SlideShare a Scribd company logo
1 of 12
Download to read offline
Rethinking Cyber Security
March 2015
Stephanie Baruk sbaruk@chappuishalder.com
Agenda
An evolving cyber threat landscape1
3 A new approach to Cyber Security
4 Key success factors to transform Cyber Security
5 Appendix
Focus on recent regulatory evolutions2
3
Rethinking Cyber Security
An evolving cyber threat landscape
Emergence 
of new risks
Sophistication 
of attacks and 
multiplicity of 
adversaries
Increased 
costs and 
impacts
Regulatory 
scrutiny
 Traditional boundaries have shifted 
with the explosion of data and 
interconnectedness
 Emerging technologies and reliance on 
third parties have created a borderless 
infrastructure resulting in increased 
exposure
 The sophistication of cyber attacks has 
increased exponentially while the 
defensive approach remained the same
 Risk is no longer limited to financial 
criminal and skilled hackers but also 
hacktivist groups driven by political or 
social agendas and nation‐states to 
create havoc in the markets 
 Financial services are seeing increased 
costs with an estimate of $30M in 2014
 Number of incidents but also higher 
complexity of responding to threats 
have contributed to higher losses
 More than financial losses, reputational 
damage and loss of market confidence 
deserve full attention at the highest 
levels of the company 
 Financial institutions are placed under 
greater scrutiny from the regulators 
 Cyber risk management practices are 
now evaluated as part of regular 
examination processes
In today’s environment with cyber threats being unavoidable, early detection, responsiveness, 
rapidity to recover and integration into a comprehensive framework are key for financial institutions
4
Rethinking Cyber Security
Focus on recent regulatory evolutions
 Corporate governance, including organization and 
reporting structure for cyber security related issues
 Management of cyber security issues and written 
information security policies and procedures
 Resources devoted to information security and 
overall risk management
 Assessment of risks raised by shared infrastructure
 Protections against intrusion
 Information security testing and monitoring, 
including penetration testing
 Incident detection and response processes, including 
monitoring
 Training of information security professionals as well 
as all other personnel
 Management of third‐party service providers
 Integration of information security into business 
continuity and disaster recovery documentation
 Cyber security insurance coverage and other third‐
party protections
 On November 3rd 2014, FFIEC released observations 
from the recent cyber security assessment
 FFIEC recommended regulated financial institutions 
participate in the Financial Services Information Sharing 
and Analysis Center
 On April 15th 2014, the SEC had announced the OCIE will 
audit more than 50 registered broker‐dealers and 
investment advisers for cyber security preparedness
 On Feb 3rd 2015, the OCIE issued a summary 
observations from examinations conducted
 On Feb 3rd 2015, the FINRA issued a new report on cyber 
security, which details practices that firms can tailor to 
their business model as they strengthen their cyber 
security efforts 
 The Report on Cyber security Practices draws in part 
from the results of FINRA's recent targeted examination
 On December 10th 2014, NYDFS issued examination 
guidance to banks outlining new targeted cyber security 
preparedness assessments
 Targeted cyber security assessments will be integrated as 
ongoing, regular part of DFS Exam Process
Audit check‐list
5
Rethinking Cyber Security
Moving towards an enterprise‐wide cyber risk management
Reputational damage
Loss of share values, loss of 
market confidence
Business disruption
Inability to execute trades, 
to access to information
Fraud and theft of 
intellectual property
Financial, loss of competitive 
edge, specific techniques
Cyber risk must become a concern for the entire enterprise starting from the Board, and be factored 
into strategic decisions
Today
• Ad‐hoc approach
• IT solely responsible for protecting computers and 
networks
• Security architecture very weak
• No governance framework and escalation process
Target
• Ad‐hoc approach patching up weaknesses 
rather than anticipating threats
• Dedicated resources but still embedded in IT
• Minimal security built in to the design process
• Cost‐benefit approach, integrated into the enterprise 
(see Appendix)
• Continuous monitoring programs enhancing situational 
awareness and risk culture established
• CISO independent of IT and has voice at the C‐Suite table 
• Technology infrastructure deployed to support security 
processes
Enterprise‐wide 
cyber risk 
management
IT‐focused
…facing a diverse array of impacts
Organizations have made significant security improvements but they have not kept pace with 
today’s adversaries and sophisticated attacks…
6
Rethinking Cyber Security
Identify ‐ Protect – Detect – Respond – Recover (NIST Framework) | What’s next (1/3)
Key takeawaysObjectives
• Establish and implement a cyber security 
governance framework that supports decision 
making and escalation within the organization to 
identify and manage cyber security risks
• Define risk management policies, processes and 
structures coupled with relevant controls tailored 
to the nature of the risks
Enhance the 
governance 
framework
• Define a governance framework to support decision making based on 
risk appetite
• Ensure active senior management and board‐level engagement with 
cyber security issues
• Identify frameworks and standards to address cyber security
• Use metrics and thresholds to manage the performance of the program
• Dedicate resources to achieve the desired risk posture
1
• Conduct regular assessments to identify and 
measure cyber security risks associated with firm 
assets and vendors, determine the likelihood of 
the occurrence of the threat and identify system 
vulnerabilities
• Prioritize, monitor and implement their 
remediation
Implement a Risk 
Assessment Program
• Identify and maintain an inventory of assets authorized to access the 
firm’s network and, as a subset thereof, critical assets that should be 
accorded prioritized protection
• Conduct comprehensive risk assessments that include:
 An assessment of external and internal threats and asset vulnerabilities
 Prioritized and time‐bound recommendations to remediate risks
• Enhance vigilance through experience‐based learning and continuous 
monitoring programs to help capture risk signals across the ecosystem
