SlideShare une entreprise Scribd logo
1  sur  16
Télécharger pour lire hors ligne
Perspective
First and Last
Line of Defense
How Business Assurance
Makes Organizations
Resilient to Risk
Ramez Shehadi
Alessandro Gazzini
Booz & Company
Contact Information
Beirut
Ramez Shehadi
Partner
+961-1-985-655
ramez.shehadi@booz.com
Frankfurt
Rainer Bernnat
Partner
+49-69-97167-414
rainer.bernnat@booz.com
London
Louise Fletcher
Partner
+44-20-7393-3530
louise.fletcher@booz.com
Alan Gemes
Senior Partner
+44-20-7393-3333
alan.gemes@booz.com
Richard Rawlinson
Partner
+44-20-7393-3333
richard.rawlinson@booz.com
Rome
Fernando Napolitano
Partner
+39-06-69-20-73-1
fernando.napolitano@booz.com
Alessandro Gazzini
Principal
+39-06-69-20-73-1
alessandro.gazzini@booz.com
Stockholm
Per-Ola Karlsson
Partner
+46-8-50619049
per-ola.karlsson@booz.com
Zurich
Carlos Amman
Partner
+41-43-268-2121
carlos.ammann@booz.com
Canberra
Andrew Johnstone-Burt
Partner
+61-2-6279-1900
andrew.johnstone-burt@booz.com
Sedar LaBarre, Stefano Buschi, and Alexandra Rutherford also
contributed to this Perspective.
Booz & Company 1
EXECUTIVE
SUMMARY
Rapid advances in technology and the need to deliver goods
and services more efficiently have made organizations more
vulnerable than ever to systemic shocks and other potentially
damaging incidents. In addition, the increasing interconnect-
edness of people and businesses means that these events are no
longer isolated; rather, they cascade through society, causing
many indirect and at times unforeseen consequences.
The traditional security programs put in force by many com-
panies and governments to meet these challenges are inefficient
and inadequate. Organizations tend to take a fragmented
and isolated approach to protecting physical and information
resources. Because of this, they are hampered by a number of
critical shortcomings: lack of an enterprise-wide view of risks,
lack of accountability in dealing with those risks, and duplica-
tive responses and investments.
Recognizing these shortcomings, organizations around the
world are embracing integrated risk-management strate-
gies. These combine the right blend of physical, information,
and IT security controls to effectively manage access to vital
information resources and ensure business continuity and
increased resilience. A model that we call “business assurance”
gives organizations the right tools and procedures to identify,
manage, and absorb a range of unforeseen events, from minor
incidents to full-blown disasters.
Booz & Company2
In recent years, the number and
severity of systemic shocks have been
increasing worldwide—earthquakes
and tsunamis, blackouts and
technology failures, worldwide food
shortages, pandemic diseases, and
terrorist attacks are just a handful of
examples plucked from the headlines
(see Exhibit 1). For every one of
these major events, there are scores
of other potential incidents bubbling
beneath the surface, threatening
the operations or livelihoods of
companies, governments, and
individuals. Some experts attribute
this rise to global connectivity, while
others point to an increase in threats
due to growing populations, poverty,
wealth imbalances, technological
complexity, and mass migrations to
coasts and other exposed regions.
Regardless of the cause, it is evident
that the world today is more
vulnerable to the effects of these
incidents due to growing digitization,
societal interconnectedness, and lean
operations. Because of these trends,
events have a cascading impact
throughout business operations
and society. For instance, in 2005,
Hurricane Katrina caused direct
catastrophic damages to buildings,
roads, and telecommunications
networks, but indirectly the storm
resulted in surging oil prices—due
to extensive refinery damage—and
paralysis among critical response
teams, whose rescue efforts were
compromised by traffic light and
telecommunication outages. The
situation is further complicated by
today’s emerging “complexity risks,”
which cut across all traditional
domains, such as the protection of
critical infrastructures, cyber security,
food and water security, and energy
security.
Public- and private-sector mandates
for greater efficiency, although
critical to growth in productivity,
add layers of risk. Operations
optimization, process automation,
and digitization have measurable
benefits, but they also expose
companies and governments to
significant incremental vulnerabilities
(see Exhibit 2). The recent surge in
electronic identify theft, for example,
has been possible only because
we became more virtual—and
productive—as a society.
Technologies that increase the
effectiveness of organizations and
drive societal interconnectedness
are exposing us to new risks as
well. Incidents are felt by more
and more people, and cause an
increasing amount of widespread
damage. Experts estimate that
a total of US$1 billion has been
stolen from financial institutions
and corporations in the Middle
East by organized cyber criminals
employing online transactions.1
In
one such case in 2007, a Dubai-based
gang stole roughly $60 million by
accessing consumers’ online credit
card information, even from Web
sites that offer government services.2
These details were then used by gang
members to make cash withdrawals
and to buy gold and diamonds
online.
CASCADING
RISKS
KEY HIGHLIGHTS
•	The number and severity of
systemic incidents are increasing
around the globe, and their impact
on business operations and society
as a whole is more far-reaching than
ever before.
•	Improved processes and
technologies that are helping
businesses operate more effectively
and efficiently are also making them
more vulnerable to these incidents
and amplifying their impact.
•	The older, traditional security
models are inefficient and ineffective
because they are based on isolated
measures that create organizational
redundancy and fail to provide a
coordinated front against today’s
cascading risks.
•	Today’s changing risk environment
demands a “business assurance”
approach that focuses on building
functional capabilities to mitigate
these risks, and incorporates
a comprehensive governance
framework that orchestrates the
optimal use of these capabilities
and engages multiple stakeholders.
Booz & Company
In addition, a rash of online security
attacks on Rolls-Royce and Shell in
the same year prompted the director
general of the U.K. MI5, the National
Intelligence Service, to warn all
British companies of the threat of
state-sponsored cyber espionage.
Just as these challenges are highly
interconnected, so too are the
potential solutions. The answer is
not to discourage interconnectedness
or to undermine organizational
advancement in technology, but to
develop a system that complements
this approach, allowing for
the adaptability and flexibility
necessary to match today’s high-risk
environment. By the same token,
no single organization, government
agency, or country can resolve the
problems effectively in isolation.
The right solutions all call for the
interaction of multiple stakeholders,
including public–private partnerships
and international collaboration.3
For instance, the U.S. National
Security Council recently conducted
a review of its cyber-security policy
and concluded that the United States
“needs a comprehensive framework
to ensure coordinated response and
recovery by the government, the
private sector, and our allies to a
significant incident or threat.”4
3
Exhibit 2
Digitization Brings Greater Risk
Source: Booz & Company
Automation/DigitizationofInformation
Risk Exposure/Potential for Damage
Digital ID
E-procurement
GIS systems
Vital records digitalized
E-gov services
Centralized
databases
Digital images of
critical assets
Real-time
process control
systems
Electronically
integrated
suppliers
Shared services
ERP systems
Low
Low
High
High
Electronic
payments
Collaborative R&D
E-mail and
communication
systems
Source: EM-DAT, the OFDA/CRED International Disaster Database
Exhibit 1
Disasters Are Packing a Bigger Punch
NUMBER AND FINANCIAL IMPACT OF
NATURAL DISASTERS
NUMBER AND FINANCIAL IMPACT OF
TECHNOLOGICAL DISASTERS
4,146
1,824
0
500
1,000
1,500
2,000
2,500
3,000
3,500
4,000
4,500
2,970
1980-
1989
1990-
1999
2000-
2009
1980-
1989
1990-
1999
2000-
2009
900,000,000
800,000,000
700,000,000
600,000,000
500,000,000
400,000,000
300,000,000
200,000,000
1,000,000,000
100,000,000
(inUS$Thousands)
(inUS$Thousands)
3,000
966
2,050
0
400
800
1,200
1,600
2,000
2,400
2,800
0
2,000,000
4,000,000
6,000,000
8,000,000
10,000,000
12,000,000
3,200 14,000,000
Number of Events
Damage
Many governments and organizations
have continued to build traditional
security programs that are inadequate
to cope with the new and emerging
vulnerabilities of today. Although
these programs may have been gener-
ally successful in advancing security,
continuity, and crisis management
capabilities, gains have been limited
because they have fostered the devel-
opment of “stovepipes.” Stovepipes
occur when functional capabilities are
developed to address specific types
of risks or vulnerabilities in isolation
from each other—for example, the
creation of an IT security policy that
does not link with the organization’s
crisis management policy. Stovepipes
are problematic because they prevent
senior decision makers from obtain-
ing an integrated and consistent view
of risks across all domains, and they
lead to unnecessary duplication of
activities and potential investments
THE STATUS QUO
IS INADEQUATE
Booz & Company4
Estonia’s E-Heist
Estonia’s government functions
depend largely on the Internet thanks
to the country’s push for a “paperless
government” and its migration toward
Web-based banking. For the past
few years, it has been hailed as an
exemplary “e-government,” where
citizens and businesses can log on to
the Internet to pay taxes and vote in
elections.
However, in 2007, Estonia was
the target of a cyber attack that
compromised international Internet
access and many national services
(media, e-government services,
banks). The attack, the first of its kind
on a national government, lasted for
more than 20 days and resulted in
millions of dollars of losses. It was
