SlideShare a Scribd company logo
1 of 24
RiskMinds
Operational Risk:
Building Cyber Resilience
Copyright © 2015 Accenture All rights reserved. 2
• People are often the weakest link – employees, vendors, customers
• Attacks span the traditional defenses – physical security, manipulation
of staff, fraud, application security, malware
• Digital assets create more entry points
• It is not a matter of IF but to WHAT EXTENT you are compromised
Building Cyber Resilience
We have heard from multiple #RiskMind2015 presentations that this is a
growing problem
Copyright © 2015 Accenture All rights reserved. 3
Global Regulatory Landscape
The Regulatory Landscape is changing rapidly to address these concerns.
(FFIEC)
Pilot
Cybersecurity
Assessment
(FINRA)
Equities Trading
Initiatives and
Securities trader
Registration
Q4 2014 Q1-3 2015 Q4 2015 2016
(SEC)
Cyber Exams,
Issues Risk Alert
(FFIEC)
Cybersecurity
Assessment
Tool
(CFTC)
Cybersecurity
Requirements
(Fed)
Cybersecurity
Information
Sharing Act
(SG CSA)
National Cyber
Security
Masterplan 2018
(SEC)
IM Cybersecurity
Guidelines
Future/Proposed Rules
Current Rules
(NIST)
Cybersecurity
Framework
Q3 2014 2016
(CFTC)
High Speed
Trading Rules
(SEC)
High Frequency
Trading Rules
(HKMA)
Cybersecurity
Risk
Management
Circular
(BoE)
CBEST
Vulnerability
Testing
Framework
Source: Accenture analysis based upon publicly available data.
Copyright © 2015 Accenture All rights reserved. 4
1. Training and Risk Culture – Taking your unique organization and infusing
the right cyber risk behaviors
2. Controls – Where are the weak points – build robust set of controls across
operations, business and IT
3. Measurement with a Purpose – What is going on without you knowing it –
creating metrics which expose the risks
4. Operating Model – How do you work with the rest of the organization -
assigning clear lines of accountability and ownership
5. Resilience – At some point it will go wrong, be prepared
The Top 5 Priorities to Get Right
We will discuss 5 priorities and determine as a group if these are the top
priorities
Priority #1 – Training and Culture
Copyright © 2015 Accenture All rights reserved. 6
Cyber Risk Culture
View of the Organization
How does your organization’s culture span these quadrants?
High Sociability
Low Sociability
High SolidarityLow Solidarity
Networked Cohesive
Fragmented Task Masters
The “Investment Bank”
The “Outsourced” Bank”
The M&A growth
“Regional Bank”
The Organic growth
“Retail Bank”
Influence of relationships
Influence of the “drive” to meet
common goals
Copyright © 2015 Accenture All rights reserved. 7
• Dynamic
• Ideas flow freely
• Metrics driven
• Centralized
Cyber Function
• Decompose and
define
approaches
• No single
solution
• Identify
problem
segments
High Sociability
Low Sociability
High Solidarity
Low Solidarity
Networked Cohesive
Fragmented Task Masters
The “Investment
Bank”
The “Outsourced”
Bank”
The M&A growth
“Regional Bank”
The Organic growth
“Retail Bank”
Influence of relationships
Influence of the “drive” to meet
common goals
Training and Culture
Cultural View of the Organization
How does your organization’s culture span these quadrants?
• Consensus driven
• Proud of brand
• Emulate role
models
• Tone from the top
• Individual
accountability
• Incentives distort
risk and culture
• Based on strong
controls
• Clear metrics
Copyright © 2015 Accenture All rights reserved. 8
Cyber Risk Pulse Check
A highly engaging and dynamic diagnostic that rapidly assesses employee
understanding of Cyber Security best practices and provides data-driven
insights and benchmarking for your firm.
E N G A G E
M O T I V A T E
A N A L Y Z E
Designed with advanced learning
methods and game mechanics to
create an immersive experience
First ever NYSE benchmark on Cyber
Security that will allow for comparative
analysis against cross-industry
participants
Dynamic diagnostic environment that
highlights the critical importance of
Cyber Security, driving behavioral and
cultural change
http://pages.s6.exacttarget.com/page.aspx?QS=c76003443ff9837d
8ef9974a19a99cfa5f994776888b6bfc6115f9e9e82e4c33&campaig
n=701E0000000xb2E
NYSE
Priority #2 – Controls
Copyright © 2015 Accenture All rights reserved. 10
Controls
(Cyber Risk Enhancements Requirements)
Traditional control frameworks evaluate effectiveness through an
operational risk approach focused on residual risk.
1. Business / IT
Process
2. Risk
Identification and
Inherent Risk
3. Control
Identification
and Rating
Impact
Frequency | Severity
Risk Type
4. Residual
Risk Scoring
Process
Control Effectiveness
Attributes
Key, Type
Control Layer
Business
Domains
Scorecard
Dependencies
Applications
Cyber Scenarios and
Trigger Events Active | Passive Risk
New FocusRenewed focus
Key Risk Indicators
Target Residual Risk
Value
Control Assessment Types
Risk Control Self Assessment | Third Party | Applications | Infrastructure | Regulatory
Copyright © 2015 Accenture All rights reserved. 11
Scenario:
• Disgruntled employee
with access to customer
data
• Employee working
during non-working
hours
• Downloading of files
which vary from peer
group
• It is month end and high
IT usage is expected
Example Controls
Use case: Identifying insider threats based upon system and physical
access to firm-wide assets with privacy data.
Controls to Mitigate:
• Security – Abnormal physical access
records vs normal patterns
• HR –Poor recent performance from
supervisors, LinkedIn® resume updated
• IT – Alerts with network, server or
database patterns which are historically
misaligned to normal business operations
• Business – Correlate data usage by peer
group for high impact activities related to
reporting/extracts
• IT – Abort or suspend reporting when
thresholds are reached for exporting or
querying data
C1
C2
C3
C4
C5
Risk Score:
68/100
67/100
35/100
75/100
45/100
Investigate
Priority #3 – Measurement with a
Purpose
Copyright © 2015 Accenture All rights reserved. 13
Measurement with a Purpose
Common categories to consider for Cyber Risk Reporting