2
• Implement technical controls to protect firm 
software and hardware that stores and processes 
data, as well as the data itself. 
Set‐up technical 
controls
• Implement a defense‐in‐depth strategy to address known and emerging 
threats with reinforced security layers
• Select controls appropriate to the firm’s technology and threat 
environment, such as:
 identity and access management;
 data security and encryption, 
 penetration testing.
3
7
Rethinking Cyber Security
Identify ‐ Protect – Detect – Respond – Recover (NIST Framework) | What’s next (2/3)
Key takeawaysObjectives
• Provide a framework to manage a cyber security 
incident in a way that limits damage, increases 
the confidence of external stakeholders, and 
reduces recovery time and costs
• Establish policies and procedures and define 
clear roles and responsibilities for escalating and 
responding to cyber security incidents
Prepare an incident 
response planning
• Set up practices for incident response and integrate them into business 
continuity and disaster recovery documentation:
 Containment and mitigation strategies for multiple incident types and 
recovery plans for systems and data
 Communication plan for outreach to relevant stakeholders
 Measures to maintain client confidence
• Enhance resilience through simulated testing and crisis management 
processes
4
• Manage cyber security risk that can arise across 
the lifecycle of vendor relationships using a risk‐
based approach to vendor management
Mitigate vendor 
risks
• Perform pre‐contract due diligence on prospective service providers 
and perform ongoing due diligence on existing vendors
• Establish contractual terms appropriate to the sensitivity of information 
and systems to which the vendor may have access
• Include vendor relationships and outsourced systems as part of the 
firm’s ongoing risk assessment process;
• Establish, maintain and monitor vendor entitlements so as to align with 
firm risk appetite and information security standards
5
• Provide cyber security trainings tailored to staff 
needs
• Enhance the risk‐awareness across the 
organization
Train staff
• Define cyber security training needs requirements
• Identify appropriate cyber security training update cycles
• Deliver interactive training with audience participation to increase 
retention
• Develop training around information from the firm’s loss incidents, risk 
assessment process and threat intelligence gathering
6
8
Rethinking Cyber Security
Identify ‐ Protect – Detect – Respond – Recover (NIST Framework) | What’s next (3/3)
Key takeawaysObjectives
• Use cyber threat intelligence to improve ability to 
identify, detect and respond to cyber security 
threats
Use cyber  
intelligence
• Assign responsibility for cyber security intelligence gathering and 
analysis at the organizational and individual levels
• Establish mechanisms to disseminate threat intelligence and analysis 
rapidly to appropriate groups within the firm
• Evaluate threat intelligence from tactical and strategic perspectives, and 
determine the appropriate time frame for the course of action
• Participate in appropriate information sharing organizations and 
periodically evaluate the firm’s information‐sharing partners
7
• Evaluate the utility of cyber insurance as a way to 
transfer some risk as part of their risk 
management processes
• Conduct an analysis to ensure alignment 
between existing coverage and risk assessment 
processes
Assess cyber 
insurance 
• For firms that have cyber security coverage, conduct a periodic analysis 
of the adequacy of the coverage provided in connection with the firm’s 
risk assessment process to determine if the policy and its coverage align 
with the firm’s risk assessment and ability to bear losses
• For firms that do not have cyber insurance, evaluate the cyber 
insurance market to determine if coverage is available that would 
enhance the firm’s ability to manage the financial impact of cyber 
security events.
8
It is now time to implement measures to address cyber security challenges by leveraging traditional 
risk management methods
9
Rethinking Cyber Security
Key Success Factors
Make cyber security matters a strategic business problem which deserves full attention at the 
executive level
1
Strengthen the cyber risk‐aware culture through training programs adopting a more human‐centric 
approach and create cyber threat intelligence unit to sustain a dynamic intelligence‐driven approach
2
Build cyber “fusion centers” that better integrate many different teams to boost intelligence, speed 
response, reduce costs and leverage scarce talent
3
Place efforts on automation and analytics to create internal and external risk transparency and to 
improve the quality and speed of real‐time cyber threat analysis
4
Implement a science‐based approach to cyber risk management, quantifying the cost of cyber risk 
and taking a cost‐benefit approach to risk mitigation 
5
Benefit from building industry relationships and expanding collaboration beyond company 
boundaries 
6
Agenda
An evolving cyber threat landscape1
3 A new approach to Cyber Security
4 Key success factors to transform Cyber Security
Appendix
Focus on recent regulatory evolutions2
5
11
• Identify cyber risks throughout the firm
Main roles and responsibilities
• Make sure risks are properly mitigated and monitor remediation actions if any
• Prepare and release communications in case of incidents
• Make sure that processes and systems comply with privacy and data protection laws and internal 
control measures
• Integrate the cyber security framework into business continuity and disaster recovery plans
• Develop the accounting framework for cyber risk
• Quantify cyber risks and assess the utility of cyber insurance
• Consider regulation, litigation possibilities, contractual obligations, and the firm’s ability to provide 
third parties with evidence of proper data protection processes
• Ensure that the control framework is in place 
Rethinking Cyber Security
Appendix | Involvement required across the organization
MONTREAL
202 – 1819 Bd Rene
Levesque O.
Montreal, Quebec,
H3H2P5
PARIS
25, rue Alphonse de
Neuville
75017, Paris, France
NIORT
19 avenue Bujault
79000 Niort, France
NEW YORK
1441, Broadway
Suite 3015, New York
NY 10018, USA
SINGAPORE
Level 25, North Tower,
One Raffles Quay,
Singapore 048583
HONG KONG
905, 9/F,
Kinwick Centre 32
Hollywood Road,
Central, Hong Kong
LONDON
50 Great Portland Street
London W1W 7ND, UK
GENEVA
Rue de Lausanne 80
CH 1202 Genève,
Suisse

