SlideShare a Scribd company logo
SentinelLooking after people, businesses & reputations in a crisis
Managing a Breach: The
communications piece.
Richard Stephenson CEO - YUDU Sentinel
LDSC 2018
1
• Risks facing Businesses
• Cyber Attacks - Frequency and Financial cost
• Lessons from Cyber Attacks
• Communication Plans
• The App Advantage
• Summary
What I will cover today
!2
The Financial Cost and Frequency of
Cyber Attacks is worsening
• Allianz Risk Barometer 2017
• In 2017 Business Interruption was the top Insurance
Risk of companies
• Non Premises Damage (Cyber and Terrorist attacks)
becoming a much bigger issue

!3
• 2017 Cost of Cybercrime study - Poneman Institute
• Annualised average cost of cyber security $11.7m /
business (Accenture $2.4m)
• Increase cost year on year 22.7%
• Average no of breaches per year 130
• Increase in the average number of breaches 27.4%
Cyber Attacks: What are the main
causes and cost - Allianz
Main causes
0% 20% 40% 60% 80%
Hacker Attack
Data/Security Breach
Malware/Virus
Employee Error
Main losses
0% 17.5% 35% 52.5% 70%
Business Interruption
Reputational Loss
Liability Claims
Reinstatement of data/restoration
Source: Allianz Global Corporate & Speciality: 2017 : 446 respondents
!4
• Breaches often reported by outsiders
• Breaches often occur over a long period of time
Cyber attacks are different and
more complicated
Source: Mandiant M-Trends 2017 report
External Notification
Internal Notification
Days to detect
!5
(Accenture = 50 days)
Cyber by Sector
Source: Mandiant M-Trends 2017 report
Sector Percentage of total Cyber Attacks
Financial 15%
Retail & Hospitality 15%
Healthcare 12%
High Tech 12%
Professional & Business Services 10%
!6
Lessons - We are all at risk
Tuesday, 27th June 2017
"From my experience, [DLA Piper] is an
excellent firm with reasonable due
diligence procedures. This tells me...this
could happen to anyone.” - Larry Poneman
(Poneman Institute)
• One day to restore Phones
• Six days to restore email
• Unspecified file and data restoration date
!7
DLA Piper Attack
Lessons - Communications Failure
• Attack took place on 23rd Jan 2015. Attackers hidden for months, identified 7
weaknesses
• External suppliers entry used: Refrigeration contractor, remote camera
supplier
• Fax machines used as they could not send emails: Communication crippled
• Months before reconnected to the internet
• Financial cost £4.5m in year, followed by over £2.7m/year for new protection
• Costs in efficiency have been real due to changes in operating processes
!8
March 2016 :
• Massive data breach reported of 2.6 Terabytes, 11.6 million
documents.
• Access was probably over years
March 2018 :
“Reputational deterioration, the media campaign, the
financial consequences and irregular actions by some
Panamanian authorities have caused irreparable damage,
resulting in the total ceasing of public operations at the end
of this month,” - Mossack Fonseca statement
Lessons - Reputational Cost
2 Years
!9
Comms Plans are the starting point:
Flex and adaptation is the reality
Target When What Frequency Method
IT Team Immediate Availability/Status Until fixed inApp, SMS
Staff Immediate Instructions 3 hrs inApp, SMS
C level Immediate Status / Actions ? inApp, SMS
Shareholders ? Status / Impact ? Docs, email
Clients ? ? ? Docs, email
Social Media Fast True story Regular Direct
Press Considered Open Docs, Conf
Suppliers ? ? ? SMS, email
Support services ? ? ? SMS, email
Authorities 72 hrs Data Breach etc As required Docs, email
Crisis PR Immediate Status Long term Web Conf
• Command and control and authority must be established immediately
• Teams need to be multi-disciplinary. It is a business issue not just IT
!10
• Follow the plan
• Speak with one voice
• Reassure stakeholders
• Answer questions honestly
• Continuously communicate with all stakeholders but
tailor communication detail to suit the audience
Some main lessons from MIT
Insights - Incident Management
Source: MIT Technology Review Insights: 2016
!11
Why use Smartphones? - We all have them
!12
• Controlled & Practiced Environment
• Independent Comms Channel
• Contacts always updated and secure
• Offline Library BC / DR plans available
• In-App messaging and notification
• Security
The App Advantage in Incident
Communication
!13
Why use Smartphones? - We all have them
!14
People are at the heart of
mitigating an attack
!15
2 way polls - Aggregated responses
• Yes/No answers give immediate picture to incident controllers
• Focusses resources in the exceptions and non responders
!16
Always ready independent multiple
communication channel:
In-App, SMS, Email, Voice
!17
Contacts: Always updated
- Incident ready
• Secure Virtual Control Centre is update with contact data on
staff and external contacts via API or weekly CSV
• App users only see contacts in their groups and
automatically updated. GDPR compliant
!18
Offline Library - Plan in your hand
when the incident strikes
BC Plans, Crisis comms plans, Incident Playbooks,
Crisis Checklists
!19
Groups - Targeted Messaging and
Document Management
Communicate and give access to documents to groups
formed from internal AND hybrid internal/external
response teams
!20
Presentation Summary
• Communication Plans must exist for all incident
types
• The need to adapt is a certainty
• Communication channels need to be independent &
ready to go
• Technology must be robust and simple to use
• Different groups need different communications
• Apps are ideal vehicles for communications
!21
Questions
SentinelLooking after people, businesses & reputations in a crisis
www.yudu.com/sentinel
!22
Richard Stephenson rs@yudu.com

