SlideShare une entreprise Scribd logo
1  sur  21
What you don’t know about IT Controls can cripple your business “ Yep, son, we have met the enemy and he is us.”   -  Pogo, 1971 Presented by: Bill Lisse ,  CISSP, GIAC PCI, GIAC HIPAA, SSCA, Security+ SME IT Audit Manager
“ Only 1 of 10 firms are leveraging Information Technology (IT) compliance (Controls)…that could help mitigate financial risk from lost or stolen data.” Source: ITpolicycompliance.com. IT Policy Compliance Group. “Why Compliance Pays: Reputations and Revenues at Risk,” July 2007   Leading Organizations 1 of 10 are well-positioned Normative Organization   7 out of 10 could substantially reduce financial risk Lagging Organizations 2 out of 10 have the most to gain Why should business leaders care?
Leaders versus Laggards Leaders  have the fewest business disruptions –  only  two or fewer disruptions annually Laggards  experience 17 disruptions or more per year Leaders  have 2 or fewer data losses or thefts per year  Laggards  have 22 or more data losses per year
Financial Risks - An 8 percent decline in market value of    stock for publicly traded firms –    some never recover - An 8 percent loss of customers - A temporary decline in revenue of 8 percent - Additional costs for litigation, notification,    settlements, cleanup, restoration, and    improvements averaging $100 per lost    customer record  ! Source: Oxford Executive Research Briefing, Impact of Catastrophes on Shareholder Value
Average Cost $1,662,720 This does not include potential civil litigation is class action lawsuits.
Prevent or Limit Losses ,[object Object],[object Object],[object Object],[object Object]
Prevent or Limit Losses ,[object Object],[object Object],[object Object],[object Object],[object Object]
Protecting your hard earned reputation  “Avoid the wrong type of branding"  ,[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],Protecting your hard earned reputation  “Avoid the wrong type of branding"
The Evolving Landscape ,[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],The Evolving Landscape
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],The Evolving Landscape
Threats are Asymmetric ,[object Object],[object Object],[object Object],[object Object],[object Object],1  Software Engineering Institute Computer Emergency Response Team and U.S. Secret Service Study   http://www.cert.org/insider_threat/ 2   FDIC and Michigan State Study  http://www.fdic.gov/consumers/consumer/idtheftstudysupp/toc.html
Threats are Asymmetric ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Harvesting data is good business… if you’re a criminal ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Source: Trend Micro “How Does The Hacker Economy Work?”
Common Myths ,[object Object],[object Object],[object Object]
Common Myths ,[object Object],[object Object],[object Object]
Top 10 Gaps ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Prescription (Best practices)  ,[object Object],[object Object],[object Object]
Conclusion ,[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],Questions?

Contenu connexe

Tendances

Second line of defense for cybersecurity : Blockchain
Second line of defense for cybersecurity : BlockchainSecond line of defense for cybersecurity : Blockchain
Second line of defense for cybersecurity : BlockchainAhmed Banafa
 
Blockchain: Fundamentals & Opportunities​
Blockchain: Fundamentals & Opportunities​Blockchain: Fundamentals & Opportunities​
Blockchain: Fundamentals & Opportunities​EC-Council
 
Blockchains : Risk or Mitigation?
Blockchains : Risk or Mitigation?Blockchains : Risk or Mitigation?
Blockchains : Risk or Mitigation?ITU
 
ZHENG WENJUN The idea of block chain
ZHENG WENJUN The idea of block chainZHENG WENJUN The idea of block chain
ZHENG WENJUN The idea of block chainFIAT/IFTA
 
Block chain technology
Block chain technologyBlock chain technology
Block chain technologyRinshi Singh
 
Global Cybersecurity Blockchain Group
Global Cybersecurity Blockchain GroupGlobal Cybersecurity Blockchain Group
Global Cybersecurity Blockchain GroupMaeva Ghonda
 
