mentioned in my short recap of my bio, I’m really big on the methodology of analyzing risk. According to the US Department of Homeland Security – and let it be known that many public and private agencies also use this methodology – in order to truly calculate risk, one must analyze threats, vulnerabilities and consequences (or impacts). There is a laundry list of possible scenarios of concern. Threats can be either manmade, cyber-related or weather induced (i.e. natural disasters). Threats can be either purposeful or accidental. What threats we should really concentrate on are those that would be successful because of known vulnerabilities. Vulnerabilities are weaknesses in structure, processes or technologies. When a vulnerability enhances the adversary’s capability of deploying his/her intended threat, the likelihood of the threat is enhanced. Vulnerabilities are also inter-related with consequences or impact. One can prioritize the existing vulnerabilities with thinking about the consequences if the threat was successful – would it harm people? Would business processes be shut-down? Would there be a psychological effect? Consequences are often the hardest to calculate, but are often the element within the risk formula that keeps us up at night. Finally, there is also a benefit of looking through the lens as the bad guy. Psychologically speaking, adversaries often want the “biggest bang for the buck.” S/he is not going to deploy a threat that will not be successful because there are no weaknesses. Likewise, s/he is not going to deploy a threat that will not result in a large impact – in other words, the resulting impact better be worth the risk to the adversary of getting caught, arrested, or even harmed or killed. This all relates to the intent of the adversary. Overall, the intent of the adversary is correlated with the consequences. Now, I realize that the topic of today’s presentation is “2018 trends in Business Continuity.” Interestingly, the relationship between Risk Management and Business Continuity is under scrutiny so in actuality, this terminology slide / topic is perhaps the baselining trend of BC in 2018. The process of conducting Business Impact Analyses (or BIA) is not the same as Risk Management, but what we just discussed is important because you would not want to conduct a BIA on an unlikely Threat because of non-existing or less-prioritized Vulnerabilities or on threats that would result in little impact and therefore appeal to the adversary. In sum, though the words of “Business Continuity” and “Risk Management” are not synonymous, conducting a BIA is dependent upon a successful and appropriate risk assessment. With this said, BIAs should focus on RISKS that are RELEVANT.
  4. {Andrea} This next slide helps us dive deeper into the “who, what and how” of Adversaries and we’ve specifically concentrated on the cyber (versus physical) landscape. In the security community, there’s been talk for years about the need to focus more on “IT risk”, or to “align security with the business,” or to “measure the value of security.” Some organizations have done very well with this, but on the whole there is still a lot of confusion about how to make that happen – and we believe this is primarily because the ownership for cyber risk has remained primarily in the Tech sphere. While executives and – increasingly – Board members are very concerned to know what’s going on, the programs themselves have continued to be delegated to technology leaders. To manage IT security from a cyber RISK perspective, though, means that it has to be taken on as a business problem. In other words, BC must become an executive-driven program. Don’t take this as Dave and I stating executives must suddenly become cyber security experts. Instead, we suggest that executives need to lead the discussion about: Who might be motivated to attack us? – Intent of Adversary from the last slide What could REALLY hurt the business? – Prioritizing consequences = CIA Model. Confidentiality, Integrity and Accountability How much risk are we really willing to accept? – and give directives that shape the program *This is crucial – there has to be SOME acceptance of risk. Once these questions are answered, then the entire organization can rely on technologists to figure out what kinds of tactics adversaries might use, and how to guard against or monitor for those indicators. Also in lines with the Business Continuity program, the program itself needs to utilize several different disciplines. Different types of business risk will likely require weighting or prioritizing these areas differently. For some types you may rely more heavily on traditional or modernized security controls. On the other hand, there may be highly risk-sensitive parts of the business that will require extra investment in monitoring infrastructure, or assignment of threat intelligence teams to analyze indicators of compromise. Similarly, other parts of the business may require strong “resilience” components – these would be well-defined and rehearsed incident response plans, redundancy infrastructure and disaster recovery capabilities – or you may decide that cyber insurance is an important part of your recovery plan.