More Related Content

What's hot

Community IT Webinar: Working with an Outsourced IT Manager
Community IT Webinar: Working with an Outsourced IT ManagerCommunity IT Webinar: Working with an Outsourced IT Manager
Community IT Webinar: Working with an Outsourced IT Manager
Community IT Innovators
 
Breached! App Attacks, Application Protection and Incident Response
Breached! App Attacks, Application Protection and Incident ResponseBreached! App Attacks, Application Protection and Incident Response
Breached! App Attacks, Application Protection and Incident Response
Resilient Systems
 
Smarter Application and Data Security in PeopleSoft
Smarter Application and Data Security in PeopleSoftSmarter Application and Data Security in PeopleSoft
Smarter Application and Data Security in PeopleSoft
Smart ERP Solutions, Inc.
 
Impacts cloud remote_workforce
Impacts cloud remote_workforceImpacts cloud remote_workforce
Impacts cloud remote_workforce
Rodrigo Varas
 
Building Human Intelligence – Pun Intended
Building Human Intelligence – Pun IntendedBuilding Human Intelligence – Pun Intended
Building Human Intelligence – Pun Intended
EnergySec
 
Not-For-Profit Cybersecurity and Privacy Disrupters During COVID-19
Not-For-Profit Cybersecurity and Privacy Disrupters During COVID-19Not-For-Profit Cybersecurity and Privacy Disrupters During COVID-19
Not-For-Profit Cybersecurity and Privacy Disrupters During COVID-19
Citrin Cooperman
 
What CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber SecurityWhat CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber Security
Karyl Scott
 
A systems engineering approach to cannabis product development.v1.03 21-19
A systems engineering approach to cannabis product development.v1.03 21-19A systems engineering approach to cannabis product development.v1.03 21-19
A systems engineering approach to cannabis product development.v1.03 21-19
Jacklyn R. Green
 
Ponemon Report: Cyber Security Incident Response: Are we as prepared as we th...
Ponemon Report: Cyber Security Incident Response: Are we as prepared as we th...Ponemon Report: Cyber Security Incident Response: Are we as prepared as we th...
Ponemon Report: Cyber Security Incident Response: Are we as prepared as we th...
Lancope, Inc.
 
