Increasing customer value through effective security risk management

Slides:



Advertisements
Similar presentations
1 K P M G L L P A D V I S O R Y Changes in the IT Audit Profession Stephen G. Hasty, Jr. National Partner in Charge IT Advisory Savannah, GA January 4,
Advertisements

Driving change in information risk within the financial services industry Subtitle Date.
A clear and compelling business case… …for the individual
© 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential 14854_10_2008_c1 1 Holistic Approach to Information Security Greg Carter, Cisco Security.
Eurasian Economic Union – challenges and opportunities from customs perspective March 2015.
How well is the Life Insurance Industry keeping pace with rapidly changing technology? International Insurance Society 23 June 2014 London.
ACG 6415 SPRING 2012 KRISTIN DONOVAN & BETH WILDMAN IT Security Frameworks.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Start-ups & big business Competition or competitive advantage? Imperial Business Insights Lecture 13 February 2014.
Institute of Operational Risk Breakout Session - Operational Risk Nirvana KPMG Giles Triffitt Peter Watson Peter Docherty 1 November 2013.
16254_08_2002 © 2002, Cisco Systems, Inc. All rights reserved. Cisco’s Security Vision Mario Mazzola Chief Development Officer August 29, 2002.
1 Telstra in Confidence Managing Security for our Mobile Technology.
ADVISORY The business of information security – developing a business case IT ADVISORY.
Security Controls – What Works
Or, How to Spend Your Weekends… Fall 2007 Agenda General Overview of the CISO Arena Technical Security Information Security Strategic Security Kirk Bailey.
100% Security “ The only system which is truly secure is one which is switched off and unplugged, locked in a titanium lined safe, buried in a concrete.
V. Conferencia Internacional Antilavado de dinero y Contra el Financiamiento al Terrorismo Anti-Money Laundering Compliance for Broker/Dealers Current.
TRANSACTION SERVICES ADVISORY Romania conference – IPO process Victor Kevehazi, Senior Partner 18 October 2005.
© 2012 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual.
Information Technology Audit
Internal Auditing and Outsourcing
Information Security Compliance System Owner Training Richard Gadsden Information Security Office Office of the CIO – Information Services Sharon Knowles.
Audit Sampling: A Basic Understanding AGA-Baltimore Johnny Ramsey, Senior Manager KPMG Government Industry Sector September 20, 2012.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Information Security Governance 25 th June 2007 Gordon Micallef Vice President – ISACA MALTA CHAPTER.
SecureAware Building an Information Security Management System.
Unify and Simplify: Security Management
What Keeps You Awake at Night Compliance Corporate Governance Critical Infrastructure Are there regulatory risks? Do employees respect and adhere to internal.
Risk Management Reconstructed Implementing fraud risk intelligence practices July 2011 KPMG FORENSIC SM.
CORPORATE GOVERNANCE Regulatory expectations and current good practice Charles Cattell The Cattellyst Consultancy.
0 © 2013 KPMG, an Australian partnership and a member firm of the KPMG network of independent member firms affiliated with KPMG International Cooperative.
Joseph Ferracin Director IT Security Solutions Managing Security.
IT Internal Audit Survey Overview of survey findings May 2009 IT ADVISORY ADVISORY.
OMB Circular A-123 Lessons Learned OMB Circular A-123 Lessons Learned FEDERAL ADVISORY Sean Hoffman Partner KPMG LLP.
AUDIT FEI Career Management Group Qualifications for a Successful CFO/Controller in Today's Market December 3, 2009.
ADVISORY What do CIOs need for Career Progression? 18 th May 2005 Kumar Parakala, Global Chief Operating Officer, IT Advisory, KPMG 8 May 2007, Sydney,
© 2007 KPMG, the Malaysian member firm of KPMG International, a Swiss cooperative. All rights reserved. 1 Differing Roles of Internal Auditor and Risk.
September 30, 2008 BIBA ROUNDTABLE Regulatory Panel.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Communications-Electronics Security Group. Excellence in Infosec.
Executive Invitation – Oracle Data Finder Service Oracle Corporation.
Factors Associated with IT Audits by the Internal Audit Function Discussant Comments October 2, 2009 INFORMATION RISK MANAGEMENT ADVISORY.
GLOBAL SERVICE/ INDUSTRY AUDIT / TAX / ADVISORY / LINE OF BUSINESS Current Topics in Global Trade Management John Patrick O’Shea Senior Manager Trade and.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
1 Accounting systems design & evaluation Karen Lau 25 Feb 2002.
Security and Assurance in IT organization Name: Mai Hoang Nguyen Class: INFO 609 Professor: T. Rohm.
SecSDLC Chapter 2.
From cost to value: 2010 Global Survey on the CIO Agenda June 15 th, 2010 IT ADVISORY KPMG INTERNATIONAL.
FINANCIAL SERVICES ADVISORY SERVICES 13 March 2007 Challenges faced by consultants whilst consulting on Basel II.
Information Security Framework Regulatory Compliance and Reporting Auditing and Validation Metrics Definition and Collection Reporting (management, regulatory,
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
KPMG GOVERNMENT INSTITUTE The Future of Government Financial Reporting: Where Do We Go From Here? AGA Baltimore Chapter AUDIT Andrew C. Lewis, CPA, CGFM,
Linkage of Risk, Capital and Financial Management CAS Annual Meeting Aaron Halpert, ACAS, MAAA Leslie R. Marlo, FCAS, MAAA November 12, 2007 INSURANCE.
Trade Compliance Considerations April 13, © 2016 KPMG LLP, a Delaware limited liability partnership and the U.S. member firm of the KPMG network.
CSC4003: Computer and Information Security Professor Mark Early, M.B.A., CISSP, CISM, PMP, ITILFv3, ISO/IEC 27002, CNSS/NSA 4011.
Security Policy and Key Management Centrally Manage Encryption Keys - Oracle TDE, SQL Server TDE and Vormetric. Tina Stewart, Vice President.
Risk Assessments in Many Flavors George J. Dolicker, CISA, CISSP.
HEALTH AND SAFETY LEADERSHIP: MANDATORY NOT DISCRETIONARY David Sutton - Partner Erica Miles - Health and Safety Specialist KPMG Advisory May 2014 The.
Workshop 4: Developing a one page business case
KPMG university mentoring program
Learn Your Information Security Management System
Cisco Systems Architecture: Enterprise Resource Planning
امنیت اطلاعات و ضرورت آن
Brexit & The BVI Hard, Soft Or Over Easy? Implications & Opportunities
Rethinking classroom design
Professional services in papua new guinea
Presentation transcript:

