SlideShare une entreprise Scribd logo
1  sur  14
Télécharger pour lire hors ligne
A clear & present danger
Building the intelligence to
create a digital fortress to
protect your customer and
your business
#DigitalByDesign
The British and
American financial
systems were recently
tested to see how well
they could stand up
to attacks by hackers
in the wake of the
Sony, TalkTalk and
United States Office of
Personnel Management
security breaches.
The biggest banks in
the UK and US faced
a simulated major
cyber attack from the
Building a digital fortress to
protect your customers and
your business
3
Bank of England and
its US counterparts
this month, as officials
probed the industry’s
ability to withstand
assaults from hackers
looking to steal data
or cripple the financial
sector.
What you don’t hear
about is the constant
and relentless
bombardment
that has resulted
in 90% of large
businesses reporting
an information
security breach. This
perspective was
further underpinned
by a recent PwC study
that recorded a 38%
increase in detected
information security
incidents.
The business risk has
also been exacerbated
by rapidly changing
technology, IOT effects,
digital disruption and
the need for changing
business models.
There is now a growing
awareness that this
topic needs to be at the
forefront of the board’s
agenda.
Bearing this
background in mind,
we recently discussed
with our clients how
SMEs and large
organisations could
build and sustain a
Digital Fortress in
order to establish
a digital resilience
that would protect
their customers and
their own business.
We also discussed
how our clients
could leverage UK
Government initiatives
that will see it invest
nearly $1Bn in the
promotion of cyber
security.
53% of organisations say that lack
of skilled resources is one of the
main obstacles that challenge
their information security (EY)
#DigitalByDesign
To become a business
leader in the digital
environment requires
that the customer
and digital strategy is
placed at the core of
your business strategy.
It also means that
protecting client or
customer information
is the essential element
within that digital
strategy. Recent studies
continue to show that
a significant number
of businesses still
don’t have a digital
strategy and therefore
probably do not have a
robust digital resilience
strategy.
A recent McKinsey
report cites that nearly
80% of technology
executives surveyed
stated that their
organisations could
not keep up with the
attackers’ increasing
sophistication, and
most organisations
recognise that there
is significant room for
improvement when
it comes to digital
resilience.
56% of organisations say
that it is unlikely or highly
unlikely that their organisation
would be able to detect a
sophisticated attack (EY)
5
This has created the
need to view digital
resilience through an
operational excellence
lens in order to create
a “Digital Fortress”
that we call the Digital
Resilience Operational
Network Ecosystem
or DRONE©. The
foundation of this
model includes a real-
time risk management
to protect customers’
sensitive and business
critical information.
The model also needs
to recognise an ever
growing IOT presence
and its security
Digital Fortress: Digital
Resilience Operational
Network Ecosystem
37% say that real-time
insight on cyber risk is
not available (EY)
91% have adopted a risk-based
cybersecurity framework (PwC)
58% of organisations do not
have a role or department
focused on emerging
technologies and their impact
on information security (EY)
#DigitalByDesign
ramifications.
Another critical aspect
within the DRONE©
model is the need to
harness not just Big
Data, but also the
Right Data in order
to facilitate the early
recognition of potential
internal and external
threats. 
This DRONE© model
also calls for the need
to establish a security
excellence centre
(SEC) that will provide
real-time insight into
cyber risks. A recent
KPMG study indicated
that only 65% of
organisations had a
cyber security team or
responsible executive
in place. Another study
showed that only 20% of
36% have a security stratecy for
the Internet of Things (PwC)
Fewer than 20% of
organisations have real
time insight on cyber risks
readily available (EY)
7
organisations have real-
time insight into cyber
risks. Another critical
characteristic of the
SEC is the integration of
a well-defined advanced
authentication,
identity and access
management (IAM)
programme.
The holistic resilience
strategy model
(DRONE©) also
recognises the role
that the board plays
in establishing the
right oversight, both
inside and outside an
organisation. There is
hard evidence which
suggests that a key
threat comes from
within organisations,
therefore enhancing
employee awareness
is a key aspect of the
model.
20% have published sources
of cyber attacks on their sector
peers readily available (EY)
Nearly two thirds of
organisations do not have
well-defined and automated
IAM programs (EY)
45% of boards participate in the
overall security strategy (PwC)
#DigitalByDesign
9
#DigitalByDesign
The author of ‘The Black
Swan’, Nassim Nichols
Taleb, described Black
Swan events as an
outlier that carries an
extreme impact. He said
human nature makes us
concoct explanations
for these events after
they have occurred,
despite their outlier
status, in an attempt to
make them explainable
and predictable.
Therefore, managing
these kind of cyber
Black Swan events
requires a blueprint
in order to deliver
sustainable digital
resilience, and it is
essential to incorporate
the simple Who, What,
Where, When and How
principles into the
model.
John Chambers
CEO, Cisco
There are two types of companies: those who have
been hacked, and those who don’t yet know they have
been hacked.
Establishing a Digital
Fortress (DRONE) by
managing Black Swan events
11
To assist you in
establishing the next
tangible steps that are
required to build the
foundations of a Digital
Fortress, you need to: Leverage UK
government
investments,
the ISO27001
standards and
the US National
Institute
Standards and
Technology
framework
Measure and
rate your current
digital resilience
process
Develop a digital
strategy that
incorporates
digital resilience
(DRONE©) as
a priority
Enhance
employee
communications
and awareness
to improve
transparency and
eradicate silos
Develop a ‘C
Suite’ governance
process to
manage real-
time risk from
both inside
and outside the
organisation
Collaborate with
your partners to
acquire a deep
knowledge of best
in class practices
Appoint a Chief
Information
Security Officer
(CISO) who will
support you in
building the
road map and
scorecard to
digital resilience
Frequently test
your Resilience
and Crisis
Management
Model
Who?
What?
Where?When?
How?
The Digital Fortress: DRONE© (D
Network Ecosystem)
#DigitalByDesign
Strategy A
Physical & Environmental Security
Employee Processes
Partners & Suppliers
Business Continuity
Incident management
Operations management
13
Digital Resilience Operational
Alignment
Governance
Organisation
Policies & Procedures
Real-Time Risk Management
Measurement & Compliance
Access Control
© Digital Alchemist Consulting Services International Ltd 2015
Thank
you!
jim@the-digital-alchemist.com
www.the-digital-alchemist.com
If you wish to discuss the building of a sustainable
Digital Fortress (DRONE©) or require help with
this, please contact us at:

Contenu connexe

Tendances

Cyber security investments 2021
Cyber security investments 2021Cyber security investments 2021
Cyber security investments 2021Management Events
 
Networkers cyber security market intelligence report
Networkers cyber security market intelligence reportNetworkers cyber security market intelligence report
Networkers cyber security market intelligence reportSimon Clements FIRP DipRP
 
Cyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of CybercrimeCyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of CybercrimeErnst & Young
 
Cyber Security small
Cyber Security smallCyber Security small
Cyber Security smallHenry Worth
 
2022 Cybersecurity Predictions
2022 Cybersecurity Predictions2022 Cybersecurity Predictions
2022 Cybersecurity PredictionsMatthew Rosenquist
 
Security Best Practices for Small Business
Security Best Practices for Small BusinessSecurity Best Practices for Small Business
Security Best Practices for Small BusinessValiant Technology
 
McAfee Labs 2017 Threats Predictions
McAfee Labs 2017 Threats PredictionsMcAfee Labs 2017 Threats Predictions
McAfee Labs 2017 Threats PredictionsMatthew Rosenquist
 
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...Enterprise Management Associates
 
Cost of Cybercrime Study in Financial Services: 2019 Report
Cost of Cybercrime Study in Financial Services: 2019 ReportCost of Cybercrime Study in Financial Services: 2019 Report
Cost of Cybercrime Study in Financial Services: 2019 Reportaccenture
 
IMC 618 - Public Relations Campaign
IMC 618 - Public Relations CampaignIMC 618 - Public Relations Campaign
IMC 618 - Public Relations CampaignStephanie Holman
 
Digital economy and its effect on cyber risk
Digital economy and its effect on cyber riskDigital economy and its effect on cyber risk
Digital economy and its effect on cyber riskaakash malhotra
 