1. Board Level Reporting 2. IT Risks 3. Operational
4. Advanced
Analytics
Infrastructure
Third Parties
SoftwareInternal
Employee Training
Data Loss Prevention
Employee Monitoring
External
Vulnerabilities
Surveillance
Funding
Risk/Reward
Decisions
IT Operations
Fraud
Target Residual Risk
Access
Management
Physical SecurityHigh Crimes and
Investigation
New FocusRenewed focus
Priority #4 – Operating Model
Copyright © 2015 Accenture All rights reserved. 15
Embed the first line of defense within technology organization.
Create a centralized office with technology control officers across
business lines which just focus upon IT.
Cyber Risk Operating Models
An operating model defines the organization’s accountability for doing the
work, supporting the right decisions and measuring effectiveness.
Centralize an entire department as 2nd line of defense with
examinations across the lines of business. Build highly specialized
team and track similar to compliance function.
Policy setting organization and influencer similar to data and
privacy. Develop risk frameworks around IT, data integrity, and
operations and run as 2nd line of defense.
Create an enterprise-wide risk function dedicated to identify,
measure and respond to threats.
Option 1 – Dedicated
Function
Option 0 – IT Centric
Option 2 – Cyber Czar
Option 3 – Risk Led
Copyright © 2015 Accenture All rights reserved. 16
Operating Model Analysis
Each option should consider the tradeoffs with the firm’s ability to Prevent
and Detect Threats.
Efficiency
Ability to Prevent and Detect Threats
Low
High
High
Option 0 – IT Centric
Option 1 – Dedicated
Function
Option 2 – Cyber Czar
Option 3 – Risk Led
Copyright © 2015 Accenture All rights reserved. 17
Operating Model Analysis
Each option should consider the tradeoffs with the firm’s ability to Prevent
and Detect Threats.
Ability to Prevent and Detect Threats
Low
High
High
ValuetoCustomer
Option 0 – IT Centric
Option 1 – Dedicated
FunctionOption 2 – Cyber Czar
Option 3 – Risk Led
Copyright © 2015 Accenture All rights reserved. 18
Operating Model Analysis
Each option should consider the tradeoffs with the firm’s ability to Prevent
and Detect Threats.
Ability to Prevent and Detect Threats
Low
High
High
SpeedtoExecute
Option 0 – IT Centric
Option 1 – Dedicated
Function
Option 2 – Cyber Czar
Option 3 – Risk Led
Priority #5 – Resilience
Copyright © 2015 Accenture All rights reserved. 20
A Comprehensive Approach Helps Protect the Full Breadth
of Entry Points and Operations which Underpin Financial
Services Organizations
Detect
IdentifyRespond
Prevent
Detection and
Identification – Tools
and metrics to identify
and log aspects to
manage operations
Operational Monitoring –
Aligning the tools to identify and
detect threats along with their
escalation and oversight
Event Response Plan – Structure
to identify and manage action plans
Business and IT
Controls – Oversight of
the controls and their testing
programs and how to leverage
COBIT®, ISA, ISO/IEC, NIST
controls
Operating Model –
Specifying the structure with
people, organization, roles, tools
and processes to govern
Crisis Management –
Structure to manage incidents
and notify impacted parties
Risk Events - Scenarios
which can impact the organization
specific to Cyber threats
Risk Identification – Aggregated set
of typical risk associated with Cyber Risk
How do we
respond?
What is the
impact?
How do we
organize?
How do we
monitor?
Copyright © 2015 Accenture All rights reserved. 21
Resilience
The ability to operate the business processes in normal and adverse
scenarios without adverse outcomes
Intgerated:
Identify,Prevent,Detect
Response:
Everyscenario
Glossary
CBEST: Bank of England vulnerability testing framework
CFTC: U.S. Commodity Futures Trading Commission
COBIT: Control Objectives for Information and Related Technology. COBIT® is a trademark of
ISACA® registered in the United States and other countries.
IEC: International Electrotechnical Commission
ISA: Information Society of Automation
ISO: International Organization for Standardization
Fed: Federal Reserve System
FFIEC: Federal Financial Institutions Examination Council
FINRA: Financial Industry Regulatory Authority
HKMA: Hong Kong Monetary Authority
NIST: National Institute of Standards and Technology
SEC: Securities and Exchange Commission
SG CA: Cyber Security Agency of Singapore
RiskMinds Operational Risk:
Building Cyber Resilience
Disclaimer:
This presentation is intended for general informational purposes only and does not take into account the
reader’s specific circumstances, and may not reflect the most current developments. Accenture disclaims,
to the fullest extent permitted by applicable law, any and all liability for the accuracy and completeness of
the information in this presentation and for any acts or omissions made based on such
information. Accenture does not provide legal, regulatory, audit, or tax advice. Readers are responsible
for obtaining such advice from their own legal counsel or other licensed professionals.
About Accenture
Accenture is a leading global professional services company, providing a broad range of services and
solutions in strategy, consulting, digital, technology and operations. Combining unmatched experience and
specialized skills across more than 40 industries and all business functions—underpinned by the world’s
largest delivery network—Accenture works at the intersection of business and technology to help clients
improve their performance and create sustainable value for their stakeholders. With more than 358,000
people serving clients in more than 120 countries, Accenture drives innovation to improve the way the
world works and lives. Visit us at www.accenture.com
Accenture, its logo, and High Performance Delivered are trademarks of Accenture.
Rights to trademarks referenced herein, other than Accenture trademarks, belong to their respective
owners. We disclaim proprietary interest in the marks and names of others.
Learn more about cyber risk and resilience:
www.accenture.com/CyberRisk