More Related Content

What's hot

Guide to high volume data sources for SIEM
Guide to high volume data sources for SIEMGuide to high volume data sources for SIEM
Guide to high volume data sources for SIEMJoseph DeFever
 
2017 cost of cyber crime study accenture
2017 cost of cyber crime study   accenture2017 cost of cyber crime study   accenture
2017 cost of cyber crime study accenturejob Titri company
 
Hpesp wp ponemon_costofcybercrimestudy2012_unitedstates(1)
Hpesp wp ponemon_costofcybercrimestudy2012_unitedstates(1)Hpesp wp ponemon_costofcybercrimestudy2012_unitedstates(1)
Hpesp wp ponemon_costofcybercrimestudy2012_unitedstates(1)Zeno Idzerda
 
US cost_of_cyber_crime_study_final6
US  cost_of_cyber_crime_study_final6 US  cost_of_cyber_crime_study_final6
US cost_of_cyber_crime_study_final6 CMR WORLD TECH
 
Cyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Cyber Liability & Cyber Insurance - Cybersecurity Seminar SeriesCyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Cyber Liability & Cyber Insurance - Cybersecurity Seminar SeriesPaige Rasid
 
The 4 Challenges of Managing Privacy Incident Response
The 4 Challenges of Managing Privacy Incident ResponseThe 4 Challenges of Managing Privacy Incident Response
The 4 Challenges of Managing Privacy Incident ResponseElizabeth Dimit
 
2015 cost of data breach study global analysis
2015 cost of data breach study global analysis2015 cost of data breach study global analysis
2015 cost of data breach study global analysisxband
 
Combating Cybersecurity Challenges with Advanced Analytics
Combating Cybersecurity Challenges with Advanced AnalyticsCombating Cybersecurity Challenges with Advanced Analytics
Combating Cybersecurity Challenges with Advanced AnalyticsCognizant
 
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...SafeNet
 
Cyber Insurance Temp
Cyber  Insurance  TempCyber  Insurance  Temp
Cyber Insurance TempRohan Sehgal
 
Cyber risk reporting aicpa framework
Cyber risk reporting aicpa frameworkCyber risk reporting aicpa framework
Cyber risk reporting aicpa frameworkJames Deiotte
 
It's Time to Rethink Your Endpoint Strategy
It's Time to Rethink Your Endpoint StrategyIt's Time to Rethink Your Endpoint Strategy
It's Time to Rethink Your Endpoint StrategyLumension
 
Webinar: “Cybersecurity During COVID-19: A Look Behind the Scenes
Webinar: “Cybersecurity During COVID-19: A Look Behind the ScenesWebinar: “Cybersecurity During COVID-19: A Look Behind the Scenes
Webinar: “Cybersecurity During COVID-19: A Look Behind the ScenesPYA, P.C.
 
Executive Summary of the 2016 Scalar Security Study
Executive Summary of the 2016 Scalar Security StudyExecutive Summary of the 2016 Scalar Security Study
Executive Summary of the 2016 Scalar Security StudyScalar Decisions
 
Managed Security For A Not So Secure World Wp090991
Managed Security For A Not So Secure World Wp090991Managed Security For A Not So Secure World Wp090991
Managed Security For A Not So Secure World Wp090991Erik Ginalick
 

What's hot (17)

Guide to high volume data sources for SIEM
Guide to high volume data sources for SIEMGuide to high volume data sources for SIEM
Guide to high volume data sources for SIEM
 
2017 cost of cyber crime study accenture
2017 cost of cyber crime study   accenture2017 cost of cyber crime study   accenture
2017 cost of cyber crime study accenture
 
Hpesp wp ponemon_costofcybercrimestudy2012_unitedstates(1)
Hpesp wp ponemon_costofcybercrimestudy2012_unitedstates(1)Hpesp wp ponemon_costofcybercrimestudy2012_unitedstates(1)
Hpesp wp ponemon_costofcybercrimestudy2012_unitedstates(1)
 
US cost_of_cyber_crime_study_final6
US  cost_of_cyber_crime_study_final6 US  cost_of_cyber_crime_study_final6
US cost_of_cyber_crime_study_final6
 
Cyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Cyber Liability & Cyber Insurance - Cybersecurity Seminar SeriesCyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Cyber Liability & Cyber Insurance - Cybersecurity Seminar Series
 
The 4 Challenges of Managing Privacy Incident Response
The 4 Challenges of Managing Privacy Incident ResponseThe 4 Challenges of Managing Privacy Incident Response
The 4 Challenges of Managing Privacy Incident Response
 
2015 cost of data breach study global analysis
2015 cost of data breach study global analysis2015 cost of data breach study global analysis
2015 cost of data breach study global analysis
 
Combating Cybersecurity Challenges with Advanced Analytics
Combating Cybersecurity Challenges with Advanced AnalyticsCombating Cybersecurity Challenges with Advanced Analytics
Combating Cybersecurity Challenges with Advanced Analytics
 
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...
 
Heidi
HeidiHeidi
Heidi
 
Cyber Insurance Temp
Cyber  Insurance  TempCyber  Insurance  Temp
Cyber Insurance Temp
 
Cyber risk reporting aicpa framework
Cyber risk reporting aicpa frameworkCyber risk reporting aicpa framework
Cyber risk reporting aicpa framework
 
It's Time to Rethink Your Endpoint Strategy
It's Time to Rethink Your Endpoint StrategyIt's Time to Rethink Your Endpoint Strategy
It's Time to Rethink Your Endpoint Strategy
 
2019 Hiscox Cyber Readiness Report
2019 Hiscox Cyber Readiness Report2019 Hiscox Cyber Readiness Report
2019 Hiscox Cyber Readiness Report
 
Webinar: “Cybersecurity During COVID-19: A Look Behind the Scenes
Webinar: “Cybersecurity During COVID-19: A Look Behind the ScenesWebinar: “Cybersecurity During COVID-19: A Look Behind the Scenes
Webinar: “Cybersecurity During COVID-19: A Look Behind the Scenes
 
Executive Summary of the 2016 Scalar Security Study
Executive Summary of the 2016 Scalar Security StudyExecutive Summary of the 2016 Scalar Security Study
Executive Summary of the 2016 Scalar Security Study
 
Managed Security For A Not So Secure World Wp090991
Managed Security For A Not So Secure World Wp090991Managed Security For A Not So Secure World Wp090991
Managed Security For A Not So Secure World Wp090991
 

Viewers also liked

Effect of BA, IBA and cutting type on transplants production from cuttings
Effect of BA, IBA and cutting type on transplants production from cuttingsEffect of BA, IBA and cutting type on transplants production from cuttings
Effect of BA, IBA and cutting type on transplants production from cuttingsAhmedabd Eleslamboly Eleslamboly
 
Nikravesh big datafeb2013bt
Nikravesh big datafeb2013btNikravesh big datafeb2013bt
Nikravesh big datafeb2013btMasoud Nikravesh
 
Marcella Marletta - Corso ICEP 2015
Marcella Marletta - Corso ICEP 2015Marcella Marletta - Corso ICEP 2015
Marcella Marletta - Corso ICEP 2015Marcella Marletta
 
aprendizaje y pensamiento critico
aprendizaje y pensamiento criticoaprendizaje y pensamiento critico
aprendizaje y pensamiento criticoDiana Nieto
 
Prateek chauhan cv senior business analyst_csc
Prateek chauhan cv senior business analyst_cscPrateek chauhan cv senior business analyst_csc
Prateek chauhan cv senior business analyst_cscPrateek Chauhan
 

Viewers also liked (11)

بحث الهند
بحث الهندبحث الهند
بحث الهند
 
Effect of BA, IBA and cutting type on transplants production from cuttings
Effect of BA, IBA and cutting type on transplants production from cuttingsEffect of BA, IBA and cutting type on transplants production from cuttings
Effect of BA, IBA and cutting type on transplants production from cuttings
 
Nikravesh big datafeb2013bt
Nikravesh big datafeb2013btNikravesh big datafeb2013bt
Nikravesh big datafeb2013bt
 
Study on the effect of pollution on some vegetable crops
Study on the effect of pollution on some vegetable  cropsStudy on the effect of pollution on some vegetable  crops
Study on the effect of pollution on some vegetable crops
 
Marcella Marletta - Corso ICEP 2015
Marcella Marletta - Corso ICEP 2015Marcella Marletta - Corso ICEP 2015
Marcella Marletta - Corso ICEP 2015
 
aprendizaje y pensamiento critico
aprendizaje y pensamiento criticoaprendizaje y pensamiento critico
aprendizaje y pensamiento critico
 
Bistabilul
BistabilulBistabilul
Bistabilul
 
T291 - MBA Pathways_300x270
T291 - MBA Pathways_300x270T291 - MBA Pathways_300x270
T291 - MBA Pathways_300x270
 
Cozy Fall Latte Recipes
Cozy Fall Latte RecipesCozy Fall Latte Recipes
Cozy Fall Latte Recipes
 
Prateek chauhan cv senior business analyst_csc
Prateek chauhan cv senior business analyst_cscPrateek chauhan cv senior business analyst_csc
Prateek chauhan cv senior business analyst_csc
 
