SlideShare a Scribd company logo
1 of 16
Download to read offline
ISO/IEC 27001,
Cyber Security
and Risk
Management:
How to avoid data
breaches?
Agenda
1. Introductions
2. Cyber Security trends: What we are seeing today
3. Identify those assets that ‘matter’
4. Understanding your threat landscape
5. What does good look like for cyber risk management?
6. Q&A
1. Introduction
Simon Lacey
 20 years in cyber security
 Principal consultant – OLIVERLACEY
 Head of secuirty policy – Bank of
England
 Information Governance Lead - BUPA
1. Introduction
Nick Frost
 25 years in cyber security
 Principal consultant – Cyber Risk
Management Group (CRMG)
 Head of information risk – PwC Group
 Senior researcher – Information
Security Forum (ISF)
2. Cyber Security: 30 years of risky business
1988
Driven by notoriety
1998
Media attention
and first real
signs of concern
2008
Financially driven
Cyber gangs
increasingly
organised
2018
Target rich
environment
with New Tech
and IoT
2. Cyber Security trends: What we are seeing today
Poll #1
To what extent does your board grapple with cyber security as a
real business risk?
A. The Board appointed a Head of Cyber security. Job done!
B. They get that cyber risk is a big deal, but they prefer to
leave it all to me/us
C. They're all over it! We deliver regular risk updates that
position cyber as an integral element of enterprise risk
3. Cyber risk assessment – key steps
3. Identify those assets that ‘matter’
Low Moderate High Very High
Financial <£100,000 £100,001 - £500,000 £500,001 - £1.5 million >£1.5 million
Reputational No or low
media
coverage
Moderate adverse
coverage (e.g story runs
over 1-2 days)
Significant adverse
coverage >2 days, main
focus of attention
Adverse coverage
sustained over
more than 1 week
Regulatory No increased
regulatory
focus
Slight increase in
regulatory focus / impact
Significant attention
from regulator / Notified
single breach
Multiple breaches /
License withdrawn
Health / Safety Very minor
injury / No
ongoing effect
Non-critical injury
requiring medical
intervention / No
prolonged effect
Critical injury requiring
hospitalisation /
medium term effect
Death / Long term
debilitation
* Consider running this as a workshop
Once a business impact assessment has been
completed: ‘Go / No Go’ to next step?
CONSIDER RISK APPETITE!
4. Understanding your threat landscape
Consider:
• Intent (malicious or
unintended?)
• Capability
• Strength
• Likelihood
• Timescale
Remember: The initiator (agent / source / actor) , is different from the action!
* Use a standard list of threats as your starting point
* Consider running this as a workshop
HOW RELEVANT ARE DIFFERENT THREATS TO YOUR
ENVIRONMENT, AND WHAT’S THEIR POTENTIAL CAPABILITY?
What does good look like for cyber risk management?
Framework for
conducting
risk
assessments
Training and
education to
equip staff
with skills
Easy to follow
process
Approved data
sets (threat
lists, control
libraries)
Plan for
delivery and
execution
Agreement on
reporting
Stakeholders
identified
Assets
identified
5. What does good look like for cyber risk management?
Focus on those systems and data assets that are business critical
Establish a practical process that incorporates the fundamentals of information risk
Evaluate GRC products to help streamline and semi-automate the cyber risk process
to minimize staff utilisation
Present the business argument to help establish a cyber risk approach (e.g. target
investment, quick wins, best practice)
Establish a phased approach (do not attempt to boil the ocean)
Extrapolate the risk insights to other areas of the security programme (e.g. policy
update, awareness and education)
Promote the approach to your clients and partners.
5. Cyber risk assessment: Hints and Tips
Prioritise the
risks
Provide the
business
with options
Collaborate
to determine
a response
You will never mitigate all
cyber risks so prioritise and
be pragmatic in what you
can achieve.
Accept the risk: reduce costs,
increase exposure to an attack and
possible damage to reputation….
Mitigate the risk: increase
investment, reduce risk to an attack
Costs, Complexity, Timescale to
implement, Disruption from change,
Business obstacles, Training, End-
user-experience, Testing and
Assurance
Poll #2
To what extent is your cyber security programme risk-based?
A. We did a gap assessment of our security programme, so
we're good
B. We've started to do risk assessments, but it's all a bit ad
hoc and we don’t focus on underlying business criticality
C. We conduct structured risk assessment and focus on
underlying business criticality. Headline risks are reported
to the Board, which shapes meaningful decision-making
5. Enterprise-wide cyber risk management
Business
awareness
Customisation (control libraries, threat lists for different tech)
Conduct multiple pilot
assessments
Training and
education
Risk review
board
GRC evaluation
Project 1
Project 2
Project 3
Project 4
Data feeds
Project 5
THANK YOU
Q&A
simon.lacey@oliverlacey.com
nick.frost@crmg-consult.com
linkedin.com/in/simon-oliver-lacey
linkedin.com/in/nickfrost