perpetrated using a network of millions
of compromised computers dispersed
all over the globe, and presumably
coordinated by a few individuals.
The attack was of a sophistication not
seen before and demonstrated that
the international legislation and laws
regarding cyber security and cyber
attacks are still immature. It became
clear a new cooperative approach is
necessary to effectively respond to
and prevent these types of events. To
help deal with these threats, NATO
has created a Cooperative Cyber
Defence Centre of Excellence in
Tallinn, Estonia, officially announced in
May 2008, which started operations in
the summer of 2008.
(see “Shortcomings of the Stovepipe
Approach”).
When organizations employ this tra-
ditional security approach, they often
experience a decrease in efficiency
and potency, critical gaps are cre-
ated, and ultimately, an unacceptable
level of risk is reached. One common
tendency of companies is to spend so
much time and attention on the estab-
lishment of extensive physical security
controls to prevent the “bad guys”
from entering company premises
that they ignore critical proprietary
information or assets made vulnerable
by digitization. Compounding the
problem is the fact that in many com-
panies, security and IT directors are
often perceived as “techies” and are
not represented in board discussions.
Their exclusion from strategy discus-
sions hamstrings an organization’s
ability to increase risk awareness and
make informed decisions.
Companies and government agencies
need an integrated risk management
strategy that takes into account the
right physical, information, and IT
security controls required to effec-
tively manage access to and use of key
company information.
Booz & Company 5
Shortcomings of the Stovepipe Approach
Companies that build their business assurance capabilities based on older
models in which stovepipes existed tend to experience critical shortcomings
across the enterprise. For starters, it is difficult to compare and prioritize
exposures from many lists, and risk assessments are often neglected when
risks are not consolidated. Boards and management have a limited view, which
restricts their ability to act when conditions warrant. Accountability rests in
the hands of many, resulting in no clear “go-to” person or function to ensure
business continuity. This lack of coordination often leads to wasted efforts and
confusion over how one function’s response fits with the company’s overall
strategy.
Source: Booz & Company
Exhibit A
Typical Organizational “Stovepipes”
Operational
Risks
Project
Risks
Strategic
Risks
Early
Warning
IT Disaster
Recovery
Critical Infrastructure
Protection
Business
Continuity
Continuity of
Operations
Personnel
Security
IT Security
Information
Security
Physical
Security
Environmental
Security
Technical Test &
Evaluation
Crisis
Communications
Incident Command
Framework
Operations
Center
Personnel
Safety
Booz & Company6
General risk management theory
states that organizations cannot
feasibly predict or sidestep every
risk, or prevent every risk from
maturing into a serious threat. At the
same time, an organization needs to
be able to mitigate and absorb the
impact of any risk by establishing and
continuously strengthening its ability
to maintain operations in the event of
an incident, even if operations cannot
immediately function at full capacity.
That is, an organization needs to
develop a security and continuity
system that enables it to become
organizationally resilient.
Over the last several decades,
globalization and other competitive
pressures have forced organizations
to focus on the efficiency of their
business as much as their effectiveness
in delivering a better product or
service for the same investment.
The recent spate of major terrorist
attacks and environmental disasters
is now pressing them to examine
how resilient their operations are
to unforeseen shocks. After all, an
organization can be ahead in the
marketplace—and have mastered
the managerial art of balancing the
efficiency and effectiveness trade-
off—but if something disrupts
the organization’s delivery of core
products or services, it is no longer
competitive. In the worst case, it may
even no longer have a reason to exist
if the trust of key stakeholders is
irretrievably lost. In short, resilience
has become imperative to survival.
Leading nations and organizations
are beginning to understand the
need to build resilient organizations
in the face of this emerging and
cascading risk environment. For
instance, the British government has
developed a nationwide network
of resilience councils, coordinated
by the Cabinet Office, to conduct
a government-wide integrated risk
assessment called the National Risk
Register, and to generally improve the
country’s resilience to all manner of
risks.5
Singapore has taken a similar
approach in devising its “Whole
of Government—Integrated Risk
Management” framework.6
The U.S. Postal Service (USPS)
invested in a resilient system that was
credited with blunting the impact
of the 2001 anthrax attacks, which
forced the agency to close its primary
collection facility in the nation’s
capital. In order to make up for this
lost capacity, the USPS rerouted its
mail to two other local facilities, and
maintained same-day service. Thanks
to its extensive planning, the USPS
was able to effectively continue its
core mission of delivering mail to its
customers.
These examples highlight the growing
trend of governments and companies
in adopting resilient solutions as a
way to deal with today’s emerging
and interconnected risks. This is what
we at Booz & Company refer to as
business assurance.
THE CASE FOR A
NEW APPROACH
Leading nations and organizations are
beginning to understand the need to
build resilient organizations in the face
of this emerging and cascading risk
environment.
7Booz & Company
strategy. Focuses on the portfolio
of critical business processes and
assets—facilities, infrastructure, IT
systems, and personnel.
•	 Incident Response: Prepares an
organization to manage all types of
events by adopting an “all haz-
ards” approach. Establishes key
elements of an incident response
framework, including an opera-
tions center and crisis communica-
tions protocols.
Developing these functional capabili-
ties is essential to reaching the right
balance across the security life cycle
that is needed to achieve resilience.
The four functional capabilities of
the business assurance model are
supported by enabling factors—the
people, infrastructure, and technol-
ogy that can help an organization
recover in the event of an incident.
Examples of such factors include
communications systems and crisis
response centers to keep people in
contact or operations groups that
have received training to respond to
specific circumstances.
Finally, companies must put in place
the governance capabilities necessary
to build and maintain an efficient
system, such as the development of
THE business
ASSURANCE
MODEL
The goal of the business assurance
model is to ensure the appropriate
protection and continuity of an orga-
nization’s core services or mission.
The concept is based primarily on
the development and integration of
functional capabilities, enabling fac-
tors, and governance capabilities. The
assurance model’s first focal point is
establishing an organization’s func-
tional capabilities, which fall under
four main categories:
•	 Risk Analysis: Identifies potential
“pain points” by establishing an
early-warning system for threats,
vulnerabilities, and impacts to criti-
cal assets and processes. Extends
traditional analysis of assets and
functions to business processes
across the organization.
•	 Integrated Security: Reduces the
possibility of occurrence through
the design and implementation of
protective measures for people,
assets, and information against
threats. Takes segregated safety and
security capabilities and integrates
them across physical, IT-based, and
personnel domains.
•	 Continuity Planning: Reduces the
impact of events through the plan-
ning, design, and implementation
of recovery targets and a continuity
Booz & Company8
Source: Booz & Company
policies and standards that regu-
late the characteristics of a resilient
system and the roles and respon-
sibilities of all stakeholders. These
strategies, policies, and performance
management efforts mandate that the
organization is consistently control-
ling and checking that the system is
functioning.
The integration of functional
capabilities, enabling factors, and
governance capabilities is of para-
mount importance. They must work
together through an operational life
cycle—identify, plan, build, execute,
and maintain—to help form an ongo-
ing resilience framework in which
everything is working together to
help deliver the organization’s core
products or services (see Exhibit 3).
It is through this life cycle that the
business assurance model becomes an
operational economy and one can see
that all capabilities and factors—gov-
ernance, functional, and enabling—
have a role to play in every phase of
the life cycle.
The integration of these capabilities
and factors is typically driven by
certain stimuli, both internal to the
organization and external. These may
include the need to identify security
coordination shortfalls across similar
security domains—physical, informa-
tion, and personel security—or the
pressure to cut costs and group all
security functions under one umbrella
with one primary management
resource. Whatever the impetus, the
integration of these capabilities and
factors results in a broad and shared
Exhibit 3
Booz & Company’s Business Assurance Model
Governance Capabilities
Functional Capabilities
Enabling Factors
Government/
Business
Activities
Strat
egy
Guiding
P
rinciples
Performance
M
anagement
Com
m
u
nication
Peo
ple
Infrast
ructure
Technology
RiskAn
alysis
Integrated
Security
Continuity
Planning
IncidentR
esponse
Maintain
Id
entify Pla
n
Build
Execute
9Booz & Company
Exhibit 4
Achieving the Right Path Is a Balancing Act
Source: Booz & Company
awareness of risks, a reduced chance
of overlap or duplication of activities,
the optimization of investment and
