SlideShare une entreprise Scribd logo
1  sur  23
www.CyberRescue.co.uk
Barrie Millett
Advisory Board
30th
Nov – 1st
Dec 2016
Security Director’s
Practical Guide to
Cyber Security
Barrie Millett
The UK Security Expo
Why are we here? Topics
www.CyberRescue.co.uk
1. What the CEO needs their Security Director to do,
to protect against Cyber Threats
2. How the Security Director can spot vulnerabilities
the IT team are most likely to have missed
3. What the Security Director should know about
Cyber Insurance
4. Surprises your CEO may suffer during the
response to a major Cyber Attack
5. Why Security Directors must be ready to lead
Recovery from major Cyber Attack
Assistance@CyberRescue.co.uk
Who are you?
Typical Security Director Role
www.CyberRescue.co.uk
1. Protect assets, staff & reputation
2. Assess risk, vulnerabilities & issues
3. Define goals to mitigate risk
4. Promote security by design & security culture
5. Respond to Security Incidents
Assistance@CyberRescue.co.uk
Kevin Duffey – Managing Director
Expert in commercial response to major cyber attacks
•CEO Asia and UK Board Member at FTSE 100 company
•Group GM at International SOS, global crisis management firm
•Helped organisations respond to cyber attacks in 25 countries.
Barrie Millett – International Advisor
Award winning leader in risk mitigation and business continuity
•Led security teams at blue-chip firms including E.ON and GE
•Chair of Joint Risk Audit & Assurance Panel, Leicestershire Police
•Expert in resilience for National Critical Infrastructure
Who are we?
Facilitators for this Workshop
a personal journey
Leading terrorism response
Severe weather events
Investigating criminal activity
transferable skills
FBI data storage in 1942
= 10 million sets of fingerprints,
plus 23 million paper cards
= 680 Gigabytes
Digital transformation
of assets
Digital transformation
of assets
£600 storage device in 2016
a “memory stick” from HyperX,
stores 1,000 Gigabytes
Exponential Risk to Assets
Cyber Threats
Annual Growth
125% Zero Day
71% DDoS
55% Spear Phish
29% Malware
21% SQLi
38% growth in
reported crime
Insurance: 52% of British CEOs think their
company is insured for cyber risks.
Just 2% of large businesses actually have
stand alone cyber insurance in UK (March ‘15)
“The market for cyber insurance isn’t sustainable” (Sept ‘15)
Why businesses say they don’t have insurance (Nov ‘15)
“Premiums too expensive” (52%) “Too many exclusions” (44%)
Companies with cyber insurance but not claimed = 81% (Mar ‘16)
£1m cyber policy costs £5k - 25k for “average” company (Apr ‘16)
Consider Cyber Insurance
Risks vary by Sector
Agree Goals with IT Director
Staff Risks:
•78% of staff don't obey info policy
•63% of breaches involve passwords
•41% of staff install apps on work PC
•30% of phishing messages are opened
•12% of staff download malicious s/ware
Supply Chain Risks:
•41% of breaches affecting healthcare are
caused by Third Parties
•17% of breaches investigated by Kroll
caused by Third Parties
•AT&T, Home Depot, TalkTalk, and Target all
suffered breaches via 3rd
parties
Assess Risks beyond IT
Staff Systems Suppliers
Work with HR, IT & Procurement
to take a Hacker’s Eye View
Example: daily Security Scorecard
on vulnerabilities at key suppliers
What to focus on in 2017?
Typical Security Director Role
www.CyberRescue.co.uk
1. Protects cyber assets, staff & reputation
2. Assesses cyber risk, vulnerabilities & issues
3. Defines cyber goals to mitigate risk
4. Promotes cyber security culture
5. Responds to cyber Security Incidents
Assistance@CyberRescue.co.uk
What to focus on in 2017?
Typical Security Director Role
www.CyberRescue.co.uk
1. Protects cyber assets, staff & reputation
2. Assesses cyber risk, vulnerabilities & issues
3. Defines cyber goals to mitigate risk
4. Promotes cyber security culture
5. Responds to cyber Security Incidents
Assistance@CyberRescue.co.uk
support CEOs to lead
www.CyberRescue.co.uk
Teams will be unnerved
Many will never have
tested a cyber attack
response
Internal and external
relationships will need
to be managed
Grown-ups at the table
www.CyberRescue.co.uk
Grown-ups at the table
www.CyberRescue.co.uk
Why are we here? Topics
www.CyberRescue.co.uk
1. What the CEO needs their Security Director to do,
to protect against Cyber Threats
2. How the Security Director can spot vulnerabilities
the IT team are most likely to have missed
3. What the Security Director should know about
Cyber Insurance
4. Surprises your CEO may suffer during the
response to a major Cyber Attack
5. Why Security Directors must be ready to lead
Recovery from major Cyber Attack
Assistance@CyberRescue.co.uk
Part 2: Simulation (for attendees only):
We will now simulate a Breach
www.CyberRescue.co.uk
For similar material, follow Cyber Rescue
on LinkedIn here.
Former Head of Resilience E.ON UK
International Advisory Board Member
Cyber Rescue Alliance
Barrie.Millett@CyberRescue.co.uk
+ 44 7913 371249
Barrie Millett