Conférence CISCO ACSS 2018
Conférence CISCO ACSS 2018Conférence CISCO ACSS 2018
Conférence CISCO ACSS 2018
African Cyber Security Summit
 
C-Suite Snacks Webinar Series : Under Attack - Preparing Your Company in the ...
C-Suite Snacks Webinar Series : Under Attack - Preparing Your Company in the ...C-Suite Snacks Webinar Series : Under Attack - Preparing Your Company in the ...
C-Suite Snacks Webinar Series : Under Attack - Preparing Your Company in the ...
Citrin Cooperman
 
Security and Wearables: Success starts with security
Security and Wearables: Success starts with securitySecurity and Wearables: Success starts with security
Security and Wearables: Success starts with security
Stephen Cobb
 
Infosecurity Europe - Infographic
Infosecurity Europe - InfographicInfosecurity Europe - Infographic
Infosecurity Europe - Infographic
Synopsys Software Integrity Group
 
CompTIA 11th Annual Information Security Trends
CompTIA 11th Annual Information Security TrendsCompTIA 11th Annual Information Security Trends
CompTIA 11th Annual Information Security Trends
CompTIA
 
A comprehensive program for preventing and detecting computer viruses is needed
A comprehensive program for preventing and detecting computer viruses is neededA comprehensive program for preventing and detecting computer viruses is needed
A comprehensive program for preventing and detecting computer viruses is neededUltraUploader
 
Symantec Intelligence Report - October 2014
Symantec Intelligence Report - October 2014Symantec Intelligence Report - October 2014
Symantec Intelligence Report - October 2014
Symantec
 
CRI Cyber Board Briefing
CRI Cyber Board Briefing CRI Cyber Board Briefing
CRI Cyber Board Briefing
OCTF Industry Engagement
 
New Synopsys research uncovers security's biggest challenges
New Synopsys research uncovers security's biggest challengesNew Synopsys research uncovers security's biggest challenges
New Synopsys research uncovers security's biggest challenges
Synopsys Software Integrity Group
 

What's hot (20)

Community IT Webinar: Working with an Outsourced IT Manager
Community IT Webinar: Working with an Outsourced IT ManagerCommunity IT Webinar: Working with an Outsourced IT Manager
Community IT Webinar: Working with an Outsourced IT Manager
 
Breached! App Attacks, Application Protection and Incident Response
Breached! App Attacks, Application Protection and Incident ResponseBreached! App Attacks, Application Protection and Incident Response
Breached! App Attacks, Application Protection and Incident Response
 
Smarter Application and Data Security in PeopleSoft
Smarter Application and Data Security in PeopleSoftSmarter Application and Data Security in PeopleSoft
Smarter Application and Data Security in PeopleSoft
 
Impacts cloud remote_workforce
Impacts cloud remote_workforceImpacts cloud remote_workforce
Impacts cloud remote_workforce
 
Building Human Intelligence – Pun Intended
Building Human Intelligence – Pun IntendedBuilding Human Intelligence – Pun Intended
Building Human Intelligence – Pun Intended
 
Not-For-Profit Cybersecurity and Privacy Disrupters During COVID-19
Not-For-Profit Cybersecurity and Privacy Disrupters During COVID-19Not-For-Profit Cybersecurity and Privacy Disrupters During COVID-19
Not-For-Profit Cybersecurity and Privacy Disrupters During COVID-19
 
Isys20261 lecture 04
Isys20261 lecture 04Isys20261 lecture 04
Isys20261 lecture 04
 
What CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber SecurityWhat CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber Security
 
A systems engineering approach to cannabis product development.v1.03 21-19
A systems engineering approach to cannabis product development.v1.03 21-19A systems engineering approach to cannabis product development.v1.03 21-19
A systems engineering approach to cannabis product development.v1.03 21-19
 
Ponemon Report: Cyber Security Incident Response: Are we as prepared as we th...
Ponemon Report: Cyber Security Incident Response: Are we as prepared as we th...Ponemon Report: Cyber Security Incident Response: Are we as prepared as we th...
Ponemon Report: Cyber Security Incident Response: Are we as prepared as we th...
 