resource allocations, and a single risk
and security snapshot for senior lead-
ers across an organization, among
other benefits.
The challenge in creating a busi-
ness assurance program resides in
striking the right balance between
facilitating integration and building
capabilities. For instance, developing
an integrated assurance organization
without paying enough attention to
building the right assurance capabili-
ties will yield an organization that is
incapable of effectively responding
to specific types of risks. Similarly,
an organization that develops the
functional capabilities but does not
effectively address the management
of these capabilities risks develop-
ing functional “stovepipes,” along
with weak coordination and no clear
accountability.
Some companies may choose to
focus first on developing their
capabilities—for instance, those
that have recently gone through a
major organizational change and are
reluctant to undertake another one
right away. Others may choose to
emphasize organizational structure
first, such as those that have rela-
tively mature capabilities that exist in
stovepipes and need to be integrated.
But to become truly resilient, compa-
nies will eventually have to address
both domains, often addressing one,
changing tack and focusing on the
other, and then changing back
(see Exhibit 4).
CoreCapabilitiesPortfolio
Level of Integration / Governance
Business Assurance
Organization-based Maturity
Low
Selective
High
Robust
Capability-based Maturity
Ideal Path
Start
End1
2
Booz & Company10
In 2003, an unexpected array of
cascading effects stemming from a
single “ordinary” failure ultimately
caused a widespread electricity
blackout in Europe. The blackout
affected about 60 million people and
resulted in an estimated 10 million
euros in direct damages. One of
Europe’s largest utility companies
was significantly affected, with power
transmission interrupted in some
areas for more than 20 hours.
The blackout highlighted that good
incident response and emergency
technical procedures, if not
completely integrated into a broader
risk management culture, are not
sufficient for effectively managing
large systemic shocks.
The utility company in question
called on Booz & Company to con-
duct an overall review of its resilience
framework. We found the company
to be well equipped with a structured
set of procedures and capabilities
that were focused on single-point
solutions, particularly at a technical
level. But it was missing the broad
and effective integrated perspective
that would allow top management
to evaluate, prioritize, communicate,
and manage multiple and large-scale
events. Company executives also
lacked a unified, shared vision of the
key operational risks across the value
chain, along with a clear idea of the
critical assets that most needed to be
protected.
Booz & Company identified and
implemented several immediate fixes:
•	 Introduction of a revised
process and organization for
crisis management with a
standardized taxonomy to ensure
communication across business
units and geographies
CASE STUDY:
A EUROPEAN
UTILITY
COMPANY
The company was missing the
integrated perspective that would allow
top management to evaluate, prioritize,
communicate, and manage multiple
and large-scale events.
Booz & Company
•	 Definition of a criticality matrix to
correctly define the severity of an
event and the associated potential
impacts, supported by the devel-
opment of several key threshold
indicators
•	 Development of a dedicated
decision support tool to assist
executives and decision makers in
gathering and managing the neces-
sary information during a crisis
with 24/7 situational awareness,
and to record and store event data
useful for successive analysis and
risk evaluations
•	 Launch of a testing and training
program to correctly deploy the
new crisis management model and
decision support tool
These actions allowed the company
to establish a unique and integrated
point of view on a wide variety of
possible risks and assure a standard-
ized management protocol based on
an event life cycle (see Exhibit 5).
Booz & Company’s model has now
been deployed in more than 15 coun-
tries and is accessible by all of the
company’s employees. It has gener-
ated significant near-term results,
including:
•	 Management’s anticipation of and
attention to “minor” events before
they escalated to “major” status
•	 A centralized view on risks across
the organization with updated
information on and control of inci-
dents across the different business
units/countries
•	 Collaboration and communication
in case of critical events
•	 An improved overall response capa-
bility with emphasis on establishing
an active early-warning system
•	 Data-intensive post-event analysis
that aided risk evaluations and the
company’s investment decisions
11
Exhibit 5
The Business Assurance Model Encompasses Activities for All Stages Before and During a Crisis
Source: Booz & Company
PRE-CRISIS CRISIS
Initial Phase Escalation Phase Final Phase
ONGOING CRISIS MANAGEMENT, INCIDENT COMMAND, SITUATION AWARENESS, AND DECISION SUPPORT
Set guidelines and standards
for event management
Create repository for disaster
recovery and contingency
plans (business units)
Implement continuous
monitoring and early warning
(situation awareness by all
employees)
International event notification and
communication
Evaluate impact of event and manage response
activities:
- Life protection
- Property preservation
- Situation monitoring
- Decision support
- Coordination with first responders
- Crisis communication response to media
Support event management
(including workflow management
and tracking and tracing)
Activate continuity plans
Coordinate business unit
recovery operations and
provide decision support to
corporate leadership team
Return to normal operations
with focus on:
- Collection of lessons learned
- Analysis of crisis
management process
effectiveness
- Identification of risk-mitigation
opportunities
- Revision of contingency and
recovery plans
Impact
Time
Booz & Company12
At the end of the day, the objective
of companies and governments is to
deliver a service, but that objective is
compromised when an organization is
not capable of managing unforeseen
incidents or threats to its business. In
today’s world, those threats are multi-
plying, and the interconnectedness of
businesses and governments around
the world means that each threat can
do far greater damage than before.
These new and emerging risks are
prompting executives and government
leaders to take a fresh look at their
ability to identify and mitigate them.
They realize that traditional security
approaches, although beneficial on
the whole, are not suited to dealing
with these threats in an increasingly
digitized world.
As a result, they are embracing
organizational resilience by building
the functional capabilities, enabling
factors, and governance capabilities
required to dramatically improve their
ability to weather even the greatest
systemic shocks. The business assur-
ance model lets executives know that
whatever may come, their organiza-
tion will have an answer.
CONCLUSION
13Booz & Company
About the Authors
Ramez Shehadi is a partner
with Booz & Company in
Beirut. He leads the informa-
tion technology practice in the
Middle East. He specializes in
e-government, e-business, and
IT-enabled transformation, help-
ing corporations and govern-
ment organizations maximize
leverage of IT, achieve opera-
tional efficiencies, and improve
governance of IT services.
Alessandro Gazzini is a
principal with Booz & Company
in Rome. He specializes in
organizational strategy and
design, operations design, and
efficiency improvement as well
as critical infrastructure protec-
tion, crisis management, civil
protection, business continuity,
information assurance, and risk
management.
Endnotes
1
Mohamed N. El-Guindy, “Cybercrime in the Middle East,” ISSA
Journal, June 2008.
2
Antony Savvas, “Dubai police arrest four in £40m online credit
card scam,” Computer Weekly, December 16, 2008.
3
Ian Kearns and Ken Gude, “The New Front Line: Security in a
Changing World,” IPPR Working Paper No. 1, February 2008;
World Economic Forum, “Global Risks 2009.”
4
“Cyberspace Policy Review: Assuring a Trusted and Resilient
Information and Communications Infrastructure,” http://www.
whitehouse.gov/assets/documents/Cyberspace_Policy_Review_
final.pdf.
5
Cabinet Office, “HMG Security Policy Framework V. 1.0,” De-
cember 2008 (http://www.cabinetoffice.gov.uk/media/111428/spf.
pdf) and “National Risk Register,” 2008 (http://www.cabinetoffice.
gov.uk/reports/national_risk_register.aspx).
6
“OECD Studies in Risk Management: Innovation in
Country Risk Management,” 2009: http://www.oecd.org/
dataoecd/33/18/42226946.pdf.
©2009 Booz & Company Inc.
Booz & Company is a leading global management
consulting firm, helping the world’s top businesses,
governments, and organizations.
Our founder, Edwin Booz, defined the profession
when he established the first management consulting
firm in 1914.
Today, with more than 3,300 people in 59 offices
around the world, we bring foresight and knowledge,
deep functional expertise, and a practical approach
to building capabilities and delivering real impact.
We work closely with our clients to create and deliver
essential advantage.
For our management magazine strategy+business,
visit www.strategy-business.com.
Visit www.booz.com to learn more about
Booz & Company.
The most recent list of
our office addresses and
telephone numbers can
be found on our website,
www.booz.com
Worldwide
Offices
Asia
Beijing
Delhi
Hong Kong
Mumbai
Seoul
Shanghai
Taipei
Tokyo
Australia,
New Zealand &
Southeast Asia
Adelaide
Auckland
Bangkok
Brisbane
Canberra
Jakarta
Kuala Lumpur
Melbourne
Sydney
Europe
Amsterdam
Berlin
Copenhagen
Dublin
Düsseldorf
Frankfurt
Helsinki
London
Madrid
Milan
Moscow
Munich
Oslo
Paris
Rome
Stockholm
Stuttgart
Vienna
Warsaw
Zurich
Middle East
Abu Dhabi
Beirut
Cairo
Dubai
Riyadh
North America
Atlanta
Chicago
Cleveland
Dallas
Detroit
Florham Park
Houston
Los Angeles
McLean
Mexico City
New York City
Parsippany
San Francisco
South America
Buenos Aires
Rio de Janeiro
Santiago
São Paulo

