SlideShare une entreprise Scribd logo
1  sur  26
“Expand Your Horizons” Webinar Series
Cyber Security: Threat and Prevention
February 24, 2015 1:00 – 1:45pm
The Webinar will begin shortly. You can ask
a question in the box on the right hand
side. We will answer them during our Q&A
at the end of the webinar.
2
Cyber Threats and the
Government of Canada
CSE Mandate: National Defence Act
3
Provide advice, guidance
and services to help
ensure the protection of
information and
information systems of
importance to the GC
PART B
PART A
Provide foreign
intelligence in
accordance with
government priorities
PART C
Provide technical
assistance to law
enforcement and
national security
What is the GC Protecting ?
4
Banking & Finance
Border Services & Immigration
Government Administration
Health
Industry & Business Development
International Affairs, Trade & Development
Legal
Natural Resources,
Energy & Environment
Security, Intelligence &
Defence
Social & Cultural
Development
Transportation
GC Cyber Activity in 2014 by Sector
Canadian Personal Information
Trade Secrets
New Technologies
Negotiating Strategies
Natural resources information
Access to everything
What are Threat Actors after?
What are the Threats?
5
State-sponsored threat actors
Foreign intelligence services tasked to collect
intelligence and/or disrupt Canadian services.
Cybercriminals
Criminals that use malware and other programs to
either steal information or coerce others to pay
them for illegitimate reasons (ransomware).
Hacktivists
Political and/or social activists that use computers
or computer networks to channel their message or
prove a point.
Script kiddies
Individuals or groups that target GC and other
organizations for the fun of it, or compete to see
who can cause the most damage.
What are the risks
6
Reputational/Trust
Business Continuity
Financial Impact
Information Loss/Damage
No quick fix for cyber security.
There are a number of mitigation measures you can undertake to significantly hinder
threat actors.
• Patching:
• Operating system;
• Applications;
• Till you can patch no more!
Patching Challenges:
• Timeliness/Costs
• Various versions : operating systems & Internet browsers.
Current malicious activity that could be prevented with
patching:
• 2010 & 2012 Common Vulnerabilities and Exposures (CVEs)
• Every compromise in 2013!
Preventing a Compromise - Patching
7
Cyber security does not stop with patching.
Proactively prepare.
Cyber threat actors will gain access.
Harden your networks:
• design your network and system efficiently;
• know where certain applications are in use;
• apply network segmentation in security zones to protect
sensitive information;
• consolidate Internet access points; and,
• other best practices.
Anticipating a Compromise
8
Shared Services Canada
A Team Sport
9
IT security teams across
the Government of Canada
Public Safety
Canadian
private sector
Canadian industry
IT vendors
Working together is key!
Understand your network and information is
constantly targeted;
Be aware of cyber threat actors and their
methods;
Top 10 Mitigation Measures
IN CONCLUSION:
Cyber threat activity is here to stay;
Compromises and vulnerabilities will increasingly be publicized –
Don’t make the headlines for the wrong reasons; and,
Anticipating compromises is just as important as preventing them.
Where from Here?
10
Ewan Willars
Tuesday 24 February
Cybersecurity:
The challenge for
finance
©ACCA
Cybersecurity: a frontline issue for finance
All organizations need to:
1. understand the nature and
likelihood of cyber-threats
2. identify, assess and mitigate
existing and emerging risks
3. implement and maintain strong
controls and policies to govern
data privacy and security
4. educate users on emerging
risks, such as those associated
with mobile technology
5. plan for increasing complexity,
and
6. make technological risk an
executive-level concern.
©ACCA
Global drivers of change for the profession:
short term (2013)
4.2
4.4
4.6
4.8
5
5.2
5.4
5.6
Public sector Corporates (large) Corporates
(small/medium)
Fuel and Energy
Prices
Cybersecurity
Challenges
Corporate
Governance
Regulation
Meanscore
©ACCA
Percentage of accountants concerned with risks
associated with cybercrime
©ACCA
The changing role of finance:
increasing cyber-risks?
Supporting
strategic direction
and creating value
Traditional control &
stewardship
responsibilities
Emergence of big data
and the data-driven
organization
Extracting insights
and value from data
Data management,
security and
assurance
©ACCA
The future: data-driven finance function
A data-driven finance department has the following
objectives:
• provide data leadership across the organization
• improve decision making across finance and other
functional areas
• manage the ever-increasing regulatory reporting
requirements
• enhance control and risk management capabilities
• improving cost efficiency and lowering the cost-to-serve.
©ACCA
The current state of play
Data challenges
Internal data
Supply
chain data
Customer
data
Poor data
integration
Reporting
funnels
©ACCA
The data-driven organization
New risks or greater resilience?
ERP
General
ledger
Unified Data
Ecosystem
• Create a unified approach
to data across the
organization
• Develop data strategy and
architecture in tandem
• Create a consistent view of
data across departments
• Improve transparency
between reported financial
results, big data analytics
and supporting transaction
detail
©ACCA
What does this mean for public sector
organisations?
• Organised attacks vs low level threats? Get the fundamentals
right!
• Big data is increasing risks and presenting new challenges –
but the opportunities for public organisations are enormous
• Centralised solutions should offer efficiency and greater
protection – but the impact of risks become more severe
• Not just an IT and technology issue. It is a board-level issue
and finance should be at the forefront
• Understand the implications of social tech, mobile and cloud
• Awareness of the issues needs to be turned into action and
leadership
©ACCA
Future challenges
• The internet of things and the growing volume and complexity
of data
• Regulation and public concerns – blurring between public and
private data
• More sophisticated attacks are innevitable
• Need for international collaboration
©ACCA
Find out more…?
DIGITAL
DARWINISM:
Thriving in the face of
technology change
100 DRIVERS OF
CHANGE for the
global accountancy
profession
BIG DATA:
Its power and perils
Enhancing competitive
advantage through
analytical insights
Are you unlocking the
value of your data?
Questions and Answers
Be sure to tune in to our next webinar!
• “A Conversation with the New Auditor General of Nova Scotia”
• Presenter: Michael Pickup – Auditor General of Nova Scotia
• Thursday, March 12 from 12:00 – 1:00pm EDT
• Register at www.fmi.ca/events/webinars
26