More Related Content

Viewers also liked

Shift Toward Dynamic Cyber Resilience
Shift Toward Dynamic Cyber ResilienceShift Toward Dynamic Cyber Resilience
Shift Toward Dynamic Cyber ResilienceDarren Argyle
 
A Manifesto for Cyber Resilience
A Manifesto for Cyber ResilienceA Manifesto for Cyber Resilience
A Manifesto for Cyber ResilienceSymantec
 
3Q2016 LinkedIn MDM, RDM & Data Governance special interest group analysis
3Q2016 LinkedIn MDM, RDM & Data Governance special interest group analysis3Q2016 LinkedIn MDM, RDM & Data Governance special interest group analysis
3Q2016 LinkedIn MDM, RDM & Data Governance special interest group analysisAaron Zornes
 
Cybersecurity Trends and CyberVision : 2015 - 2025
Cybersecurity Trends and CyberVision : 2015 - 2025Cybersecurity Trends and CyberVision : 2015 - 2025
Cybersecurity Trends and CyberVision : 2015 - 2025Dr David Probert
 
Accenture 2015 Global Risk Management Study: Banking Report Key Findings and ...
Accenture 2015 Global Risk Management Study: Banking Report Key Findings and ...Accenture 2015 Global Risk Management Study: Banking Report Key Findings and ...
Accenture 2015 Global Risk Management Study: Banking Report Key Findings and ...accenture
 
EC-Council Computer Hacking Forensic Investigator v9
EC-Council Computer Hacking Forensic Investigator v9EC-Council Computer Hacking Forensic Investigator v9
EC-Council Computer Hacking Forensic Investigator v9ITpreneurs
 
ASFWS 2011 : Cyberguerre et Infrastructures critiques : Menaces & Risques
ASFWS 2011 : Cyberguerre et Infrastructures critiques : Menaces & RisquesASFWS 2011 : Cyberguerre et Infrastructures critiques : Menaces & Risques
ASFWS 2011 : Cyberguerre et Infrastructures critiques : Menaces & RisquesCyber Security Alliance
 
Critical Controls Of Cyber Defense
Critical Controls Of Cyber DefenseCritical Controls Of Cyber Defense
Critical Controls Of Cyber DefenseRishu Mehra
 
Mergers & Acquisitions It Implications
Mergers & Acquisitions   It ImplicationsMergers & Acquisitions   It Implications
Mergers & Acquisitions It Implicationsllangin
 
Accenture 2015 Global Risk Management Study: Risk Masters infographic
Accenture 2015 Global Risk Management Study: Risk Masters infographicAccenture 2015 Global Risk Management Study: Risk Masters infographic
Accenture 2015 Global Risk Management Study: Risk Masters infographicaccenture
 
Operational Risk Management - A Gateway to managing the risk profile of your...
Operational Risk Management -  A Gateway to managing the risk profile of your...Operational Risk Management -  A Gateway to managing the risk profile of your...
Operational Risk Management - A Gateway to managing the risk profile of your...Eneni Oduwole
 
Cyber Security in Manufacturing
Cyber Security in ManufacturingCyber Security in Manufacturing
Cyber Security in ManufacturingCentraComm
 
Partner Transformation for Hybrid Cloud Management
Partner Transformation for Hybrid Cloud ManagementPartner Transformation for Hybrid Cloud Management
Partner Transformation for Hybrid Cloud ManagementVistara
 