Conférence CISCO ACSS 2018
Conférence CISCO ACSS 2018Conférence CISCO ACSS 2018
Conférence CISCO ACSS 2018
 
Power station monitoring and cyber security
Power station monitoring and cyber securityPower station monitoring and cyber security
Power station monitoring and cyber security
 
C-Suite Snacks Webinar Series : Under Attack - Preparing Your Company in the ...
C-Suite Snacks Webinar Series : Under Attack - Preparing Your Company in the ...C-Suite Snacks Webinar Series : Under Attack - Preparing Your Company in the ...
C-Suite Snacks Webinar Series : Under Attack - Preparing Your Company in the ...
 
Security and Wearables: Success starts with security
Security and Wearables: Success starts with securitySecurity and Wearables: Success starts with security
Security and Wearables: Success starts with security
 
Infosecurity Europe - Infographic
Infosecurity Europe - InfographicInfosecurity Europe - Infographic
Infosecurity Europe - Infographic
 
CompTIA 11th Annual Information Security Trends
CompTIA 11th Annual Information Security TrendsCompTIA 11th Annual Information Security Trends
CompTIA 11th Annual Information Security Trends
 
A comprehensive program for preventing and detecting computer viruses is needed
A comprehensive program for preventing and detecting computer viruses is neededA comprehensive program for preventing and detecting computer viruses is needed
A comprehensive program for preventing and detecting computer viruses is needed
 
Symantec Intelligence Report - October 2014
Symantec Intelligence Report - October 2014Symantec Intelligence Report - October 2014
Symantec Intelligence Report - October 2014
 
CRI Cyber Board Briefing
CRI Cyber Board Briefing CRI Cyber Board Briefing
CRI Cyber Board Briefing
 
New Synopsys research uncovers security's biggest challenges
New Synopsys research uncovers security's biggest challengesNew Synopsys research uncovers security's biggest challenges
New Synopsys research uncovers security's biggest challenges
 

Similar to YUDU - Managing a Breach (LDSC Cyber Themed Evening)

MASC RMA Cyber presentation by Belton Zeigler
MASC RMA Cyber presentation by Belton ZeiglerMASC RMA Cyber presentation by Belton Zeigler
MASC RMA Cyber presentation by Belton Zeigler
Womble Bond Dickinson (US) LLP
 
Ibm ofa ottawa_analytics_in_gov _campbell_robertson
Ibm  ofa ottawa_analytics_in_gov _campbell_robertsonIbm  ofa ottawa_analytics_in_gov _campbell_robertson
Ibm ofa ottawa_analytics_in_gov _campbell_robertson
dawnrk
 
Ibm ofa ottawa_analytics_in_gov _campbell_robertson
Ibm  ofa ottawa_analytics_in_gov _campbell_robertsonIbm  ofa ottawa_analytics_in_gov _campbell_robertson
Ibm ofa ottawa_analytics_in_gov _campbell_robertson
dawnrk
 
Ibm ofa ottawa_analytics_in_gov _campbell_robertson
Ibm  ofa ottawa_analytics_in_gov _campbell_robertsonIbm  ofa ottawa_analytics_in_gov _campbell_robertson
Ibm ofa ottawa_analytics_in_gov _campbell_robertson
dawnrk
 
SoCal HIMSS Privacy Security Webinar
SoCal HIMSS Privacy Security WebinarSoCal HIMSS Privacy Security Webinar
SoCal HIMSS Privacy Security Webinar
Marty Miller
 
A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...
Judith Beckhard Cardoso
 
Remote Work Productivity
Remote Work ProductivityRemote Work Productivity
Remote Work Productivity
Mihajlo Prerad
 
5 things digital media companies need to do now
5 things digital media companies need to do now5 things digital media companies need to do now
5 things digital media companies need to do now
Grant Thornton LLP
 
Cyber Response and Planning for SMBs
Cyber Response and Planning for SMBsCyber Response and Planning for SMBs
Cyber Response and Planning for SMBs
Mary Brophy
 
The State of Data Security
The State of Data SecurityThe State of Data Security
The State of Data Security
Razor Technology
 
La Seguridad en la Economía de las Aplicaciones
La Seguridad en la Economía de las AplicacionesLa Seguridad en la Economía de las Aplicaciones
La Seguridad en la Economía de las Aplicaciones
Asociación de Marketing Bancario Argentino
 