Contenu connexe

Tendances

Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentationParab Mishra
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecuritysommerville-videos
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentationA.S. Sabuj
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and SecurityNoushad Hasan
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securitySharath Raj
 
Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Radar Cyber Security
 
Cyber Terrorism Presentation
Cyber Terrorism PresentationCyber Terrorism Presentation
Cyber Terrorism Presentationmerlyna
 
Cyber security
Cyber securityCyber security
Cyber securityPihu Goel
 
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...Edureka!
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityRamiro Cid
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindSaurabh Kheni
 
Ethical Hacking Powerpoint
Ethical Hacking PowerpointEthical Hacking Powerpoint
Ethical Hacking PowerpointRen Tuazon
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to CybersecurityKrutarth Vasavada
 

Tendances (20)

Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurity
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentation
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
 
Cybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacksCybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacks
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025
 
Cyber Terrorism Presentation
Cyber Terrorism PresentationCyber Terrorism Presentation
Cyber Terrorism Presentation
 
Cyber security
Cyber securityCyber security
Cyber security
 
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
 
CYBER SECURITY
CYBER SECURITY CYBER SECURITY
CYBER SECURITY
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
ETHICAL HACKING PPT
ETHICAL HACKING PPTETHICAL HACKING PPT
ETHICAL HACKING PPT
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For Mankind
 
CYBER TERRORISM
     CYBER TERRORISM     CYBER TERRORISM
CYBER TERRORISM
 
Ethical Hacking Powerpoint
Ethical Hacking PowerpointEthical Hacking Powerpoint
Ethical Hacking Powerpoint
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to Cybersecurity
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 

Similaire à Cyber Security: Threat and Prevention

Cybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 Trends
Cybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 TrendsCybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 Trends
Cybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 TrendsIvanti
 
A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...Judith Beckhard Cardoso
 
Cyber security general perspective a
Cyber security general perspective aCyber security general perspective a
Cyber security general perspective amarukanda
 
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY IndiaGet Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY IndiaRahul Neel Mani
 
MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?Kurt Hagerman
 
CTEK Cyber Briefing - April 2022.pptx
CTEK Cyber Briefing - April 2022.pptxCTEK Cyber Briefing - April 2022.pptx
CTEK Cyber Briefing - April 2022.pptxSophia Price
 
CynergisTek Cyber Briefing April 2022
CynergisTek Cyber Briefing April 2022CynergisTek Cyber Briefing April 2022
CynergisTek Cyber Briefing April 2022SophiaPalmira1
 
7th ERM - S2 - Cyber security, Cyber Risk and Data Privacy - Kalpesh Doshi (1...
7th ERM - S2 - Cyber security, Cyber Risk and Data Privacy - Kalpesh Doshi (1...7th ERM - S2 - Cyber security, Cyber Risk and Data Privacy - Kalpesh Doshi (1...
7th ERM - S2 - Cyber security, Cyber Risk and Data Privacy - Kalpesh Doshi (1...TraintechTde
 
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Cristian Garcia G.
 