Stucture of atmoshere
Stucture of atmoshereStucture of atmoshere
Stucture of atmoshere
 

Similar to Rethinking Cyber Security Approach

Threat horizon 2017 by isf forum
Threat horizon 2017 by isf forumThreat horizon 2017 by isf forum
Threat horizon 2017 by isf forumfloora_jj
 
Whitepaper 2015 industry_drilldown_finance_en
Whitepaper 2015 industry_drilldown_finance_enWhitepaper 2015 industry_drilldown_finance_en
Whitepaper 2015 industry_drilldown_finance_enBankir_Ru
 
Top 10 cybersecurity predictions for 2016 by Matthew Rosenquist
Top 10 cybersecurity predictions for 2016 by Matthew RosenquistTop 10 cybersecurity predictions for 2016 by Matthew Rosenquist
Top 10 cybersecurity predictions for 2016 by Matthew RosenquistMatthew Rosenquist
 
Detecting Frauds and Identifying Security Challenge | by Money2Conf
Detecting Frauds and Identifying Security Challenge | by Money2ConfDetecting Frauds and Identifying Security Challenge | by Money2Conf
Detecting Frauds and Identifying Security Challenge | by Money2ConfMoney 2Conf
 
Top 7 Cyber Security Challenges of Financial Institutions.pdf
Top 7 Cyber Security Challenges of Financial Institutions.pdfTop 7 Cyber Security Challenges of Financial Institutions.pdf
Top 7 Cyber Security Challenges of Financial Institutions.pdfMr. Business Magazine
 
7 Cybersecurity Statistics You Need to Know in 2023.pptx
7 Cybersecurity Statistics You Need to Know in 2023.pptx7 Cybersecurity Statistics You Need to Know in 2023.pptx
7 Cybersecurity Statistics You Need to Know in 2023.pptxIT Company Dubai
 
7th ERM - S2 - Cyber security, Cyber Risk and Data Privacy - Kalpesh Doshi (1...
7th ERM - S2 - Cyber security, Cyber Risk and Data Privacy - Kalpesh Doshi (1...7th ERM - S2 - Cyber security, Cyber Risk and Data Privacy - Kalpesh Doshi (1...
7th ERM - S2 - Cyber security, Cyber Risk and Data Privacy - Kalpesh Doshi (1...TraintechTde
 
Internet is a threat in financial secotr
Internet is a threat in financial secotr Internet is a threat in financial secotr
Internet is a threat in financial secotr khan shamim
 
IMT 552-JPMorgan Chase & Co. Risk Assessment v05
IMT 552-JPMorgan Chase & Co. Risk Assessment v05IMT 552-JPMorgan Chase & Co. Risk Assessment v05
IMT 552-JPMorgan Chase & Co. Risk Assessment v05Daniel Kapellmann Zafra
 
Gp2 Public Policy Assign8 644 Sp10
Gp2 Public Policy Assign8 644 Sp10Gp2 Public Policy Assign8 644 Sp10
Gp2 Public Policy Assign8 644 Sp10Deepa Devadas
 
Data security: How a proactive C-suite can reduce cyber-risk for the enterprise
Data security: How a proactive C-suite can reduce cyber-risk for the enterpriseData security: How a proactive C-suite can reduce cyber-risk for the enterprise
Data security: How a proactive C-suite can reduce cyber-risk for the enterpriseThe Economist Media Businesses
 
2023 - IBM Cost of a Data Breach Report.pdf
2023 - IBM Cost of a Data Breach Report.pdf2023 - IBM Cost of a Data Breach Report.pdf
2023 - IBM Cost of a Data Breach Report.pdfErickaDiaz24
 
UW - IMT 552-JPMorgan Chase & Co. Risk Assessment
UW - IMT 552-JPMorgan Chase & Co. Risk AssessmentUW - IMT 552-JPMorgan Chase & Co. Risk Assessment
UW - IMT 552-JPMorgan Chase & Co. Risk AssessmentAkshay Ajgaonkar
 
CSE 2016 Future of Cyber Security by Matthew Rosenquist
CSE 2016 Future of Cyber Security by Matthew RosenquistCSE 2016 Future of Cyber Security by Matthew Rosenquist
CSE 2016 Future of Cyber Security by Matthew RosenquistMatthew Rosenquist
 
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)PwC France
 
Cyber Review_April 2015
Cyber Review_April 2015Cyber Review_April 2015
Cyber Review_April 2015James Sheehan
 
employee-awareness-and-training-the-holy-grail-of-cybersecurity
employee-awareness-and-training-the-holy-grail-of-cybersecurityemployee-awareness-and-training-the-holy-grail-of-cybersecurity
employee-awareness-and-training-the-holy-grail-of-cybersecurityPaul Ferrillo
 
Ensuring Data Protection Compliance.docx.pdf
Ensuring Data Protection Compliance.docx.pdfEnsuring Data Protection Compliance.docx.pdf
Ensuring Data Protection Compliance.docx.pdfvincular1
 

Similar to Rethinking Cyber Security Approach (20)

Threat horizon 2017 by isf forum
Threat horizon 2017 by isf forumThreat horizon 2017 by isf forum
Threat horizon 2017 by isf forum
 