More Related Content

More from PECB

Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?PECB
 
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...PECB
 
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...PECB
 
Student Information Session University KTMC
Student Information Session University KTMC Student Information Session University KTMC
Student Information Session University KTMC PECB
 
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...PECB
 
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...PECB
 
Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA PECB
 
IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?PECB
 
Information Session University Egybyte.pptx
Information Session University Egybyte.pptxInformation Session University Egybyte.pptx
Information Session University Egybyte.pptxPECB
 
Student Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptxStudent Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptxPECB
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023PECB
 
ISO 28000:2022 – Reduce risks and improve the security management system
ISO 28000:2022 – Reduce risks and improve the security management systemISO 28000:2022 – Reduce risks and improve the security management system
ISO 28000:2022 – Reduce risks and improve the security management systemPECB
 
ISO/IEC 27005:2022 – What are the changes?
ISO/IEC 27005:2022 – What are the changes?ISO/IEC 27005:2022 – What are the changes?
ISO/IEC 27005:2022 – What are the changes?PECB
 
ISO/IEC 27001:2022 – What are the changes?
ISO/IEC 27001:2022 – What are the changes?ISO/IEC 27001:2022 – What are the changes?
ISO/IEC 27001:2022 – What are the changes?PECB
 
ISO/IEC 27032 vs. ISO 31000 – How do they help towards Cybersecurity Risk Man...
ISO/IEC 27032 vs. ISO 31000 – How do they help towards Cybersecurity Risk Man...ISO/IEC 27032 vs. ISO 31000 – How do they help towards Cybersecurity Risk Man...
ISO/IEC 27032 vs. ISO 31000 – How do they help towards Cybersecurity Risk Man...PECB
 
ISO/IEC 27001 and ISO 22301: How do they map?
ISO/IEC 27001 and ISO 22301: How do they map?ISO/IEC 27001 and ISO 22301: How do they map?
ISO/IEC 27001 and ISO 22301: How do they map?PECB
 
George, Tony, Michael - PECB Webinar 27701 Data Protection Risk Management V1...
George, Tony, Michael - PECB Webinar 27701 Data Protection Risk Management V1...George, Tony, Michael - PECB Webinar 27701 Data Protection Risk Management V1...
George, Tony, Michael - PECB Webinar 27701 Data Protection Risk Management V1...PECB
 
Top 5 information security challenges - How does ISO/IEC 27001 help you?
Top 5 information security challenges - How does ISO/IEC 27001 help you?Top 5 information security challenges - How does ISO/IEC 27001 help you?
Top 5 information security challenges - How does ISO/IEC 27001 help you?PECB
 
ISO/IEC 27001, ISO/IEC 27002 and ISO/IEC 27032: How do they map?
ISO/IEC 27001, ISO/IEC 27002 and ISO/IEC 27032: How do they map?ISO/IEC 27001, ISO/IEC 27002 and ISO/IEC 27032: How do they map?
ISO/IEC 27001, ISO/IEC 27002 and ISO/IEC 27032: How do they map?PECB
 
ISO-IEC 27701 and EU-U.S. Privacy Regulations What’s next.pptx
ISO-IEC 27701 and EU-U.S. Privacy Regulations What’s next.pptxISO-IEC 27701 and EU-U.S. Privacy Regulations What’s next.pptx
ISO-IEC 27701 and EU-U.S. Privacy Regulations What’s next.pptxPECB
 

More from PECB (20)

Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
 
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
 
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
 
Student Information Session University KTMC
Student Information Session University KTMC Student Information Session University KTMC
Student Information Session University KTMC
 
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
 
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
 
Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA
 
IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?
 