Contenu connexe

Tendances

What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?
PECB
 
Business Continuity, Data Privacy, and Information Security: How do they link?
Business Continuity, Data Privacy, and Information Security: How do they link?Business Continuity, Data Privacy, and Information Security: How do they link?
Business Continuity, Data Privacy, and Information Security: How do they link?
PECB
 
Shift Toward Dynamic Cyber Resilience
Shift Toward Dynamic Cyber ResilienceShift Toward Dynamic Cyber Resilience
Shift Toward Dynamic Cyber Resilience
Darren Argyle
 
Case Study: The Role of Human Error in Information Security
Case Study: The Role of Human Error in Information SecurityCase Study: The Role of Human Error in Information Security
Case Study: The Role of Human Error in Information Security
PECB
 
Cybersecurity in the Cognitive Era: Priming Your Digital Immune System
Cybersecurity in the Cognitive Era: Priming Your Digital Immune SystemCybersecurity in the Cognitive Era: Priming Your Digital Immune System
Cybersecurity in the Cognitive Era: Priming Your Digital Immune System
IBM Security
 

Tendances (20)

FireEye Cyber Defense Summit 2016 Now What - Before & After The Breach
FireEye Cyber Defense Summit 2016 Now What - Before & After The BreachFireEye Cyber Defense Summit 2016 Now What - Before & After The Breach
FireEye Cyber Defense Summit 2016 Now What - Before & After The Breach
 
What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?
 
Business Continuity, Data Privacy, and Information Security: How do they link?
Business Continuity, Data Privacy, and Information Security: How do they link?Business Continuity, Data Privacy, and Information Security: How do they link?
Business Continuity, Data Privacy, and Information Security: How do they link?
 
Cyber Recovery - Legal Toolkit
Cyber Recovery - Legal ToolkitCyber Recovery - Legal Toolkit
Cyber Recovery - Legal Toolkit
 
What CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber SecurityWhat CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber Security
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & Recommendations
 
The State of Cyber
The State of CyberThe State of Cyber
The State of Cyber
 
Cyber Secuirty Visualization
Cyber Secuirty VisualizationCyber Secuirty Visualization
Cyber Secuirty Visualization
 
Shift Toward Dynamic Cyber Resilience
Shift Toward Dynamic Cyber ResilienceShift Toward Dynamic Cyber Resilience
Shift Toward Dynamic Cyber Resilience
 
Improving Cyber Security Literacy in Boards & Executives
Improving Cyber Security Literacy in Boards & ExecutivesImproving Cyber Security Literacy in Boards & Executives
Improving Cyber Security Literacy in Boards & Executives
 