Liquid Workforce - Tech Vision 2016 Trend 2
Liquid Workforce - Tech Vision 2016 Trend 2Liquid Workforce - Tech Vision 2016 Trend 2
Liquid Workforce - Tech Vision 2016 Trend 2accenture
 

Viewers also liked (15)

Shift Toward Dynamic Cyber Resilience
Shift Toward Dynamic Cyber ResilienceShift Toward Dynamic Cyber Resilience
Shift Toward Dynamic Cyber Resilience
 
A Manifesto for Cyber Resilience
A Manifesto for Cyber ResilienceA Manifesto for Cyber Resilience
A Manifesto for Cyber Resilience
 
3Q2016 LinkedIn MDM, RDM & Data Governance special interest group analysis
3Q2016 LinkedIn MDM, RDM & Data Governance special interest group analysis3Q2016 LinkedIn MDM, RDM & Data Governance special interest group analysis
3Q2016 LinkedIn MDM, RDM & Data Governance special interest group analysis
 
Cybersecurity Trends and CyberVision : 2015 - 2025
Cybersecurity Trends and CyberVision : 2015 - 2025Cybersecurity Trends and CyberVision : 2015 - 2025
Cybersecurity Trends and CyberVision : 2015 - 2025
 
Accenture 2015 Global Risk Management Study: Banking Report Key Findings and ...
Accenture 2015 Global Risk Management Study: Banking Report Key Findings and ...Accenture 2015 Global Risk Management Study: Banking Report Key Findings and ...
Accenture 2015 Global Risk Management Study: Banking Report Key Findings and ...
 
EC-Council Computer Hacking Forensic Investigator v9
EC-Council Computer Hacking Forensic Investigator v9EC-Council Computer Hacking Forensic Investigator v9
EC-Council Computer Hacking Forensic Investigator v9
 
ASFWS 2011 : Cyberguerre et Infrastructures critiques : Menaces & Risques
ASFWS 2011 : Cyberguerre et Infrastructures critiques : Menaces & RisquesASFWS 2011 : Cyberguerre et Infrastructures critiques : Menaces & Risques
ASFWS 2011 : Cyberguerre et Infrastructures critiques : Menaces & Risques
 
Critical Controls Of Cyber Defense
Critical Controls Of Cyber DefenseCritical Controls Of Cyber Defense
Critical Controls Of Cyber Defense
 
Mergers & Acquisitions It Implications
Mergers & Acquisitions   It ImplicationsMergers & Acquisitions   It Implications
Mergers & Acquisitions It Implications
 
Accenture 2015 Global Risk Management Study: Risk Masters infographic
Accenture 2015 Global Risk Management Study: Risk Masters infographicAccenture 2015 Global Risk Management Study: Risk Masters infographic
Accenture 2015 Global Risk Management Study: Risk Masters infographic
 
Operational Risk Management - A Gateway to managing the risk profile of your...
Operational Risk Management -  A Gateway to managing the risk profile of your...Operational Risk Management -  A Gateway to managing the risk profile of your...
Operational Risk Management - A Gateway to managing the risk profile of your...
 
Cyber Security in Manufacturing
Cyber Security in ManufacturingCyber Security in Manufacturing
Cyber Security in Manufacturing
 
Cyber resilience (building the cyber security governance) isaca id tech ses ...
Cyber resilience (building the cyber security governance)  isaca id tech ses ...Cyber resilience (building the cyber security governance)  isaca id tech ses ...
Cyber resilience (building the cyber security governance) isaca id tech ses ...
 
Partner Transformation for Hybrid Cloud Management
Partner Transformation for Hybrid Cloud ManagementPartner Transformation for Hybrid Cloud Management
Partner Transformation for Hybrid Cloud Management
 
Liquid Workforce - Tech Vision 2016 Trend 2
Liquid Workforce - Tech Vision 2016 Trend 2Liquid Workforce - Tech Vision 2016 Trend 2
Liquid Workforce - Tech Vision 2016 Trend 2
 

More from accenture

The Industrialist: Trends & Innovations - January 2024
The Industrialist: Trends & Innovations - January 2024The Industrialist: Trends & Innovations - January 2024
The Industrialist: Trends & Innovations - January 2024accenture
 
The Industrialist: Trends & Innovations - September 2023
The Industrialist: Trends & Innovations - September 2023The Industrialist: Trends & Innovations - September 2023
The Industrialist: Trends & Innovations - September 2023accenture
 
Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education accenture
 
The Industrialist: Trends & Innovations - July 2023
The Industrialist: Trends & Innovations - July 2023The Industrialist: Trends & Innovations - July 2023
The Industrialist: Trends & Innovations - July 2023accenture
 
Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education accenture
 
Engineering Services: con gli ingegneri per creare valore sostenibile
Engineering Services: con gli ingegneri per creare valore sostenibileEngineering Services: con gli ingegneri per creare valore sostenibile
Engineering Services: con gli ingegneri per creare valore sostenibileaccenture
 