The Idea Behind Blockchain Technology
The Idea Behind Blockchain TechnologyThe Idea Behind Blockchain Technology
The Idea Behind Blockchain TechnologyBlockchain Council
 
Permissioned v. Permissionless Blockchain 10XTS
Permissioned v. Permissionless Blockchain 10XTSPermissioned v. Permissionless Blockchain 10XTS
Permissioned v. Permissionless Blockchain 10XTSJohn Bentley, II
 
A Secure Model of IoT Using Blockchain
A Secure Model of IoT Using BlockchainA Secure Model of IoT Using Blockchain
A Secure Model of IoT Using BlockchainAltoros
 
Blockchain security a different perspective
Blockchain security a different perspectiveBlockchain security a different perspective
Blockchain security a different perspectiveSecunoid Systems Inc
 
What is blockchain?
What is blockchain?What is blockchain?
What is blockchain?learndac
 
Blockchain for Accounting & Assurance
Blockchain for Accounting & AssuranceBlockchain for Accounting & Assurance
Blockchain for Accounting & AssuranceEryk Budi Pratama
 
IEEE 5G World Forum: 8 trends of iot in 2018 and beyond july 9th 2018 santa ...
IEEE 5G World Forum:  8 trends of iot in 2018 and beyond july 9th 2018 santa ...IEEE 5G World Forum:  8 trends of iot in 2018 and beyond july 9th 2018 santa ...
IEEE 5G World Forum: 8 trends of iot in 2018 and beyond july 9th 2018 santa ...Ahmed Banafa
 
Blockchain and IOT and the GxP Lab Slides
Blockchain and IOT and the GxP Lab SlidesBlockchain and IOT and the GxP Lab Slides
Blockchain and IOT and the GxP Lab SlidesPistoia Alliance
 
Blockchain Insurance Benefits
Blockchain Insurance BenefitsBlockchain Insurance Benefits
Blockchain Insurance BenefitsDon Sevcik
 
Introduction to Blockchain Governance Models
Introduction to Blockchain Governance ModelsIntroduction to Blockchain Governance Models
Introduction to Blockchain Governance ModelsGokul Alex
 

Tendances (20)

Second line of defense for cybersecurity : Blockchain
Second line of defense for cybersecurity : BlockchainSecond line of defense for cybersecurity : Blockchain
Second line of defense for cybersecurity : Blockchain
 
Blockchain: Fundamentals & Opportunities​
Blockchain: Fundamentals & Opportunities​Blockchain: Fundamentals & Opportunities​
Blockchain: Fundamentals & Opportunities​
 
Blockchains : Risk or Mitigation?
Blockchains : Risk or Mitigation?Blockchains : Risk or Mitigation?
Blockchains : Risk or Mitigation?
 
ZHENG WENJUN The idea of block chain
ZHENG WENJUN The idea of block chainZHENG WENJUN The idea of block chain
ZHENG WENJUN The idea of block chain
 
Block chain technology
Block chain technologyBlock chain technology
Block chain technology
 
Block chain technology
Block chain technologyBlock chain technology
Block chain technology
 
Global Cybersecurity Blockchain Group
Global Cybersecurity Blockchain GroupGlobal Cybersecurity Blockchain Group
Global Cybersecurity Blockchain Group
 
Block chain A Paradigm Shift
Block chain A Paradigm ShiftBlock chain A Paradigm Shift
Block chain A Paradigm Shift
 
The Idea Behind Blockchain Technology
The Idea Behind Blockchain TechnologyThe Idea Behind Blockchain Technology
The Idea Behind Blockchain Technology
 
Permissioned v. Permissionless Blockchain 10XTS
Permissioned v. Permissionless Blockchain 10XTSPermissioned v. Permissionless Blockchain 10XTS
Permissioned v. Permissionless Blockchain 10XTS
 
A Secure Model of IoT Using Blockchain
A Secure Model of IoT Using BlockchainA Secure Model of IoT Using Blockchain
A Secure Model of IoT Using Blockchain
 
Blockchain security a different perspective
Blockchain security a different perspectiveBlockchain security a different perspective
Blockchain security a different perspective
 
Block Chain Basics
Block Chain BasicsBlock Chain Basics
Block Chain Basics
 
What is blockchain?
What is blockchain?What is blockchain?
What is blockchain?
 