2015 Global Threat Intelligence Report
2015 Global Threat Intelligence Report2015 Global Threat Intelligence Report
2015 Global Threat Intelligence Report
DImension Data
 
PROTECTING YOUR BUSINESS AND CLIENT INFORMATION IN A DIGITAL WORLD - Mitch Ta...
PROTECTING YOUR BUSINESS AND CLIENT INFORMATION IN A DIGITAL WORLD - Mitch Ta...PROTECTING YOUR BUSINESS AND CLIENT INFORMATION IN A DIGITAL WORLD - Mitch Ta...
PROTECTING YOUR BUSINESS AND CLIENT INFORMATION IN A DIGITAL WORLD - Mitch Ta...
IFG Network marcus evans
 
The 2018 Threatscape
The 2018 ThreatscapeThe 2018 Threatscape
The 2018 Threatscape
Peter Wood
 
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Cristian Garcia G.
 
The 1% Who Can Take Down your Organization
The 1% Who Can Take Down your OrganizationThe 1% Who Can Take Down your Organization
The 1% Who Can Take Down your Organization
CloudLock
 
TIC-TOC: Disrupt the Threat Management Conversation with Dominique Singer and...
TIC-TOC: Disrupt the Threat Management Conversation with Dominique Singer and...TIC-TOC: Disrupt the Threat Management Conversation with Dominique Singer and...
TIC-TOC: Disrupt the Threat Management Conversation with Dominique Singer and...
SaraPia5
 
Unlocking Value of Data in a Digital Age
Unlocking Value of Data in a Digital AgeUnlocking Value of Data in a Digital Age
Unlocking Value of Data in a Digital Age
Ruud Brink
 

Similar to YUDU - Managing a Breach (LDSC Cyber Themed Evening) (20)

MASC RMA Cyber presentation by Belton Zeigler
MASC RMA Cyber presentation by Belton ZeiglerMASC RMA Cyber presentation by Belton Zeigler
MASC RMA Cyber presentation by Belton Zeigler
 
Ibm ofa ottawa_analytics_in_gov _campbell_robertson
Ibm  ofa ottawa_analytics_in_gov _campbell_robertsonIbm  ofa ottawa_analytics_in_gov _campbell_robertson
Ibm ofa ottawa_analytics_in_gov _campbell_robertson
 
Ibm ofa ottawa_analytics_in_gov _campbell_robertson
Ibm  ofa ottawa_analytics_in_gov _campbell_robertsonIbm  ofa ottawa_analytics_in_gov _campbell_robertson
Ibm ofa ottawa_analytics_in_gov _campbell_robertson
 
Ibm ofa ottawa_analytics_in_gov _campbell_robertson
Ibm  ofa ottawa_analytics_in_gov _campbell_robertsonIbm  ofa ottawa_analytics_in_gov _campbell_robertson
Ibm ofa ottawa_analytics_in_gov _campbell_robertson
 
SoCal HIMSS Privacy Security Webinar
SoCal HIMSS Privacy Security WebinarSoCal HIMSS Privacy Security Webinar
SoCal HIMSS Privacy Security Webinar
 
A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...
 
ISACA ISSA Presentation
ISACA ISSA PresentationISACA ISSA Presentation
ISACA ISSA Presentation
 
Remote Work Productivity
Remote Work ProductivityRemote Work Productivity
Remote Work Productivity
 
5 things digital media companies need to do now
5 things digital media companies need to do now5 things digital media companies need to do now
5 things digital media companies need to do now
 
Cyber Response and Planning for SMBs
Cyber Response and Planning for SMBsCyber Response and Planning for SMBs
Cyber Response and Planning for SMBs
 
The State of Data Security
The State of Data SecurityThe State of Data Security
The State of Data Security
 
La Seguridad en la Economía de las Aplicaciones
La Seguridad en la Economía de las AplicacionesLa Seguridad en la Economía de las Aplicaciones
La Seguridad en la Economía de las Aplicaciones
 
2015 Global Threat Intelligence Report
2015 Global Threat Intelligence Report2015 Global Threat Intelligence Report
2015 Global Threat Intelligence Report
 
PROTECTING YOUR BUSINESS AND CLIENT INFORMATION IN A DIGITAL WORLD - Mitch Ta...
PROTECTING YOUR BUSINESS AND CLIENT INFORMATION IN A DIGITAL WORLD - Mitch Ta...PROTECTING YOUR BUSINESS AND CLIENT INFORMATION IN A DIGITAL WORLD - Mitch Ta...
PROTECTING YOUR BUSINESS AND CLIENT INFORMATION IN A DIGITAL WORLD - Mitch Ta...
 