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...PECB
 
David doughty presentation 181119
David doughty presentation 181119David doughty presentation 181119
David doughty presentation 181119David Doughty
 
NextLevel Cyber Security Executive Briefing
NextLevel Cyber Security Executive BriefingNextLevel Cyber Security Executive Briefing
NextLevel Cyber Security Executive BriefingJoe Nathans
 
Top 10 Cybersecurity Predictions for 2015
Top 10 Cybersecurity Predictions for 2015Top 10 Cybersecurity Predictions for 2015
Top 10 Cybersecurity Predictions for 2015Matthew Rosenquist
 
Securing Fintech: Threats, Challenges & Best Practices
Securing Fintech: Threats, Challenges & Best PracticesSecuring Fintech: Threats, Challenges & Best Practices
Securing Fintech: Threats, Challenges & Best PracticesUlf Mattsson
 
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...WCIT 2014
 
protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...
protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...
protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...James Fisher
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsUlf Mattsson
 
Your organization is at risk! Upgrade your IT security & IT governance now.
Your organization is at risk! Upgrade your IT security & IT governance now.Your organization is at risk! Upgrade your IT security & IT governance now.
Your organization is at risk! Upgrade your IT security & IT governance now.Cyril Soeri
 

Similaire à Cyber Security: Threat and Prevention (20)

Cybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 Trends
Cybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 TrendsCybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 Trends
Cybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 Trends
 
A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...
 
Cyber security general perspective a
Cyber security general perspective aCyber security general perspective a
Cyber security general perspective a
 
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY IndiaGet Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
 
MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
CTEK Cyber Briefing - April 2022.pptx
CTEK Cyber Briefing - April 2022.pptxCTEK Cyber Briefing - April 2022.pptx
CTEK Cyber Briefing - April 2022.pptx
 
CynergisTek Cyber Briefing April 2022
CynergisTek Cyber Briefing April 2022CynergisTek Cyber Briefing April 2022
CynergisTek Cyber Briefing April 2022
 
7th ERM - S2 - Cyber security, Cyber Risk and Data Privacy - Kalpesh Doshi (1...
7th ERM - S2 - Cyber security, Cyber Risk and Data Privacy - Kalpesh Doshi (1...7th ERM - S2 - Cyber security, Cyber Risk and Data Privacy - Kalpesh Doshi (1...
7th ERM - S2 - Cyber security, Cyber Risk and Data Privacy - Kalpesh Doshi (1...
 
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
 
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
 
David doughty presentation 181119
David doughty presentation 181119David doughty presentation 181119
David doughty presentation 181119
 
NextLevel Cyber Security Executive Briefing
NextLevel Cyber Security Executive BriefingNextLevel Cyber Security Executive Briefing
NextLevel Cyber Security Executive Briefing
 
Top 10 Cybersecurity Predictions for 2015
Top 10 Cybersecurity Predictions for 2015Top 10 Cybersecurity Predictions for 2015
Top 10 Cybersecurity Predictions for 2015
 
Securing Fintech: Threats, Challenges & Best Practices
Securing Fintech: Threats, Challenges & Best PracticesSecuring Fintech: Threats, Challenges & Best Practices
Securing Fintech: Threats, Challenges & Best Practices
 
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
 
ISACA ISSA Presentation
ISACA ISSA PresentationISACA ISSA Presentation
ISACA ISSA Presentation
 
protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...
protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...
protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & Recommendations
 
Your organization is at risk! Upgrade your IT security & IT governance now.
Your organization is at risk! Upgrade your IT security & IT governance now.Your organization is at risk! Upgrade your IT security & IT governance now.
Your organization is at risk! Upgrade your IT security & IT governance now.
 