Case Study: The Role of Human Error in Information Security
Case Study: The Role of Human Error in Information SecurityCase Study: The Role of Human Error in Information Security
Case Study: The Role of Human Error in Information Security
 
Data security 2016 trends and questions
Data security 2016 trends and questionsData security 2016 trends and questions
Data security 2016 trends and questions
 
Cybersecurity in the Cognitive Era: Priming Your Digital Immune System
Cybersecurity in the Cognitive Era: Priming Your Digital Immune SystemCybersecurity in the Cognitive Era: Priming Your Digital Immune System
Cybersecurity in the Cognitive Era: Priming Your Digital Immune System
 
The Board and Cyber Security
The Board and Cyber SecurityThe Board and Cyber Security
The Board and Cyber Security
 
Role of The Board In IT Governance & Cyber Security-Steve Howse
Role of The Board In IT Governance & Cyber Security-Steve HowseRole of The Board In IT Governance & Cyber Security-Steve Howse
Role of The Board In IT Governance & Cyber Security-Steve Howse
 
M-Trends® 2013: Attack the Security Gap
M-Trends® 2013: Attack the Security GapM-Trends® 2013: Attack the Security Gap
M-Trends® 2013: Attack the Security Gap
 
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA RegulationTop 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
 
CRI Cyber Board Briefing
CRI Cyber Board Briefing CRI Cyber Board Briefing
CRI Cyber Board Briefing
 
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
 
Why Executives Underinvest In Cybersecurity
Why Executives Underinvest In CybersecurityWhy Executives Underinvest In Cybersecurity
Why Executives Underinvest In Cybersecurity
 

Similaire à The Security Director's Practical Guide to Cyber Security

2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...
2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...
2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...
Neil Curran MSc CISSP CRISC CGEIT CISM CISA
 
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
Sarah Jarvis
 
Cybersecurity In The Cognitive Era: Priming Your Digital Immune System
Cybersecurity In The Cognitive Era: Priming Your Digital Immune SystemCybersecurity In The Cognitive Era: Priming Your Digital Immune System
Cybersecurity In The Cognitive Era: Priming Your Digital Immune System
IBM Security
 
A CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk ManagementA CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk Management
Daren Dunkel
 

Similaire à The Security Director's Practical Guide to Cyber Security (20)

Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
 
2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...
2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...
2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...
 
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
 
MCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk ManagementMCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk Management
 
MCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk ManagementMCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk Management
 
NUS-ISS Learning Day 2019-Architecting security in the digital age
NUS-ISS Learning Day 2019-Architecting security in the digital ageNUS-ISS Learning Day 2019-Architecting security in the digital age
NUS-ISS Learning Day 2019-Architecting security in the digital age
 
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
 
Current enterprise information security measures continue to fail us. Why is ...
Current enterprise information security measures continue to fail us. Why is ...Current enterprise information security measures continue to fail us. Why is ...
Current enterprise information security measures continue to fail us. Why is ...
 
Information & Cyber Security Risk
Information & Cyber Security RiskInformation & Cyber Security Risk
Information & Cyber Security Risk
 
How to Protect Your Business from Cyber Threats | The Entrepreneur Review
How to Protect Your Business from Cyber Threats | The Entrepreneur ReviewHow to Protect Your Business from Cyber Threats | The Entrepreneur Review
How to Protect Your Business from Cyber Threats | The Entrepreneur Review
 
Cybersecurity In The Cognitive Era: Priming Your Digital Immune System
Cybersecurity In The Cognitive Era: Priming Your Digital Immune SystemCybersecurity In The Cognitive Era: Priming Your Digital Immune System
Cybersecurity In The Cognitive Era: Priming Your Digital Immune System
 
Cyber threat forecast 2018..
Cyber threat forecast 2018..Cyber threat forecast 2018..
Cyber threat forecast 2018..
 