The 2018 Threatscape
The 2018 ThreatscapeThe 2018 Threatscape
The 2018 Threatscape
 
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
 
The 1% Who Can Take Down your Organization
The 1% Who Can Take Down your OrganizationThe 1% Who Can Take Down your Organization
The 1% Who Can Take Down your Organization
 
PA SB DC Cyber Brief
PA SB DC Cyber Brief PA SB DC Cyber Brief
PA SB DC Cyber Brief
 
TIC-TOC: Disrupt the Threat Management Conversation with Dominique Singer and...
TIC-TOC: Disrupt the Threat Management Conversation with Dominique Singer and...TIC-TOC: Disrupt the Threat Management Conversation with Dominique Singer and...
TIC-TOC: Disrupt the Threat Management Conversation with Dominique Singer and...
 
Unlocking Value of Data in a Digital Age
Unlocking Value of Data in a Digital AgeUnlocking Value of Data in a Digital Age
Unlocking Value of Data in a Digital Age
 

Recently uploaded

Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdfBonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
khadija278284
 
Media as a Mind Controlling Strategy In Old and Modern Era
Media as a Mind Controlling Strategy In Old and Modern EraMedia as a Mind Controlling Strategy In Old and Modern Era
Media as a Mind Controlling Strategy In Old and Modern Era
faizulhassanfaiz1670
 
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptxsomanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
Howard Spence
 
María Carolina Martínez - eCommerce Day Colombia 2024
María Carolina Martínez - eCommerce Day Colombia 2024María Carolina Martínez - eCommerce Day Colombia 2024
María Carolina Martínez - eCommerce Day Colombia 2024
eCommerce Institute
 
International Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software TestingInternational Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software Testing
Sebastiano Panichella
 
Obesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditionsObesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditions
Faculty of Medicine And Health Sciences
 
Getting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control TowerGetting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control Tower
Vladimir Samoylov
 
Acorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutesAcorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutes
IP ServerOne
 
Gregory Harris' Civics Presentation.pptx
Gregory Harris' Civics Presentation.pptxGregory Harris' Civics Presentation.pptx
Gregory Harris' Civics Presentation.pptx
gharris9
 
Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...
Sebastiano Panichella
 
Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024
Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024
Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024
Dutch Power
 
AWANG ANIQKMALBIN AWANG TAJUDIN B22080004 ASSIGNMENT 2 MPU3193 PHILOSOPHY AND...
AWANG ANIQKMALBIN AWANG TAJUDIN B22080004 ASSIGNMENT 2 MPU3193 PHILOSOPHY AND...AWANG ANIQKMALBIN AWANG TAJUDIN B22080004 ASSIGNMENT 2 MPU3193 PHILOSOPHY AND...
AWANG ANIQKMALBIN AWANG TAJUDIN B22080004 ASSIGNMENT 2 MPU3193 PHILOSOPHY AND...
AwangAniqkmals
 
Tom tresser burning issue.pptx My Burning issue
Tom tresser burning issue.pptx My Burning issueTom tresser burning issue.pptx My Burning issue
Tom tresser burning issue.pptx My Burning issue
amekonnen
 
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
0x01 - Newton's Third Law:  Static vs. Dynamic Abusers0x01 - Newton's Third Law:  Static vs. Dynamic Abusers
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
OWASP Beja
 
Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024
Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024
Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024
Dutch Power
 
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
OECD Directorate for Financial and Enterprise Affairs
 
Bitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXOBitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXO
Matjaž Lipuš
 
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdfSupercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Access Innovations, Inc.
 