Latin america cyber security market,symantec market share internet security,m...
Latin america cyber security market,symantec market share internet security,m...Latin america cyber security market,symantec market share internet security,m...
Latin america cyber security market,symantec market share internet security,m...Ashish Chauhan
 
Cybersecurity Improvement eBook
Cybersecurity Improvement eBookCybersecurity Improvement eBook
Cybersecurity Improvement eBookPablo Junco
 
SVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - OverviewSVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - OverviewSilicon Valley Bank
 
15 Years of Web Security: The Rebellious Teenage Years
15 Years of Web Security: The Rebellious Teenage Years15 Years of Web Security: The Rebellious Teenage Years
15 Years of Web Security: The Rebellious Teenage YearsJeremiah Grossman
 
SVB Cybersecurity Impact on Innovation Report
SVB Cybersecurity Impact on Innovation ReportSVB Cybersecurity Impact on Innovation Report
SVB Cybersecurity Impact on Innovation ReportSilicon Valley Bank
 
Before the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracksBefore the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracks- Mark - Fullbright
 

Tendances (20)

Cyber security investments 2021
Cyber security investments 2021Cyber security investments 2021
Cyber security investments 2021
 
Networkers cyber security market intelligence report
Networkers cyber security market intelligence reportNetworkers cyber security market intelligence report
Networkers cyber security market intelligence report
 
Cyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of CybercrimeCyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of Cybercrime
 
Cyber Security small
Cyber Security smallCyber Security small
Cyber Security small
 
2022 Cybersecurity Predictions
2022 Cybersecurity Predictions2022 Cybersecurity Predictions
2022 Cybersecurity Predictions
 
Security Best Practices for Small Business
Security Best Practices for Small BusinessSecurity Best Practices for Small Business
Security Best Practices for Small Business
 
McAfee Labs 2017 Threats Predictions
McAfee Labs 2017 Threats PredictionsMcAfee Labs 2017 Threats Predictions
McAfee Labs 2017 Threats Predictions
 
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
 
Cost of Cybercrime Study in Financial Services: 2019 Report
Cost of Cybercrime Study in Financial Services: 2019 ReportCost of Cybercrime Study in Financial Services: 2019 Report
Cost of Cybercrime Study in Financial Services: 2019 Report
 
IMC 618 - Public Relations Campaign
IMC 618 - Public Relations CampaignIMC 618 - Public Relations Campaign
IMC 618 - Public Relations Campaign
 
Digital economy and its effect on cyber risk
Digital economy and its effect on cyber riskDigital economy and its effect on cyber risk
Digital economy and its effect on cyber risk
 
Latin america cyber security market,symantec market share internet security,m...
Latin america cyber security market,symantec market share internet security,m...Latin america cyber security market,symantec market share internet security,m...
Latin america cyber security market,symantec market share internet security,m...
 
The 10 most trusted cyber security solution providers 2018
The 10 most trusted cyber security solution providers 2018The 10 most trusted cyber security solution providers 2018
The 10 most trusted cyber security solution providers 2018
 
Cybersecurity Improvement eBook
Cybersecurity Improvement eBookCybersecurity Improvement eBook
Cybersecurity Improvement eBook
 
SVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - OverviewSVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - Overview
 
The 10 Fastest Growing Cyber Security Companies of 2017
The 10 Fastest Growing Cyber Security Companies of 2017The 10 Fastest Growing Cyber Security Companies of 2017
The 10 Fastest Growing Cyber Security Companies of 2017
 
15 Years of Web Security: The Rebellious Teenage Years
15 Years of Web Security: The Rebellious Teenage Years15 Years of Web Security: The Rebellious Teenage Years
15 Years of Web Security: The Rebellious Teenage Years
 
SVB Cybersecurity Impact on Innovation Report
SVB Cybersecurity Impact on Innovation ReportSVB Cybersecurity Impact on Innovation Report
SVB Cybersecurity Impact on Innovation Report
 
Risky Business
Risky BusinessRisky Business
Risky Business
 
Before the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracksBefore the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracks
 

En vedette

DA_MSc thesis Report
DA_MSc thesis ReportDA_MSc thesis Report
DA_MSc thesis ReportDavid Awad
 