Contenu connexe

Tendances

Cybersecurity: Whose job is it anyway?
Cybersecurity: Whose job is it anyway?Cybersecurity: Whose job is it anyway?
Cybersecurity: Whose job is it anyway?Guy Pearce
 
CC_Futureinc_Cyber Security
CC_Futureinc_Cyber SecurityCC_Futureinc_Cyber Security
CC_Futureinc_Cyber SecurityAlistair Blake
 
Cyber Insurance - The Basics
Cyber Insurance - The Basics Cyber Insurance - The Basics
Cyber Insurance - The Basics Chris Stallard
 
World Energy Focus - Ottobre 2016
World Energy Focus - Ottobre 2016World Energy Focus - Ottobre 2016
World Energy Focus - Ottobre 2016WEC Italia
 
State of Cyber Crime Safety and Security in Banking
State of Cyber Crime Safety and Security in BankingState of Cyber Crime Safety and Security in Banking
State of Cyber Crime Safety and Security in BankingIJSRED
 
Coso in the cyber age
Coso in the cyber ageCoso in the cyber age
Coso in the cyber ageAmit Bhargava
 
American Bar Association guidelines on Cyber Security standards
American Bar Association guidelines on Cyber Security standardsAmerican Bar Association guidelines on Cyber Security standards
American Bar Association guidelines on Cyber Security standardsDavid Sweigert
 
Digital danger zone tackling cyber security
Digital danger zone tackling cyber securityDigital danger zone tackling cyber security
Digital danger zone tackling cyber securityJohn Kingsley
 
Cybersecurity report
Cybersecurity reportCybersecurity report
Cybersecurity reportKevin Leffew
 
1. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol21. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol2Adela Cocic
 
Managing Cyber Risk: Are Companies Safeguarding Their Assets?
Managing Cyber Risk: Are Companies Safeguarding Their Assets?Managing Cyber Risk: Are Companies Safeguarding Their Assets?
Managing Cyber Risk: Are Companies Safeguarding Their Assets?EMC
 
2015 cost of data breach study global analysis
2015 cost of data breach study global analysis2015 cost of data breach study global analysis
2015 cost of data breach study global analysisxband
 
How much security is enough?
How much security is enough?How much security is enough?
How much security is enough?Sherry Jones
 
Supporting an Effective Cyber Insurance Market (OECD Report for the G7 Presid...
Supporting an Effective Cyber Insurance Market (OECD Report for the G7 Presid...Supporting an Effective Cyber Insurance Market (OECD Report for the G7 Presid...
Supporting an Effective Cyber Insurance Market (OECD Report for the G7 Presid...Δρ. Γιώργος K. Κασάπης
 

Tendances (17)

Cybersecurity: Whose job is it anyway?
Cybersecurity: Whose job is it anyway?Cybersecurity: Whose job is it anyway?
Cybersecurity: Whose job is it anyway?
 
The Future of Cybersecurity
The Future of CybersecurityThe Future of Cybersecurity
The Future of Cybersecurity
 
CC_Futureinc_Cyber Security
CC_Futureinc_Cyber SecurityCC_Futureinc_Cyber Security
CC_Futureinc_Cyber Security
 
Cyber Insurance - The Basics
Cyber Insurance - The Basics Cyber Insurance - The Basics
Cyber Insurance - The Basics
 
World Energy Focus - Ottobre 2016
World Energy Focus - Ottobre 2016World Energy Focus - Ottobre 2016
World Energy Focus - Ottobre 2016
 
State of Cyber Crime Safety and Security in Banking
State of Cyber Crime Safety and Security in BankingState of Cyber Crime Safety and Security in Banking
State of Cyber Crime Safety and Security in Banking
 
Coso in the cyber age
Coso in the cyber ageCoso in the cyber age
Coso in the cyber age
 
American Bar Association guidelines on Cyber Security standards
American Bar Association guidelines on Cyber Security standardsAmerican Bar Association guidelines on Cyber Security standards
American Bar Association guidelines on Cyber Security standards
 
Digital danger zone tackling cyber security
Digital danger zone tackling cyber securityDigital danger zone tackling cyber security
Digital danger zone tackling cyber security
 
Cyber Warfare
Cyber WarfareCyber Warfare
Cyber Warfare
 
Cybersecurity report
Cybersecurity reportCybersecurity report
Cybersecurity report
 
1. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol21. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol2
 
Managing Cyber Risk: Are Companies Safeguarding Their Assets?
Managing Cyber Risk: Are Companies Safeguarding Their Assets?Managing Cyber Risk: Are Companies Safeguarding Their Assets?
Managing Cyber Risk: Are Companies Safeguarding Their Assets?
 
2015 cost of data breach study global analysis
2015 cost of data breach study global analysis2015 cost of data breach study global analysis
2015 cost of data breach study global analysis
 
How much security is enough?
How much security is enough?How much security is enough?
How much security is enough?
 
Supporting an Effective Cyber Insurance Market (OECD Report for the G7 Presid...
Supporting an Effective Cyber Insurance Market (OECD Report for the G7 Presid...Supporting an Effective Cyber Insurance Market (OECD Report for the G7 Presid...
Supporting an Effective Cyber Insurance Market (OECD Report for the G7 Presid...
 
Effects of IT Governance Measures on Cyber-attack Incidents
Effects of IT Governance Measures on Cyber-attack IncidentsEffects of IT Governance Measures on Cyber-attack Incidents
Effects of IT Governance Measures on Cyber-attack Incidents
 

Similaire à First_and_Last_Line_of_Defense_Final-v2

Cyber savvy (2)
Cyber savvy (2)Cyber savvy (2)
Cyber savvy (2)naveen p
 
Precious ore, precious data
Precious ore, precious dataPrecious ore, precious data
Precious ore, precious dataBrunswick Group
 
Cyber risk reporting aicpa framework
Cyber risk reporting aicpa frameworkCyber risk reporting aicpa framework
Cyber risk reporting aicpa frameworkJames Deiotte
 
TLC220_2014_S1_ResearchEssay_DinesR_31510992_Monday_1030am
TLC220_2014_S1_ResearchEssay_DinesR_31510992_Monday_1030amTLC220_2014_S1_ResearchEssay_DinesR_31510992_Monday_1030am
TLC220_2014_S1_ResearchEssay_DinesR_31510992_Monday_1030amRod Dines
 
Cybersecurity Disrupters and Cybersecurity Insurance in the COVID-19 Era – Is...
Cybersecurity Disrupters and Cybersecurity Insurance in the COVID-19 Era – Is...Cybersecurity Disrupters and Cybersecurity Insurance in the COVID-19 Era – Is...
Cybersecurity Disrupters and Cybersecurity Insurance in the COVID-19 Era – Is...Citrin Cooperman
 
NEC Public Safety | Integrating Physical & Cyber Security
NEC Public Safety | Integrating Physical & Cyber SecurityNEC Public Safety | Integrating Physical & Cyber Security
NEC Public Safety | Integrating Physical & Cyber SecurityNEC Public Safety
 
Not Prepared for Hacks .docx
                 Not Prepared for Hacks    .docx                 Not Prepared for Hacks    .docx
Not Prepared for Hacks .docxhallettfaustina
 
As telcos go digital, cybersecurity risks intensify by pwc
As telcos go digital, cybersecurity risks intensify by pwcAs telcos go digital, cybersecurity risks intensify by pwc
As telcos go digital, cybersecurity risks intensify by pwcMert Akın
 
CYBER-THREAT-LANDSCAPE-2021.pdf
CYBER-THREAT-LANDSCAPE-2021.pdfCYBER-THREAT-LANDSCAPE-2021.pdf
CYBER-THREAT-LANDSCAPE-2021.pdfKrishna N
 
Topics Risk Solutions: Issue 1/2016
Topics Risk Solutions: Issue 1/2016Topics Risk Solutions: Issue 1/2016
Topics Risk Solutions: Issue 1/2016Munich Re
 
The rise of the robot and the lie of resilience
The rise of the robot and the lie of resilienceThe rise of the robot and the lie of resilience
The rise of the robot and the lie of resilienceGirija Shettar
 
Briefing paper: Third-Party Risks: The cyber dimension
Briefing paper: Third-Party Risks: The cyber dimensionBriefing paper: Third-Party Risks: The cyber dimension
Briefing paper: Third-Party Risks: The cyber dimensionThe Economist Media Businesses
 
Project 2020 Scenarios for the Future of.docx
Project 2020 Scenarios for the Future of.docxProject 2020 Scenarios for the Future of.docx
Project 2020 Scenarios for the Future of.docxbriancrawford30935
 
Is Your Organization in Crisis?
Is Your Organization in Crisis?Is Your Organization in Crisis?
Is Your Organization in Crisis?BlackBerry
 
Using Advanced Analytics to Combat P&C Claims Fraud
Using Advanced Analytics to Combat P&C Claims FraudUsing Advanced Analytics to Combat P&C Claims Fraud
Using Advanced Analytics to Combat P&C Claims FraudCognizant
 
HBR - Zurich - FERMAZ - PRIMO Cyber Risks Report
HBR - Zurich - FERMAZ - PRIMO Cyber Risks ReportHBR - Zurich - FERMAZ - PRIMO Cyber Risks Report
HBR - Zurich - FERMAZ - PRIMO Cyber Risks ReportFERMA
 

Similaire à First_and_Last_Line_of_Defense_Final-v2 (20)

Cyber savvy (2)
Cyber savvy (2)Cyber savvy (2)
Cyber savvy (2)
 
Delusions of-safety-cyber-savvy-ceo
Delusions of-safety-cyber-savvy-ceoDelusions of-safety-cyber-savvy-ceo
Delusions of-safety-cyber-savvy-ceo
 
Precious ore, precious data
Precious ore, precious dataPrecious ore, precious data
Precious ore, precious data
 
Delusions of-safety-cyber-savvy-ceo
Delusions of-safety-cyber-savvy-ceoDelusions of-safety-cyber-savvy-ceo
Delusions of-safety-cyber-savvy-ceo
 
Cyber risk reporting aicpa framework
Cyber risk reporting aicpa frameworkCyber risk reporting aicpa framework
Cyber risk reporting aicpa framework
 
TLC220_2014_S1_ResearchEssay_DinesR_31510992_Monday_1030am
TLC220_2014_S1_ResearchEssay_DinesR_31510992_Monday_1030amTLC220_2014_S1_ResearchEssay_DinesR_31510992_Monday_1030am
TLC220_2014_S1_ResearchEssay_DinesR_31510992_Monday_1030am
 
Cybersecurity Disrupters and Cybersecurity Insurance in the COVID-19 Era – Is...
Cybersecurity Disrupters and Cybersecurity Insurance in the COVID-19 Era – Is...Cybersecurity Disrupters and Cybersecurity Insurance in the COVID-19 Era – Is...
Cybersecurity Disrupters and Cybersecurity Insurance in the COVID-19 Era – Is...
 
NEC Public Safety | Integrating Physical & Cyber Security
NEC Public Safety | Integrating Physical & Cyber SecurityNEC Public Safety | Integrating Physical & Cyber Security
NEC Public Safety | Integrating Physical & Cyber Security
 
Not Prepared for Hacks .docx
                 Not Prepared for Hacks    .docx                 Not Prepared for Hacks    .docx
Not Prepared for Hacks .docx
 
As telcos go digital, cybersecurity risks intensify by pwc
As telcos go digital, cybersecurity risks intensify by pwcAs telcos go digital, cybersecurity risks intensify by pwc
As telcos go digital, cybersecurity risks intensify by pwc
 
CYBER-THREAT-LANDSCAPE-2021.pdf
CYBER-THREAT-LANDSCAPE-2021.pdfCYBER-THREAT-LANDSCAPE-2021.pdf
CYBER-THREAT-LANDSCAPE-2021.pdf
 
IE_ERS_CyberAnalysisReport
IE_ERS_CyberAnalysisReportIE_ERS_CyberAnalysisReport
IE_ERS_CyberAnalysisReport
 
Topics Risk Solutions: Issue 1/2016
Topics Risk Solutions: Issue 1/2016Topics Risk Solutions: Issue 1/2016
Topics Risk Solutions: Issue 1/2016
 
The rise of the robot and the lie of resilience
The rise of the robot and the lie of resilienceThe rise of the robot and the lie of resilience
The rise of the robot and the lie of resilience
 
Briefing paper: Third-Party Risks: The cyber dimension
Briefing paper: Third-Party Risks: The cyber dimensionBriefing paper: Third-Party Risks: The cyber dimension
Briefing paper: Third-Party Risks: The cyber dimension
 
Project 2020 Scenarios for the Future of.docx
Project 2020 Scenarios for the Future of.docxProject 2020 Scenarios for the Future of.docx
Project 2020 Scenarios for the Future of.docx
 
Is Your Organization in Crisis?
Is Your Organization in Crisis?Is Your Organization in Crisis?
Is Your Organization in Crisis?
 
From One Crisis to the Next: Supply Chain Issues and Climate Change
From One Crisis to the Next: Supply Chain Issues and Climate ChangeFrom One Crisis to the Next: Supply Chain Issues and Climate Change
From One Crisis to the Next: Supply Chain Issues and Climate Change
 
Using Advanced Analytics to Combat P&C Claims Fraud
Using Advanced Analytics to Combat P&C Claims FraudUsing Advanced Analytics to Combat P&C Claims Fraud
Using Advanced Analytics to Combat P&C Claims Fraud
 
HBR - Zurich - FERMAZ - PRIMO Cyber Risks Report
HBR - Zurich - FERMAZ - PRIMO Cyber Risks ReportHBR - Zurich - FERMAZ - PRIMO Cyber Risks Report
HBR - Zurich - FERMAZ - PRIMO Cyber Risks Report
 

First_and_Last_Line_of_Defense_Final-v2

  • 1. Perspective First and Last Line of Defense How Business Assurance Makes Organizations Resilient to Risk Ramez Shehadi Alessandro Gazzini
  • 2. Booz & Company Contact Information Beirut Ramez Shehadi Partner +961-1-985-655 ramez.shehadi@booz.com Frankfurt Rainer Bernnat Partner +49-69-97167-414 rainer.bernnat@booz.com London Louise Fletcher Partner +44-20-7393-3530 louise.fletcher@booz.com Alan Gemes Senior Partner +44-20-7393-3333 alan.gemes@booz.com Richard Rawlinson Partner +44-20-7393-3333 richard.rawlinson@booz.com Rome Fernando Napolitano Partner +39-06-69-20-73-1 fernando.napolitano@booz.com Alessandro Gazzini Principal +39-06-69-20-73-1 alessandro.gazzini@booz.com Stockholm Per-Ola Karlsson Partner +46-8-50619049 per-ola.karlsson@booz.com Zurich Carlos Amman Partner +41-43-268-2121 carlos.ammann@booz.com Canberra Andrew Johnstone-Burt Partner +61-2-6279-1900 andrew.johnstone-burt@booz.com Sedar LaBarre, Stefano Buschi, and Alexandra Rutherford also contributed to this Perspective.
  • 3. Booz & Company 1 EXECUTIVE SUMMARY Rapid advances in technology and the need to deliver goods and services more efficiently have made organizations more vulnerable than ever to systemic shocks and other potentially damaging incidents. In addition, the increasing interconnect- edness of people and businesses means that these events are no longer isolated; rather, they cascade through society, causing many indirect and at times unforeseen consequences. The traditional security programs put in force by many com- panies and governments to meet these challenges are inefficient and inadequate. Organizations tend to take a fragmented and isolated approach to protecting physical and information resources. Because of this, they are hampered by a number of critical shortcomings: lack of an enterprise-wide view of risks, lack of accountability in dealing with those risks, and duplica- tive responses and investments. Recognizing these shortcomings, organizations around the world are embracing integrated risk-management strate- gies. These combine the right blend of physical, information, and IT security controls to effectively manage access to vital information resources and ensure business continuity and increased resilience. A model that we call “business assurance” gives organizations the right tools and procedures to identify, manage, and absorb a range of unforeseen events, from minor incidents to full-blown disasters.
  • 4. Booz & Company2 In recent years, the number and severity of systemic shocks have been increasing worldwide—earthquakes and tsunamis, blackouts and technology failures, worldwide food shortages, pandemic diseases, and terrorist attacks are just a handful of examples plucked from the headlines (see Exhibit 1). For every one of these major events, there are scores of other potential incidents bubbling beneath the surface, threatening the operations or livelihoods of companies, governments, and individuals. Some experts attribute this rise to global connectivity, while others point to an increase in threats due to growing populations, poverty, wealth imbalances, technological complexity, and mass migrations to coasts and other exposed regions. Regardless of the cause, it is evident that the world today is more vulnerable to the effects of these incidents due to growing digitization, societal interconnectedness, and lean operations. Because of these trends, events have a cascading impact throughout business operations and society. For instance, in 2005, Hurricane Katrina caused direct catastrophic damages to buildings, roads, and telecommunications networks, but indirectly the storm resulted in surging oil prices—due to extensive refinery damage—and paralysis among critical response teams, whose rescue efforts were compromised by traffic light and telecommunication outages. The situation is further complicated by today’s emerging “complexity risks,” which cut across all traditional domains, such as the protection of critical infrastructures, cyber security, food and water security, and energy security. Public- and private-sector mandates for greater efficiency, although critical to growth in productivity, add layers of risk. Operations optimization, process automation, and digitization have measurable benefits, but they also expose companies and governments to significant incremental vulnerabilities (see Exhibit 2). The recent surge in electronic identify theft, for example, has been possible only because we became more virtual—and productive—as a society. Technologies that increase the effectiveness of organizations and drive societal interconnectedness are exposing us to new risks as well. Incidents are felt by more and more people, and cause an increasing amount of widespread damage. Experts estimate that a total of US$1 billion has been stolen from financial institutions and corporations in the Middle East by organized cyber criminals employing online transactions.1 In one such case in 2007, a Dubai-based gang stole roughly $60 million by accessing consumers’ online credit card information, even from Web sites that offer government services.2 These details were then used by gang members to make cash withdrawals and to buy gold and diamonds online. CASCADING RISKS KEY HIGHLIGHTS • The number and severity of systemic incidents are increasing around the globe, and their impact on business operations and society as a whole is more far-reaching than ever before. • Improved processes and technologies that are helping businesses operate more effectively and efficiently are also making them more vulnerable to these incidents and amplifying their impact. • The older, traditional security models are inefficient and ineffective because they are based on isolated measures that create organizational redundancy and fail to provide a coordinated front against today’s cascading risks. • Today’s changing risk environment demands a “business assurance” approach that focuses on building functional capabilities to mitigate these risks, and incorporates a comprehensive governance framework that orchestrates the optimal use of these capabilities and engages multiple stakeholders.
  • 5. Booz & Company In addition, a rash of online security attacks on Rolls-Royce and Shell in the same year prompted the director general of the U.K. MI5, the National Intelligence Service, to warn all British companies of the threat of state-sponsored cyber espionage. Just as these challenges are highly interconnected, so too are the potential solutions. The answer is not to discourage interconnectedness or to undermine organizational advancement in technology, but to develop a system that complements this approach, allowing for the adaptability and flexibility necessary to match today’s high-risk environment. By the same token, no single organization, government agency, or country can resolve the problems effectively in isolation. The right solutions all call for the interaction of multiple stakeholders, including public–private partnerships and international collaboration.3 For instance, the U.S. National Security Council recently conducted a review of its cyber-security policy and concluded that the United States “needs a comprehensive framework to ensure coordinated response and recovery by the government, the private sector, and our allies to a significant incident or threat.”4 3 Exhibit 2 Digitization Brings Greater Risk Source: Booz & Company Automation/DigitizationofInformation Risk Exposure/Potential for Damage Digital ID E-procurement GIS systems Vital records digitalized E-gov services Centralized databases Digital images of critical assets Real-time process control systems Electronically integrated suppliers Shared services ERP systems Low Low High High Electronic payments Collaborative R&D E-mail and communication systems Source: EM-DAT, the OFDA/CRED International Disaster Database Exhibit 1 Disasters Are Packing a Bigger Punch NUMBER AND FINANCIAL IMPACT OF NATURAL DISASTERS NUMBER AND FINANCIAL IMPACT OF TECHNOLOGICAL DISASTERS 4,146 1,824 0 500 1,000 1,500 2,000 2,500 3,000 3,500 4,000 4,500 2,970 1980- 1989 1990- 1999 2000- 2009 1980- 1989 1990- 1999 2000- 2009 900,000,000 800,000,000 700,000,000 600,000,000 500,000,000 400,000,000 300,000,000 200,000,000 1,000,000,000 100,000,000 (inUS$Thousands) (inUS$Thousands) 3,000 966 2,050 0 400 800 1,200 1,600 2,000 2,400 2,800 0 2,000,000 4,000,000 6,000,000 8,000,000 10,000,000 12,000,000 3,200 14,000,000 Number of Events Damage
  • 6. Many governments and organizations have continued to build traditional security programs that are inadequate to cope with the new and emerging vulnerabilities of today. Although these programs may have been gener- ally successful in advancing security, continuity, and crisis management capabilities, gains have been limited because they have fostered the devel- opment of “stovepipes.” Stovepipes occur when functional capabilities are developed to address specific types of risks or vulnerabilities in isolation from each other—for example, the creation of an IT security policy that does not link with the organization’s crisis management policy. Stovepipes are problematic because they prevent senior decision makers from obtain- ing an integrated and consistent view of risks across all domains, and they lead to unnecessary duplication of activities and potential investments THE STATUS QUO IS INADEQUATE Booz & Company4 Estonia’s E-Heist Estonia’s government functions depend largely on the Internet thanks to the country’s push for a “paperless government” and its migration toward Web-based banking. For the past few years, it has been hailed as an exemplary “e-government,” where citizens and businesses can log on to the Internet to pay taxes and vote in elections. However, in 2007, Estonia was the target of a cyber attack that compromised international Internet access and many national services (media, e-government services, banks). The attack, the first of its kind on a national government, lasted for more than 20 days and resulted in millions of dollars of losses. It was perpetrated using a network of millions of compromised computers dispersed all over the globe, and presumably coordinated by a few individuals. The attack was of a sophistication not seen before and demonstrated that the international legislation and laws regarding cyber security and cyber attacks are still immature. It became clear a new cooperative approach is necessary to effectively respond to and prevent these types of events. To help deal with these threats, NATO has created a Cooperative Cyber Defence Centre of Excellence in Tallinn, Estonia, officially announced in May 2008, which started operations in the summer of 2008. (see “Shortcomings of the Stovepipe Approach”). When organizations employ this tra- ditional security approach, they often experience a decrease in efficiency and potency, critical gaps are cre- ated, and ultimately, an unacceptable level of risk is reached. One common tendency of companies is to spend so much time and attention on the estab- lishment of extensive physical security controls to prevent the “bad guys” from entering company premises that they ignore critical proprietary information or assets made vulnerable by digitization. Compounding the problem is the fact that in many com- panies, security and IT directors are often perceived as “techies” and are not represented in board discussions. Their exclusion from strategy discus- sions hamstrings an organization’s ability to increase risk awareness and make informed decisions. Companies and government agencies need an integrated risk management strategy that takes into account the right physical, information, and IT security controls required to effec- tively manage access to and use of key company information.
  • 7. Booz & Company 5 Shortcomings of the Stovepipe Approach Companies that build their business assurance capabilities based on older models in which stovepipes existed tend to experience critical shortcomings across the enterprise. For starters, it is difficult to compare and prioritize exposures from many lists, and risk assessments are often neglected when risks are not consolidated. Boards and management have a limited view, which restricts their ability to act when conditions warrant. Accountability rests in the hands of many, resulting in no clear “go-to” person or function to ensure business continuity. This lack of coordination often leads to wasted efforts and confusion over how one function’s response fits with the company’s overall strategy. Source: Booz & Company Exhibit A Typical Organizational “Stovepipes” Operational Risks Project Risks Strategic Risks Early Warning IT Disaster Recovery Critical Infrastructure Protection Business Continuity Continuity of Operations Personnel Security IT Security Information Security Physical Security Environmental Security Technical Test & Evaluation Crisis Communications Incident Command Framework Operations Center Personnel Safety
  • 8. Booz & Company6 General risk management theory states that organizations cannot feasibly predict or sidestep every risk, or prevent every risk from maturing into a serious threat. At the same time, an organization needs to be able to mitigate and absorb the impact of any risk by establishing and continuously strengthening its ability to maintain operations in the event of an incident, even if operations cannot immediately function at full capacity. That is, an organization needs to develop a security and continuity system that enables it to become organizationally resilient. Over the last several decades, globalization and other competitive pressures have forced organizations to focus on the efficiency of their business as much as their effectiveness in delivering a better product or service for the same investment. The recent spate of major terrorist attacks and environmental disasters is now pressing them to examine how resilient their operations are to unforeseen shocks. After all, an organization can be ahead in the marketplace—and have mastered the managerial art of balancing the efficiency and effectiveness trade- off—but if something disrupts the organization’s delivery of core products or services, it is no longer competitive. In the worst case, it may even no longer have a reason to exist if the trust of key stakeholders is irretrievably lost. In short, resilience has become imperative to survival. Leading nations and organizations are beginning to understand the need to build resilient organizations in the face of this emerging and cascading risk environment. For instance, the British government has developed a nationwide network of resilience councils, coordinated by the Cabinet Office, to conduct a government-wide integrated risk assessment called the National Risk Register, and to generally improve the country’s resilience to all manner of risks.5 Singapore has taken a similar approach in devising its “Whole of Government—Integrated Risk Management” framework.6 The U.S. Postal Service (USPS) invested in a resilient system that was credited with blunting the impact of the 2001 anthrax attacks, which forced the agency to close its primary collection facility in the nation’s capital. In order to make up for this lost capacity, the USPS rerouted its mail to two other local facilities, and maintained same-day service. Thanks to its extensive planning, the USPS was able to effectively continue its core mission of delivering mail to its customers. These examples highlight the growing trend of governments and companies in adopting resilient solutions as a way to deal with today’s emerging and interconnected risks. This is what we at Booz & Company refer to as business assurance. THE CASE FOR A NEW APPROACH Leading nations and organizations are beginning to understand the need to build resilient organizations in the face of this emerging and cascading risk environment.
  • 9. 7Booz & Company strategy. Focuses on the portfolio of critical business processes and assets—facilities, infrastructure, IT systems, and personnel. • Incident Response: Prepares an organization to manage all types of events by adopting an “all haz- ards” approach. Establishes key elements of an incident response framework, including an opera- tions center and crisis communica- tions protocols. Developing these functional capabili- ties is essential to reaching the right balance across the security life cycle that is needed to achieve resilience. The four functional capabilities of the business assurance model are supported by enabling factors—the people, infrastructure, and technol- ogy that can help an organization recover in the event of an incident. Examples of such factors include communications systems and crisis response centers to keep people in contact or operations groups that have received training to respond to specific circumstances. Finally, companies must put in place the governance capabilities necessary to build and maintain an efficient system, such as the development of THE business ASSURANCE MODEL The goal of the business assurance model is to ensure the appropriate protection and continuity of an orga- nization’s core services or mission. The concept is based primarily on the development and integration of functional capabilities, enabling fac- tors, and governance capabilities. The assurance model’s first focal point is establishing an organization’s func- tional capabilities, which fall under four main categories: • Risk Analysis: Identifies potential “pain points” by establishing an early-warning system for threats, vulnerabilities, and impacts to criti- cal assets and processes. Extends traditional analysis of assets and functions to business processes across the organization. • Integrated Security: Reduces the possibility of occurrence through the design and implementation of protective measures for people, assets, and information against threats. Takes segregated safety and security capabilities and integrates them across physical, IT-based, and personnel domains. • Continuity Planning: Reduces the impact of events through the plan- ning, design, and implementation of recovery targets and a continuity
  • 10. Booz & Company8 Source: Booz & Company policies and standards that regu- late the characteristics of a resilient system and the roles and respon- sibilities of all stakeholders. These strategies, policies, and performance management efforts mandate that the organization is consistently control- ling and checking that the system is functioning. The integration of functional capabilities, enabling factors, and governance capabilities is of para- mount importance. They must work together through an operational life cycle—identify, plan, build, execute, and maintain—to help form an ongo- ing resilience framework in which everything is working together to help deliver the organization’s core products or services (see Exhibit 3). It is through this life cycle that the business assurance model becomes an operational economy and one can see that all capabilities and factors—gov- ernance, functional, and enabling— have a role to play in every phase of the life cycle. The integration of these capabilities and factors is typically driven by certain stimuli, both internal to the organization and external. These may include the need to identify security coordination shortfalls across similar security domains—physical, informa- tion, and personel security—or the pressure to cut costs and group all security functions under one umbrella with one primary management resource. Whatever the impetus, the integration of these capabilities and factors results in a broad and shared Exhibit 3 Booz & Company’s Business Assurance Model Governance Capabilities Functional Capabilities Enabling Factors Government/ Business Activities Strat egy Guiding P rinciples Performance M anagement Com m u nication Peo ple Infrast ructure Technology RiskAn alysis Integrated Security Continuity Planning IncidentR esponse Maintain Id entify Pla n Build Execute