Increasing customer value through effective security risk management INFORMATION RISK MANAGEMENT Increasing customer value through effective security risk management ADVISORY Rob Goldberg, CISSP Associate Director, Information Risk Management KPMG Risk Advisory Services March 2005

Overview Current global state of information security Case study: measuring information security effectiveness, enterprise-wide Closing remarks

Don’t believe the hype Click through each slide and discuss how the global media “latches” on to hackers, focusing on sensationalism. This creates “fear, uncertainty, and doubt” – the FUD factor among CEOs. Key messages: 1 – Hackers ARE a real threat, but not the main one, despite what the media says 2 – There are REAL documented losses, but there are also incidents that appear to have no motive behind them (such as the New Zealand story)

What is information security? What most people think of… “It’s what keeps the hackers out.” “It’s managing access to systems through the use of IDs and passwords.” “It’s the process of encrypting data so others can’t read it.” “It’s a barrier, preventing me from doing what I need to do.” These appear one at a time. Therefore, good idea would be to start the slide then ask the audience to answer the question. Get several answers from people then show the answers. Guaranteed to get some matches.

What is information security? Confidentiality Integrity Availability Keeping sensitive information protected Keeping information intact and valid Keeping information available and accessible Industry-accepted definition for security. Following 3 slides walk through each of these areas. Key message is that although most people think about Confidentiality when you talk information security (keeping people from seeing things they shouldn’t!), the reality is that it is comprised of all three of these and in business terms, Availability and Integrity are often much more important.

What is information security? Key facets of an information security program include: People – organisation, responsibility, accountability, and leadership Process – policies, procedures, and processes Technology – scalable technical support for automation, integration, and enabling of information security operations Ultimately, information security is the method by which an organisation ensures that it has control over its information

What’s happening in the world today: cause Intent Terrorism / Industrial Espionage Nuisance / Fame Curiosity Packet Forging/ Spoofing High Stealth Diagnostics Back Doors Sweepers Sophistication of Methods Sniffers Exploiting Known Vulnerabilities Hijacking Sessions Disabling Audits Self Replicating Code Technical Knowledge Required Password Cracking Key message is that unlike 20 years ago anyone can download a tool from the Internet and wreak havoc. Wouldn’t be a big deal if (1) we hadn’t become so dependent on technology and (2) the intent of the “bad guys” has gone from curiosity to terrorism. There’s much more at stake. Password Guessing Low 1980 1990 2000+

What’s happening in the world today: cause Terrorism threat / vulnerability is a clear and present danger HUGE increase in regulatory pressure Increasing pressure on 3rd party relationships / offshoring Larger impacts from worms / viruses (Sasser) Realisation that traditional model (IT security) doesn’t work Increasing realisation that standards-based approaches are best Audit committees, boards of directors and sr. execs more aware Phishing is currently the fastest-growing crime area

What’s happening in the world today: effect Increasing use of standards (ISO17799) Reporting on information security to board and audit committee Formal responsibilities of senior management for security Organisational changes to support increased visibility of security Increase in awareness programs (customers, suppliers and employees) Greater involvement of security in contract development Governments globally enforcing security-related regulations Companies adopting a “no security, no service” attitude

What’s happening in the world today: effect Board of Directors Business Partners Customers Shareholders Current Trend of Focus Supply Chain Organisation Business Process Re-visiting earlier slide – new focus is on increasing the areas of influence for information security. ONLY leading organisations (very few, globally) are doing this, but the trend will be to increase the scope of information security and use it to protect the interests of the stakeholders. Infrastructure

Case study: measuring information security effectiveness, enterprise-wide Business process focus: how well does security support execution of business strategy? Evaluation of business processes / sub-processes to understand risks associated with confidentiality, integrity, and availability of information assets Part of ongoing program – not a point-in-time assessment Results reported to the Board and Audit Committee Scorecard highlights key areas of risk

Business process example Authorization, Authentication, Interfaces Policy, People, Procedures, Contracts Table / Row Security, Critical Data Elements Filesystem, Trust, Platform Security Segmentation, Architecture, Management Components Tests SAP Manufacturing Oracle Unix Cisco / NOS Application Business Process Database Host Network

Risk = Asset Value * Threat * Vulnerability Business risk defined Business risk is the result of aggregated risks associated with your information security program and architecture Risk = Asset Value * Threat * Vulnerability SAP Manufacturing Oracle Unix Cisco / NOS

Security risk scorecard example

Security risk trending analysis

A holistic approach = customer value Recommended Approach High High Stakeholders Organisation Few Companies Strong Business Impact Business Process Application Data Security Maturity Business Value Host A graphical way to represent a “top-down” holistic approach to information security that focuses on the areas that have the most business impact. This slide ties together ALL of the messages from the entire presentation. Most Companies Commodity Network Traditional Approach Physical Low Low = Current global industry maturity level

Closing remarks Countries around the world have (and will continue to have) a lot of lessons learned. Take advantage of this! Australia is not immune from the regulatory pressures elsewhere (e.g. SOX) – so use pressure to drive continuous improvement Realise that being proactive will drive lower cost of solutions Adopt standards-based approaches (e.g. ISO/IEC 17799) At a minimum ensure “duty of care” Focus on security from a top-down, holistic point of view – this will drive customer value and competitive advantage

The KPMG logo and name are trademarks of KPMG. Presenter’s contact details Rob Goldberg Associate Director National Security Services Leader (02) 9335 7728 rhgoldberg@kpmg.com.au www.kpmg.com.au The information contained herein is of a general nature and is not intended to address the circumstances of any particular individual or entity. Although we endeavor to provide accurate and timely information, there can be no guarantee that such information is accurate as of the date it is received or that it will continue to be accurate in the future. No one should act on such information without appropriate professional advice after a thorough examination of the particular situation. © 2005 KPMG, an Australian partnership, is part of the KPMG International network. KPMG is a Swiss cooperative. All rights reserved. The KPMG logo and name are trademarks of KPMG.