Blockchain for Accounting & Assurance
Blockchain for Accounting & AssuranceBlockchain for Accounting & Assurance
Blockchain for Accounting & Assurance
 
IEEE 5G World Forum: 8 trends of iot in 2018 and beyond july 9th 2018 santa ...
IEEE 5G World Forum:  8 trends of iot in 2018 and beyond july 9th 2018 santa ...IEEE 5G World Forum:  8 trends of iot in 2018 and beyond july 9th 2018 santa ...
IEEE 5G World Forum: 8 trends of iot in 2018 and beyond july 9th 2018 santa ...
 
Block chain explained
Block chain explainedBlock chain explained
Block chain explained
 
Blockchain and IOT and the GxP Lab Slides
Blockchain and IOT and the GxP Lab SlidesBlockchain and IOT and the GxP Lab Slides
Blockchain and IOT and the GxP Lab Slides
 
Blockchain Insurance Benefits
Blockchain Insurance BenefitsBlockchain Insurance Benefits
Blockchain Insurance Benefits
 
Introduction to Blockchain Governance Models
Introduction to Blockchain Governance ModelsIntroduction to Blockchain Governance Models
Introduction to Blockchain Governance Models
 

Similaire à IT Controls Presentation

The Insider Threat
The Insider ThreatThe Insider Threat
The Insider Threatillustro
 
Material de apoyo Un replanteamiento masivo de la seguridad.
Material de apoyo Un replanteamiento masivo de la seguridad.Material de apoyo Un replanteamiento masivo de la seguridad.
Material de apoyo Un replanteamiento masivo de la seguridad.Universidad Cenfotec
 
Before the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracksBefore the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracks- Mark - Fullbright
 
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONS
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONSCybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONS
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONSRandall Chase
 
Data Security Regulatory Lansdcape
Data Security Regulatory LansdcapeData Security Regulatory Lansdcape
Data Security Regulatory LansdcapeBrian Bauer
 
Powerpoint mack jackson
Powerpoint   mack jacksonPowerpoint   mack jackson
Powerpoint mack jacksonaiimnevada
 
11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of securityMatthew Pascucci
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselCasey Ellis
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counselbugcrowd
 
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...Casey Ellis
 
IAPP - Trust is Terrible Thing to Waste
IAPP - Trust is Terrible Thing to WasteIAPP - Trust is Terrible Thing to Waste
IAPP - Trust is Terrible Thing to WasteDave Steer
 
Leading Practices in Information Security & Privacy
Leading Practices in Information Security & PrivacyLeading Practices in Information Security & Privacy
Leading Practices in Information Security & PrivacyDonny Shimamoto
 
Information security management v2010
Information security management v2010Information security management v2010
Information security management v2010joevest
 
Cybersecurity pres 05-19-final
Cybersecurity pres 05-19-finalCybersecurity pres 05-19-final
Cybersecurity pres 05-19-finalVivek Ahuja
 
Issala exec-forum-opening-150604
Issala exec-forum-opening-150604Issala exec-forum-opening-150604
Issala exec-forum-opening-150604ISSA LA
 
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnovProtecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnovEric Vanderburg
 
Phish, Spoof, Scam: Insider Threats, the GDPR & Other Regulations
Phish, Spoof, Scam: Insider Threats, the GDPR & Other RegulationsPhish, Spoof, Scam: Insider Threats, the GDPR & Other Regulations
Phish, Spoof, Scam: Insider Threats, the GDPR & Other RegulationsObserveIT
 

Similaire à IT Controls Presentation (20)

BEA Presentation
BEA PresentationBEA Presentation
BEA Presentation
 
The Insider Threat
The Insider ThreatThe Insider Threat
The Insider Threat
 
Material de apoyo Un replanteamiento masivo de la seguridad.
Material de apoyo Un replanteamiento masivo de la seguridad.Material de apoyo Un replanteamiento masivo de la seguridad.
Material de apoyo Un replanteamiento masivo de la seguridad.
 