  5. {Andrea} Up to this point, we’ve stated the importance of analyzing threats, vulnerabilities and consequences. And we’ve also acknowledged the benefit of asking ourselves “who would harm us, what would they do to harm us and how would they harm us?” Honing in on the risk formula’s element of THREAT, we acknowledge that a persistent trend in business continuity for 2018 is the new technologies that we all face. What are those new technologies? Well, we’ve included some examples in the yellow dots – using cloud services or allowing employees to bring /use their own mobile device. Granted these innovations bring fantastic opportunities for us as business owners/operators – new technologies drive down costs, increase integration and drive efficiencies. But, we must acknowledge the risk that new technologies also bring. Technology could be the deployment mechanism of a threat actor and/or the vulnerabilities that Threat Actors could take advantage of to bring about negative impacts to our organizations. In other words, new technologies do bring new avenues of exploitation and as a result, organizations must acknowledge their potential increased exposure to cyber-attacks. So let’s fully transition to the threat of cyber – and Dave, I’ll hand the microphone over to you …
  6. {DAVE} Let’s take a look at some of the real-world cyber events… Data Breach Ransomware Phishing Data Loss/Insider Threat Vulnerability Mgmt. (“the basics”) Data loss / Insider Threat Highlights are about Threats and Vulnerabilities within the cyber landscape. It’s interesting that there is so much good attention paid to cyber risk mitigation efforts, but the lessons learned when a cyber incident occurs is often a very basic action could have prevented the attack from occurring in the first place. So, let’s not loose track of basics = spend the time on training and
  7. {Dave} We’ve heard it said, there are two types of organizations - those that have been breached and those that have been breached and don’t know it. Read stats.
  8. {Dave} It is obvious the need for Cyber Risk Services is growing. Attacks and breaches are more and more common and the methods of attack are ever-changing. Some notable statistics include 229 as the average number of days before an infiltration/breach is detected. And that the Healthcare industry has the most breaches by far at 63% of all breach incidents. SOURCE: Ponemon Institute, Cybersponse, 2018 https://cybersponse.com/dont-be-a-statistic-these-numbers-are-scary
  9. {Dave} Manufacturers of widgets not cyber experts.
  10. {Dave} Two sided- perspective: Manufacturer = Should ensure this; Purchaser = Should verify that these are in place and if not, that’s an accepted risk
  11. {Andrea} Solution! Training. Example = https://www.asisonline.org/About-ASIS/Who-We-Are/Whats-New/SiteAssets/Pages/Soft-Target-and-Active-Shooter-Resources/Appendix%20D.pdf
  12. {Andrea} In this slide we talk about the convergence of trends. First, we have the physical and cyber convergence. In the previous slides, we’ve separated cyber and physical trends, but in this slide we acknowledge the convergence of these trends. A great example is NERC’s 3 out of 14 Critical Infrastructure Protection Requirements. *Transition to Dave* {Dave talks about the second and the third examples of convergence}
  13. {Dave}
  14. {Andrea} BC professionals need to concentrate on the ENTIRE spectrum of planning: Resilience is after-boom. Resilience is a measure of “it happened – now what? Are you totally crippled or can you minimize impact and start the clock again, and soon?” Impenetrability is before-boom. Our PPT today acknowledges several trends where the threat is going to happen, it’s a matter of when. So, place your BC efforts into planning for emergency response AND impacts to business process(es). Many want to keep these two elements separate, but we can acknowledge that many words within this word bubble are synonymous with BC programs. ///////////////////// **Dave, I know it’s traumatic, but you had an experience in this topic, do you mind sharing with the team here? Incidents are becoming more critical – be quick and efficient in your response in order to best reduce the impact of the incident.
  15. {Dave} *Six Sigma at many organizations simply means a measure of quality that strives for near perfection
  16. {Andrea} Read slide