Whitepaper 2015 industry_drilldown_finance_en
Whitepaper 2015 industry_drilldown_finance_enWhitepaper 2015 industry_drilldown_finance_en
Whitepaper 2015 industry_drilldown_finance_en
 
Top 10 cybersecurity predictions for 2016 by Matthew Rosenquist
Top 10 cybersecurity predictions for 2016 by Matthew RosenquistTop 10 cybersecurity predictions for 2016 by Matthew Rosenquist
Top 10 cybersecurity predictions for 2016 by Matthew Rosenquist
 
Detecting Frauds and Identifying Security Challenge | by Money2Conf
Detecting Frauds and Identifying Security Challenge | by Money2ConfDetecting Frauds and Identifying Security Challenge | by Money2Conf
Detecting Frauds and Identifying Security Challenge | by Money2Conf
 
Top 7 Cyber Security Challenges of Financial Institutions.pdf
Top 7 Cyber Security Challenges of Financial Institutions.pdfTop 7 Cyber Security Challenges of Financial Institutions.pdf
Top 7 Cyber Security Challenges of Financial Institutions.pdf
 
7 Cybersecurity Statistics You Need to Know in 2023.pptx
7 Cybersecurity Statistics You Need to Know in 2023.pptx7 Cybersecurity Statistics You Need to Know in 2023.pptx
7 Cybersecurity Statistics You Need to Know in 2023.pptx
 
7th ERM - S2 - Cyber security, Cyber Risk and Data Privacy - Kalpesh Doshi (1...
7th ERM - S2 - Cyber security, Cyber Risk and Data Privacy - Kalpesh Doshi (1...7th ERM - S2 - Cyber security, Cyber Risk and Data Privacy - Kalpesh Doshi (1...
7th ERM - S2 - Cyber security, Cyber Risk and Data Privacy - Kalpesh Doshi (1...
 
Get Prepared
Get PreparedGet Prepared
Get Prepared
 
Internet is a threat in financial secotr
Internet is a threat in financial secotr Internet is a threat in financial secotr
Internet is a threat in financial secotr
 
The Impact of Technology on the Profession
The Impact of Technology on the ProfessionThe Impact of Technology on the Profession
The Impact of Technology on the Profession
 
IMT 552-JPMorgan Chase & Co. Risk Assessment v05
IMT 552-JPMorgan Chase & Co. Risk Assessment v05IMT 552-JPMorgan Chase & Co. Risk Assessment v05
IMT 552-JPMorgan Chase & Co. Risk Assessment v05
 
Gp2 Public Policy Assign8 644 Sp10
Gp2 Public Policy Assign8 644 Sp10Gp2 Public Policy Assign8 644 Sp10
Gp2 Public Policy Assign8 644 Sp10
 
Data security: How a proactive C-suite can reduce cyber-risk for the enterprise
Data security: How a proactive C-suite can reduce cyber-risk for the enterpriseData security: How a proactive C-suite can reduce cyber-risk for the enterprise
Data security: How a proactive C-suite can reduce cyber-risk for the enterprise
 
2023 - IBM Cost of a Data Breach Report.pdf
2023 - IBM Cost of a Data Breach Report.pdf2023 - IBM Cost of a Data Breach Report.pdf
2023 - IBM Cost of a Data Breach Report.pdf
 
UW - IMT 552-JPMorgan Chase & Co. Risk Assessment
UW - IMT 552-JPMorgan Chase & Co. Risk AssessmentUW - IMT 552-JPMorgan Chase & Co. Risk Assessment
UW - IMT 552-JPMorgan Chase & Co. Risk Assessment
 
CSE 2016 Future of Cyber Security by Matthew Rosenquist
CSE 2016 Future of Cyber Security by Matthew RosenquistCSE 2016 Future of Cyber Security by Matthew Rosenquist
CSE 2016 Future of Cyber Security by Matthew Rosenquist
 
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
 
Cyber Review_April 2015
Cyber Review_April 2015Cyber Review_April 2015
Cyber Review_April 2015
 
employee-awareness-and-training-the-holy-grail-of-cybersecurity
employee-awareness-and-training-the-holy-grail-of-cybersecurityemployee-awareness-and-training-the-holy-grail-of-cybersecurity
employee-awareness-and-training-the-holy-grail-of-cybersecurity
 
Ensuring Data Protection Compliance.docx.pdf
Ensuring Data Protection Compliance.docx.pdfEnsuring Data Protection Compliance.docx.pdf
Ensuring Data Protection Compliance.docx.pdf
 

Recently uploaded

Demographic transition and the rise of wealth inequality
Demographic transition and the rise of wealth inequalityDemographic transition and the rise of wealth inequality
Demographic transition and the rise of wealth inequalityGRAPE
 
TACLOBAN-CITY-DIVISION-POPQUIZ-2023.pptx
TACLOBAN-CITY-DIVISION-POPQUIZ-2023.pptxTACLOBAN-CITY-DIVISION-POPQUIZ-2023.pptx
TACLOBAN-CITY-DIVISION-POPQUIZ-2023.pptxKathlynVillar
 