Digital Euro: Implications for the Financial System
Digital Euro: Implications for the Financial SystemDigital Euro: Implications for the Financial System
Digital Euro: Implications for the Financial Systemaccenture
 
More deals, less money: the Black founder funding journey
More deals, less money: the Black founder funding journeyMore deals, less money: the Black founder funding journey
More deals, less money: the Black founder funding journeyaccenture
 
The Industrialist: Trends & Innovations - June 2023
The Industrialist: Trends & Innovations - June 2023The Industrialist: Trends & Innovations - June 2023
The Industrialist: Trends & Innovations - June 2023accenture
 
Reinventing Enterprise Operations
Reinventing Enterprise OperationsReinventing Enterprise Operations
Reinventing Enterprise Operationsaccenture
 
Semiconductor Gender Parity Study
Semiconductor Gender Parity StudySemiconductor Gender Parity Study
Semiconductor Gender Parity Studyaccenture
 
The Industrialist: Trends & Innovations - March 2023
The Industrialist: Trends & Innovations - March 2023The Industrialist: Trends & Innovations - March 2023
The Industrialist: Trends & Innovations - March 2023accenture
 
Nonprofit reinvention in a time of unprecedented change
 Nonprofit reinvention in a time of unprecedented change Nonprofit reinvention in a time of unprecedented change
Nonprofit reinvention in a time of unprecedented changeaccenture
 
Free to be 100% me
Free to be 100% meFree to be 100% me
Free to be 100% meaccenture
 
The Industrialist: Trends & Innovations - February 2023
The Industrialist: Trends & Innovations - February 2023The Industrialist: Trends & Innovations - February 2023
The Industrialist: Trends & Innovations - February 2023accenture
 
Mundo gamer e a oportunidade de entrada pela abordagem do movimento
Mundo gamer e a oportunidade de entrada pela abordagem do movimentoMundo gamer e a oportunidade de entrada pela abordagem do movimento
Mundo gamer e a oportunidade de entrada pela abordagem do movimentoaccenture
 
Pathways to Profitability for the Communications Industry
Pathways to Profitability for the Communications IndustryPathways to Profitability for the Communications Industry
Pathways to Profitability for the Communications Industryaccenture
 
The Industrialist: Trends & Innovations - January 2023
The Industrialist: Trends & Innovations - January 2023The Industrialist: Trends & Innovations - January 2023
The Industrialist: Trends & Innovations - January 2023accenture
 
Reimagining the Agenda | Accenture
Reimagining the Agenda | AccentureReimagining the Agenda | Accenture
Reimagining the Agenda | Accentureaccenture
 
Climate Leadership Eleventh Hour | Accenture
Climate Leadership Eleventh Hour | AccentureClimate Leadership Eleventh Hour | Accenture
Climate Leadership Eleventh Hour | Accentureaccenture
 

More from accenture (20)

The Industrialist: Trends & Innovations - January 2024
The Industrialist: Trends & Innovations - January 2024The Industrialist: Trends & Innovations - January 2024
The Industrialist: Trends & Innovations - January 2024
 
The Industrialist: Trends & Innovations - September 2023
The Industrialist: Trends & Innovations - September 2023The Industrialist: Trends & Innovations - September 2023
The Industrialist: Trends & Innovations - September 2023
 
Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education
 
The Industrialist: Trends & Innovations - July 2023
The Industrialist: Trends & Innovations - July 2023The Industrialist: Trends & Innovations - July 2023
The Industrialist: Trends & Innovations - July 2023
 
Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education
 
Engineering Services: con gli ingegneri per creare valore sostenibile
Engineering Services: con gli ingegneri per creare valore sostenibileEngineering Services: con gli ingegneri per creare valore sostenibile
Engineering Services: con gli ingegneri per creare valore sostenibile
 
Digital Euro: Implications for the Financial System
Digital Euro: Implications for the Financial SystemDigital Euro: Implications for the Financial System
Digital Euro: Implications for the Financial System
 
More deals, less money: the Black founder funding journey
More deals, less money: the Black founder funding journeyMore deals, less money: the Black founder funding journey
More deals, less money: the Black founder funding journey
 
The Industrialist: Trends & Innovations - June 2023
The Industrialist: Trends & Innovations - June 2023The Industrialist: Trends & Innovations - June 2023
The Industrialist: Trends & Innovations - June 2023
 
Reinventing Enterprise Operations
Reinventing Enterprise OperationsReinventing Enterprise Operations
Reinventing Enterprise Operations
 
Semiconductor Gender Parity Study
Semiconductor Gender Parity StudySemiconductor Gender Parity Study
Semiconductor Gender Parity Study
 
The Industrialist: Trends & Innovations - March 2023
The Industrialist: Trends & Innovations - March 2023The Industrialist: Trends & Innovations - March 2023
The Industrialist: Trends & Innovations - March 2023
 
Nonprofit reinvention in a time of unprecedented change
 Nonprofit reinvention in a time of unprecedented change Nonprofit reinvention in a time of unprecedented change
Nonprofit reinvention in a time of unprecedented change
 