The 10 Most Iconic Leaders in Enterprise Security.pdf
The 10 Most Iconic Leaders in Enterprise Security.pdfThe 10 Most Iconic Leaders in Enterprise Security.pdf
The 10 Most Iconic Leaders in Enterprise Security.pdf
 
A CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk ManagementA CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk Management
 
Trustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
Trustwave: 7 Experts on Transforming Your Threat Detection & Response StrategyTrustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
Trustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
 
GITA March 2015 Newsletter
GITA March 2015 NewsletterGITA March 2015 Newsletter
GITA March 2015 Newsletter
 
How to Connect Your Server Room to the Board Room – Before a Data Breach Occurs
How to Connect Your Server Room to the Board Room – Before a Data Breach OccursHow to Connect Your Server Room to the Board Room – Before a Data Breach Occurs
How to Connect Your Server Room to the Board Room – Before a Data Breach Occurs
 
Nsc42 - is the cloud secure - is easy if you do it smart ECC Conference
Nsc42 - is the cloud secure - is easy if you do it smart ECC ConferenceNsc42 - is the cloud secure - is easy if you do it smart ECC Conference
Nsc42 - is the cloud secure - is easy if you do it smart ECC Conference
 
How to Build a Successful Cybersecurity Program?
How to Build a Successful Cybersecurity Program?How to Build a Successful Cybersecurity Program?
How to Build a Successful Cybersecurity Program?
 

Plus de Kevin Duffey

Plus de Kevin Duffey (20)

Cyber Insights from 100 surveys
Cyber Insights from 100 surveysCyber Insights from 100 surveys
Cyber Insights from 100 surveys
 
Cyber TPRM - the journey ahead
Cyber TPRM - the journey aheadCyber TPRM - the journey ahead
Cyber TPRM - the journey ahead
 
Ensuring Cyber Resilience in the Finance Sector
Ensuring Cyber Resilience in the Finance SectorEnsuring Cyber Resilience in the Finance Sector
Ensuring Cyber Resilience in the Finance Sector
 
Breaches Anticipated in 2022 - November 1st, 2022
Breaches Anticipated in 2022 - November 1st, 2022Breaches Anticipated in 2022 - November 1st, 2022
Breaches Anticipated in 2022 - November 1st, 2022
 
Best Cyber Insights of 2022, from over 200 surveys
Best Cyber Insights of 2022, from over 200 surveysBest Cyber Insights of 2022, from over 200 surveys
Best Cyber Insights of 2022, from over 200 surveys
 
Breaches Anticipated in 2022 as Cyber Security Posture so Low
Breaches Anticipated in 2022 as Cyber Security Posture so LowBreaches Anticipated in 2022 as Cyber Security Posture so Low
Breaches Anticipated in 2022 as Cyber Security Posture so Low
 
Cyber Insurance - Best Insights of June 2022.pptx
Cyber Insurance - Best Insights of June 2022.pptxCyber Insurance - Best Insights of June 2022.pptx
Cyber Insurance - Best Insights of June 2022.pptx
 
Best Cyber Risk Insights from 100 reports published in year to March 2022
Best Cyber Risk Insights from 100 reports published in year to March 2022Best Cyber Risk Insights from 100 reports published in year to March 2022
Best Cyber Risk Insights from 100 reports published in year to March 2022
 
Breaches Anticipated - because firms have weak cyber security visible to hac...
Breaches Anticipated  - because firms have weak cyber security visible to hac...Breaches Anticipated  - because firms have weak cyber security visible to hac...
Breaches Anticipated - because firms have weak cyber security visible to hac...
 