Plus de fmi_igf

''Lean'' for Internal Audit
''Lean'' for Internal Audit''Lean'' for Internal Audit
''Lean'' for Internal Auditfmi_igf
 
PPX-FMI January 26, 2016 Learning Event
PPX-FMI January 26, 2016 Learning EventPPX-FMI January 26, 2016 Learning Event
PPX-FMI January 26, 2016 Learning Eventfmi_igf
 
Costing Centre of Expertise
Costing Centre of ExpertiseCosting Centre of Expertise
Costing Centre of Expertisefmi_igf
 
Operational Capacity Analysis
Operational Capacity AnalysisOperational Capacity Analysis
Operational Capacity Analysisfmi_igf
 
Operational Costing and Capacity Management
Operational Costing and Capacity ManagementOperational Costing and Capacity Management
Operational Costing and Capacity Managementfmi_igf
 
Big data roundtabe intro - canada
Big data roundtabe intro - canadaBig data roundtabe intro - canada
Big data roundtabe intro - canadafmi_igf
 
Communication pendant un conflit
Communication pendant un conflitCommunication pendant un conflit
Communication pendant un conflitfmi_igf
 
Communication durant
Communication durant Communication durant
Communication durant fmi_igf
 
Full Slide Deck
Full Slide DeckFull Slide Deck
Full Slide Deckfmi_igf
 
Webinar slides 2014-12-11
Webinar slides 2014-12-11Webinar slides 2014-12-11
Webinar slides 2014-12-11fmi_igf
 
New Brunswick's Public Service: Pursuing Performance Excellence
New Brunswick's Public Service: Pursuing Performance ExcellenceNew Brunswick's Public Service: Pursuing Performance Excellence
New Brunswick's Public Service: Pursuing Performance Excellencefmi_igf
 
Performance Alignment: Linking Resource Management to Organizational Goals
Performance Alignment: Linking Resource Management to Organizational GoalsPerformance Alignment: Linking Resource Management to Organizational Goals
Performance Alignment: Linking Resource Management to Organizational Goalsfmi_igf
 
Gestion Du Changement
Gestion Du ChangementGestion Du Changement
Gestion Du Changementfmi_igf
 
L'attestation des Dirigeants principals des finances
L'attestation des Dirigeants principals des finances L'attestation des Dirigeants principals des finances
L'attestation des Dirigeants principals des finances fmi_igf
 
Reflections from an International Financial Management Professional
Reflections from an International Financial Management ProfessionalReflections from an International Financial Management Professional
Reflections from an International Financial Management Professionalfmi_igf
 
Identity Theft: Fallout, Investigation, and Prevention
Identity Theft: Fallout, Investigation, and PreventionIdentity Theft: Fallout, Investigation, and Prevention
Identity Theft: Fallout, Investigation, and Preventionfmi_igf
 
Chief Financial Officer Attestation
Chief Financial Officer AttestationChief Financial Officer Attestation
Chief Financial Officer Attestationfmi_igf
 
Change Management
Change ManagementChange Management
Change Managementfmi_igf
 
Fraud in the Public Sector
Fraud in the Public SectorFraud in the Public Sector
Fraud in the Public Sectorfmi_igf
 
2014-10 The Millenial Career Shift
2014-10 The Millenial Career Shift2014-10 The Millenial Career Shift
2014-10 The Millenial Career Shiftfmi_igf
 

Plus de fmi_igf (20)

''Lean'' for Internal Audit
''Lean'' for Internal Audit''Lean'' for Internal Audit
''Lean'' for Internal Audit
 
PPX-FMI January 26, 2016 Learning Event
PPX-FMI January 26, 2016 Learning EventPPX-FMI January 26, 2016 Learning Event
PPX-FMI January 26, 2016 Learning Event
 
Costing Centre of Expertise
Costing Centre of ExpertiseCosting Centre of Expertise
Costing Centre of Expertise
 
Operational Capacity Analysis
Operational Capacity AnalysisOperational Capacity Analysis
Operational Capacity Analysis
 
Operational Costing and Capacity Management
Operational Costing and Capacity ManagementOperational Costing and Capacity Management
Operational Costing and Capacity Management
 
Big data roundtabe intro - canada
Big data roundtabe intro - canadaBig data roundtabe intro - canada
Big data roundtabe intro - canada
 
Communication pendant un conflit
Communication pendant un conflitCommunication pendant un conflit
Communication pendant un conflit
 
Communication durant
Communication durant Communication durant
Communication durant
 
Full Slide Deck
Full Slide DeckFull Slide Deck
Full Slide Deck
 
Webinar slides 2014-12-11
Webinar slides 2014-12-11Webinar slides 2014-12-11
Webinar slides 2014-12-11
 
New Brunswick's Public Service: Pursuing Performance Excellence
New Brunswick's Public Service: Pursuing Performance ExcellenceNew Brunswick's Public Service: Pursuing Performance Excellence
New Brunswick's Public Service: Pursuing Performance Excellence
 