Before the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracksBefore the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracks
 
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONS
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONSCybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONS
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONS
 
Data Security Regulatory Lansdcape
Data Security Regulatory LansdcapeData Security Regulatory Lansdcape
Data Security Regulatory Lansdcape
 
Powerpoint mack jackson
Powerpoint   mack jacksonPowerpoint   mack jackson
Powerpoint mack jackson
 
11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
 
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
 
Cybersecurity Presentation 6-11-15
Cybersecurity Presentation 6-11-15Cybersecurity Presentation 6-11-15
Cybersecurity Presentation 6-11-15
 
IAPP - Trust is Terrible Thing to Waste
IAPP - Trust is Terrible Thing to WasteIAPP - Trust is Terrible Thing to Waste
IAPP - Trust is Terrible Thing to Waste
 
Leading Practices in Information Security & Privacy
Leading Practices in Information Security & PrivacyLeading Practices in Information Security & Privacy
Leading Practices in Information Security & Privacy
 
Information security management v2010
Information security management v2010Information security management v2010
Information security management v2010
 
Cybersecurity pres 05-19-final
Cybersecurity pres 05-19-finalCybersecurity pres 05-19-final
Cybersecurity pres 05-19-final
 
Issala exec-forum-opening-150604
Issala exec-forum-opening-150604Issala exec-forum-opening-150604
Issala exec-forum-opening-150604
 
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnovProtecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
 
Information Security For Small Business
Information Security For Small BusinessInformation Security For Small Business
Information Security For Small Business
 
Phish, Spoof, Scam: Insider Threats, the GDPR & Other Regulations
Phish, Spoof, Scam: Insider Threats, the GDPR & Other RegulationsPhish, Spoof, Scam: Insider Threats, the GDPR & Other Regulations
Phish, Spoof, Scam: Insider Threats, the GDPR & Other Regulations
 

IT Controls Presentation

  • 1. What you don’t know about IT Controls can cripple your business “ Yep, son, we have met the enemy and he is us.” - Pogo, 1971 Presented by: Bill Lisse , CISSP, GIAC PCI, GIAC HIPAA, SSCA, Security+ SME IT Audit Manager
  • 2. “ Only 1 of 10 firms are leveraging Information Technology (IT) compliance (Controls)…that could help mitigate financial risk from lost or stolen data.” Source: ITpolicycompliance.com. IT Policy Compliance Group. “Why Compliance Pays: Reputations and Revenues at Risk,” July 2007 Leading Organizations 1 of 10 are well-positioned Normative Organization 7 out of 10 could substantially reduce financial risk Lagging Organizations 2 out of 10 have the most to gain Why should business leaders care?
  • 3. Leaders versus Laggards Leaders have the fewest business disruptions – only two or fewer disruptions annually Laggards experience 17 disruptions or more per year Leaders have 2 or fewer data losses or thefts per year Laggards have 22 or more data losses per year
  • 4. Financial Risks - An 8 percent decline in market value of stock for publicly traded firms – some never recover - An 8 percent loss of customers - A temporary decline in revenue of 8 percent - Additional costs for litigation, notification, settlements, cleanup, restoration, and improvements averaging $100 per lost customer record ! Source: Oxford Executive Research Briefing, Impact of Catastrophes on Shareholder Value
  • 5. Average Cost $1,662,720 This does not include potential civil litigation is class action lawsuits.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.