ΤτΕ: Ανάπτυξη 2,3% και πληθωρισμός 2,8% φέτος
ΤτΕ: Ανάπτυξη 2,3% και πληθωρισμός 2,8% φέτοςΤτΕ: Ανάπτυξη 2,3% και πληθωρισμός 2,8% φέτος
ΤτΕ: Ανάπτυξη 2,3% και πληθωρισμός 2,8% φέτοςNewsroom8
 
Money Forward Integrated Report “Forward Map” 2024
Money Forward Integrated Report “Forward Map” 2024Money Forward Integrated Report “Forward Map” 2024
Money Forward Integrated Report “Forward Map” 2024Money Forward
 
Banking: Commercial and Central Banking.pptx
Banking: Commercial and Central Banking.pptxBanking: Commercial and Central Banking.pptx
Banking: Commercial and Central Banking.pptxANTHONYAKINYOSOYE1
 
Aon-UK-DC-Pension-Tracker-Q1-2024. slideshare
Aon-UK-DC-Pension-Tracker-Q1-2024. slideshareAon-UK-DC-Pension-Tracker-Q1-2024. slideshare
Aon-UK-DC-Pension-Tracker-Q1-2024. slideshareHenry Tapper
 
2B Nation-State.pptx contemporary world nation
2B  Nation-State.pptx contemporary world nation2B  Nation-State.pptx contemporary world nation
2B Nation-State.pptx contemporary world nationko9240888
 
Introduction to Health Economics Dr. R. Kurinji Malar.pptx
Introduction to Health Economics Dr. R. Kurinji Malar.pptxIntroduction to Health Economics Dr. R. Kurinji Malar.pptx
Introduction to Health Economics Dr. R. Kurinji Malar.pptxDrRkurinjiMalarkurin
 
OAT_RI_Ep18 WeighingTheRisks_Mar24_GlobalCredit.pptx
OAT_RI_Ep18 WeighingTheRisks_Mar24_GlobalCredit.pptxOAT_RI_Ep18 WeighingTheRisks_Mar24_GlobalCredit.pptx
OAT_RI_Ep18 WeighingTheRisks_Mar24_GlobalCredit.pptxhiddenlevers
 
Hello this ppt is about seminar final project
Hello this ppt is about seminar final projectHello this ppt is about seminar final project
Hello this ppt is about seminar final projectninnasirsi
 
Zimbabwe's New Gold-Backed Currency- A Path to Stability or Another Monetary.pdf
Zimbabwe's New Gold-Backed Currency- A Path to Stability or Another Monetary.pdfZimbabwe's New Gold-Backed Currency- A Path to Stability or Another Monetary.pdf
Zimbabwe's New Gold-Backed Currency- A Path to Stability or Another Monetary.pdfFREELANCER
 
ekthesi-trapeza-tis-ellados-gia-2023.pdf
ekthesi-trapeza-tis-ellados-gia-2023.pdfekthesi-trapeza-tis-ellados-gia-2023.pdf
ekthesi-trapeza-tis-ellados-gia-2023.pdfSteliosTheodorou4
 
What is sip and What are its Benefits in 2024
What is sip and What are its Benefits in 2024What is sip and What are its Benefits in 2024
What is sip and What are its Benefits in 2024prajwalgopocket
 
Global Economic Outlook, 2024 - Scholaride Consulting
Global Economic Outlook, 2024 - Scholaride ConsultingGlobal Economic Outlook, 2024 - Scholaride Consulting
Global Economic Outlook, 2024 - Scholaride Consultingswastiknandyofficial
 
10 QuickBooks Tips 2024 - Globus Finanza.pdf
10 QuickBooks Tips 2024 - Globus Finanza.pdf10 QuickBooks Tips 2024 - Globus Finanza.pdf
10 QuickBooks Tips 2024 - Globus Finanza.pdfglobusfinanza
 
Thoma Bravo Equity - Presentation Pension Fund
Thoma Bravo Equity - Presentation Pension FundThoma Bravo Equity - Presentation Pension Fund
Thoma Bravo Equity - Presentation Pension FundAshwinJey
 
Building pressure? Rising rents, and what to expect in the future
Building pressure? Rising rents, and what to expect in the futureBuilding pressure? Rising rents, and what to expect in the future
Building pressure? Rising rents, and what to expect in the futureResolutionFoundation
 
2024-04-09 - Pension Playpen roundtable - slides.pptx
2024-04-09 - Pension Playpen roundtable - slides.pptx2024-04-09 - Pension Playpen roundtable - slides.pptx
2024-04-09 - Pension Playpen roundtable - slides.pptxHenry Tapper
 
Uk-NO1 Rohani Amil In Islamabad Amil Baba in Rawalpindi Kala Jadu Amil In Raw...
Uk-NO1 Rohani Amil In Islamabad Amil Baba in Rawalpindi Kala Jadu Amil In Raw...Uk-NO1 Rohani Amil In Islamabad Amil Baba in Rawalpindi Kala Jadu Amil In Raw...
Uk-NO1 Rohani Amil In Islamabad Amil Baba in Rawalpindi Kala Jadu Amil In Raw...Amil baba
 

Recently uploaded (19)

Demographic transition and the rise of wealth inequality
Demographic transition and the rise of wealth inequalityDemographic transition and the rise of wealth inequality
Demographic transition and the rise of wealth inequality
 