Cyber insurance insights - 17th feb 2022
Cyber insurance insights - 17th feb 2022Cyber insurance insights - 17th feb 2022
Cyber insurance insights - 17th feb 2022
 
Breaches anticipated in 2021 - Published 14th Jjune 2021
Breaches anticipated in 2021 - Published 14th Jjune 2021Breaches anticipated in 2021 - Published 14th Jjune 2021
Breaches anticipated in 2021 - Published 14th Jjune 2021
 
Cyber Resilience: managing 3rd Party Risks in Financial Services
Cyber Resilience: managing 3rd Party Risks in Financial ServicesCyber Resilience: managing 3rd Party Risks in Financial Services
Cyber Resilience: managing 3rd Party Risks in Financial Services
 
Privacy & Security in Feb 2020: new Fintech regulations on Cyber Security at ...
Privacy & Security in Feb 2020: new Fintech regulations on Cyber Security at ...Privacy & Security in Feb 2020: new Fintech regulations on Cyber Security at ...
Privacy & Security in Feb 2020: new Fintech regulations on Cyber Security at ...
 
Cyber Risk Measurement: what 25 CISOs & CROs plan for 2020
Cyber Risk Measurement: what 25 CISOs & CROs plan for 2020Cyber Risk Measurement: what 25 CISOs & CROs plan for 2020
Cyber Risk Measurement: what 25 CISOs & CROs plan for 2020
 
Keynote at Operational Resilience summit - Financial Services - 18th Nov 2019
Keynote at Operational Resilience summit - Financial Services - 18th Nov 2019Keynote at Operational Resilience summit - Financial Services - 18th Nov 2019
Keynote at Operational Resilience summit - Financial Services - 18th Nov 2019
 
Cyber Resilience across Subsidiaries and Suppliers
Cyber Resilience across Subsidiaries and SuppliersCyber Resilience across Subsidiaries and Suppliers
Cyber Resilience across Subsidiaries and Suppliers
 
London First - cyber attack simulation - 22nd May 2018
London First - cyber attack simulation - 22nd May 2018London First - cyber attack simulation - 22nd May 2018
London First - cyber attack simulation - 22nd May 2018
 
Cyber Attack Simulation for 450 Executives
Cyber Attack Simulation for 450 ExecutivesCyber Attack Simulation for 450 Executives
Cyber Attack Simulation for 450 Executives
 
Equifax Breach - Lessons - Cyber Rescue - 16th may 2018
Equifax Breach - Lessons - Cyber Rescue - 16th may 2018Equifax Breach - Lessons - Cyber Rescue - 16th may 2018
Equifax Breach - Lessons - Cyber Rescue - 16th may 2018
 
Cyber attack response from the CEO perspective - Tallinn Estonia - Short Simu...
Cyber attack response from the CEO perspective - Tallinn Estonia - Short Simu...Cyber attack response from the CEO perspective - Tallinn Estonia - Short Simu...
Cyber attack response from the CEO perspective - Tallinn Estonia - Short Simu...
 

Dernier

Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
lizamodels9
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
lizamodels9
 
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Anamikakaur10
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
dlhescort
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
amitlee9823
 
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...
lizamodels9
 
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service NoidaCall Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
dlhescort
 
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al MizharAl Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
allensay1
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
dollysharma2066
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
Abortion pills in Kuwait Cytotec pills in Kuwait
 

Dernier (20)

Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024
 
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
 
Malegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Malegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceMalegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Malegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
 
Falcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business Growth
 
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
 
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
 
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 MonthsSEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
 
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service NoidaCall Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
 
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
 
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al MizharAl Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
 
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
Falcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in indiaFalcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in india
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 