Organization behaviour
Organization behaviourOrganization behaviour
Organization behaviourSheetal Wagh
 
Corporate Adviser Group Risk Forum 2015 - Ellipse Presentation
Corporate Adviser Group Risk Forum 2015 - Ellipse PresentationCorporate Adviser Group Risk Forum 2015 - Ellipse Presentation
Corporate Adviser Group Risk Forum 2015 - Ellipse Presentationellipseuk
 
Final Lasting Legacy Campaign Elements
Final Lasting Legacy Campaign ElementsFinal Lasting Legacy Campaign Elements
Final Lasting Legacy Campaign ElementsGregory Alford
 
wagner_aotc_2003
wagner_aotc_2003wagner_aotc_2003
wagner_aotc_2003Mary Wagner
 
экзаменационные задания по высшей математике
экзаменационные задания по высшей математикеэкзаменационные задания по высшей математике
экзаменационные задания по высшей математикеRoman Prilipa
 
«Социальная сторона бизнеса» - Алексей Сидоров. коммерческий директор макрор...
«Социальная сторона бизнеса» - Алексей Сидоров.  коммерческий директор макрор...«Социальная сторона бизнеса» - Алексей Сидоров.  коммерческий директор макрор...
«Социальная сторона бизнеса» - Алексей Сидоров. коммерческий директор макрор...Михаил Рубинштейн
 
7 big benefits of giving employees the knowledge
7 big benefits of giving employees the knowledge7 big benefits of giving employees the knowledge
7 big benefits of giving employees the knowledgeSaif Ur Rehman
 
Natale in Jamaica
Natale in Jamaica Natale in Jamaica
Natale in Jamaica elviruccia
 
Muhammad Wahaj Khan
Muhammad Wahaj KhanMuhammad Wahaj Khan
Muhammad Wahaj KhanWahaj Khan
 
Critical thinking pp ci 350
Critical thinking pp ci 350 Critical thinking pp ci 350
Critical thinking pp ci 350 smith2118
 
Hatcher Group - Social media
Hatcher Group - Social mediaHatcher Group - Social media
Hatcher Group - Social mediaSELPConference
 

En vedette (15)

DA_MSc thesis Report
DA_MSc thesis ReportDA_MSc thesis Report
DA_MSc thesis Report
 
Organization behaviour
Organization behaviourOrganization behaviour
Organization behaviour
 
Corporate Adviser Group Risk Forum 2015 - Ellipse Presentation
Corporate Adviser Group Risk Forum 2015 - Ellipse PresentationCorporate Adviser Group Risk Forum 2015 - Ellipse Presentation
Corporate Adviser Group Risk Forum 2015 - Ellipse Presentation
 
Business Plan
Business PlanBusiness Plan
Business Plan
 
Final Lasting Legacy Campaign Elements
Final Lasting Legacy Campaign ElementsFinal Lasting Legacy Campaign Elements
Final Lasting Legacy Campaign Elements
 
wagner_aotc_2003
wagner_aotc_2003wagner_aotc_2003
wagner_aotc_2003
 
Background
BackgroundBackground
Background
 
экзаменационные задания по высшей математике
экзаменационные задания по высшей математикеэкзаменационные задания по высшей математике
экзаменационные задания по высшей математике
 
«Социальная сторона бизнеса» - Алексей Сидоров. коммерческий директор макрор...
«Социальная сторона бизнеса» - Алексей Сидоров.  коммерческий директор макрор...«Социальная сторона бизнеса» - Алексей Сидоров.  коммерческий директор макрор...
«Социальная сторона бизнеса» - Алексей Сидоров. коммерческий директор макрор...
 