Performance Alignment: Linking Resource Management to Organizational Goals
Performance Alignment: Linking Resource Management to Organizational GoalsPerformance Alignment: Linking Resource Management to Organizational Goals
Performance Alignment: Linking Resource Management to Organizational Goals
 
Gestion Du Changement
Gestion Du ChangementGestion Du Changement
Gestion Du Changement
 
L'attestation des Dirigeants principals des finances
L'attestation des Dirigeants principals des finances L'attestation des Dirigeants principals des finances
L'attestation des Dirigeants principals des finances
 
Reflections from an International Financial Management Professional
Reflections from an International Financial Management ProfessionalReflections from an International Financial Management Professional
Reflections from an International Financial Management Professional
 
Identity Theft: Fallout, Investigation, and Prevention
Identity Theft: Fallout, Investigation, and PreventionIdentity Theft: Fallout, Investigation, and Prevention
Identity Theft: Fallout, Investigation, and Prevention
 
Chief Financial Officer Attestation
Chief Financial Officer AttestationChief Financial Officer Attestation
Chief Financial Officer Attestation
 
Change Management
Change ManagementChange Management
Change Management
 
Fraud in the Public Sector
Fraud in the Public SectorFraud in the Public Sector
Fraud in the Public Sector
 
2014-10 The Millenial Career Shift
2014-10 The Millenial Career Shift2014-10 The Millenial Career Shift
2014-10 The Millenial Career Shift
 

Dernier

Panet vs.Plastics - Earth Day 2024 - 22 APRIL
Panet vs.Plastics - Earth Day 2024 - 22 APRILPanet vs.Plastics - Earth Day 2024 - 22 APRIL
Panet vs.Plastics - Earth Day 2024 - 22 APRILChristina Parmionova
 
High-Level Thematic Event on Tourism - SUSTAINABILITY WEEK 2024- United Natio...
High-Level Thematic Event on Tourism - SUSTAINABILITY WEEK 2024- United Natio...High-Level Thematic Event on Tourism - SUSTAINABILITY WEEK 2024- United Natio...
High-Level Thematic Event on Tourism - SUSTAINABILITY WEEK 2024- United Natio...Christina Parmionova
 
productionpost-productiondiary-240320114322-5004daf6.pptx
productionpost-productiondiary-240320114322-5004daf6.pptxproductionpost-productiondiary-240320114322-5004daf6.pptx
productionpost-productiondiary-240320114322-5004daf6.pptxHenryBriggs2
 
Call Girls In Pullman Hotel New Delhi Aerocity 9873777170
Call Girls In Pullman Hotel New Delhi Aerocity 9873777170Call Girls In Pullman Hotel New Delhi Aerocity 9873777170
Call Girls In Pullman Hotel New Delhi Aerocity 9873777170Sonam Pathan
 
call girls in DLF Phase 1 gurgaon 🔝 >༒9540349809 🔝 genuine Escort Service 🔝...
call girls in DLF Phase 1  gurgaon  🔝 >༒9540349809 🔝 genuine Escort Service 🔝...call girls in DLF Phase 1  gurgaon  🔝 >༒9540349809 🔝 genuine Escort Service 🔝...
call girls in DLF Phase 1 gurgaon 🔝 >༒9540349809 🔝 genuine Escort Service 🔝...saminamagar
 
In credit? Assessing where Universal Credit’s long rollout has left the benef...
In credit? Assessing where Universal Credit’s long rollout has left the benef...In credit? Assessing where Universal Credit’s long rollout has left the benef...
In credit? Assessing where Universal Credit’s long rollout has left the benef...ResolutionFoundation
 
YHR Fall 2023 Issue (Joseph Manning Interview) (2).pdf
YHR Fall 2023 Issue (Joseph Manning Interview) (2).pdfYHR Fall 2023 Issue (Joseph Manning Interview) (2).pdf
YHR Fall 2023 Issue (Joseph Manning Interview) (2).pdfyalehistoricalreview
 
Stop throwing your old clothes and start donating
Stop throwing your old clothes and start donatingStop throwing your old clothes and start donating
Stop throwing your old clothes and start donatingSERUDS INDIA
 
Swachh Bharat Abhiyan: Transforming India Towards a Cleaner Future
Swachh Bharat Abhiyan: Transforming India Towards a Cleaner FutureSwachh Bharat Abhiyan: Transforming India Towards a Cleaner Future
Swachh Bharat Abhiyan: Transforming India Towards a Cleaner FutureAnkitRaj274827
 
call girls in Kirti Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Kirti Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Kirti Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Kirti Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️saminamagar
 