  • 11. 9Booz & Company Exhibit 4 Achieving the Right Path Is a Balancing Act Source: Booz & Company awareness of risks, a reduced chance of overlap or duplication of activities, the optimization of investment and resource allocations, and a single risk and security snapshot for senior lead- ers across an organization, among other benefits. The challenge in creating a busi- ness assurance program resides in striking the right balance between facilitating integration and building capabilities. For instance, developing an integrated assurance organization without paying enough attention to building the right assurance capabili- ties will yield an organization that is incapable of effectively responding to specific types of risks. Similarly, an organization that develops the functional capabilities but does not effectively address the management of these capabilities risks develop- ing functional “stovepipes,” along with weak coordination and no clear accountability. Some companies may choose to focus first on developing their capabilities—for instance, those that have recently gone through a major organizational change and are reluctant to undertake another one right away. Others may choose to emphasize organizational structure first, such as those that have rela- tively mature capabilities that exist in stovepipes and need to be integrated. But to become truly resilient, compa- nies will eventually have to address both domains, often addressing one, changing tack and focusing on the other, and then changing back (see Exhibit 4). CoreCapabilitiesPortfolio Level of Integration / Governance Business Assurance Organization-based Maturity Low Selective High Robust Capability-based Maturity Ideal Path Start End1 2
  • 12. Booz & Company10 In 2003, an unexpected array of cascading effects stemming from a single “ordinary” failure ultimately caused a widespread electricity blackout in Europe. The blackout affected about 60 million people and resulted in an estimated 10 million euros in direct damages. One of Europe’s largest utility companies was significantly affected, with power transmission interrupted in some areas for more than 20 hours. The blackout highlighted that good incident response and emergency technical procedures, if not completely integrated into a broader risk management culture, are not sufficient for effectively managing large systemic shocks. The utility company in question called on Booz & Company to con- duct an overall review of its resilience framework. We found the company to be well equipped with a structured set of procedures and capabilities that were focused on single-point solutions, particularly at a technical level. But it was missing the broad and effective integrated perspective that would allow top management to evaluate, prioritize, communicate, and manage multiple and large-scale events. Company executives also lacked a unified, shared vision of the key operational risks across the value chain, along with a clear idea of the critical assets that most needed to be protected. Booz & Company identified and implemented several immediate fixes: • Introduction of a revised process and organization for crisis management with a standardized taxonomy to ensure communication across business units and geographies CASE STUDY: A EUROPEAN UTILITY COMPANY The company was missing the integrated perspective that would allow top management to evaluate, prioritize, communicate, and manage multiple and large-scale events.
  • 13. Booz & Company • Definition of a criticality matrix to correctly define the severity of an event and the associated potential impacts, supported by the devel- opment of several key threshold indicators • Development of a dedicated decision support tool to assist executives and decision makers in gathering and managing the neces- sary information during a crisis with 24/7 situational awareness, and to record and store event data useful for successive analysis and risk evaluations • Launch of a testing and training program to correctly deploy the new crisis management model and decision support tool These actions allowed the company to establish a unique and integrated point of view on a wide variety of possible risks and assure a standard- ized management protocol based on an event life cycle (see Exhibit 5). Booz & Company’s model has now been deployed in more than 15 coun- tries and is accessible by all of the company’s employees. It has gener- ated significant near-term results, including: • Management’s anticipation of and attention to “minor” events before they escalated to “major” status • A centralized view on risks across the organization with updated information on and control of inci- dents across the different business units/countries • Collaboration and communication in case of critical events • An improved overall response capa- bility with emphasis on establishing an active early-warning system • Data-intensive post-event analysis that aided risk evaluations and the company’s investment decisions 11 Exhibit 5 The Business Assurance Model Encompasses Activities for All Stages Before and During a Crisis Source: Booz & Company PRE-CRISIS CRISIS Initial Phase Escalation Phase Final Phase ONGOING CRISIS MANAGEMENT, INCIDENT COMMAND, SITUATION AWARENESS, AND DECISION SUPPORT Set guidelines and standards for event management Create repository for disaster recovery and contingency plans (business units) Implement continuous monitoring and early warning (situation awareness by all employees) International event notification and communication Evaluate impact of event and manage response activities: - Life protection - Property preservation - Situation monitoring - Decision support - Coordination with first responders - Crisis communication response to media Support event management (including workflow management and tracking and tracing) Activate continuity plans Coordinate business unit recovery operations and provide decision support to corporate leadership team Return to normal operations with focus on: - Collection of lessons learned - Analysis of crisis management process effectiveness - Identification of risk-mitigation opportunities - Revision of contingency and recovery plans Impact Time
  • 14. Booz & Company12 At the end of the day, the objective of companies and governments is to deliver a service, but that objective is compromised when an organization is not capable of managing unforeseen incidents or threats to its business. In today’s world, those threats are multi- plying, and the interconnectedness of businesses and governments around the world means that each threat can do far greater damage than before. These new and emerging risks are prompting executives and government leaders to take a fresh look at their ability to identify and mitigate them. They realize that traditional security approaches, although beneficial on the whole, are not suited to dealing with these threats in an increasingly digitized world. As a result, they are embracing organizational resilience by building the functional capabilities, enabling factors, and governance capabilities required to dramatically improve their ability to weather even the greatest systemic shocks. The business assur- ance model lets executives know that whatever may come, their organiza- tion will have an answer. CONCLUSION
  • 15. 13Booz & Company About the Authors Ramez Shehadi is a partner with Booz & Company in Beirut. He leads the informa- tion technology practice in the Middle East. He specializes in e-government, e-business, and IT-enabled transformation, help- ing corporations and govern- ment organizations maximize leverage of IT, achieve opera- tional efficiencies, and improve governance of IT services. Alessandro Gazzini is a principal with Booz & Company in Rome. He specializes in organizational strategy and design, operations design, and efficiency improvement as well as critical infrastructure protec- tion, crisis management, civil protection, business continuity, information assurance, and risk management. Endnotes 1 Mohamed N. El-Guindy, “Cybercrime in the Middle East,” ISSA Journal, June 2008. 2 Antony Savvas, “Dubai police arrest four in £40m online credit card scam,” Computer Weekly, December 16, 2008. 3 Ian Kearns and Ken Gude, “The New Front Line: Security in a Changing World,” IPPR Working Paper No. 1, February 2008; World Economic Forum, “Global Risks 2009.” 4 “Cyberspace Policy Review: Assuring a Trusted and Resilient Information and Communications Infrastructure,” http://www. whitehouse.gov/assets/documents/Cyberspace_Policy_Review_ final.pdf. 5 Cabinet Office, “HMG Security Policy Framework V. 1.0,” De- cember 2008 (http://www.cabinetoffice.gov.uk/media/111428/spf. pdf) and “National Risk Register,” 2008 (http://www.cabinetoffice. gov.uk/reports/national_risk_register.aspx). 6 “OECD Studies in Risk Management: Innovation in Country Risk Management,” 2009: http://www.oecd.org/ dataoecd/33/18/42226946.pdf.
  • 16. ©2009 Booz & Company Inc. Booz & Company is a leading global management consulting firm, helping the world’s top businesses, governments, and organizations. Our founder, Edwin Booz, defined the profession when he established the first management consulting firm in 1914. Today, with more than 3,300 people in 59 offices around the world, we bring foresight and knowledge, deep functional expertise, and a practical approach to building capabilities and delivering real impact. We work closely with our clients to create and deliver essential advantage. For our management magazine strategy+business, visit www.strategy-business.com. Visit www.booz.com to learn more about Booz & Company. The most recent list of our office addresses and telephone numbers can be found on our website, www.booz.com Worldwide Offices Asia Beijing Delhi Hong Kong Mumbai Seoul Shanghai Taipei Tokyo Australia, New Zealand & Southeast Asia Adelaide Auckland Bangkok Brisbane Canberra Jakarta Kuala Lumpur Melbourne Sydney Europe Amsterdam Berlin Copenhagen Dublin Düsseldorf Frankfurt Helsinki London Madrid Milan Moscow Munich Oslo Paris Rome Stockholm Stuttgart Vienna Warsaw Zurich Middle East Abu Dhabi Beirut Cairo Dubai Riyadh North America Atlanta Chicago Cleveland Dallas Detroit Florham Park Houston Los Angeles McLean Mexico City New York City Parsippany San Francisco South America Buenos Aires Rio de Janeiro Santiago São Paulo