7 big benefits of giving employees the knowledge
7 big benefits of giving employees the knowledge7 big benefits of giving employees the knowledge
7 big benefits of giving employees the knowledge
 
Natale in Jamaica
Natale in Jamaica Natale in Jamaica
Natale in Jamaica
 
Muhammad Wahaj Khan
Muhammad Wahaj KhanMuhammad Wahaj Khan
Muhammad Wahaj Khan
 
Fruits and vegetables
Fruits and vegetablesFruits and vegetables
Fruits and vegetables
 
Critical thinking pp ci 350
Critical thinking pp ci 350 Critical thinking pp ci 350
Critical thinking pp ci 350
 
Hatcher Group - Social media
Hatcher Group - Social mediaHatcher Group - Social media
Hatcher Group - Social media
 

Similaire à Building a Digital Fortress to Protect Customers and Business

How close is your organization to being breached | Safe Security
How close is your organization to being breached | Safe SecurityHow close is your organization to being breached | Safe Security
How close is your organization to being breached | Safe SecurityRahul Tyagi
 
We are living in a world where cyber security is a top priority for .pdf
We are living in a world where cyber security is a top priority for .pdfWe are living in a world where cyber security is a top priority for .pdf
We are living in a world where cyber security is a top priority for .pdfgalagirishp
 
Security - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperSecurity - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperCMR WORLD TECH
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...International Federation of Accountants
 
Top 3 security concerns for enterprises
Top 3 security concerns for enterprisesTop 3 security concerns for enterprises
Top 3 security concerns for enterprisesTaranggg11
 
The digital economy and cybersecurity
The digital economy and cybersecurityThe digital economy and cybersecurity
The digital economy and cybersecurityMark Albala
 
Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020CBIZ, Inc.
 
Key note in nyc the next breach target and how oracle can help - nyoug
Key note in nyc   the next breach target and how oracle can help - nyougKey note in nyc   the next breach target and how oracle can help - nyoug
Key note in nyc the next breach target and how oracle can help - nyougUlf Mattsson
 
Ask the Experts final
Ask the Experts finalAsk the Experts final
Ask the Experts finalDaren Dunkel
 
Building Cyber Resilience in the Digital Economy
Building Cyber Resilience in the Digital EconomyBuilding Cyber Resilience in the Digital Economy
Building Cyber Resilience in the Digital EconomyAgus Wicaksono
 
5 Security Trends to Watch in 2020
5 Security Trends to Watch in 20205 Security Trends to Watch in 2020
5 Security Trends to Watch in 2020Dharmendra Rama
 
Securing the C-Suite: Cybersecurity Perspectives from the Boardroom
Securing the C-Suite: Cybersecurity Perspectives from the BoardroomSecuring the C-Suite: Cybersecurity Perspectives from the Boardroom
Securing the C-Suite: Cybersecurity Perspectives from the BoardroomIBM Security
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCybAnastaciaShadelb
 
Francis Kaitano Presentation - CSO Perspectives Roadshow Auckland 9th Mar 2015
Francis Kaitano Presentation - CSO Perspectives Roadshow Auckland 9th Mar 2015Francis Kaitano Presentation - CSO Perspectives Roadshow Auckland 9th Mar 2015
Francis Kaitano Presentation - CSO Perspectives Roadshow Auckland 9th Mar 2015CSO_Presentations
 
BIZGrowth Strategies - Cybersecurity Special Edition
BIZGrowth Strategies - Cybersecurity Special EditionBIZGrowth Strategies - Cybersecurity Special Edition
BIZGrowth Strategies - Cybersecurity Special EditionCBIZ, Inc.
 
Global Megatrends in Cybersecurity – A Survey of 1,000 CxOs
Global Megatrends in Cybersecurity – A Survey of 1,000 CxOsGlobal Megatrends in Cybersecurity – A Survey of 1,000 CxOs
Global Megatrends in Cybersecurity – A Survey of 1,000 CxOsArgyle Executive Forum
 

Similaire à Building a Digital Fortress to Protect Customers and Business (20)

How close is your organization to being breached | Safe Security
How close is your organization to being breached | Safe SecurityHow close is your organization to being breached | Safe Security
How close is your organization to being breached | Safe Security
 
We are living in a world where cyber security is a top priority for .pdf
We are living in a world where cyber security is a top priority for .pdfWe are living in a world where cyber security is a top priority for .pdf
We are living in a world where cyber security is a top priority for .pdf
 
The Future of Cybersecurity
The Future of CybersecurityThe Future of Cybersecurity
The Future of Cybersecurity
 
Security - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperSecurity - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaper
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
 