Canadian Immigration Tracker - Key Slides - February 2024.pdf
Canadian Immigration Tracker - Key Slides - February 2024.pdfCanadian Immigration Tracker - Key Slides - February 2024.pdf
Canadian Immigration Tracker - Key Slides - February 2024.pdfAndrew Griffith
 
call girls in Mayapuri DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Mayapuri DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Mayapuri DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Mayapuri DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️saminamagar
 
Make Charity for Poor Students to Strong Kurnool
Make Charity for Poor Students to Strong KurnoolMake Charity for Poor Students to Strong Kurnool
Make Charity for Poor Students to Strong KurnoolSERUDS INDIA
 
Russian Call Girl Hebbagodi ! 7001305949 ₹2999 Only and Free Hotel Delivery 2...
Russian Call Girl Hebbagodi ! 7001305949 ₹2999 Only and Free Hotel Delivery 2...Russian Call Girl Hebbagodi ! 7001305949 ₹2999 Only and Free Hotel Delivery 2...
Russian Call Girl Hebbagodi ! 7001305949 ₹2999 Only and Free Hotel Delivery 2...narwatsonia7
 
How to design healthy team dynamics to deliver successful digital projects.pptx
How to design healthy team dynamics to deliver successful digital projects.pptxHow to design healthy team dynamics to deliver successful digital projects.pptx
How to design healthy team dynamics to deliver successful digital projects.pptxTechSoupConnectLondo
 
Action Toolkit - Earth Day 2024 - April 22nd.
Action Toolkit - Earth Day 2024 - April 22nd.Action Toolkit - Earth Day 2024 - April 22nd.
Action Toolkit - Earth Day 2024 - April 22nd.Christina Parmionova
 
call girls in Mukherjee Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝...
call girls in Mukherjee Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝...call girls in Mukherjee Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝...
call girls in Mukherjee Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝...saminamagar
 
call girls in sector 22 Gurgaon 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in sector 22 Gurgaon  🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in sector 22 Gurgaon  🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in sector 22 Gurgaon 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️saminamagar
 
2024: The FAR, Federal Acquisition Regulations - Part 25
2024: The FAR, Federal Acquisition Regulations - Part 252024: The FAR, Federal Acquisition Regulations - Part 25
2024: The FAR, Federal Acquisition Regulations - Part 25JSchaus & Associates
 

Dernier (20)

Panet vs.Plastics - Earth Day 2024 - 22 APRIL
Panet vs.Plastics - Earth Day 2024 - 22 APRILPanet vs.Plastics - Earth Day 2024 - 22 APRIL
Panet vs.Plastics - Earth Day 2024 - 22 APRIL
 
High-Level Thematic Event on Tourism - SUSTAINABILITY WEEK 2024- United Natio...
High-Level Thematic Event on Tourism - SUSTAINABILITY WEEK 2024- United Natio...High-Level Thematic Event on Tourism - SUSTAINABILITY WEEK 2024- United Natio...
High-Level Thematic Event on Tourism - SUSTAINABILITY WEEK 2024- United Natio...
 
productionpost-productiondiary-240320114322-5004daf6.pptx
productionpost-productiondiary-240320114322-5004daf6.pptxproductionpost-productiondiary-240320114322-5004daf6.pptx
productionpost-productiondiary-240320114322-5004daf6.pptx
 
Call Girls In Pullman Hotel New Delhi Aerocity 9873777170
Call Girls In Pullman Hotel New Delhi Aerocity 9873777170Call Girls In Pullman Hotel New Delhi Aerocity 9873777170
Call Girls In Pullman Hotel New Delhi Aerocity 9873777170
 
call girls in DLF Phase 1 gurgaon 🔝 >༒9540349809 🔝 genuine Escort Service 🔝...
call girls in DLF Phase 1  gurgaon  🔝 >༒9540349809 🔝 genuine Escort Service 🔝...call girls in DLF Phase 1  gurgaon  🔝 >༒9540349809 🔝 genuine Escort Service 🔝...
call girls in DLF Phase 1 gurgaon 🔝 >༒9540349809 🔝 genuine Escort Service 🔝...
 
In credit? Assessing where Universal Credit’s long rollout has left the benef...
In credit? Assessing where Universal Credit’s long rollout has left the benef...In credit? Assessing where Universal Credit’s long rollout has left the benef...
In credit? Assessing where Universal Credit’s long rollout has left the benef...
 
