DRAFT 1 Belfast 2015 5 th World Cyber Security Technology Research Summit Suren Gupta Allstate Corporation Executive Vice President Allstate Technology.

Slides:



Advertisements
Similar presentations
FFIEC Agency Supplement to Authentication in an Internet Banking Environment
Advertisements

Draft of June 9, 2015 Cyber Risks in the Boardroom Managing Business, Legal and Reputational Risks Perspectives for Directors and Executive Officers Preparing.
Comptroller of the Currency Administrator of National Banks E- Security Risk Mitigation: A Supervisor’s Perspective Global Dialogue World Bank Group September.
Driving Improvements in Efficiency & Effectiveness North West Centre of Excellence Stakeholder Event Martin Fokinther Executive Consultant, Global Public.
Internet 2 Corporate Value Proposition Stuart Kippelman (J&J) Jeff Lemmer (Ford) December 12, 2005.
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 DRAFT.
Case Study: Department of Revenue Data Breach National Association of State Auditors, Comptrollers and Treasurers March 21, 2013.
BOTSWANA NATIONAL CYBER SECURITY STRATEGY PROJECT
2.1 Perspectives of Competitive Advantage Managing Strategically – formulating and implementing strategies that allow an organization to develop and maintain.
Strategies for Innovation Sourcing 30 August 2007 Paul McGowan Center for Innovative Technology Herndon, VA / Strategies.
September 14, David A. Reed Attorney at Law Reed & Jolly, PLLC (703)
© 2015 ForeScout Technologies, Page 2 Source: Identity Theft Resource Center Annual number of data breaches Breaches reported Average annual cost of security.
Cyber Security Nevada Businesses Overview June, 2014.
© 2003 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice Global Citizenship Walt Rosenberg.
Rural Development Council 8 th December Contents Scottish Enterprise Focus Economic Downturn Implications & Actions Core Rural Objectives HIE Economic.
The Impact of Privacy on HP’s Customer Relationship Management Solution Mike Overly Vice President, Marketing © 2003 Hewlett-Packard Development Company,
℠ Pryvos ℠ Computer Security and Forensic Services May 27, 2015 Copyright © 2015 Pryvos, Inc. 1.
Corporate Social Responsibility LECTURE 25: Corporate Social Responsibility MGT
Ali Alhamdan, PhD National Information Center Ministry of Interior
Larry Clinton Operations Officer Internet Security Alliance
NEACS: CRO Perspective William Feher Vice President, Internal Audit and Chief Risk Officer October 27, 2015.
© Cloud Security Alliance, 2015 Jim Reavis CEO, Cloud Security Alliance.
FST Media Technology & Innovation – the Future of Insurance & Wealth Management Conference Four Pillars of the CIO Role Strategy, Governance, Risk and.
Interaction Private Sector Working Group Discussion with USAID Global Partnerships January 30, 2014.
Legal Jeopardy: Whose Risk Is It?. SPEAKERS Jason Straight Chief Privacy Officer and Senior Vice President Cyber Risk Solutions at UnitedLex Patrick Manzo.
ERCOT IT Update Ken Shoquist VP, CIO Information Technology Board Meeting February 2004.
CYBERSECURITY: RISK AND LIABILITY March 2, 2016 Joshua A. Mooney Co-chair-Cyber Law and Data Protection White and Williams LLP (215)
FFIEC Cybersecurity Assessment Tool Maine Credit Union League September 23, 2015 Patrick Truett, Information Systems Officer National Credit Union Administration.
CLOSE THE SECURITY GAP WITH IT SOLUTIONS FROM COMPUTACENTER AND CISCO AUGUST 2014.
Activu-Powered Video Wall Prominently Featured during President Obama’s Visit to the National Cybersecurity and Communications Integration Center On January.
Cyber Insurance Risk Transfer Alternatives Heather Soronen - Operations Director Rocky Mountain Insurance Information Association.
Cyber Security Phillip Davies Head of Content, Cyber and Investigations.
Cyber Insurance Risk Transfer Alternatives
Cybersecurity as a Business Differentiator
Cyber in Financial Services
Increasing Information and Data Security in Today’s Cybersecurity World 2017 Conference Review 6/6/2017.
Cyber Security – An Existential Threat? (IIC, Singapore)
Information Security Program
Information Security – Current Challenges
Comprehensive Security and Compliance at an Affordable Price.
National Cyber Intelligence Center
Cyber Risk Presentation to the Board of Directors
Information Technology Sector
Business At the Speed of Cyber
U.S. COAST GUARD CYBERSECURITY POLICY and CYBERSECURITY PLANNING
California Cybersecurity Integration Center (Cal-CSIC)
Cyber Attacks on Businesses 43% of cyber attacks target small business Only 14% of small business rate their ability to mitigate cyber risk highly.
The National Initiative for Cybersecurity Education (NICE)  AFCEA International Cyber Education, Research, and Training Symposium January 17, 2018 Bill.
DETAILED Global CYBERSECURITY SURVEY Summary RESULTS
HOSTED BY IN PARTNERSHIP WITH SUPPORTED BY Barcelona iCapital 2015.
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024 Dynamic Application Security.
SAM Financial Services Cybersecurity Assessment
Cyber Security and Consumer Financial Transactions Data Security
Attacks on The Manufacturing Industry
Cyber Trends and Market Update
Securing the Threats of Tomorrow, Today.
Cybersecurity compliance for attorneys
John Carlson Senior Director, BITS
Cyber Security Culture
Cybersecurity ATD technical
The State of Cybersecurity in State Government NAST March 26, 2019
Community of Users.
Presented By: Erez Hevroni
Hanqing Zhou|Yijiang Li|Jason M Mays|Karabo Ntokwane|Qianru Yang
Managing IT Risk in a digital Transformation AGE
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024 Low Power Wide Area Network.
Figuring out CyberSecurity Return On Investment
Presentation transcript:

DRAFT 1 Belfast th World Cyber Security Technology Research Summit Suren Gupta Allstate Corporation Executive Vice President Allstate Technology & Strategic Ventures

2 THE CHANGING LANDSCAPE THEIR NEW CHALLENGES AND RESPONSIBILITIES CONSUMERS AND STAKEHOLDERS WHAT WE NEED TO KEEP THEM INFORMED AND SAFE CORPORATE BOARDS CORPORATECYBERSECURITY Agenda

CORPORATE CYBERSECURITY: THE CHANGING LANDSCAPE 3

Allstate Corporation at a Glance publicly held personal lines property and casualty insurer in the U.S. by revenue million households served billion revenue in 2014 employees Exclusive Allstate Agencies and Financial Specialists Potentially suspicious cyber incidents every day 4 #1 16 $ ,200 11,900 1 billion

The number of confirmed data breaches is increasing dramatically 5 Source: 2014 Verizon Data Breach Investigations Report 1,367

Consumer trust in companies to secure personal information is tenuous 6 Gallup, June 2014

Corporate boards are under pressure to take more accountability for cybersecurity 7 “A prominent proxy adviser urged the ouster of most Target Corp. board members for failing to manage risks and protect the company from a massive data breach.” -- May 28, 2014

CEOs are elevating the importance of cybersecurity 8 CEOs now see cybersecurity technologies as one of the three most strategically important types of digital technology: #1 Mobile technologies for customers #2 Data mining and analysis #3 Cybersecurity technologies Source: PwC 18 th Annual Global CEO Survey, January 2015

The Internet of Things, tech innovation and political unrest elevate the threat level 9 50 BILLION IP devices will be connected by 2022 NON- TECH Companies are quickly bringing consumer technologies to market POLITICAL UNREST Drives both state- sponsored and lone-wolf cyber attacks Millions of access points + vulnerable technologies + politically-motivated attacks = perfect storm of corporate risk

CORPORATE BOARDS: THEIR NEW CHALLENGES AND RESPONSIBILITIES 10

Cyber threats potentially broaden a company’s risks 11 Internal Risk -Operational -Financial -Reputational External Risk -Customer -Shareholder Systemic Risk -Markets -Infrastructure Traditional Cyber

What corporate boards need to mitigate cyber risk 12 Education Information Risk Profile Assessment Governance and Controls

What corporate boards need to mitigate cyber risk 13 Outside advisors to bring in world-class best practices, outside perspective and broader knowledge of the changing threat landscape. Education 1

What corporate boards need to mitigate cyber risk 14 Access to the company’s cybersecurity capabilities and how management plans to enhance them. Information 2

What corporate boards need to mitigate cyber risk 15 The extent of the risks the company faces and how management is thinking about cybersecurity, which requires a different type of management than traditional risk. Risk Profile Assessment 3

What corporate boards need to mitigate cyber risk 16 The governance, controls and response processes in place or needed to address a breach and protect the company's reputation should a breach occur. Governance and Controls 4

17 CONSUMERS AND STAKEHOLDERS: WHAT WE NEED TO KEEP THEM INFORMED AND SAFE

Adopt the NIST framework internationally 18

Stronger international collaboration needed among private, government and academic sectors 19 Cybersecurity Universities Government Business

Questions that need urgent answers Given the increasing threat, do we need a new international body to bring greater collaboration? What would be the mission of such a body?What would be the mission of such a body? Who would govern it?Who would govern it? How would it be funded?How would it be funded? What authority would it have?What authority would it have? 20

DRAFT 21 Belfast th World Cyber Security Technology Research Summit Suren Gupta Allstate Corporation Executive Vice President Allstate Technology & Strategic Ventures