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Sebastiano Panichella
 
Burning Issue Presentation By Kenmaryon.pdf
Burning Issue Presentation By Kenmaryon.pdfBurning Issue Presentation By Kenmaryon.pdf
Burning Issue Presentation By Kenmaryon.pdf
kkirkland2
 

Recently uploaded (20)

Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdfBonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
 
Media as a Mind Controlling Strategy In Old and Modern Era
Media as a Mind Controlling Strategy In Old and Modern EraMedia as a Mind Controlling Strategy In Old and Modern Era
Media as a Mind Controlling Strategy In Old and Modern Era
 
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptxsomanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
 
María Carolina Martínez - eCommerce Day Colombia 2024
María Carolina Martínez - eCommerce Day Colombia 2024María Carolina Martínez - eCommerce Day Colombia 2024
María Carolina Martínez - eCommerce Day Colombia 2024
 
International Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software TestingInternational Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software Testing
 
Obesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditionsObesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditions
 
Getting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control TowerGetting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control Tower
 
Acorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutesAcorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutes
 
Gregory Harris' Civics Presentation.pptx
Gregory Harris' Civics Presentation.pptxGregory Harris' Civics Presentation.pptx
Gregory Harris' Civics Presentation.pptx
 
Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...
 
Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024
Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024
Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024
 
AWANG ANIQKMALBIN AWANG TAJUDIN B22080004 ASSIGNMENT 2 MPU3193 PHILOSOPHY AND...
AWANG ANIQKMALBIN AWANG TAJUDIN B22080004 ASSIGNMENT 2 MPU3193 PHILOSOPHY AND...AWANG ANIQKMALBIN AWANG TAJUDIN B22080004 ASSIGNMENT 2 MPU3193 PHILOSOPHY AND...
AWANG ANIQKMALBIN AWANG TAJUDIN B22080004 ASSIGNMENT 2 MPU3193 PHILOSOPHY AND...
 
Tom tresser burning issue.pptx My Burning issue
Tom tresser burning issue.pptx My Burning issueTom tresser burning issue.pptx My Burning issue
Tom tresser burning issue.pptx My Burning issue
 
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
0x01 - Newton's Third Law:  Static vs. Dynamic Abusers0x01 - Newton's Third Law:  Static vs. Dynamic Abusers
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
 
Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024
Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024
Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024
 
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
 
Bitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXOBitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXO
 
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdfSupercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
 
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
 
Burning Issue Presentation By Kenmaryon.pdf
Burning Issue Presentation By Kenmaryon.pdfBurning Issue Presentation By Kenmaryon.pdf
Burning Issue Presentation By Kenmaryon.pdf
 

YUDU - Managing a Breach (LDSC Cyber Themed Evening)

