Towards SME Digital Resilience Unpacking the APEC Guidebook

Slides:



Advertisements
Similar presentations
Dr Lami Kaya ISO Information Security Management System (ISMS) Certification Overview Dr Lami Kaya
Advertisements

PhoenixPro Procurement. technology. contracts. projects.
P1-P2-M1-D1-D2.
Agenda COBIT 5 Product Family Information Security COBIT 5 content
3rd Party Risk Categorization Process
Fraud Prevention and Risk Management
Cybercrime Outlook on African banks Adwo Heintjes Global Head IT Audit & Ops Rabobank.
Unit 4 – Impact of the use of IT on Business Systems.
1 Oppliger: Ch. 15 Risk Management. 2 Outline Introduction Formal risk analysis Alternative risk analysis approaches/technologies –Security scanning –Intrusion.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Forensics Services September 10, 2007.
Thomas Levy. Agenda 1.Aims: Reducing Cyber Risk 2.Information Risk Management 3.Secure Configuration 4.Network Security 5.Managing User Access 6.Education.
WHAT IS VIRUS? NAE GRAND CHALLENGE SECURE CYBERSPACE.
Can your team outwit, outplay and outlast your opponents to be the ultimate CyberSurvivor?
Cyber Security & Fraud – The impact on small businesses.
Mid-West Electric Consumers Association Board Meeting Mark A. Gabriel Administrator.
Institutional affiliation Date.  Security is very important as it keeps your secret from other know.  An insecure network exposes a business to various.
Ewan Donald Cyber Security FEEL FREE A NEW APPROACH TO CYBER SECURITY.
ISMS Implementation Workshop Adaptive Processes Consulting Pvt. Ltd.
Alex Adamec.  Any physical or virtual information system that controls, processes, transmits, receives, or stores electronic information in any form.
MIS323 – Business Telecommunications Chapter 10 Security.
Cyber Security in the Mobile Era KEEPING ENTERPRISE DATA SAFE IN THE BYOD ERA.
Cyber Security – Client View Peter Gibbons | Head of Cyber Security, Group Business Services Suppliers’ Summer Conference 15/07/2015.
Risk Controls in IA Zachary Rensko COSC 481. Outline Definition Risk Control Strategies Risk Control Categories The Human Firewall Project OCTAVE.
Figure 1. Current Threat Landscape Sentiment From: ESG Research Report: Cyber Supply Chain Security Revisited. Source: Enterprise Strategy Group, 2015.
Surveillance and Security Systems Cyber Security Integration.
Threats & Challenges in the Digital World EY 2015 Global Information Security Survey.
The Need of CSIRT in Enterprise Keyur Desai – Vice President - IT
Figure 1. Current Threat Landscape Sentiment
Security and resilience for Smart Hospitals Key findings
Securing Information Systems
Proactive Incident Response
Cybersecurity: Risk Management
Cybersecurity as a Business Differentiator
Technology and Business Continuity
Cybersecurity - What’s Next? June 2017
Cyber Security Enterprise Risk Management: Key to an Organization’s Resilience Richard A. Spires CEO, Learning Tree International Former CIO, IRS and.
Network Security Basics: Malware and Attacks
and Security Management: ISO 28000
SMEs needs and challenges in a changing disaster context
Natural disaster (Flood, Earthquake etc.)
Information Technology Sector
Business Continuity Plan Training
IT and Project Management Best Practice Training
Securing Information Systems
Risk Assessment Richard Newman
8 Building Blocks of National Cyber Strategies
Andy Hall – Cyber & Tech INSURANCE Specialist
Personal Introduction
Threat Trends and Protection Strategies Barbara Laswell, Ph. D
David Sayago EU Research Funding Team Valorisation Centre.
Brandon Traffanstedt Systems Engineer - Southeast
Perspectives on Defense Cyber Issues
Cyber Risk & Cyber Insurance - Overview
Today’s Manufacturing Environment
Cyber security policy in an evolving landscape
CRITICAL INFRASTRUCTURE RESILIENCE INDEX (CIRI)
Community of Users.
Risk Mitigation & Incident Response Week 12
Cybersecurity Threat Assessment
Report E E – international mapping, second version
Final Conference 18 Set 2018.
Cyber Security in a Risk Management Framework
CYBER SECURITY SPACE OPERATIONS AND RESILIENCY.
Counter APT Counter APT HUNT operations combine best of breed endpoint detection response technology with an experienced cadre of cybersecurity experts.
Awareness and Auditor training kit
Computer System Security
CyberSecurity Strategy For Defendable ROI
CMGT/431 INFORMATION SYSTEMS SECURITY The Latest Version // uopcourse.com
CMGT 431 CMGT431 cmgt 431 cmgt431 Entire Course // uopstudy.com
Streamline your move to the cloud
Presentation transcript:

Towards SME Digital Resilience Unpacking the APEC Guidebook Aslam Perwaiz, Head, Disaster Risk Management Systems & Team Leader, iPrepare Business Facility of ADPC

The term “digital resilience”, therefore, refers to the capabilities of SMEs to respond to and recover from digital crises such as Internet security threats and cyber-attacks.

SMEs, cyber risk and resilience – to invest or not to invest? How much do Small and Medium Sized Enterprises (SMEs)  have to fear from cyber-attack? 74% of small businesses have suffered a cyber security breach, according to the PricewaterhouseCoopers 2015 Information Security Breaches survey . Of those affected, 38% suffered from viruses or malicious software while a further 16% were hit by a denial of service attack

Let us unzip it !

Key Steps Step 1: Understanding your ISMS requirements and forming an ISMS team Step 7: Selecting ISMS controls Step 8: Establishing a business continuity plan Step 2: Determining ISMS policies and objectives Step 9: Responding to and reporting information security incidents Step 3: Listing and categorizing information assets Step 4: Identifying and evaluating information asset risk Step 10: How to determine the effectiveness of your ISMS Step 5: Assessing information asset risk Step 11: Continuous ISMS improvement and problem follow-up Step 6: Producing a risk treatment plan

PDCA Cycle 3. Listing and categorizing information assets 4. Identifying and evaluating information asset risk 5. Assessing information asset risk 7. Selecting ISMS controls 8. Establishing a business continuity plan 9. Responding to and reporting information security incidents 1. Understanding your ISMS requirements and forming an ISMS team 2. Determining ISMS policies and objectives 10. How to determine the effective ness of your ISMS 6. Producing a risk treatment plan 11. Continuous ISMS improvement and problem follow-up

Key Words ISMS requirements ISMS team ISMS policies and objectives Information assets Information asset risk Risk treatment plan ISMS controls Business continuity plan Information security incidents ISMS effectiveness ISMS Improvement

Questions Aslam Perwaiz Team Leader iPrepare Business Facility of ADPC