YHR Fall 2023 Issue (Joseph Manning Interview) (2).pdf
YHR Fall 2023 Issue (Joseph Manning Interview) (2).pdfYHR Fall 2023 Issue (Joseph Manning Interview) (2).pdf
YHR Fall 2023 Issue (Joseph Manning Interview) (2).pdf
 
Stop throwing your old clothes and start donating
Stop throwing your old clothes and start donatingStop throwing your old clothes and start donating
Stop throwing your old clothes and start donating
 
Swachh Bharat Abhiyan: Transforming India Towards a Cleaner Future
Swachh Bharat Abhiyan: Transforming India Towards a Cleaner FutureSwachh Bharat Abhiyan: Transforming India Towards a Cleaner Future
Swachh Bharat Abhiyan: Transforming India Towards a Cleaner Future
 
call girls in Kirti Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Kirti Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Kirti Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Kirti Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
 
Canadian Immigration Tracker - Key Slides - February 2024.pdf
Canadian Immigration Tracker - Key Slides - February 2024.pdfCanadian Immigration Tracker - Key Slides - February 2024.pdf
Canadian Immigration Tracker - Key Slides - February 2024.pdf
 
Hot Sexy call girls in Palam Vihar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Palam Vihar🔝 9953056974 🔝 escort ServiceHot Sexy call girls in Palam Vihar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Palam Vihar🔝 9953056974 🔝 escort Service
 
call girls in Mayapuri DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Mayapuri DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Mayapuri DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Mayapuri DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
 
Make Charity for Poor Students to Strong Kurnool
Make Charity for Poor Students to Strong KurnoolMake Charity for Poor Students to Strong Kurnool
Make Charity for Poor Students to Strong Kurnool
 
Russian Call Girl Hebbagodi ! 7001305949 ₹2999 Only and Free Hotel Delivery 2...
Russian Call Girl Hebbagodi ! 7001305949 ₹2999 Only and Free Hotel Delivery 2...Russian Call Girl Hebbagodi ! 7001305949 ₹2999 Only and Free Hotel Delivery 2...
Russian Call Girl Hebbagodi ! 7001305949 ₹2999 Only and Free Hotel Delivery 2...
 
How to design healthy team dynamics to deliver successful digital projects.pptx
How to design healthy team dynamics to deliver successful digital projects.pptxHow to design healthy team dynamics to deliver successful digital projects.pptx
How to design healthy team dynamics to deliver successful digital projects.pptx
 
Action Toolkit - Earth Day 2024 - April 22nd.
Action Toolkit - Earth Day 2024 - April 22nd.Action Toolkit - Earth Day 2024 - April 22nd.
Action Toolkit - Earth Day 2024 - April 22nd.
 
call girls in Mukherjee Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝...
call girls in Mukherjee Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝...call girls in Mukherjee Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝...
call girls in Mukherjee Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝...
 
call girls in sector 22 Gurgaon 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in sector 22 Gurgaon  🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in sector 22 Gurgaon  🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in sector 22 Gurgaon 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
 
2024: The FAR, Federal Acquisition Regulations - Part 25
2024: The FAR, Federal Acquisition Regulations - Part 252024: The FAR, Federal Acquisition Regulations - Part 25
2024: The FAR, Federal Acquisition Regulations - Part 25
 