Free to be 100% me
Free to be 100% meFree to be 100% me
Free to be 100% me
 
The Industrialist: Trends & Innovations - February 2023
The Industrialist: Trends & Innovations - February 2023The Industrialist: Trends & Innovations - February 2023
The Industrialist: Trends & Innovations - February 2023
 
Mundo gamer e a oportunidade de entrada pela abordagem do movimento
Mundo gamer e a oportunidade de entrada pela abordagem do movimentoMundo gamer e a oportunidade de entrada pela abordagem do movimento
Mundo gamer e a oportunidade de entrada pela abordagem do movimento
 
Pathways to Profitability for the Communications Industry
Pathways to Profitability for the Communications IndustryPathways to Profitability for the Communications Industry
Pathways to Profitability for the Communications Industry
 
The Industrialist: Trends & Innovations - January 2023
The Industrialist: Trends & Innovations - January 2023The Industrialist: Trends & Innovations - January 2023
The Industrialist: Trends & Innovations - January 2023
 
Reimagining the Agenda | Accenture
Reimagining the Agenda | AccentureReimagining the Agenda | Accenture
Reimagining the Agenda | Accenture
 
Climate Leadership Eleventh Hour | Accenture
Climate Leadership Eleventh Hour | AccentureClimate Leadership Eleventh Hour | Accenture
Climate Leadership Eleventh Hour | Accenture
 

Recently uploaded

Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 

Recently uploaded (20)

Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 

Cyber and Operational Risk: Building Cyber Resilience

  • 2. Copyright © 2015 Accenture All rights reserved. 2 • People are often the weakest link – employees, vendors, customers • Attacks span the traditional defenses – physical security, manipulation of staff, fraud, application security, malware • Digital assets create more entry points • It is not a matter of IF but to WHAT EXTENT you are compromised Building Cyber Resilience We have heard from multiple #RiskMind2015 presentations that this is a growing problem
  • 3. Copyright © 2015 Accenture All rights reserved. 3 Global Regulatory Landscape The Regulatory Landscape is changing rapidly to address these concerns. (FFIEC) Pilot Cybersecurity Assessment (FINRA) Equities Trading Initiatives and Securities trader Registration Q4 2014 Q1-3 2015 Q4 2015 2016 (SEC) Cyber Exams, Issues Risk Alert (FFIEC) Cybersecurity Assessment Tool (CFTC) Cybersecurity Requirements (Fed) Cybersecurity Information Sharing Act (SG CSA) National Cyber Security Masterplan 2018 (SEC) IM Cybersecurity Guidelines Future/Proposed Rules Current Rules (NIST) Cybersecurity Framework Q3 2014 2016 (CFTC) High Speed Trading Rules (SEC) High Frequency Trading Rules (HKMA) Cybersecurity Risk Management Circular (BoE) CBEST Vulnerability Testing Framework Source: Accenture analysis based upon publicly available data.
  • 4. Copyright © 2015 Accenture All rights reserved. 4 1. Training and Risk Culture – Taking your unique organization and infusing the right cyber risk behaviors 2. Controls – Where are the weak points – build robust set of controls across operations, business and IT 3. Measurement with a Purpose – What is going on without you knowing it – creating metrics which expose the risks 4. Operating Model – How do you work with the rest of the organization - assigning clear lines of accountability and ownership 5. Resilience – At some point it will go wrong, be prepared The Top 5 Priorities to Get Right We will discuss 5 priorities and determine as a group if these are the top priorities
  • 5. Priority #1 – Training and Culture
  • 6. Copyright © 2015 Accenture All rights reserved. 6 Cyber Risk Culture View of the Organization How does your organization’s culture span these quadrants? High Sociability Low Sociability High SolidarityLow Solidarity Networked Cohesive Fragmented Task Masters The “Investment Bank” The “Outsourced” Bank” The M&A growth “Regional Bank” The Organic growth “Retail Bank” Influence of relationships Influence of the “drive” to meet common goals
  • 7. Copyright © 2015 Accenture All rights reserved. 7 • Dynamic • Ideas flow freely • Metrics driven • Centralized Cyber Function • Decompose and define approaches • No single solution • Identify problem segments High Sociability Low Sociability High Solidarity Low Solidarity Networked Cohesive Fragmented Task Masters The “Investment Bank” The “Outsourced” Bank” The M&A growth “Regional Bank” The Organic growth “Retail Bank” Influence of relationships Influence of the “drive” to meet common goals Training and Culture Cultural View of the Organization How does your organization’s culture span these quadrants? • Consensus driven • Proud of brand • Emulate role models • Tone from the top • Individual accountability • Incentives distort risk and culture • Based on strong controls • Clear metrics
  • 8. Copyright © 2015 Accenture All rights reserved. 8 Cyber Risk Pulse Check A highly engaging and dynamic diagnostic that rapidly assesses employee understanding of Cyber Security best practices and provides data-driven insights and benchmarking for your firm. E N G A G E M O T I V A T E A N A L Y Z E Designed with advanced learning methods and game mechanics to create an immersive experience First ever NYSE benchmark on Cyber Security that will allow for comparative analysis against cross-industry participants Dynamic diagnostic environment that highlights the critical importance of Cyber Security, driving behavioral and cultural change http://pages.s6.exacttarget.com/page.aspx?QS=c76003443ff9837d 8ef9974a19a99cfa5f994776888b6bfc6115f9e9e82e4c33&campaig n=701E0000000xb2E NYSE
  • 9. Priority #2 – Controls
  • 10. Copyright © 2015 Accenture All rights reserved. 10 Controls (Cyber Risk Enhancements Requirements) Traditional control frameworks evaluate effectiveness through an operational risk approach focused on residual risk. 1. Business / IT Process 2. Risk Identification and Inherent Risk 3. Control Identification and Rating Impact Frequency | Severity Risk Type 4. Residual Risk Scoring Process Control Effectiveness Attributes Key, Type Control Layer Business Domains Scorecard Dependencies Applications Cyber Scenarios and Trigger Events Active | Passive Risk New FocusRenewed focus Key Risk Indicators Target Residual Risk Value Control Assessment Types Risk Control Self Assessment | Third Party | Applications | Infrastructure | Regulatory
  • 11. Copyright © 2015 Accenture All rights reserved. 11 Scenario: • Disgruntled employee with access to customer data • Employee working during non-working hours • Downloading of files which vary from peer group • It is month end and high IT usage is expected Example Controls Use case: Identifying insider threats based upon system and physical access to firm-wide assets with privacy data. Controls to Mitigate: • Security – Abnormal physical access records vs normal patterns • HR –Poor recent performance from supervisors, LinkedIn® resume updated • IT – Alerts with network, server or database patterns which are historically misaligned to normal business operations • Business – Correlate data usage by peer group for high impact activities related to reporting/extracts • IT – Abort or suspend reporting when thresholds are reached for exporting or querying data C1 C2 C3 C4 C5 Risk Score: 68/100 67/100 35/100 75/100 45/100 Investigate
  • 12. Priority #3 – Measurement with a Purpose
  • 13. Copyright © 2015 Accenture All rights reserved. 13 Measurement with a Purpose Common categories to consider for Cyber Risk Reporting 1. Board Level Reporting 2. IT Risks 3. Operational 4. Advanced Analytics Infrastructure Third Parties SoftwareInternal Employee Training Data Loss Prevention Employee Monitoring External Vulnerabilities Surveillance Funding Risk/Reward Decisions IT Operations Fraud Target Residual Risk Access Management Physical SecurityHigh Crimes and Investigation New FocusRenewed focus
  • 14. Priority #4 – Operating Model
  • 15. Copyright © 2015 Accenture All rights reserved. 15 Embed the first line of defense within technology organization. Create a centralized office with technology control officers across business lines which just focus upon IT. Cyber Risk Operating Models An operating model defines the organization’s accountability for doing the work, supporting the right decisions and measuring effectiveness. Centralize an entire department as 2nd line of defense with examinations across the lines of business. Build highly specialized team and track similar to compliance function. Policy setting organization and influencer similar to data and privacy. Develop risk frameworks around IT, data integrity, and operations and run as 2nd line of defense. Create an enterprise-wide risk function dedicated to identify, measure and respond to threats. Option 1 – Dedicated Function Option 0 – IT Centric Option 2 – Cyber Czar Option 3 – Risk Led
  • 16. Copyright © 2015 Accenture All rights reserved. 16 Operating Model Analysis Each option should consider the tradeoffs with the firm’s ability to Prevent and Detect Threats. Efficiency Ability to Prevent and Detect Threats Low High High Option 0 – IT Centric Option 1 – Dedicated Function Option 2 – Cyber Czar Option 3 – Risk Led
  • 17. Copyright © 2015 Accenture All rights reserved. 17 Operating Model Analysis Each option should consider the tradeoffs with the firm’s ability to Prevent and Detect Threats. Ability to Prevent and Detect Threats Low High High ValuetoCustomer Option 0 – IT Centric Option 1 – Dedicated FunctionOption 2 – Cyber Czar Option 3 – Risk Led
  • 18. Copyright © 2015 Accenture All rights reserved. 18 Operating Model Analysis Each option should consider the tradeoffs with the firm’s ability to Prevent and Detect Threats. Ability to Prevent and Detect Threats Low High High SpeedtoExecute Option 0 – IT Centric Option 1 – Dedicated Function Option 2 – Cyber Czar Option 3 – Risk Led
  • 19. Priority #5 – Resilience
  • 20. Copyright © 2015 Accenture All rights reserved. 20 A Comprehensive Approach Helps Protect the Full Breadth of Entry Points and Operations which Underpin Financial Services Organizations Detect IdentifyRespond Prevent Detection and Identification – Tools and metrics to identify and log aspects to manage operations Operational Monitoring – Aligning the tools to identify and detect threats along with their escalation and oversight Event Response Plan – Structure to identify and manage action plans Business and IT Controls – Oversight of the controls and their testing programs and how to leverage COBIT®, ISA, ISO/IEC, NIST controls Operating Model – Specifying the structure with people, organization, roles, tools and processes to govern Crisis Management – Structure to manage incidents and notify impacted parties Risk Events - Scenarios which can impact the organization specific to Cyber threats Risk Identification – Aggregated set of typical risk associated with Cyber Risk How do we respond? What is the impact? How do we organize? How do we monitor?
  • 21. Copyright © 2015 Accenture All rights reserved. 21 Resilience The ability to operate the business processes in normal and adverse scenarios without adverse outcomes Intgerated: Identify,Prevent,Detect Response: Everyscenario
  • 22. Glossary CBEST: Bank of England vulnerability testing framework CFTC: U.S. Commodity Futures Trading Commission COBIT: Control Objectives for Information and Related Technology. COBIT® is a trademark of ISACA® registered in the United States and other countries. IEC: International Electrotechnical Commission ISA: Information Society of Automation ISO: International Organization for Standardization Fed: Federal Reserve System FFIEC: Federal Financial Institutions Examination Council FINRA: Financial Industry Regulatory Authority HKMA: Hong Kong Monetary Authority NIST: National Institute of Standards and Technology SEC: Securities and Exchange Commission SG CA: Cyber Security Agency of Singapore
  • 23. RiskMinds Operational Risk: Building Cyber Resilience Disclaimer: This presentation is intended for general informational purposes only and does not take into account the reader’s specific circumstances, and may not reflect the most current developments. Accenture disclaims, to the fullest extent permitted by applicable law, any and all liability for the accuracy and completeness of the information in this presentation and for any acts or omissions made based on such information. Accenture does not provide legal, regulatory, audit, or tax advice. Readers are responsible for obtaining such advice from their own legal counsel or other licensed professionals. About Accenture Accenture is a leading global professional services company, providing a broad range of services and solutions in strategy, consulting, digital, technology and operations. Combining unmatched experience and specialized skills across more than 40 industries and all business functions—underpinned by the world’s largest delivery network—Accenture works at the intersection of business and technology to help clients improve their performance and create sustainable value for their stakeholders. With more than 358,000 people serving clients in more than 120 countries, Accenture drives innovation to improve the way the world works and lives. Visit us at www.accenture.com Accenture, its logo, and High Performance Delivered are trademarks of Accenture. Rights to trademarks referenced herein, other than Accenture trademarks, belong to their respective owners. We disclaim proprietary interest in the marks and names of others.
  • 24. Learn more about cyber risk and resilience: www.accenture.com/CyberRisk

Editor's Notes

  1. FFIEC Cybersecurity Assessment Tool is a collaboration between FDIC, OCC, FRB, CFPB, NCUA & SLC
  2. What training programs are working? What is not working? What are some of the common training principles which are most effective? What role has culture played in the formulation of an overall strategy? What are the nuances of your culture which present challenges?
  3. Sociability: How well people get on socially Solidarity: Goal orientation and team performance Four Cultures Networked (high on people focus, low and task focus) Communal (high people and high task) Mercenary (low people, high task) Fragmented (low people, low task) The model will predicting the success with which structured approaches to manage risk are implemented in an organization. In general low scores in sociability and solidarity create a barrier to implement effective management of risk As an example a Networked organization (high levels of social interactions and low tolerance for rules and procedures) would respond better by participating in a cyber risk workshop to facilitate change versus a Mercenary culture that would accept any changes more easily as getting the task done is more important than the addressing the people needs. The key is to understand the current culture and worked with that culture to facilitate change. All of the cultures has a upside and downside as it relates to managing cyber risk however research indicates that organizations should seek to strengthen both their sociability and Solidarity rating in order to implement risk management more effectively.
  4. Training and Risk Culture What is required regardless of Quadrant? Curriculum Alignment to Corporate Standards across compliance, privacy & IT Refresh content but align to long term curriculum Assess high-risk areas Do not create “Check-in-the-box” Make it easy for people to understand “who to contact” Experience & Tracking Make learning fun Promote good practices by recognizing star performers, departments or “whistle-blowers” Track adherence across employees and third parties Invest in third parties and partners to understand their practices and commitment to your organization Send fake “phishing emails” to see if they are reported
  5. What aspects of your control framework are you adapting for Cyber Risk? How do you place value on risks and the cost to mitigate a control? How do you articulate business value and prioritize against residual risk? Are residual risk modelling the prevailing approach for Cyber Risk? Do you intend to leverage RCSA or are their other assessments which are becoming more relevant?
  6. How have the measurement techniques evolved? What are challenges with your transformation? How would you prioritize measurement initiatives within your bank?
  7. Where is your organization on the journey of Cyber Risk operating model? Which option are most closely aligned today and where are you going? What are the key barriers to overcome your selected option? Where there any options which your team feels would be more appropriate?
  8. Option 0 – Do nothing, embedded with IT Option 1- How compliance is organized, dec
  9. Are you actively conducting Resiliency Management Exercises? What lessons have you learned from actual attacks or events?