SlideShare uma empresa Scribd logo
1 de 30
Drew Gibson |
BRACE FOR IMPACT
Preparing your business
to manage cyber incidents
2| BRACE FOR IMPACT Preparing your business to manage cyber incidents | ©Atos
Cyber is more than an IT problem
Organisations deal with it to varying degrees of success
This is however industry or market dependent
3| BRACE FOR IMPACT Preparing your business to manage cyber incidents | ©Atos
Global number of
attacks - unknown
2012 first time mentioned in
WEF Global Risks Report
It has been a known issue for many years
The data says it all
So why is it such an issue?
first virus 1982
Elk Cloner
(open to debate)
US$315bn*
Global cost of attacks
over the past 12 months
- Grant Thornton survey
$
Recognition
as an issue
Ranking in 2016 report –
out of top 10,
Global spend on
cyber-security
estimated at
2015
2020
$75 bn
$170 bn
becoming more
normalised
4| BRACE FOR IMPACT Preparing your business to manage cyber incidents | ©Atos
Cyber is more than an IT problem
We know that cyber attacks are prolific and cost organisations millions
So how do we prepare ourselves for the
inevitable in a sustainable manner
5| BRACE FOR IMPACT Preparing your business to manage cyber incidents | ©Atos
Legal Obligations
6| BRACE FOR IMPACT Preparing your business to manage cyber incidents | ©Atos
What if?
7| BRACE FOR IMPACT Preparing your business to manage cyber incidents | ©Atos
Hypothetically
You were a UK based telecoms and internet provider
So what?
8| BRACE FOR IMPACT Preparing your business to manage cyber incidents | ©Atos
Hypothetically
Who had been hacked!
Multiple times…
How much data has gone?
9| BRACE FOR IMPACT Preparing your business to manage cyber incidents | ©Atos
Hypothetically
And you hadn’t joined up your IT Security Team and your PR Department…
How much data has gone?
Publicly messaged
customers
accounts
breached
following forensic
investigation
cost of prevention estimated at
(consultancy based)
cost of remediation post incident at
(reported)
– who stayed, who went, who will go?
10| BRACE FOR IMPACT Preparing your business to manage cyber incidents | ©Atos
Hypothetically
What could it do to your share price?
11| BRACE FOR IMPACT Preparing your business to manage cyber incidents | ©Atos
So could this be you?
12| BRACE FOR IMPACT Preparing your business to manage cyber incidents | ©Atos
So Rollback 6 months…
13| BRACE FOR IMPACT Preparing your business to manage cyber incidents | ©Atos
What could you have done?
What could have prevented or reduced the impact of the data breach
▶ Technical protection
▶ The Legal protection
▶ Enhanced/Better IT Security procedures
▶ Joined up business processes
▶ Better understanding of vulnerability and victimhood
? ?
14| BRACE FOR IMPACT Preparing your business to manage cyber incidents | ©Atos
What could you have done?
Using the technology to protect you
▶ Monitoring
▶ Inner protection as well as external
15| BRACE FOR IMPACT Preparing your business to manage cyber incidents | ©Atos
What could you have done?
IT processes and procedures
But are these sufficient protection on their own and do they
really consider the customer’s view point
16| BRACE FOR IMPACT Preparing your business to manage cyber incidents | ©Atos
What could you have done?
Legal aspects are you braced for impact
17| BRACE FOR IMPACT Preparing your business to manage cyber incidents | ©Atos
What could you have done?
Do the business processes match the IT Security processes
▶ It is not necessarily about the breach,
but how it is managed
▶ lack of communications
▶ Well intentioned, but misleading
communications – potentially 4 million
customers v 156,000 actual
4 million potential
156,000 actual
16,000
18| BRACE FOR IMPACT Preparing your business to manage cyber incidents | ©Atos
What could you have done?
Psychologically are you braced for impact
▶ how does the rest of the world view you – the victim or part
of the problem
▶ Were you irresponsible with people’s data
▶ So what did you really save by not investing in better data
protection measures
▶ Consumers understanding about their data – they can give
it away with ease, but you have to protect it in a way that
they don’t have to.
▶ The assumption that you will treat all their data in
confidence
▶ It might not be you – have you been negligent in who you
have engaged to look after the data
▶ Or to transfer it?
19| BRACE FOR IMPACT Preparing your business to manage cyber incidents | ©Atos
The Perception
20| BRACE FOR IMPACT Preparing your business to manage cyber incidents | ©Atos
Stealing money from a cash machine
So what is the difference
21| BRACE FOR IMPACT Preparing your business to manage cyber incidents | ©Atos
Cyber is more than an IT problem
So did these organisations understand the
attacks impacts?
This is however industry or market dependent
22| BRACE FOR IMPACT Preparing your business to manage cyber incidents | ©Atos
The Costs
23| BRACE FOR IMPACT Preparing your business to manage cyber incidents | ©Atos
The costs are simple to articulate.
McKinsey/World Economic Forum report,
Increased Cyber Security Can Save Global Economy Trillions (2014) stated:
But they still don’t provide a clear
definition of cyber or its issues
8 Months
is the average time that an
advanced threat goes unnoticed
on a victims network
US 3$ Trillion
is the total global impact
of cyber-crime
2.5 Billion
exposed records as a
result of a data breach
in the past five years,
(2009-2014)
1 in 5
organisations have
experienced an
Advanced Persistent
Threat (APT) attack
In 2013 there was a
in breaches being identified
and reported and it is growing
62% increase
24| BRACE FOR IMPACT Preparing your business to manage cyber incidents | ©Atos
Studies into perceptions and actual costs of cyber
attacks
Often not the share price, but the hidden costs that result from a cyber
attack
25| BRACE FOR IMPACT Preparing your business to manage cyber incidents | ©Atos
The Costs
Do Cyber Attacks effect share prices?
26| BRACE FOR IMPACT Preparing your business to manage cyber incidents | ©Atos
The Solution
27| BRACE FOR IMPACT Preparing your business to manage cyber incidents | ©Atos
Understand how you define “cyber”
Understand that you are comparing the same thing, only
differently
So how do organisations define what it relates clearly?
ClearUnclear
Low
Understanding of
the term Cyber
Abilitytodefine
thetermCyberHigh
Developgreaterunderstandinga
towhatdefinitionsmeanin
relationtovulnerabilities
Provide greater clarity as to what cyber
refers to and what it does not
Vagueness
of
Definitions
Muddled
Definitions
Coherence
of
Definitions
Confusion of
Definitions
Move to greater coherence of definitions
1
2
3
4
28| BRACE FOR IMPACT Preparing your business to manage cyber incidents | ©Atos
Understand how you define “cyber”
Understand that you are comparing the same thing, only
differently
Current issue in achieving greater coherence of definitions
So need to define what it relates clearly.
ClearUnclear
Low
Understanding of
the term Cyber
Abilitytodefine
thetermCyberHigh
Developgreaterunderstandinga
towhatdefinitionsmeanin
relationtovulnerabilities
Provide greater clarity as to what cyber
refers to and what it does not
Vagueness
of
Definitions
Muddled
Definitions
Coherence
of
Definitions
Confusion of
Definitions
1
2
3
4
29| BRACE FOR IMPACT Preparing your business to manage cyber incidents | ©Atos
Questions
30| BRACE FOR IMPACT Preparing your business to manage cyber incidents | ©Atos
Thank you
Drew Gibson MSc
Principal Consultant – Operational Risk and
Cyber Resilience, Atos Consulting
+44 (0) 7894 437 705
drew.gibson@atos.net

Mais conteúdo relacionado

Mais procurados

Cyber Heroes of tomorrow's world
Cyber Heroes of tomorrow's worldCyber Heroes of tomorrow's world
Cyber Heroes of tomorrow's worldKevin Duffey
 
Social Engineering the CEO
Social Engineering the CEOSocial Engineering the CEO
Social Engineering the CEOKevin Duffey
 
Is it a Risk to Be Compliant?
Is it a Risk to Be Compliant?Is it a Risk to Be Compliant?
Is it a Risk to Be Compliant?PECB
 
WSS Career Pathways Bio
WSS Career Pathways BioWSS Career Pathways Bio
WSS Career Pathways BioCath Goulding
 
How Good Privacy Practices can help prepare for a Data Breach from TRUSTe
How Good Privacy Practices can help prepare for a Data Breach from TRUSTe How Good Privacy Practices can help prepare for a Data Breach from TRUSTe
How Good Privacy Practices can help prepare for a Data Breach from TRUSTe TrustArc
 
Building an Effective Data Privacy Program – 6 Steps from TRUSTe
Building an Effective Data Privacy Program – 6 Steps from TRUSTeBuilding an Effective Data Privacy Program – 6 Steps from TRUSTe
Building an Effective Data Privacy Program – 6 Steps from TRUSTeTrustArc
 
BCS ITNow 201506 - Silver Bullet
BCS ITNow 201506 - Silver BulletBCS ITNow 201506 - Silver Bullet
BCS ITNow 201506 - Silver BulletGareth Niblett
 
Organizational Integrity & Its Relationship with Management Systems and Enter...
Organizational Integrity & Its Relationship with Management Systems and Enter...Organizational Integrity & Its Relationship with Management Systems and Enter...
Organizational Integrity & Its Relationship with Management Systems and Enter...PECB
 
The developing world of cyber litigation and compliance
The developing world of cyber litigation and complianceThe developing world of cyber litigation and compliance
The developing world of cyber litigation and compliancePECB
 
Board and Cyber Security
Board and Cyber SecurityBoard and Cyber Security
Board and Cyber SecurityLeon Fouche
 
An Invitation to Hack: Wiley Rein and HackerOne Webinar on Vulnerability Disc...
An Invitation to Hack: Wiley Rein and HackerOne Webinar on Vulnerability Disc...An Invitation to Hack: Wiley Rein and HackerOne Webinar on Vulnerability Disc...
An Invitation to Hack: Wiley Rein and HackerOne Webinar on Vulnerability Disc...HackerOne
 
What Small Business Can Do To Protect Themselves Now in Cybersecurity
What Small Business Can Do To Protect Themselves Now in CybersecurityWhat Small Business Can Do To Protect Themselves Now in Cybersecurity
What Small Business Can Do To Protect Themselves Now in CybersecurityReading Works Detroit
 
What to Do Before a Cyber Incident Occurs
What to Do Before a Cyber Incident OccursWhat to Do Before a Cyber Incident Occurs
What to Do Before a Cyber Incident OccursColleen Beck-Domanico
 
Advancing Your Cybersecurity Career
Advancing Your Cybersecurity CareerAdvancing Your Cybersecurity Career
Advancing Your Cybersecurity CareerKeyaan Williams
 
Business Continuity requires a Security Architecture to reduce risk and cost
Business Continuity requires a Security Architecture to reduce risk and costBusiness Continuity requires a Security Architecture to reduce risk and cost
Business Continuity requires a Security Architecture to reduce risk and costPECB
 
Cybersecurity Risk Governance
Cybersecurity Risk GovernanceCybersecurity Risk Governance
Cybersecurity Risk GovernanceDan Michaluk
 
Ey Asia-Pacific Cyber Case Competition 2019
Ey Asia-Pacific Cyber Case Competition 2019Ey Asia-Pacific Cyber Case Competition 2019
Ey Asia-Pacific Cyber Case Competition 2019Pinzhang Chen 陈品璋
 
How To Integrate Business Risk & IT Risk
How To Integrate Business Risk & IT Risk How To Integrate Business Risk & IT Risk
How To Integrate Business Risk & IT Risk SureCloud
 

Mais procurados (20)

Cyber Heroes of tomorrow's world
Cyber Heroes of tomorrow's worldCyber Heroes of tomorrow's world
Cyber Heroes of tomorrow's world
 
Social Engineering the CEO
Social Engineering the CEOSocial Engineering the CEO
Social Engineering the CEO
 
Is it a Risk to Be Compliant?
Is it a Risk to Be Compliant?Is it a Risk to Be Compliant?
Is it a Risk to Be Compliant?
 
WSS Career Pathways Bio
WSS Career Pathways BioWSS Career Pathways Bio
WSS Career Pathways Bio
 
Cyber - it's all now a matter of time!
Cyber - it's all now a matter of time!Cyber - it's all now a matter of time!
Cyber - it's all now a matter of time!
 
How Good Privacy Practices can help prepare for a Data Breach from TRUSTe
How Good Privacy Practices can help prepare for a Data Breach from TRUSTe How Good Privacy Practices can help prepare for a Data Breach from TRUSTe
How Good Privacy Practices can help prepare for a Data Breach from TRUSTe
 
10 reasons businesses fail!
10 reasons businesses fail!10 reasons businesses fail!
10 reasons businesses fail!
 
Building an Effective Data Privacy Program – 6 Steps from TRUSTe
Building an Effective Data Privacy Program – 6 Steps from TRUSTeBuilding an Effective Data Privacy Program – 6 Steps from TRUSTe
Building an Effective Data Privacy Program – 6 Steps from TRUSTe
 
BCS ITNow 201506 - Silver Bullet
BCS ITNow 201506 - Silver BulletBCS ITNow 201506 - Silver Bullet
BCS ITNow 201506 - Silver Bullet
 
Organizational Integrity & Its Relationship with Management Systems and Enter...
Organizational Integrity & Its Relationship with Management Systems and Enter...Organizational Integrity & Its Relationship with Management Systems and Enter...
Organizational Integrity & Its Relationship with Management Systems and Enter...
 
The developing world of cyber litigation and compliance
The developing world of cyber litigation and complianceThe developing world of cyber litigation and compliance
The developing world of cyber litigation and compliance
 
Board and Cyber Security
Board and Cyber SecurityBoard and Cyber Security
Board and Cyber Security
 
An Invitation to Hack: Wiley Rein and HackerOne Webinar on Vulnerability Disc...
An Invitation to Hack: Wiley Rein and HackerOne Webinar on Vulnerability Disc...An Invitation to Hack: Wiley Rein and HackerOne Webinar on Vulnerability Disc...
An Invitation to Hack: Wiley Rein and HackerOne Webinar on Vulnerability Disc...
 
What Small Business Can Do To Protect Themselves Now in Cybersecurity
What Small Business Can Do To Protect Themselves Now in CybersecurityWhat Small Business Can Do To Protect Themselves Now in Cybersecurity
What Small Business Can Do To Protect Themselves Now in Cybersecurity
 
What to Do Before a Cyber Incident Occurs
What to Do Before a Cyber Incident OccursWhat to Do Before a Cyber Incident Occurs
What to Do Before a Cyber Incident Occurs
 
Advancing Your Cybersecurity Career
Advancing Your Cybersecurity CareerAdvancing Your Cybersecurity Career
Advancing Your Cybersecurity Career
 
Business Continuity requires a Security Architecture to reduce risk and cost
Business Continuity requires a Security Architecture to reduce risk and costBusiness Continuity requires a Security Architecture to reduce risk and cost
Business Continuity requires a Security Architecture to reduce risk and cost
 
Cybersecurity Risk Governance
Cybersecurity Risk GovernanceCybersecurity Risk Governance
Cybersecurity Risk Governance
 
Ey Asia-Pacific Cyber Case Competition 2019
Ey Asia-Pacific Cyber Case Competition 2019Ey Asia-Pacific Cyber Case Competition 2019
Ey Asia-Pacific Cyber Case Competition 2019
 
How To Integrate Business Risk & IT Risk
How To Integrate Business Risk & IT Risk How To Integrate Business Risk & IT Risk
How To Integrate Business Risk & IT Risk
 

Destaque

bci london forum holding
bci london forum holdingbci london forum holding
bci london forum holdingMiles Glover
 
Emergency Evacuation Checklist Jim Burtles
Emergency Evacuation Checklist Jim BurtlesEmergency Evacuation Checklist Jim Burtles
Emergency Evacuation Checklist Jim Burtlesbcilondonforum
 
Agenci: The good the bad and the ugly of cyber space
Agenci: The good the bad and the ugly of cyber spaceAgenci: The good the bad and the ugly of cyber space
Agenci: The good the bad and the ugly of cyber spacebcilondonforum
 
BCI - Rise of the Machines
 BCI - Rise of the Machines BCI - Rise of the Machines
BCI - Rise of the MachinesMiles Glover
 
Emergency Evacuation Planning Jim Burtles
Emergency Evacuation Planning Jim BurtlesEmergency Evacuation Planning Jim Burtles
Emergency Evacuation Planning Jim Burtlesbcilondonforum
 
bci london forum invacuation
bci london forum invacuationbci london forum invacuation
bci london forum invacuationMiles Glover
 
Company Overview 20090228
Company Overview 20090228Company Overview 20090228
Company Overview 20090228nl23994
 
Atos Origin I S M Organization
Atos  Origin  I S M  OrganizationAtos  Origin  I S M  Organization
Atos Origin I S M Organizationpetercadejong
 
Atos - Trusted Partner for your Digital Journey
Atos - Trusted Partner for your Digital Journey Atos - Trusted Partner for your Digital Journey
Atos - Trusted Partner for your Digital Journey Paris, Bezons
 
Paving the path to tomorrow... today!
Paving the path to tomorrow... today!Paving the path to tomorrow... today!
Paving the path to tomorrow... today!Atos
 
SI Competence in Capgemini Czech
SI Competence in Capgemini CzechSI Competence in Capgemini Czech
SI Competence in Capgemini CzechJan Luc
 
Egan Company Presents - Total Systems Integration: Creating Smarter Buildings
Egan Company Presents - Total Systems Integration: Creating Smarter BuildingsEgan Company Presents - Total Systems Integration: Creating Smarter Buildings
Egan Company Presents - Total Systems Integration: Creating Smarter BuildingsEgan Company
 
Atos_Corporate_Presentation_19112015_V
Atos_Corporate_Presentation_19112015_VAtos_Corporate_Presentation_19112015_V
Atos_Corporate_Presentation_19112015_VMarcel van den Bosch
 
Digital Data Center
Digital Data CenterDigital Data Center
Digital Data CenterAtos
 
Ecr presentation ss chain - jeffrey - final
Ecr presentation   ss chain - jeffrey - finalEcr presentation   ss chain - jeffrey - final
Ecr presentation ss chain - jeffrey - finalECR Community
 

Destaque (16)

bci london forum holding
bci london forum holdingbci london forum holding
bci london forum holding
 
Emergency Evacuation Checklist Jim Burtles
Emergency Evacuation Checklist Jim BurtlesEmergency Evacuation Checklist Jim Burtles
Emergency Evacuation Checklist Jim Burtles
 
Agenci: The good the bad and the ugly of cyber space
Agenci: The good the bad and the ugly of cyber spaceAgenci: The good the bad and the ugly of cyber space
Agenci: The good the bad and the ugly of cyber space
 
BCI - Rise of the Machines
 BCI - Rise of the Machines BCI - Rise of the Machines
BCI - Rise of the Machines
 
Emergency Evacuation Planning Jim Burtles
Emergency Evacuation Planning Jim BurtlesEmergency Evacuation Planning Jim Burtles
Emergency Evacuation Planning Jim Burtles
 
bci london forum invacuation
bci london forum invacuationbci london forum invacuation
bci london forum invacuation
 
Company Overview 20090228
Company Overview 20090228Company Overview 20090228
Company Overview 20090228
 
Atos Origin I S M Organization
Atos  Origin  I S M  OrganizationAtos  Origin  I S M  Organization
Atos Origin I S M Organization
 
Atos - Trusted Partner for your Digital Journey
Atos - Trusted Partner for your Digital Journey Atos - Trusted Partner for your Digital Journey
Atos - Trusted Partner for your Digital Journey
 
Paving the path to tomorrow... today!
Paving the path to tomorrow... today!Paving the path to tomorrow... today!
Paving the path to tomorrow... today!
 
SI Competence in Capgemini Czech
SI Competence in Capgemini CzechSI Competence in Capgemini Czech
SI Competence in Capgemini Czech
 
Egan Company Presents - Total Systems Integration: Creating Smarter Buildings
Egan Company Presents - Total Systems Integration: Creating Smarter BuildingsEgan Company Presents - Total Systems Integration: Creating Smarter Buildings
Egan Company Presents - Total Systems Integration: Creating Smarter Buildings
 
Atos_Corporate_Presentation_19112015_V
Atos_Corporate_Presentation_19112015_VAtos_Corporate_Presentation_19112015_V
Atos_Corporate_Presentation_19112015_V
 
Digital Data Center
Digital Data CenterDigital Data Center
Digital Data Center
 
Ecr presentation ss chain - jeffrey - final
Ecr presentation   ss chain - jeffrey - finalEcr presentation   ss chain - jeffrey - final
Ecr presentation ss chain - jeffrey - final
 
Atos Consulting
Atos ConsultingAtos Consulting
Atos Consulting
 

Semelhante a ATOS: Preparing your business to manage cyber incidents

Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...PECB
 
BIZGrowth Strategies - Cybersecurity Special Edition
BIZGrowth Strategies - Cybersecurity Special EditionBIZGrowth Strategies - Cybersecurity Special Edition
BIZGrowth Strategies - Cybersecurity Special EditionCBIZ, Inc.
 
A Guide To Cyber Insurance
A Guide To Cyber InsuranceA Guide To Cyber Insurance
A Guide To Cyber InsuranceJohn Ryan
 
Tips to Make an Incident Response Plan to Tackle Cyber Threats and Safeguardi...
Tips to Make an Incident Response Plan to Tackle Cyber Threats and Safeguardi...Tips to Make an Incident Response Plan to Tackle Cyber Threats and Safeguardi...
Tips to Make an Incident Response Plan to Tackle Cyber Threats and Safeguardi...Ahad
 
How close is your organization to being breached | Safe Security
How close is your organization to being breached | Safe SecurityHow close is your organization to being breached | Safe Security
How close is your organization to being breached | Safe SecurityRahul Tyagi
 
Cybersecurity Risk Management for Financial Institutions
Cybersecurity Risk Management for Financial InstitutionsCybersecurity Risk Management for Financial Institutions
Cybersecurity Risk Management for Financial InstitutionsSarah Cirelli
 
Cyber crime liability report
Cyber crime liability reportCyber crime liability report
Cyber crime liability reportSayali Sawant
 
Towards the Next Generation Financial Crimes Platform - How Data, Analytics, ...
Towards the Next Generation Financial Crimes Platform - How Data, Analytics, ...Towards the Next Generation Financial Crimes Platform - How Data, Analytics, ...
Towards the Next Generation Financial Crimes Platform - How Data, Analytics, ...Molly Alexander
 
Why Accountants Can’t Afford to Ignore Cyber Security in 2023
Why Accountants Can’t Afford to Ignore Cyber Security in 2023Why Accountants Can’t Afford to Ignore Cyber Security in 2023
Why Accountants Can’t Afford to Ignore Cyber Security in 2023incmagazineseo
 
Cyber Security for the Small Business Experience
Cyber Security for the Small Business ExperienceCyber Security for the Small Business Experience
Cyber Security for the Small Business ExperienceNational Retail Federation
 
Provide a MEMO.docx
Provide a MEMO.docxProvide a MEMO.docx
Provide a MEMO.docxwrite30
 
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)Sarah Jarvis
 
Addressing cyber risk managment from SME perspective
Addressing cyber risk managment from SME perspectiveAddressing cyber risk managment from SME perspective
Addressing cyber risk managment from SME perspectiveCyber Watching
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...International Federation of Accountants
 
White paper cyber risk appetite defining and understanding risk in the moder...
White paper cyber risk appetite  defining and understanding risk in the moder...White paper cyber risk appetite  defining and understanding risk in the moder...
White paper cyber risk appetite defining and understanding risk in the moder...balejandre
 
15 Years of Web Security: The Rebellious Teenage Years
15 Years of Web Security: The Rebellious Teenage Years15 Years of Web Security: The Rebellious Teenage Years
15 Years of Web Security: The Rebellious Teenage YearsJeremiah Grossman
 

Semelhante a ATOS: Preparing your business to manage cyber incidents (20)

Breaches Are Bad for Business. How Will You Detect and Respond to Your Next C...
Breaches Are Bad for Business. How Will You Detect and Respond to Your Next C...Breaches Are Bad for Business. How Will You Detect and Respond to Your Next C...
Breaches Are Bad for Business. How Will You Detect and Respond to Your Next C...
 
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
 
BIZGrowth Strategies - Cybersecurity Special Edition
BIZGrowth Strategies - Cybersecurity Special EditionBIZGrowth Strategies - Cybersecurity Special Edition
BIZGrowth Strategies - Cybersecurity Special Edition
 
A Guide To Cyber Insurance
A Guide To Cyber InsuranceA Guide To Cyber Insurance
A Guide To Cyber Insurance
 
Tips to Make an Incident Response Plan to Tackle Cyber Threats and Safeguardi...
Tips to Make an Incident Response Plan to Tackle Cyber Threats and Safeguardi...Tips to Make an Incident Response Plan to Tackle Cyber Threats and Safeguardi...
Tips to Make an Incident Response Plan to Tackle Cyber Threats and Safeguardi...
 
How close is your organization to being breached | Safe Security
How close is your organization to being breached | Safe SecurityHow close is your organization to being breached | Safe Security
How close is your organization to being breached | Safe Security
 
Cyber threat forecast 2018..
Cyber threat forecast 2018..Cyber threat forecast 2018..
Cyber threat forecast 2018..
 
The Rise of Data Breaches in Small Businesses
The Rise of Data Breaches in Small Businesses The Rise of Data Breaches in Small Businesses
The Rise of Data Breaches in Small Businesses
 
Cybersecurity Risk Management for Financial Institutions
Cybersecurity Risk Management for Financial InstitutionsCybersecurity Risk Management for Financial Institutions
Cybersecurity Risk Management for Financial Institutions
 
Cyber crime liability report
Cyber crime liability reportCyber crime liability report
Cyber crime liability report
 
Towards the Next Generation Financial Crimes Platform - How Data, Analytics, ...
Towards the Next Generation Financial Crimes Platform - How Data, Analytics, ...Towards the Next Generation Financial Crimes Platform - How Data, Analytics, ...
Towards the Next Generation Financial Crimes Platform - How Data, Analytics, ...
 
Why Accountants Can’t Afford to Ignore Cyber Security in 2023
Why Accountants Can’t Afford to Ignore Cyber Security in 2023Why Accountants Can’t Afford to Ignore Cyber Security in 2023
Why Accountants Can’t Afford to Ignore Cyber Security in 2023
 
dcb1203CyberNDI
dcb1203CyberNDIdcb1203CyberNDI
dcb1203CyberNDI
 
Cyber Security for the Small Business Experience
Cyber Security for the Small Business ExperienceCyber Security for the Small Business Experience
Cyber Security for the Small Business Experience
 
Provide a MEMO.docx
Provide a MEMO.docxProvide a MEMO.docx
Provide a MEMO.docx
 
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
 
Addressing cyber risk managment from SME perspective
Addressing cyber risk managment from SME perspectiveAddressing cyber risk managment from SME perspective
Addressing cyber risk managment from SME perspective
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
 
White paper cyber risk appetite defining and understanding risk in the moder...
White paper cyber risk appetite  defining and understanding risk in the moder...White paper cyber risk appetite  defining and understanding risk in the moder...
White paper cyber risk appetite defining and understanding risk in the moder...
 
15 Years of Web Security: The Rebellious Teenage Years
15 Years of Web Security: The Rebellious Teenage Years15 Years of Web Security: The Rebellious Teenage Years
15 Years of Web Security: The Rebellious Teenage Years
 

Último

How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityEric T. Tung
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsMichael W. Hawkins
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒anilsa9823
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxpriyanshujha201
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...rajveerescorts2022
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsP&CO
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataExhibitors Data
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfAdmir Softic
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangaloreamitlee9823
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...anilsa9823
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxWorkforce Group
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdfRenandantas16
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...lizamodels9
 
John Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdfJohn Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdfAmzadHosen3
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...amitlee9823
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxAndy Lambert
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Lviv Startup Club
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...Paul Menig
 

Último (20)

How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael Hawkins
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors Data
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
John Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdfJohn Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdf
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
 

ATOS: Preparing your business to manage cyber incidents

  • 1. Drew Gibson | BRACE FOR IMPACT Preparing your business to manage cyber incidents
  • 2. 2| BRACE FOR IMPACT Preparing your business to manage cyber incidents | ©Atos Cyber is more than an IT problem Organisations deal with it to varying degrees of success This is however industry or market dependent
  • 3. 3| BRACE FOR IMPACT Preparing your business to manage cyber incidents | ©Atos Global number of attacks - unknown 2012 first time mentioned in WEF Global Risks Report It has been a known issue for many years The data says it all So why is it such an issue? first virus 1982 Elk Cloner (open to debate) US$315bn* Global cost of attacks over the past 12 months - Grant Thornton survey $ Recognition as an issue Ranking in 2016 report – out of top 10, Global spend on cyber-security estimated at 2015 2020 $75 bn $170 bn becoming more normalised
  • 4. 4| BRACE FOR IMPACT Preparing your business to manage cyber incidents | ©Atos Cyber is more than an IT problem We know that cyber attacks are prolific and cost organisations millions So how do we prepare ourselves for the inevitable in a sustainable manner
  • 5. 5| BRACE FOR IMPACT Preparing your business to manage cyber incidents | ©Atos Legal Obligations
  • 6. 6| BRACE FOR IMPACT Preparing your business to manage cyber incidents | ©Atos What if?
  • 7. 7| BRACE FOR IMPACT Preparing your business to manage cyber incidents | ©Atos Hypothetically You were a UK based telecoms and internet provider So what?
  • 8. 8| BRACE FOR IMPACT Preparing your business to manage cyber incidents | ©Atos Hypothetically Who had been hacked! Multiple times… How much data has gone?
  • 9. 9| BRACE FOR IMPACT Preparing your business to manage cyber incidents | ©Atos Hypothetically And you hadn’t joined up your IT Security Team and your PR Department… How much data has gone? Publicly messaged customers accounts breached following forensic investigation cost of prevention estimated at (consultancy based) cost of remediation post incident at (reported) – who stayed, who went, who will go?
  • 10. 10| BRACE FOR IMPACT Preparing your business to manage cyber incidents | ©Atos Hypothetically What could it do to your share price?
  • 11. 11| BRACE FOR IMPACT Preparing your business to manage cyber incidents | ©Atos So could this be you?
  • 12. 12| BRACE FOR IMPACT Preparing your business to manage cyber incidents | ©Atos So Rollback 6 months…
  • 13. 13| BRACE FOR IMPACT Preparing your business to manage cyber incidents | ©Atos What could you have done? What could have prevented or reduced the impact of the data breach ▶ Technical protection ▶ The Legal protection ▶ Enhanced/Better IT Security procedures ▶ Joined up business processes ▶ Better understanding of vulnerability and victimhood ? ?
  • 14. 14| BRACE FOR IMPACT Preparing your business to manage cyber incidents | ©Atos What could you have done? Using the technology to protect you ▶ Monitoring ▶ Inner protection as well as external
  • 15. 15| BRACE FOR IMPACT Preparing your business to manage cyber incidents | ©Atos What could you have done? IT processes and procedures But are these sufficient protection on their own and do they really consider the customer’s view point
  • 16. 16| BRACE FOR IMPACT Preparing your business to manage cyber incidents | ©Atos What could you have done? Legal aspects are you braced for impact
  • 17. 17| BRACE FOR IMPACT Preparing your business to manage cyber incidents | ©Atos What could you have done? Do the business processes match the IT Security processes ▶ It is not necessarily about the breach, but how it is managed ▶ lack of communications ▶ Well intentioned, but misleading communications – potentially 4 million customers v 156,000 actual 4 million potential 156,000 actual 16,000
  • 18. 18| BRACE FOR IMPACT Preparing your business to manage cyber incidents | ©Atos What could you have done? Psychologically are you braced for impact ▶ how does the rest of the world view you – the victim or part of the problem ▶ Were you irresponsible with people’s data ▶ So what did you really save by not investing in better data protection measures ▶ Consumers understanding about their data – they can give it away with ease, but you have to protect it in a way that they don’t have to. ▶ The assumption that you will treat all their data in confidence ▶ It might not be you – have you been negligent in who you have engaged to look after the data ▶ Or to transfer it?
  • 19. 19| BRACE FOR IMPACT Preparing your business to manage cyber incidents | ©Atos The Perception
  • 20. 20| BRACE FOR IMPACT Preparing your business to manage cyber incidents | ©Atos Stealing money from a cash machine So what is the difference
  • 21. 21| BRACE FOR IMPACT Preparing your business to manage cyber incidents | ©Atos Cyber is more than an IT problem So did these organisations understand the attacks impacts? This is however industry or market dependent
  • 22. 22| BRACE FOR IMPACT Preparing your business to manage cyber incidents | ©Atos The Costs
  • 23. 23| BRACE FOR IMPACT Preparing your business to manage cyber incidents | ©Atos The costs are simple to articulate. McKinsey/World Economic Forum report, Increased Cyber Security Can Save Global Economy Trillions (2014) stated: But they still don’t provide a clear definition of cyber or its issues 8 Months is the average time that an advanced threat goes unnoticed on a victims network US 3$ Trillion is the total global impact of cyber-crime 2.5 Billion exposed records as a result of a data breach in the past five years, (2009-2014) 1 in 5 organisations have experienced an Advanced Persistent Threat (APT) attack In 2013 there was a in breaches being identified and reported and it is growing 62% increase
  • 24. 24| BRACE FOR IMPACT Preparing your business to manage cyber incidents | ©Atos Studies into perceptions and actual costs of cyber attacks Often not the share price, but the hidden costs that result from a cyber attack
  • 25. 25| BRACE FOR IMPACT Preparing your business to manage cyber incidents | ©Atos The Costs Do Cyber Attacks effect share prices?
  • 26. 26| BRACE FOR IMPACT Preparing your business to manage cyber incidents | ©Atos The Solution
  • 27. 27| BRACE FOR IMPACT Preparing your business to manage cyber incidents | ©Atos Understand how you define “cyber” Understand that you are comparing the same thing, only differently So how do organisations define what it relates clearly? ClearUnclear Low Understanding of the term Cyber Abilitytodefine thetermCyberHigh Developgreaterunderstandinga towhatdefinitionsmeanin relationtovulnerabilities Provide greater clarity as to what cyber refers to and what it does not Vagueness of Definitions Muddled Definitions Coherence of Definitions Confusion of Definitions Move to greater coherence of definitions 1 2 3 4
  • 28. 28| BRACE FOR IMPACT Preparing your business to manage cyber incidents | ©Atos Understand how you define “cyber” Understand that you are comparing the same thing, only differently Current issue in achieving greater coherence of definitions So need to define what it relates clearly. ClearUnclear Low Understanding of the term Cyber Abilitytodefine thetermCyberHigh Developgreaterunderstandinga towhatdefinitionsmeanin relationtovulnerabilities Provide greater clarity as to what cyber refers to and what it does not Vagueness of Definitions Muddled Definitions Coherence of Definitions Confusion of Definitions 1 2 3 4
  • 29. 29| BRACE FOR IMPACT Preparing your business to manage cyber incidents | ©Atos Questions
  • 30. 30| BRACE FOR IMPACT Preparing your business to manage cyber incidents | ©Atos Thank you Drew Gibson MSc Principal Consultant – Operational Risk and Cyber Resilience, Atos Consulting +44 (0) 7894 437 705 drew.gibson@atos.net