Top 3 security concerns for enterprises
Top 3 security concerns for enterprisesTop 3 security concerns for enterprises
Top 3 security concerns for enterprises
 
The digital economy and cybersecurity
The digital economy and cybersecurityThe digital economy and cybersecurity
The digital economy and cybersecurity
 
Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020
 
Key note in nyc the next breach target and how oracle can help - nyoug
Key note in nyc   the next breach target and how oracle can help - nyougKey note in nyc   the next breach target and how oracle can help - nyoug
Key note in nyc the next breach target and how oracle can help - nyoug
 
Ask the Experts final
Ask the Experts finalAsk the Experts final
Ask the Experts final
 
Building Cyber Resilience in the Digital Economy
Building Cyber Resilience in the Digital EconomyBuilding Cyber Resilience in the Digital Economy
Building Cyber Resilience in the Digital Economy
 
Building Cyber Resilience
Building Cyber ResilienceBuilding Cyber Resilience
Building Cyber Resilience
 
5 Security Trends to Watch in 2020
5 Security Trends to Watch in 20205 Security Trends to Watch in 2020
5 Security Trends to Watch in 2020
 
Securing the C-Suite: Cybersecurity Perspectives from the Boardroom
Securing the C-Suite: Cybersecurity Perspectives from the BoardroomSecuring the C-Suite: Cybersecurity Perspectives from the Boardroom
Securing the C-Suite: Cybersecurity Perspectives from the Boardroom
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
 
Francis Kaitano Presentation - CSO Perspectives Roadshow Auckland 9th Mar 2015
Francis Kaitano Presentation - CSO Perspectives Roadshow Auckland 9th Mar 2015Francis Kaitano Presentation - CSO Perspectives Roadshow Auckland 9th Mar 2015
Francis Kaitano Presentation - CSO Perspectives Roadshow Auckland 9th Mar 2015
 
BIZGrowth Strategies - Cybersecurity Special Edition
BIZGrowth Strategies - Cybersecurity Special EditionBIZGrowth Strategies - Cybersecurity Special Edition
BIZGrowth Strategies - Cybersecurity Special Edition
 
Global Megatrends in Cybersecurity – A Survey of 1,000 CxOs
Global Megatrends in Cybersecurity – A Survey of 1,000 CxOsGlobal Megatrends in Cybersecurity – A Survey of 1,000 CxOs
Global Megatrends in Cybersecurity – A Survey of 1,000 CxOs
 
The economics of digital identity
The economics of digital identityThe economics of digital identity
The economics of digital identity
 