The Security Director's Practical Guide to Cyber Security

  • 1. www.CyberRescue.co.uk Barrie Millett Advisory Board 30th Nov – 1st Dec 2016 Security Director’s Practical Guide to Cyber Security Barrie Millett The UK Security Expo
  • 2. Why are we here? Topics www.CyberRescue.co.uk 1. What the CEO needs their Security Director to do, to protect against Cyber Threats 2. How the Security Director can spot vulnerabilities the IT team are most likely to have missed 3. What the Security Director should know about Cyber Insurance 4. Surprises your CEO may suffer during the response to a major Cyber Attack 5. Why Security Directors must be ready to lead Recovery from major Cyber Attack Assistance@CyberRescue.co.uk
  • 3. Who are you? Typical Security Director Role www.CyberRescue.co.uk 1. Protect assets, staff & reputation 2. Assess risk, vulnerabilities & issues 3. Define goals to mitigate risk 4. Promote security by design & security culture 5. Respond to Security Incidents Assistance@CyberRescue.co.uk
  • 4. Kevin Duffey – Managing Director Expert in commercial response to major cyber attacks •CEO Asia and UK Board Member at FTSE 100 company •Group GM at International SOS, global crisis management firm •Helped organisations respond to cyber attacks in 25 countries. Barrie Millett – International Advisor Award winning leader in risk mitigation and business continuity •Led security teams at blue-chip firms including E.ON and GE •Chair of Joint Risk Audit & Assurance Panel, Leicestershire Police •Expert in resilience for National Critical Infrastructure Who are we? Facilitators for this Workshop
  • 6. Leading terrorism response Severe weather events Investigating criminal activity transferable skills
  • 7. FBI data storage in 1942 = 10 million sets of fingerprints, plus 23 million paper cards = 680 Gigabytes Digital transformation of assets
  • 8. Digital transformation of assets £600 storage device in 2016 a “memory stick” from HyperX, stores 1,000 Gigabytes
  • 9. Exponential Risk to Assets Cyber Threats Annual Growth 125% Zero Day 71% DDoS 55% Spear Phish 29% Malware 21% SQLi 38% growth in reported crime
  • 10. Insurance: 52% of British CEOs think their company is insured for cyber risks. Just 2% of large businesses actually have stand alone cyber insurance in UK (March ‘15) “The market for cyber insurance isn’t sustainable” (Sept ‘15) Why businesses say they don’t have insurance (Nov ‘15) “Premiums too expensive” (52%) “Too many exclusions” (44%) Companies with cyber insurance but not claimed = 81% (Mar ‘16) £1m cyber policy costs £5k - 25k for “average” company (Apr ‘16) Consider Cyber Insurance
  • 11. Risks vary by Sector
  • 12. Agree Goals with IT Director
  • 13. Staff Risks: •78% of staff don't obey info policy •63% of breaches involve passwords •41% of staff install apps on work PC •30% of phishing messages are opened •12% of staff download malicious s/ware Supply Chain Risks: •41% of breaches affecting healthcare are caused by Third Parties •17% of breaches investigated by Kroll caused by Third Parties •AT&T, Home Depot, TalkTalk, and Target all suffered breaches via 3rd parties Assess Risks beyond IT
  • 14. Staff Systems Suppliers Work with HR, IT & Procurement to take a Hacker’s Eye View
  • 15. Example: daily Security Scorecard on vulnerabilities at key suppliers
  • 16. What to focus on in 2017? Typical Security Director Role www.CyberRescue.co.uk 1. Protects cyber assets, staff & reputation 2. Assesses cyber risk, vulnerabilities & issues 3. Defines cyber goals to mitigate risk 4. Promotes cyber security culture 5. Responds to cyber Security Incidents Assistance@CyberRescue.co.uk
  • 17. What to focus on in 2017? Typical Security Director Role www.CyberRescue.co.uk 1. Protects cyber assets, staff & reputation 2. Assesses cyber risk, vulnerabilities & issues 3. Defines cyber goals to mitigate risk 4. Promotes cyber security culture 5. Responds to cyber Security Incidents Assistance@CyberRescue.co.uk
  • 18. support CEOs to lead www.CyberRescue.co.uk Teams will be unnerved Many will never have tested a cyber attack response Internal and external relationships will need to be managed
  • 19. Grown-ups at the table www.CyberRescue.co.uk
  • 20. Grown-ups at the table www.CyberRescue.co.uk
  • 21. Why are we here? Topics www.CyberRescue.co.uk 1. What the CEO needs their Security Director to do, to protect against Cyber Threats 2. How the Security Director can spot vulnerabilities the IT team are most likely to have missed 3. What the Security Director should know about Cyber Insurance 4. Surprises your CEO may suffer during the response to a major Cyber Attack 5. Why Security Directors must be ready to lead Recovery from major Cyber Attack Assistance@CyberRescue.co.uk
  • 22. Part 2: Simulation (for attendees only): We will now simulate a Breach
  • 23. www.CyberRescue.co.uk For similar material, follow Cyber Rescue on LinkedIn here. Former Head of Resilience E.ON UK International Advisory Board Member Cyber Rescue Alliance Barrie.Millett@CyberRescue.co.uk + 44 7913 371249 Barrie Millett

Notes de l'éditeur

  1. The Cyber Rescue Alliance exists to help Executives reduce harm from cyber attack. To help organisations be resilient. To help with commercial Recovery. We help executives avoid turning a breach into a disaster. We help CEOs make decisions in what is often the most stressful time in their career. We recognise that a cyber attack is a crime We know that executives deserve our sympathy and support And we know that executives find attacks very stressful because they are often so unprepared. So I will share some observations about how we believe Security Directors can and should help executives respond to major breaches.
  2. Personal experiences have demonstrated that cyber and physical security needs to be intrinsically linked. With business operations and external agencies also playing a significant role. You will all have had significant personal journeys around managing crime and crisis events that you can use to great effect. The importance of all teams understanding the dynamics of emerging threats is essential. How actors are merging cyber and physical attacks for greater impact or just as a facilitator. We believe that Security Directors can play a truly successful role in protecting the teams and asset by ensuring a big team approach is taken. In many instances Security Directors already have the trust of the board, police and other agencies, local operations and business teams. CEOs need Security Directors to use their rich experiences in other areas to enrich an organisations response to the growing cyber threats.
  3. Security Directors have rich learning from other areas that can and should be harnessed in the arena of cyber security, with the response required prior to, during and following terrorist attacks, a severe weather event and criminal activity. Cyber crime is just that, a crime, a key point that should not be missed. Security departments have been leading organisational response on criminal activity for years and this experience should not be lost. High impact events will hit the Board room and the CEO will have to be able to respond from a position of knowledge and confidence in their teams ability to respond effectively and Security Directors have rich experience in helping executives prepare and respond to crisis situations.
  4. It’s the data storage system the FBI used in 1942 To hold a lot less data than fits on a modern memory stick. Choosing pictures that tell stories is really important. For example, some people compare a data breach to an earthquake. There is some value in that approach, because…
  5. This memory stick holds 1,000 Gigabytes Who here can visualise what that looks like? We find it helpful to show CEOs this picture, of just 600 Gigabytes
  6. Teams will be unnerved by the pace at which cyber incidents can unfold. Many will never have tested a cyber attack response to the degree that other response plans such as, building denial of access, terrorist events, severe weather etc… Internal and external relationships will need to be managed with these relationships built in quiet times and ofter forged of many years of interaction to gain their trust.
  7. Security Directors are the grown-ups at the table, during any business crisis. You have years of experience, training and tools to call upon. Your colleagues will need your mature guidance and support, to manage the cascade of commercial consequences that follow a breach. High impact events will hit the Board room and the CEO will have to be able to respond from a position of knowledge and confidence in their teams ability to respond effectively and Security Directors have rich experience in helping executives prepare and respond to crisis situations and help them to navigate through to successful conclusion.
  8. Silo thinking, incomplete planning internally or externally, seriously limits your resilience capabilities, increases costs and erodes value. Challenge cannot be effectively addressed by individual institutions, organisations and teams working in isolation – the interdependencies and responsibilities are simply to great. We must connect our thinking, resources and activities to create a collaborative approach, building common understanding and direction that overcomes the barriers to building resilient organisations and a more resilient society. The Physical and Cyber worlds are in my opinion intrinsically connected and Security Directors can effectively prepare our organisations and disrupt the attacks. Price of failure is too great and by working together we can win together and support CEOs and Boards to effectively manage high impact events. Thank you.