  • 1. SentinelLooking after people, businesses & reputations in a crisis Managing a Breach: The communications piece. Richard Stephenson CEO - YUDU Sentinel LDSC 2018 1
  • 2. • Risks facing Businesses • Cyber Attacks - Frequency and Financial cost • Lessons from Cyber Attacks • Communication Plans • The App Advantage • Summary What I will cover today !2
  • 3. The Financial Cost and Frequency of Cyber Attacks is worsening • Allianz Risk Barometer 2017 • In 2017 Business Interruption was the top Insurance Risk of companies • Non Premises Damage (Cyber and Terrorist attacks) becoming a much bigger issue
 !3 • 2017 Cost of Cybercrime study - Poneman Institute • Annualised average cost of cyber security $11.7m / business (Accenture $2.4m) • Increase cost year on year 22.7% • Average no of breaches per year 130 • Increase in the average number of breaches 27.4%
  • 4. Cyber Attacks: What are the main causes and cost - Allianz Main causes 0% 20% 40% 60% 80% Hacker Attack Data/Security Breach Malware/Virus Employee Error Main losses 0% 17.5% 35% 52.5% 70% Business Interruption Reputational Loss Liability Claims Reinstatement of data/restoration Source: Allianz Global Corporate & Speciality: 2017 : 446 respondents !4
  • 5. • Breaches often reported by outsiders • Breaches often occur over a long period of time Cyber attacks are different and more complicated Source: Mandiant M-Trends 2017 report External Notification Internal Notification Days to detect !5 (Accenture = 50 days)
  • 6. Cyber by Sector Source: Mandiant M-Trends 2017 report Sector Percentage of total Cyber Attacks Financial 15% Retail & Hospitality 15% Healthcare 12% High Tech 12% Professional & Business Services 10% !6
  • 7. Lessons - We are all at risk Tuesday, 27th June 2017 "From my experience, [DLA Piper] is an excellent firm with reasonable due diligence procedures. This tells me...this could happen to anyone.” - Larry Poneman (Poneman Institute) • One day to restore Phones • Six days to restore email • Unspecified file and data restoration date !7 DLA Piper Attack
  • 8. Lessons - Communications Failure • Attack took place on 23rd Jan 2015. Attackers hidden for months, identified 7 weaknesses • External suppliers entry used: Refrigeration contractor, remote camera supplier • Fax machines used as they could not send emails: Communication crippled • Months before reconnected to the internet • Financial cost £4.5m in year, followed by over £2.7m/year for new protection • Costs in efficiency have been real due to changes in operating processes !8
  • 9. March 2016 : • Massive data breach reported of 2.6 Terabytes, 11.6 million documents. • Access was probably over years March 2018 : “Reputational deterioration, the media campaign, the financial consequences and irregular actions by some Panamanian authorities have caused irreparable damage, resulting in the total ceasing of public operations at the end of this month,” - Mossack Fonseca statement Lessons - Reputational Cost 2 Years !9
  • 10. Comms Plans are the starting point: Flex and adaptation is the reality Target When What Frequency Method IT Team Immediate Availability/Status Until fixed inApp, SMS Staff Immediate Instructions 3 hrs inApp, SMS C level Immediate Status / Actions ? inApp, SMS Shareholders ? Status / Impact ? Docs, email Clients ? ? ? Docs, email Social Media Fast True story Regular Direct Press Considered Open Docs, Conf Suppliers ? ? ? SMS, email Support services ? ? ? SMS, email Authorities 72 hrs Data Breach etc As required Docs, email Crisis PR Immediate Status Long term Web Conf • Command and control and authority must be established immediately • Teams need to be multi-disciplinary. It is a business issue not just IT !10
  • 11. • Follow the plan • Speak with one voice • Reassure stakeholders • Answer questions honestly • Continuously communicate with all stakeholders but tailor communication detail to suit the audience Some main lessons from MIT Insights - Incident Management Source: MIT Technology Review Insights: 2016 !11
  • 12. Why use Smartphones? - We all have them !12
  • 13. • Controlled & Practiced Environment • Independent Comms Channel • Contacts always updated and secure • Offline Library BC / DR plans available • In-App messaging and notification • Security The App Advantage in Incident Communication !13
  • 14. Why use Smartphones? - We all have them !14
  • 15. People are at the heart of mitigating an attack !15
  • 16. 2 way polls - Aggregated responses • Yes/No answers give immediate picture to incident controllers • Focusses resources in the exceptions and non responders !16
  • 17. Always ready independent multiple communication channel: In-App, SMS, Email, Voice !17
  • 18. Contacts: Always updated - Incident ready • Secure Virtual Control Centre is update with contact data on staff and external contacts via API or weekly CSV • App users only see contacts in their groups and automatically updated. GDPR compliant !18
  • 19. Offline Library - Plan in your hand when the incident strikes BC Plans, Crisis comms plans, Incident Playbooks, Crisis Checklists !19
  • 20. Groups - Targeted Messaging and Document Management Communicate and give access to documents to groups formed from internal AND hybrid internal/external response teams !20
  • 21. Presentation Summary • Communication Plans must exist for all incident types • The need to adapt is a certainty • Communication channels need to be independent & ready to go • Technology must be robust and simple to use • Different groups need different communications • Apps are ideal vehicles for communications !21
  • 22. Questions SentinelLooking after people, businesses & reputations in a crisis www.yudu.com/sentinel !22 Richard Stephenson rs@yudu.com