Information Session University Egybyte.pptx
Information Session University Egybyte.pptxInformation Session University Egybyte.pptx
Information Session University Egybyte.pptx
 
Student Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptxStudent Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptx
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023
 
ISO 28000:2022 – Reduce risks and improve the security management system
ISO 28000:2022 – Reduce risks and improve the security management systemISO 28000:2022 – Reduce risks and improve the security management system
ISO 28000:2022 – Reduce risks and improve the security management system
 
ISO/IEC 27005:2022 – What are the changes?
ISO/IEC 27005:2022 – What are the changes?ISO/IEC 27005:2022 – What are the changes?
ISO/IEC 27005:2022 – What are the changes?
 
ISO/IEC 27001:2022 – What are the changes?
ISO/IEC 27001:2022 – What are the changes?ISO/IEC 27001:2022 – What are the changes?
ISO/IEC 27001:2022 – What are the changes?
 
ISO/IEC 27032 vs. ISO 31000 – How do they help towards Cybersecurity Risk Man...
ISO/IEC 27032 vs. ISO 31000 – How do they help towards Cybersecurity Risk Man...ISO/IEC 27032 vs. ISO 31000 – How do they help towards Cybersecurity Risk Man...
ISO/IEC 27032 vs. ISO 31000 – How do they help towards Cybersecurity Risk Man...
 
ISO/IEC 27001 and ISO 22301: How do they map?
ISO/IEC 27001 and ISO 22301: How do they map?ISO/IEC 27001 and ISO 22301: How do they map?
ISO/IEC 27001 and ISO 22301: How do they map?
 
George, Tony, Michael - PECB Webinar 27701 Data Protection Risk Management V1...
George, Tony, Michael - PECB Webinar 27701 Data Protection Risk Management V1...George, Tony, Michael - PECB Webinar 27701 Data Protection Risk Management V1...
George, Tony, Michael - PECB Webinar 27701 Data Protection Risk Management V1...
 
Top 5 information security challenges - How does ISO/IEC 27001 help you?
Top 5 information security challenges - How does ISO/IEC 27001 help you?Top 5 information security challenges - How does ISO/IEC 27001 help you?
Top 5 information security challenges - How does ISO/IEC 27001 help you?
 
ISO/IEC 27001, ISO/IEC 27002 and ISO/IEC 27032: How do they map?
ISO/IEC 27001, ISO/IEC 27002 and ISO/IEC 27032: How do they map?ISO/IEC 27001, ISO/IEC 27002 and ISO/IEC 27032: How do they map?
ISO/IEC 27001, ISO/IEC 27002 and ISO/IEC 27032: How do they map?
 
ISO-IEC 27701 and EU-U.S. Privacy Regulations What’s next.pptx
ISO-IEC 27701 and EU-U.S. Privacy Regulations What’s next.pptxISO-IEC 27701 and EU-U.S. Privacy Regulations What’s next.pptx
ISO-IEC 27701 and EU-U.S. Privacy Regulations What’s next.pptx
 

ISO/IEC 27001, Cybersecurity, and Risk Management: How to avoid data breaches?

  • 1. ISO/IEC 27001, Cyber Security and Risk Management: How to avoid data breaches?
  • 2. Agenda 1. Introductions 2. Cyber Security trends: What we are seeing today 3. Identify those assets that ‘matter’ 4. Understanding your threat landscape 5. What does good look like for cyber risk management? 6. Q&A
  • 3. 1. Introduction Simon Lacey  20 years in cyber security  Principal consultant – OLIVERLACEY  Head of secuirty policy – Bank of England  Information Governance Lead - BUPA
  • 4. 1. Introduction Nick Frost  25 years in cyber security  Principal consultant – Cyber Risk Management Group (CRMG)  Head of information risk – PwC Group  Senior researcher – Information Security Forum (ISF)
  • 5. 2. Cyber Security: 30 years of risky business 1988 Driven by notoriety 1998 Media attention and first real signs of concern 2008 Financially driven Cyber gangs increasingly organised 2018 Target rich environment with New Tech and IoT
  • 6. 2. Cyber Security trends: What we are seeing today
  • 7. Poll #1 To what extent does your board grapple with cyber security as a real business risk? A. The Board appointed a Head of Cyber security. Job done! B. They get that cyber risk is a big deal, but they prefer to leave it all to me/us C. They're all over it! We deliver regular risk updates that position cyber as an integral element of enterprise risk
  • 8. 3. Cyber risk assessment – key steps
  • 9. 3. Identify those assets that ‘matter’ Low Moderate High Very High Financial <£100,000 £100,001 - £500,000 £500,001 - £1.5 million >£1.5 million Reputational No or low media coverage Moderate adverse coverage (e.g story runs over 1-2 days) Significant adverse coverage >2 days, main focus of attention Adverse coverage sustained over more than 1 week Regulatory No increased regulatory focus Slight increase in regulatory focus / impact Significant attention from regulator / Notified single breach Multiple breaches / License withdrawn Health / Safety Very minor injury / No ongoing effect Non-critical injury requiring medical intervention / No prolonged effect Critical injury requiring hospitalisation / medium term effect Death / Long term debilitation * Consider running this as a workshop Once a business impact assessment has been completed: ‘Go / No Go’ to next step? CONSIDER RISK APPETITE!
  • 10. 4. Understanding your threat landscape Consider: • Intent (malicious or unintended?) • Capability • Strength • Likelihood • Timescale Remember: The initiator (agent / source / actor) , is different from the action! * Use a standard list of threats as your starting point * Consider running this as a workshop HOW RELEVANT ARE DIFFERENT THREATS TO YOUR ENVIRONMENT, AND WHAT’S THEIR POTENTIAL CAPABILITY?
  • 11. What does good look like for cyber risk management? Framework for conducting risk assessments Training and education to equip staff with skills Easy to follow process Approved data sets (threat lists, control libraries) Plan for delivery and execution Agreement on reporting Stakeholders identified Assets identified
  • 12. 5. What does good look like for cyber risk management? Focus on those systems and data assets that are business critical Establish a practical process that incorporates the fundamentals of information risk Evaluate GRC products to help streamline and semi-automate the cyber risk process to minimize staff utilisation Present the business argument to help establish a cyber risk approach (e.g. target investment, quick wins, best practice) Establish a phased approach (do not attempt to boil the ocean) Extrapolate the risk insights to other areas of the security programme (e.g. policy update, awareness and education) Promote the approach to your clients and partners.
  • 13. 5. Cyber risk assessment: Hints and Tips Prioritise the risks Provide the business with options Collaborate to determine a response You will never mitigate all cyber risks so prioritise and be pragmatic in what you can achieve. Accept the risk: reduce costs, increase exposure to an attack and possible damage to reputation…. Mitigate the risk: increase investment, reduce risk to an attack Costs, Complexity, Timescale to implement, Disruption from change, Business obstacles, Training, End- user-experience, Testing and Assurance
  • 14. Poll #2 To what extent is your cyber security programme risk-based? A. We did a gap assessment of our security programme, so we're good B. We've started to do risk assessments, but it's all a bit ad hoc and we don’t focus on underlying business criticality C. We conduct structured risk assessment and focus on underlying business criticality. Headline risks are reported to the Board, which shapes meaningful decision-making
  • 15. 5. Enterprise-wide cyber risk management Business awareness Customisation (control libraries, threat lists for different tech) Conduct multiple pilot assessments Training and education Risk review board GRC evaluation Project 1 Project 2 Project 3 Project 4 Data feeds Project 5

Editor's Notes

  1. Run through these – main point is that compliance led approaches (on their own) are no longer sufficient……that’s why we are talking about risk led approaches today