Cyber Security: Threat and Prevention

  • 1. “Expand Your Horizons” Webinar Series Cyber Security: Threat and Prevention February 24, 2015 1:00 – 1:45pm The Webinar will begin shortly. You can ask a question in the box on the right hand side. We will answer them during our Q&A at the end of the webinar.
  • 2. 2 Cyber Threats and the Government of Canada
  • 3. CSE Mandate: National Defence Act 3 Provide advice, guidance and services to help ensure the protection of information and information systems of importance to the GC PART B PART A Provide foreign intelligence in accordance with government priorities PART C Provide technical assistance to law enforcement and national security
  • 4. What is the GC Protecting ? 4 Banking & Finance Border Services & Immigration Government Administration Health Industry & Business Development International Affairs, Trade & Development Legal Natural Resources, Energy & Environment Security, Intelligence & Defence Social & Cultural Development Transportation GC Cyber Activity in 2014 by Sector Canadian Personal Information Trade Secrets New Technologies Negotiating Strategies Natural resources information Access to everything What are Threat Actors after?
  • 5. What are the Threats? 5 State-sponsored threat actors Foreign intelligence services tasked to collect intelligence and/or disrupt Canadian services. Cybercriminals Criminals that use malware and other programs to either steal information or coerce others to pay them for illegitimate reasons (ransomware). Hacktivists Political and/or social activists that use computers or computer networks to channel their message or prove a point. Script kiddies Individuals or groups that target GC and other organizations for the fun of it, or compete to see who can cause the most damage.
  • 6. What are the risks 6 Reputational/Trust Business Continuity Financial Impact Information Loss/Damage
  • 7. No quick fix for cyber security. There are a number of mitigation measures you can undertake to significantly hinder threat actors. • Patching: • Operating system; • Applications; • Till you can patch no more! Patching Challenges: • Timeliness/Costs • Various versions : operating systems & Internet browsers. Current malicious activity that could be prevented with patching: • 2010 & 2012 Common Vulnerabilities and Exposures (CVEs) • Every compromise in 2013! Preventing a Compromise - Patching 7
  • 8. Cyber security does not stop with patching. Proactively prepare. Cyber threat actors will gain access. Harden your networks: • design your network and system efficiently; • know where certain applications are in use; • apply network segmentation in security zones to protect sensitive information; • consolidate Internet access points; and, • other best practices. Anticipating a Compromise 8
  • 9. Shared Services Canada A Team Sport 9 IT security teams across the Government of Canada Public Safety Canadian private sector Canadian industry IT vendors Working together is key!
  • 10. Understand your network and information is constantly targeted; Be aware of cyber threat actors and their methods; Top 10 Mitigation Measures IN CONCLUSION: Cyber threat activity is here to stay; Compromises and vulnerabilities will increasingly be publicized – Don’t make the headlines for the wrong reasons; and, Anticipating compromises is just as important as preventing them. Where from Here? 10
  • 11. Ewan Willars Tuesday 24 February Cybersecurity: The challenge for finance
  • 12. ©ACCA Cybersecurity: a frontline issue for finance All organizations need to: 1. understand the nature and likelihood of cyber-threats 2. identify, assess and mitigate existing and emerging risks 3. implement and maintain strong controls and policies to govern data privacy and security 4. educate users on emerging risks, such as those associated with mobile technology 5. plan for increasing complexity, and 6. make technological risk an executive-level concern.
  • 13. ©ACCA Global drivers of change for the profession: short term (2013) 4.2 4.4 4.6 4.8 5 5.2 5.4 5.6 Public sector Corporates (large) Corporates (small/medium) Fuel and Energy Prices Cybersecurity Challenges Corporate Governance Regulation Meanscore
  • 14. ©ACCA Percentage of accountants concerned with risks associated with cybercrime
  • 15. ©ACCA The changing role of finance: increasing cyber-risks? Supporting strategic direction and creating value Traditional control & stewardship responsibilities Emergence of big data and the data-driven organization Extracting insights and value from data Data management, security and assurance
  • 16. ©ACCA The future: data-driven finance function A data-driven finance department has the following objectives: • provide data leadership across the organization • improve decision making across finance and other functional areas • manage the ever-increasing regulatory reporting requirements • enhance control and risk management capabilities • improving cost efficiency and lowering the cost-to-serve.
  • 17. ©ACCA The current state of play Data challenges Internal data Supply chain data Customer data Poor data integration Reporting funnels
  • 18. ©ACCA The data-driven organization New risks or greater resilience? ERP General ledger Unified Data Ecosystem • Create a unified approach to data across the organization • Develop data strategy and architecture in tandem • Create a consistent view of data across departments • Improve transparency between reported financial results, big data analytics and supporting transaction detail
  • 19. ©ACCA What does this mean for public sector organisations? • Organised attacks vs low level threats? Get the fundamentals right! • Big data is increasing risks and presenting new challenges – but the opportunities for public organisations are enormous • Centralised solutions should offer efficiency and greater protection – but the impact of risks become more severe • Not just an IT and technology issue. It is a board-level issue and finance should be at the forefront • Understand the implications of social tech, mobile and cloud • Awareness of the issues needs to be turned into action and leadership
  • 20. ©ACCA Future challenges • The internet of things and the growing volume and complexity of data • Regulation and public concerns – blurring between public and private data • More sophisticated attacks are innevitable • Need for international collaboration
  • 22. DIGITAL DARWINISM: Thriving in the face of technology change
  • 23. 100 DRIVERS OF CHANGE for the global accountancy profession
  • 24. BIG DATA: Its power and perils
  • 25. Enhancing competitive advantage through analytical insights Are you unlocking the value of your data?
  • 26. Questions and Answers Be sure to tune in to our next webinar! • “A Conversation with the New Auditor General of Nova Scotia” • Presenter: Michael Pickup – Auditor General of Nova Scotia • Thursday, March 12 from 12:00 – 1:00pm EDT • Register at www.fmi.ca/events/webinars 26