TACLOBAN-CITY-DIVISION-POPQUIZ-2023.pptx
TACLOBAN-CITY-DIVISION-POPQUIZ-2023.pptxTACLOBAN-CITY-DIVISION-POPQUIZ-2023.pptx
TACLOBAN-CITY-DIVISION-POPQUIZ-2023.pptx
 
ΤτΕ: Ανάπτυξη 2,3% και πληθωρισμός 2,8% φέτος
ΤτΕ: Ανάπτυξη 2,3% και πληθωρισμός 2,8% φέτοςΤτΕ: Ανάπτυξη 2,3% και πληθωρισμός 2,8% φέτος
ΤτΕ: Ανάπτυξη 2,3% και πληθωρισμός 2,8% φέτος
 
Money Forward Integrated Report “Forward Map” 2024
Money Forward Integrated Report “Forward Map” 2024Money Forward Integrated Report “Forward Map” 2024
Money Forward Integrated Report “Forward Map” 2024
 
Banking: Commercial and Central Banking.pptx
Banking: Commercial and Central Banking.pptxBanking: Commercial and Central Banking.pptx
Banking: Commercial and Central Banking.pptx
 
Aon-UK-DC-Pension-Tracker-Q1-2024. slideshare
Aon-UK-DC-Pension-Tracker-Q1-2024. slideshareAon-UK-DC-Pension-Tracker-Q1-2024. slideshare
Aon-UK-DC-Pension-Tracker-Q1-2024. slideshare
 
2B Nation-State.pptx contemporary world nation
2B  Nation-State.pptx contemporary world nation2B  Nation-State.pptx contemporary world nation
2B Nation-State.pptx contemporary world nation
 
Introduction to Health Economics Dr. R. Kurinji Malar.pptx
Introduction to Health Economics Dr. R. Kurinji Malar.pptxIntroduction to Health Economics Dr. R. Kurinji Malar.pptx
Introduction to Health Economics Dr. R. Kurinji Malar.pptx
 
OAT_RI_Ep18 WeighingTheRisks_Mar24_GlobalCredit.pptx
OAT_RI_Ep18 WeighingTheRisks_Mar24_GlobalCredit.pptxOAT_RI_Ep18 WeighingTheRisks_Mar24_GlobalCredit.pptx
OAT_RI_Ep18 WeighingTheRisks_Mar24_GlobalCredit.pptx
 
Hello this ppt is about seminar final project
Hello this ppt is about seminar final projectHello this ppt is about seminar final project
Hello this ppt is about seminar final project
 
Zimbabwe's New Gold-Backed Currency- A Path to Stability or Another Monetary.pdf
Zimbabwe's New Gold-Backed Currency- A Path to Stability or Another Monetary.pdfZimbabwe's New Gold-Backed Currency- A Path to Stability or Another Monetary.pdf
Zimbabwe's New Gold-Backed Currency- A Path to Stability or Another Monetary.pdf
 
ekthesi-trapeza-tis-ellados-gia-2023.pdf
ekthesi-trapeza-tis-ellados-gia-2023.pdfekthesi-trapeza-tis-ellados-gia-2023.pdf
ekthesi-trapeza-tis-ellados-gia-2023.pdf
 
What is sip and What are its Benefits in 2024
What is sip and What are its Benefits in 2024What is sip and What are its Benefits in 2024
What is sip and What are its Benefits in 2024
 
Global Economic Outlook, 2024 - Scholaride Consulting
Global Economic Outlook, 2024 - Scholaride ConsultingGlobal Economic Outlook, 2024 - Scholaride Consulting
Global Economic Outlook, 2024 - Scholaride Consulting
 
10 QuickBooks Tips 2024 - Globus Finanza.pdf
10 QuickBooks Tips 2024 - Globus Finanza.pdf10 QuickBooks Tips 2024 - Globus Finanza.pdf
10 QuickBooks Tips 2024 - Globus Finanza.pdf
 
Thoma Bravo Equity - Presentation Pension Fund
Thoma Bravo Equity - Presentation Pension FundThoma Bravo Equity - Presentation Pension Fund
Thoma Bravo Equity - Presentation Pension Fund
 
Building pressure? Rising rents, and what to expect in the future
Building pressure? Rising rents, and what to expect in the futureBuilding pressure? Rising rents, and what to expect in the future
Building pressure? Rising rents, and what to expect in the future
 
2024-04-09 - Pension Playpen roundtable - slides.pptx
2024-04-09 - Pension Playpen roundtable - slides.pptx2024-04-09 - Pension Playpen roundtable - slides.pptx
2024-04-09 - Pension Playpen roundtable - slides.pptx
 
Uk-NO1 Rohani Amil In Islamabad Amil Baba in Rawalpindi Kala Jadu Amil In Raw...
Uk-NO1 Rohani Amil In Islamabad Amil Baba in Rawalpindi Kala Jadu Amil In Raw...Uk-NO1 Rohani Amil In Islamabad Amil Baba in Rawalpindi Kala Jadu Amil In Raw...
Uk-NO1 Rohani Amil In Islamabad Amil Baba in Rawalpindi Kala Jadu Amil In Raw...
 

Rethinking Cyber Security Approach