Building a Digital Fortress to Protect Customers and Business

  • 1. A clear & present danger Building the intelligence to create a digital fortress to protect your customer and your business
  • 2. #DigitalByDesign The British and American financial systems were recently tested to see how well they could stand up to attacks by hackers in the wake of the Sony, TalkTalk and United States Office of Personnel Management security breaches. The biggest banks in the UK and US faced a simulated major cyber attack from the Building a digital fortress to protect your customers and your business
  • 3. 3 Bank of England and its US counterparts this month, as officials probed the industry’s ability to withstand assaults from hackers looking to steal data or cripple the financial sector. What you don’t hear about is the constant and relentless bombardment that has resulted in 90% of large businesses reporting an information security breach. This perspective was further underpinned by a recent PwC study that recorded a 38% increase in detected information security incidents. The business risk has also been exacerbated by rapidly changing technology, IOT effects, digital disruption and the need for changing business models. There is now a growing awareness that this topic needs to be at the forefront of the board’s agenda. Bearing this background in mind, we recently discussed with our clients how SMEs and large organisations could build and sustain a Digital Fortress in order to establish a digital resilience that would protect their customers and their own business. We also discussed how our clients could leverage UK Government initiatives that will see it invest nearly $1Bn in the promotion of cyber security. 53% of organisations say that lack of skilled resources is one of the main obstacles that challenge their information security (EY)
  • 4. #DigitalByDesign To become a business leader in the digital environment requires that the customer and digital strategy is placed at the core of your business strategy. It also means that protecting client or customer information is the essential element within that digital strategy. Recent studies continue to show that a significant number of businesses still don’t have a digital strategy and therefore probably do not have a robust digital resilience strategy. A recent McKinsey report cites that nearly 80% of technology executives surveyed stated that their organisations could not keep up with the attackers’ increasing sophistication, and most organisations recognise that there is significant room for improvement when it comes to digital resilience. 56% of organisations say that it is unlikely or highly unlikely that their organisation would be able to detect a sophisticated attack (EY)
  • 5. 5 This has created the need to view digital resilience through an operational excellence lens in order to create a “Digital Fortress” that we call the Digital Resilience Operational Network Ecosystem or DRONE©. The foundation of this model includes a real- time risk management to protect customers’ sensitive and business critical information. The model also needs to recognise an ever growing IOT presence and its security Digital Fortress: Digital Resilience Operational Network Ecosystem 37% say that real-time insight on cyber risk is not available (EY) 91% have adopted a risk-based cybersecurity framework (PwC) 58% of organisations do not have a role or department focused on emerging technologies and their impact on information security (EY)
  • 6. #DigitalByDesign ramifications. Another critical aspect within the DRONE© model is the need to harness not just Big Data, but also the Right Data in order to facilitate the early recognition of potential internal and external threats.  This DRONE© model also calls for the need to establish a security excellence centre (SEC) that will provide real-time insight into cyber risks. A recent KPMG study indicated that only 65% of organisations had a cyber security team or responsible executive in place. Another study showed that only 20% of 36% have a security stratecy for the Internet of Things (PwC) Fewer than 20% of organisations have real time insight on cyber risks readily available (EY)
  • 7. 7 organisations have real- time insight into cyber risks. Another critical characteristic of the SEC is the integration of a well-defined advanced authentication, identity and access management (IAM) programme. The holistic resilience strategy model (DRONE©) also recognises the role that the board plays in establishing the right oversight, both inside and outside an organisation. There is hard evidence which suggests that a key threat comes from within organisations, therefore enhancing employee awareness is a key aspect of the model. 20% have published sources of cyber attacks on their sector peers readily available (EY) Nearly two thirds of organisations do not have well-defined and automated IAM programs (EY) 45% of boards participate in the overall security strategy (PwC)
  • 9. 9
  • 10. #DigitalByDesign The author of ‘The Black Swan’, Nassim Nichols Taleb, described Black Swan events as an outlier that carries an extreme impact. He said human nature makes us concoct explanations for these events after they have occurred, despite their outlier status, in an attempt to make them explainable and predictable. Therefore, managing these kind of cyber Black Swan events requires a blueprint in order to deliver sustainable digital resilience, and it is essential to incorporate the simple Who, What, Where, When and How principles into the model. John Chambers CEO, Cisco There are two types of companies: those who have been hacked, and those who don’t yet know they have been hacked. Establishing a Digital Fortress (DRONE) by managing Black Swan events
  • 11. 11 To assist you in establishing the next tangible steps that are required to build the foundations of a Digital Fortress, you need to: Leverage UK government investments, the ISO27001 standards and the US National Institute Standards and Technology framework Measure and rate your current digital resilience process Develop a digital strategy that incorporates digital resilience (DRONE©) as a priority Enhance employee communications and awareness to improve transparency and eradicate silos Develop a ‘C Suite’ governance process to manage real- time risk from both inside and outside the organisation Collaborate with your partners to acquire a deep knowledge of best in class practices Appoint a Chief Information Security Officer (CISO) who will support you in building the road map and scorecard to digital resilience Frequently test your Resilience and Crisis Management Model Who? What? Where?When? How?
  • 12. The Digital Fortress: DRONE© (D Network Ecosystem) #DigitalByDesign Strategy A Physical & Environmental Security Employee Processes Partners & Suppliers Business Continuity Incident management Operations management
  • 13. 13 Digital Resilience Operational Alignment Governance Organisation Policies & Procedures Real-Time Risk Management Measurement & Compliance Access Control
  • 14. © Digital Alchemist Consulting Services International Ltd 2015 Thank you! jim@the-digital-alchemist.com www.the-digital-alchemist.com If you wish to discuss the building of a sustainable Digital Fortress (DRONE©) or require help with this, please contact us at: