SlideShare uma empresa Scribd logo
1 de 8
Baixar para ler offline
6/28/2017
1
Working Together to Build a Cyber
Security Program
David Johnston, Sr. Director, Loss Prevention &
Corporate Security, Dunkin' Brands, Inc.
Working Together to Build
a Cyber Security Program
David Johnston
Dunkin’ Brands, Inc.
6/28/2017
2
Working Together to Build a Cyber Security Program
• Understanding the Cyber Threat Landscape
• Building stronger LP / IT Security Relationships
• The Value of LP in a Cyber World
• Malware
• Ransomware
• DDoS Attacks
• Botnets
• Phishing / Social Engineering
• Insider Threats
• 3rd Party Threat
• Data Breaches – Data Loss
• Business Disruption
• Online / Mobile Fraud
• Business Email Compromise
• Loyalty Abuse
And more…
“Cybercrimes costs the global economy more than $450B” – CNBC.com
“ Average cost to a US retailer for a successful cyber attack $15.4M” – Forbes
“33% of customers will delay shopping at a retailer post data breach; 19% will stop
shopping there altogether” - KPMG
6/28/2017
3
• 20,000+ restaurants in 62+ countries
• 100% franchised environment
• Highly visible brand recognition
• Strong digital landscape
– Mobile Application (with SVC payment)
– Loyalty Program – Points/Coupons
– Mobile and Online Ordering
• Loyal customer base
• Everything touches IT
• IT Departments more role-specific
• Help Desk
• Data and Systems
• IT Security
• Applications (by Department)
• IT Security engaged at higher level
• Accreditations / Credentials
• Gatekeepers of Control
• “Protectors of the Brand”
The Evolution of Information Technology Security
6/28/2017
4
Physical Security
Loss Prevention
Information
Technology
THEN
NOW
Physical
Security
Information
Security
With increased use of technology
and data in regards to protecting
assets, people and property,
Physical Security and Information
Security now have similar
responsibilities
How do we play well together to
best protect a company?
What role can we play as loss
prevention?
How does LP become part of the
core team?
6/28/2017
5
Getting into the Discussions
• Education & knowledge
• Understand your environment
• Build strong relationships
• Engage IT in your world
• Educate on your value
• Educate ourselves
• Cyber Security
• Attack Methods
• Prevention Techniques
• Applications (by Department)
• Understand Your/The Environment
• What is happening now?
• How does it affect your company?
• How could your team help?
Education is a must!
6/28/2017
6
• Include IT in your world
• Investigative Support
• Corporate Security Support
• Planning Sessions
• Tabletop Exercises
• Explain how LP can assist IT
• Systems and Technologies
• Resources & Process
• Connections
Build Partnerships with IT
March / April 2017
LP’s Role in a Cyber Security Program
Physical Security System Management
Investigative Process / Deductive Reasoning
Interviewing Skills
Auditing / Evidence Collection
Law Enforcement Engagement
6/28/2017
7
LP’s Role in a Cyber Security Program
• Security System Review
• Access & CCTV Systems
• Lead Physical Loss Events
• Evidence Collection
• Interviewing Suspects
• Insider Threat Assessment
• Auditing / System Checks
• Store Incidents & Events
• Provide Contacts
• Assistance for/by LE
Law Enforcement Engagement
Field Support
Investigative SupportPhysical Security Assistance
Interviewing Skills
What role do you play?
• Do you have a copy of your
company’s cybersecurity program?
• Is your function listed as a role within
the program?
• Are you engaged in tabletop exercises
related to cyber/data security?
• Are you called upon when an incident
or event occurs?
6/28/2017
8
Working Together to Build a Cyber Security Program
• Cyber Threats will continue to increase and cause retail
business loss
• LP/Security professionals need to educate ourselves and talk
more frequently about these threats/loss
• LP/Security has a role and should be a core member of the
program
Resources
Groups
• Infragard (FBI/DHS public-private community)
• HSIN (Homeland Security Information Network)
• DSAC (FBI public-private CSO group)
• Search Cybersecurity Associations
THANK YOU FOR YOUR TIME
Send Email with Subject Line: Cyber Resources
To david.johnston@dunkinbrands.com
Resources
• Infosecurity-magazine.com
• CSO Online
• ASIS (store – books and publications)
• SANS Institute
• Online Training (search cybersecurity classes)

Mais conteúdo relacionado

Mais procurados

How to be everywhere tackling multi store security
How to be everywhere tackling multi store securityHow to be everywhere tackling multi store security
How to be everywhere tackling multi store securityNational Retail Federation
 
Social Engineering the CEO
Social Engineering the CEOSocial Engineering the CEO
Social Engineering the CEOKevin Duffey
 
ISACA talk - cybersecurity and security culture
ISACA talk - cybersecurity and security cultureISACA talk - cybersecurity and security culture
ISACA talk - cybersecurity and security cultureCraig McGill
 
Santam insurance 2
Santam insurance 2Santam insurance 2
Santam insurance 2Bhavna Neel
 
Cyber Security for Local Gov SAMFOG
Cyber Security for Local Gov SAMFOGCyber Security for Local Gov SAMFOG
Cyber Security for Local Gov SAMFOGDonald E. Hester
 
Designing for Trust – Presentation at Interact 2011, Lisbon, Portugal
Designing for Trust – Presentation at Interact 2011, Lisbon, PortugalDesigning for Trust – Presentation at Interact 2011, Lisbon, Portugal
Designing for Trust – Presentation at Interact 2011, Lisbon, PortugalAndreas Woelk
 
How Good Privacy Practices can help prepare for a Data Breach from TRUSTe
How Good Privacy Practices can help prepare for a Data Breach from TRUSTe How Good Privacy Practices can help prepare for a Data Breach from TRUSTe
How Good Privacy Practices can help prepare for a Data Breach from TRUSTe TrustArc
 
Big data security in the cloud: Buzzword Bingo!
Big data security in the cloud: Buzzword Bingo!Big data security in the cloud: Buzzword Bingo!
Big data security in the cloud: Buzzword Bingo!Spiceworks Ziff Davis
 
MasterSnacks: Cybersecurity - Third-Party Crashers: Avoiding Service Provider...
MasterSnacks: Cybersecurity - Third-Party Crashers: Avoiding Service Provider...MasterSnacks: Cybersecurity - Third-Party Crashers: Avoiding Service Provider...
MasterSnacks: Cybersecurity - Third-Party Crashers: Avoiding Service Provider...Citrin Cooperman
 
Guy Bunker - Stealing Back The Data From Cyber-Attackers - The Information Go...
Guy Bunker - Stealing Back The Data From Cyber-Attackers - The Information Go...Guy Bunker - Stealing Back The Data From Cyber-Attackers - The Information Go...
Guy Bunker - Stealing Back The Data From Cyber-Attackers - The Information Go...ARMA International
 
Building Cyber Resilience in the Digital Economy
Building Cyber Resilience in the Digital EconomyBuilding Cyber Resilience in the Digital Economy
Building Cyber Resilience in the Digital EconomyAgus Wicaksono
 
Incentivizing Better Risk Decisions - Lessons from Rogue Actuaries - SIRAcon ...
Incentivizing Better Risk Decisions - Lessons from Rogue Actuaries - SIRAcon ...Incentivizing Better Risk Decisions - Lessons from Rogue Actuaries - SIRAcon ...
Incentivizing Better Risk Decisions - Lessons from Rogue Actuaries - SIRAcon ...Tony Martin-Vegue
 
Security Breach: It's not if, it's not when, it's will you know
Security Breach: It's not if, it's not when, it's will you knowSecurity Breach: It's not if, it's not when, it's will you know
Security Breach: It's not if, it's not when, it's will you knowqmatheson
 

Mais procurados (16)

How to be everywhere tackling multi store security
How to be everywhere tackling multi store securityHow to be everywhere tackling multi store security
How to be everywhere tackling multi store security
 
Social Engineering the CEO
Social Engineering the CEOSocial Engineering the CEO
Social Engineering the CEO
 
ISACA talk - cybersecurity and security culture
ISACA talk - cybersecurity and security cultureISACA talk - cybersecurity and security culture
ISACA talk - cybersecurity and security culture
 
Santam insurance 2
Santam insurance 2Santam insurance 2
Santam insurance 2
 
Cyber Security for Local Gov SAMFOG
Cyber Security for Local Gov SAMFOGCyber Security for Local Gov SAMFOG
Cyber Security for Local Gov SAMFOG
 
Freewill Eng245 2017
Freewill Eng245 2017Freewill Eng245 2017
Freewill Eng245 2017
 
Designing for Trust – Presentation at Interact 2011, Lisbon, Portugal
Designing for Trust – Presentation at Interact 2011, Lisbon, PortugalDesigning for Trust – Presentation at Interact 2011, Lisbon, Portugal
Designing for Trust – Presentation at Interact 2011, Lisbon, Portugal
 
How Good Privacy Practices can help prepare for a Data Breach from TRUSTe
How Good Privacy Practices can help prepare for a Data Breach from TRUSTe How Good Privacy Practices can help prepare for a Data Breach from TRUSTe
How Good Privacy Practices can help prepare for a Data Breach from TRUSTe
 
Big data security in the cloud: Buzzword Bingo!
Big data security in the cloud: Buzzword Bingo!Big data security in the cloud: Buzzword Bingo!
Big data security in the cloud: Buzzword Bingo!
 
MasterSnacks: Cybersecurity - Third-Party Crashers: Avoiding Service Provider...
MasterSnacks: Cybersecurity - Third-Party Crashers: Avoiding Service Provider...MasterSnacks: Cybersecurity - Third-Party Crashers: Avoiding Service Provider...
MasterSnacks: Cybersecurity - Third-Party Crashers: Avoiding Service Provider...
 
RSA 2017 - CISO's 5 steps to Success
RSA 2017 - CISO's 5 steps to SuccessRSA 2017 - CISO's 5 steps to Success
RSA 2017 - CISO's 5 steps to Success
 
Guy Bunker - Stealing Back The Data From Cyber-Attackers - The Information Go...
Guy Bunker - Stealing Back The Data From Cyber-Attackers - The Information Go...Guy Bunker - Stealing Back The Data From Cyber-Attackers - The Information Go...
Guy Bunker - Stealing Back The Data From Cyber-Attackers - The Information Go...
 
Building Cyber Resilience in the Digital Economy
Building Cyber Resilience in the Digital EconomyBuilding Cyber Resilience in the Digital Economy
Building Cyber Resilience in the Digital Economy
 
Incentivizing Better Risk Decisions - Lessons from Rogue Actuaries - SIRAcon ...
Incentivizing Better Risk Decisions - Lessons from Rogue Actuaries - SIRAcon ...Incentivizing Better Risk Decisions - Lessons from Rogue Actuaries - SIRAcon ...
Incentivizing Better Risk Decisions - Lessons from Rogue Actuaries - SIRAcon ...
 
Security Breach: It's not if, it's not when, it's will you know
Security Breach: It's not if, it's not when, it's will you knowSecurity Breach: It's not if, it's not when, it's will you know
Security Breach: It's not if, it's not when, it's will you know
 
Seed investdeck
Seed investdeckSeed investdeck
Seed investdeck
 

Semelhante a Working Together to Build a Cyber Security Program

How to Effectively Equip Your IG Program for the Perilous Journey Into the Fu...
How to Effectively Equip Your IG Program for the Perilous Journey Into the Fu...How to Effectively Equip Your IG Program for the Perilous Journey Into the Fu...
How to Effectively Equip Your IG Program for the Perilous Journey Into the Fu...Aggregage
 
Be More Secure than your Competition: MePush Cyber Security for Small Business
Be More Secure than your Competition:  MePush Cyber Security for Small BusinessBe More Secure than your Competition:  MePush Cyber Security for Small Business
Be More Secure than your Competition: MePush Cyber Security for Small BusinessArt Ocain
 
Eliminate the 49% of Documents that Contain Data Breaches Webinar
Eliminate the 49% of Documents that Contain Data Breaches WebinarEliminate the 49% of Documents that Contain Data Breaches Webinar
Eliminate the 49% of Documents that Contain Data Breaches WebinarConcept Searching, Inc
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Stephen Cobb
 
Cybersecurity Series - Cyber Defense for Internal Auditors
Cybersecurity Series - Cyber Defense for Internal AuditorsCybersecurity Series - Cyber Defense for Internal Auditors
Cybersecurity Series - Cyber Defense for Internal AuditorsJim Kaplan CIA CFE
 
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015Joe Bartolo
 
Strengthening Caribbean Business against Cyber Attacks May 18.pdf
Strengthening Caribbean Business against Cyber Attacks May 18.pdfStrengthening Caribbean Business against Cyber Attacks May 18.pdf
Strengthening Caribbean Business against Cyber Attacks May 18.pdfSymptai Consulting Limited
 
Is Your Company's Data Secure? Shelley Vinson Helfer
Is Your Company's Data Secure? Shelley Vinson HelferIs Your Company's Data Secure? Shelley Vinson Helfer
Is Your Company's Data Secure? Shelley Vinson HelferMAX Technical Training
 
Enabling Science with Trust and Security – Guest Keynote
Enabling Science with Trust and Security – Guest KeynoteEnabling Science with Trust and Security – Guest Keynote
Enabling Science with Trust and Security – Guest KeynoteGlobus
 
Big Data, Big Investment
Big Data, Big InvestmentBig Data, Big Investment
Big Data, Big InvestmentGGV Capital
 
Co-Presented: YOU are the Alpha and Omega of a Secure Future (Kottova / Dray)...
Co-Presented: YOU are the Alpha and Omega of a Secure Future (Kottova / Dray)...Co-Presented: YOU are the Alpha and Omega of a Secure Future (Kottova / Dray)...
Co-Presented: YOU are the Alpha and Omega of a Secure Future (Kottova / Dray)...Kimberley Dray
 
A Look at Cyber Insurance -- A Corporate Perspective
A Look at Cyber Insurance -- A Corporate  PerspectiveA Look at Cyber Insurance -- A Corporate  Perspective
A Look at Cyber Insurance -- A Corporate PerspectiveDawn Yankeelov
 
FINTECH, CYBERSECURITY AND BUSINESS READINESS
FINTECH, CYBERSECURITY AND BUSINESS READINESS FINTECH, CYBERSECURITY AND BUSINESS READINESS
FINTECH, CYBERSECURITY AND BUSINESS READINESS Andrew_Goss
 
HDI Capital Area Slides August 17, 2018
HDI Capital Area Slides August 17, 2018HDI Capital Area Slides August 17, 2018
HDI Capital Area Slides August 17, 2018hdicapitalarea
 
Final presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit planFinal presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit planCameron Forbes Over
 
Final presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit planFinal presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit planCameron Forbes Over
 
Using Technology and People to Improve your Threat Resistance and Cyber Security
Using Technology and People to Improve your Threat Resistance and Cyber SecurityUsing Technology and People to Improve your Threat Resistance and Cyber Security
Using Technology and People to Improve your Threat Resistance and Cyber SecurityStephen Cobb
 

Semelhante a Working Together to Build a Cyber Security Program (20)

How to Effectively Equip Your IG Program for the Perilous Journey Into the Fu...
How to Effectively Equip Your IG Program for the Perilous Journey Into the Fu...How to Effectively Equip Your IG Program for the Perilous Journey Into the Fu...
How to Effectively Equip Your IG Program for the Perilous Journey Into the Fu...
 
CIO 360 grados: empoderamiento total
CIO 360 grados: empoderamiento totalCIO 360 grados: empoderamiento total
CIO 360 grados: empoderamiento total
 
IT & Network Security Awareness
IT & Network Security AwarenessIT & Network Security Awareness
IT & Network Security Awareness
 
Be More Secure than your Competition: MePush Cyber Security for Small Business
Be More Secure than your Competition:  MePush Cyber Security for Small BusinessBe More Secure than your Competition:  MePush Cyber Security for Small Business
Be More Secure than your Competition: MePush Cyber Security for Small Business
 
Eliminate the 49% of Documents that Contain Data Breaches Webinar
Eliminate the 49% of Documents that Contain Data Breaches WebinarEliminate the 49% of Documents that Contain Data Breaches Webinar
Eliminate the 49% of Documents that Contain Data Breaches Webinar
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
 
Cybersecurity Series - Cyber Defense for Internal Auditors
Cybersecurity Series - Cyber Defense for Internal AuditorsCybersecurity Series - Cyber Defense for Internal Auditors
Cybersecurity Series - Cyber Defense for Internal Auditors
 
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
 
Strengthening Caribbean Business against Cyber Attacks May 18.pdf
Strengthening Caribbean Business against Cyber Attacks May 18.pdfStrengthening Caribbean Business against Cyber Attacks May 18.pdf
Strengthening Caribbean Business against Cyber Attacks May 18.pdf
 
Is Your Company's Data Secure? Shelley Vinson Helfer
Is Your Company's Data Secure? Shelley Vinson HelferIs Your Company's Data Secure? Shelley Vinson Helfer
Is Your Company's Data Secure? Shelley Vinson Helfer
 
Enabling Science with Trust and Security – Guest Keynote
Enabling Science with Trust and Security – Guest KeynoteEnabling Science with Trust and Security – Guest Keynote
Enabling Science with Trust and Security – Guest Keynote
 
Big Data, Big Investment
Big Data, Big InvestmentBig Data, Big Investment
Big Data, Big Investment
 
Co-Presented: YOU are the Alpha and Omega of a Secure Future (Kottova / Dray)...
Co-Presented: YOU are the Alpha and Omega of a Secure Future (Kottova / Dray)...Co-Presented: YOU are the Alpha and Omega of a Secure Future (Kottova / Dray)...
Co-Presented: YOU are the Alpha and Omega of a Secure Future (Kottova / Dray)...
 
A Look at Cyber Insurance -- A Corporate Perspective
A Look at Cyber Insurance -- A Corporate  PerspectiveA Look at Cyber Insurance -- A Corporate  Perspective
A Look at Cyber Insurance -- A Corporate Perspective
 
FINTECH, CYBERSECURITY AND BUSINESS READINESS
FINTECH, CYBERSECURITY AND BUSINESS READINESS FINTECH, CYBERSECURITY AND BUSINESS READINESS
FINTECH, CYBERSECURITY AND BUSINESS READINESS
 
HDI Capital Area Slides August 17, 2018
HDI Capital Area Slides August 17, 2018HDI Capital Area Slides August 17, 2018
HDI Capital Area Slides August 17, 2018
 
GDPR Series Session 4
GDPR Series Session 4GDPR Series Session 4
GDPR Series Session 4
 
Final presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit planFinal presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit plan
 
Final presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit planFinal presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit plan
 
Using Technology and People to Improve your Threat Resistance and Cyber Security
Using Technology and People to Improve your Threat Resistance and Cyber SecurityUsing Technology and People to Improve your Threat Resistance and Cyber Security
Using Technology and People to Improve your Threat Resistance and Cyber Security
 

Mais de National Retail Federation

Conversational digital humans: The future of retail?
Conversational digital humans: The future of retail?Conversational digital humans: The future of retail?
Conversational digital humans: The future of retail?National Retail Federation
 
Drive enhanced customer experiences with the power of data
Drive enhanced customer experiences with the power of dataDrive enhanced customer experiences with the power of data
Drive enhanced customer experiences with the power of dataNational Retail Federation
 
Driving optimal decision-making in fresh grocery
Driving optimal decision-making in fresh groceryDriving optimal decision-making in fresh grocery
Driving optimal decision-making in fresh groceryNational Retail Federation
 
Five Guys and Flybuy - Challenges, innovations, and what's next
Five Guys and Flybuy - Challenges, innovations, and what's nextFive Guys and Flybuy - Challenges, innovations, and what's next
Five Guys and Flybuy - Challenges, innovations, and what's nextNational Retail Federation
 
Thermal intelligence - Advancing food safety and profitability for retailers
Thermal intelligence - Advancing food safety and profitability for retailersThermal intelligence - Advancing food safety and profitability for retailers
Thermal intelligence - Advancing food safety and profitability for retailersNational Retail Federation
 
Unlocking the power of in-session marketing to convert the anonymous
Unlocking the power of in-session marketing to convert the anonymousUnlocking the power of in-session marketing to convert the anonymous
Unlocking the power of in-session marketing to convert the anonymousNational Retail Federation
 
Navigating uncertainty: The art and science of learning and doing 10x in a te...
Navigating uncertainty: The art and science of learning and doing 10x in a te...Navigating uncertainty: The art and science of learning and doing 10x in a te...
Navigating uncertainty: The art and science of learning and doing 10x in a te...National Retail Federation
 
Building deeper empathy for your customers in uncertain times and beyond
Building deeper empathy for your customers in uncertain times and beyondBuilding deeper empathy for your customers in uncertain times and beyond
Building deeper empathy for your customers in uncertain times and beyondNational Retail Federation
 
The state of commerce: Key trends and future predictions
The state of commerce: Key trends and future predictionsThe state of commerce: Key trends and future predictions
The state of commerce: Key trends and future predictionsNational Retail Federation
 
Redefining intelligence: Exploring the latest advances in next-generation AI ...
Redefining intelligence: Exploring the latest advances in next-generation AI ...Redefining intelligence: Exploring the latest advances in next-generation AI ...
Redefining intelligence: Exploring the latest advances in next-generation AI ...National Retail Federation
 
Top global consumer trends for retailers in 2023
Top global consumer trends for retailers in 2023Top global consumer trends for retailers in 2023
Top global consumer trends for retailers in 2023National Retail Federation
 
Data-driven site selection: How understanding consumer movement drives Little...
Data-driven site selection: How understanding consumer movement drives Little...Data-driven site selection: How understanding consumer movement drives Little...
Data-driven site selection: How understanding consumer movement drives Little...National Retail Federation
 
Demystifying data: Profitability, people and the power of analytics
Demystifying data: Profitability, people and the power of analyticsDemystifying data: Profitability, people and the power of analytics
Demystifying data: Profitability, people and the power of analyticsNational Retail Federation
 
Five reasons automation will save your restaurant
Five reasons automation will save your restaurantFive reasons automation will save your restaurant
Five reasons automation will save your restaurantNational Retail Federation
 
Retail Media Networks: How the physical store will power their next phase of ...
Retail Media Networks: How the physical store will power their next phase of ...Retail Media Networks: How the physical store will power their next phase of ...
Retail Media Networks: How the physical store will power their next phase of ...National Retail Federation
 
Working together to combat organized retail crime
Working together to combat organized retail crimeWorking together to combat organized retail crime
Working together to combat organized retail crimeNational Retail Federation
 
Voice in retail: It speaks, it listens, it’s impacting our real world businesses
Voice in retail: It speaks, it listens, it’s impacting our real world businessesVoice in retail: It speaks, it listens, it’s impacting our real world businesses
Voice in retail: It speaks, it listens, it’s impacting our real world businessesNational Retail Federation
 
A look ahead to 2023: Impasse or opportunity for a new path
A look ahead to 2023: Impasse or opportunity for a new pathA look ahead to 2023: Impasse or opportunity for a new path
A look ahead to 2023: Impasse or opportunity for a new pathNational Retail Federation
 

Mais de National Retail Federation (20)

Conversational digital humans: The future of retail?
Conversational digital humans: The future of retail?Conversational digital humans: The future of retail?
Conversational digital humans: The future of retail?
 
Drive enhanced customer experiences with the power of data
Drive enhanced customer experiences with the power of dataDrive enhanced customer experiences with the power of data
Drive enhanced customer experiences with the power of data
 
Driving optimal decision-making in fresh grocery
Driving optimal decision-making in fresh groceryDriving optimal decision-making in fresh grocery
Driving optimal decision-making in fresh grocery
 
Five Guys and Flybuy - Challenges, innovations, and what's next
Five Guys and Flybuy - Challenges, innovations, and what's nextFive Guys and Flybuy - Challenges, innovations, and what's next
Five Guys and Flybuy - Challenges, innovations, and what's next
 
Thermal intelligence - Advancing food safety and profitability for retailers
Thermal intelligence - Advancing food safety and profitability for retailersThermal intelligence - Advancing food safety and profitability for retailers
Thermal intelligence - Advancing food safety and profitability for retailers
 
NRF 2023 Back-to-Class Consumer Trends
NRF 2023 Back-to-Class Consumer TrendsNRF 2023 Back-to-Class Consumer Trends
NRF 2023 Back-to-Class Consumer Trends
 
Unlocking the power of in-session marketing to convert the anonymous
Unlocking the power of in-session marketing to convert the anonymousUnlocking the power of in-session marketing to convert the anonymous
Unlocking the power of in-session marketing to convert the anonymous
 
Navigating uncertainty: The art and science of learning and doing 10x in a te...
Navigating uncertainty: The art and science of learning and doing 10x in a te...Navigating uncertainty: The art and science of learning and doing 10x in a te...
Navigating uncertainty: The art and science of learning and doing 10x in a te...
 
Building deeper empathy for your customers in uncertain times and beyond
Building deeper empathy for your customers in uncertain times and beyondBuilding deeper empathy for your customers in uncertain times and beyond
Building deeper empathy for your customers in uncertain times and beyond
 
The state of commerce: Key trends and future predictions
The state of commerce: Key trends and future predictionsThe state of commerce: Key trends and future predictions
The state of commerce: Key trends and future predictions
 
Redefining intelligence: Exploring the latest advances in next-generation AI ...
Redefining intelligence: Exploring the latest advances in next-generation AI ...Redefining intelligence: Exploring the latest advances in next-generation AI ...
Redefining intelligence: Exploring the latest advances in next-generation AI ...
 
Top global consumer trends for retailers in 2023
Top global consumer trends for retailers in 2023Top global consumer trends for retailers in 2023
Top global consumer trends for retailers in 2023
 
Data-driven site selection: How understanding consumer movement drives Little...
Data-driven site selection: How understanding consumer movement drives Little...Data-driven site selection: How understanding consumer movement drives Little...
Data-driven site selection: How understanding consumer movement drives Little...
 
Can resale increase foot traffic in stores?
Can resale increase foot traffic in stores?Can resale increase foot traffic in stores?
Can resale increase foot traffic in stores?
 
Demystifying data: Profitability, people and the power of analytics
Demystifying data: Profitability, people and the power of analyticsDemystifying data: Profitability, people and the power of analytics
Demystifying data: Profitability, people and the power of analytics
 
Five reasons automation will save your restaurant
Five reasons automation will save your restaurantFive reasons automation will save your restaurant
Five reasons automation will save your restaurant
 
Retail Media Networks: How the physical store will power their next phase of ...
Retail Media Networks: How the physical store will power their next phase of ...Retail Media Networks: How the physical store will power their next phase of ...
Retail Media Networks: How the physical store will power their next phase of ...
 
Working together to combat organized retail crime
Working together to combat organized retail crimeWorking together to combat organized retail crime
Working together to combat organized retail crime
 
Voice in retail: It speaks, it listens, it’s impacting our real world businesses
Voice in retail: It speaks, it listens, it’s impacting our real world businessesVoice in retail: It speaks, it listens, it’s impacting our real world businesses
Voice in retail: It speaks, it listens, it’s impacting our real world businesses
 
A look ahead to 2023: Impasse or opportunity for a new path
A look ahead to 2023: Impasse or opportunity for a new pathA look ahead to 2023: Impasse or opportunity for a new path
A look ahead to 2023: Impasse or opportunity for a new path
 

Último

Best VIP Call Girls Noida Sector 51 Call Me: 8448380779
Best VIP Call Girls Noida Sector 51 Call Me: 8448380779Best VIP Call Girls Noida Sector 51 Call Me: 8448380779
Best VIP Call Girls Noida Sector 51 Call Me: 8448380779Delhi Call girls
 
call Now 9811711561 Cash Payment乂 Call Girls in Dwarka
call Now 9811711561 Cash Payment乂 Call Girls in Dwarkacall Now 9811711561 Cash Payment乂 Call Girls in Dwarka
call Now 9811711561 Cash Payment乂 Call Girls in Dwarkavikas rana
 
Best VIP Call Girls Noida Sector 55 Call Me: 8448380779
Best VIP Call Girls Noida Sector 55 Call Me: 8448380779Best VIP Call Girls Noida Sector 55 Call Me: 8448380779
Best VIP Call Girls Noida Sector 55 Call Me: 8448380779Delhi Call girls
 
Call Girls In Dev kunj Delhi 9654467111 Short 1500 Night 6000
Call Girls In Dev kunj Delhi 9654467111 Short 1500 Night 6000Call Girls In Dev kunj Delhi 9654467111 Short 1500 Night 6000
Call Girls In Dev kunj Delhi 9654467111 Short 1500 Night 6000Sapana Sha
 
The 15 Minute Breakdown: 2024 Beauty Marketing Study
The 15 Minute Breakdown: 2024 Beauty Marketing StudyThe 15 Minute Breakdown: 2024 Beauty Marketing Study
The 15 Minute Breakdown: 2024 Beauty Marketing StudyKatherineBishop4
 
Indian Call Girl In Dubai #$# O5634O3O18 #$# Dubai Call Girl
Indian Call Girl In Dubai #$# O5634O3O18 #$# Dubai Call GirlIndian Call Girl In Dubai #$# O5634O3O18 #$# Dubai Call Girl
Indian Call Girl In Dubai #$# O5634O3O18 #$# Dubai Call GirlAroojKhan71
 
The 15 Minute Breakdown: 2024 Beauty Marketing Study
The 15 Minute Breakdown: 2024 Beauty Marketing StudyThe 15 Minute Breakdown: 2024 Beauty Marketing Study
The 15 Minute Breakdown: 2024 Beauty Marketing StudyTinuiti
 
Best VIP Call Girls Noida Sector 50 Call Me: 8448380779
Best VIP Call Girls Noida Sector 50 Call Me: 8448380779Best VIP Call Girls Noida Sector 50 Call Me: 8448380779
Best VIP Call Girls Noida Sector 50 Call Me: 8448380779Delhi Call girls
 
Film= Dubai Call Girls O525547819 Call Girls Dubai Whsatapp
Film= Dubai Call Girls O525547819 Call Girls Dubai WhsatappFilm= Dubai Call Girls O525547819 Call Girls Dubai Whsatapp
Film= Dubai Call Girls O525547819 Call Girls Dubai Whsatappkojalkojal131
 
Dubai Call Girls O525547&19 (Asii) Call Girls Dubai
Dubai Call Girls O525547&19 (Asii) Call Girls DubaiDubai Call Girls O525547&19 (Asii) Call Girls Dubai
Dubai Call Girls O525547&19 (Asii) Call Girls Dubaikojalkojal131
 
Top Rated Pune Call Girls Talegaon Dabhade ⟟ 6297143586 ⟟ Call Me For Genuin...
Top Rated  Pune Call Girls Talegaon Dabhade ⟟ 6297143586 ⟟ Call Me For Genuin...Top Rated  Pune Call Girls Talegaon Dabhade ⟟ 6297143586 ⟟ Call Me For Genuin...
Top Rated Pune Call Girls Talegaon Dabhade ⟟ 6297143586 ⟟ Call Me For Genuin...Call Girls in Nagpur High Profile
 

Último (11)

Best VIP Call Girls Noida Sector 51 Call Me: 8448380779
Best VIP Call Girls Noida Sector 51 Call Me: 8448380779Best VIP Call Girls Noida Sector 51 Call Me: 8448380779
Best VIP Call Girls Noida Sector 51 Call Me: 8448380779
 
call Now 9811711561 Cash Payment乂 Call Girls in Dwarka
call Now 9811711561 Cash Payment乂 Call Girls in Dwarkacall Now 9811711561 Cash Payment乂 Call Girls in Dwarka
call Now 9811711561 Cash Payment乂 Call Girls in Dwarka
 
Best VIP Call Girls Noida Sector 55 Call Me: 8448380779
Best VIP Call Girls Noida Sector 55 Call Me: 8448380779Best VIP Call Girls Noida Sector 55 Call Me: 8448380779
Best VIP Call Girls Noida Sector 55 Call Me: 8448380779
 
Call Girls In Dev kunj Delhi 9654467111 Short 1500 Night 6000
Call Girls In Dev kunj Delhi 9654467111 Short 1500 Night 6000Call Girls In Dev kunj Delhi 9654467111 Short 1500 Night 6000
Call Girls In Dev kunj Delhi 9654467111 Short 1500 Night 6000
 
The 15 Minute Breakdown: 2024 Beauty Marketing Study
The 15 Minute Breakdown: 2024 Beauty Marketing StudyThe 15 Minute Breakdown: 2024 Beauty Marketing Study
The 15 Minute Breakdown: 2024 Beauty Marketing Study
 
Indian Call Girl In Dubai #$# O5634O3O18 #$# Dubai Call Girl
Indian Call Girl In Dubai #$# O5634O3O18 #$# Dubai Call GirlIndian Call Girl In Dubai #$# O5634O3O18 #$# Dubai Call Girl
Indian Call Girl In Dubai #$# O5634O3O18 #$# Dubai Call Girl
 
The 15 Minute Breakdown: 2024 Beauty Marketing Study
The 15 Minute Breakdown: 2024 Beauty Marketing StudyThe 15 Minute Breakdown: 2024 Beauty Marketing Study
The 15 Minute Breakdown: 2024 Beauty Marketing Study
 
Best VIP Call Girls Noida Sector 50 Call Me: 8448380779
Best VIP Call Girls Noida Sector 50 Call Me: 8448380779Best VIP Call Girls Noida Sector 50 Call Me: 8448380779
Best VIP Call Girls Noida Sector 50 Call Me: 8448380779
 
Film= Dubai Call Girls O525547819 Call Girls Dubai Whsatapp
Film= Dubai Call Girls O525547819 Call Girls Dubai WhsatappFilm= Dubai Call Girls O525547819 Call Girls Dubai Whsatapp
Film= Dubai Call Girls O525547819 Call Girls Dubai Whsatapp
 
Dubai Call Girls O525547&19 (Asii) Call Girls Dubai
Dubai Call Girls O525547&19 (Asii) Call Girls DubaiDubai Call Girls O525547&19 (Asii) Call Girls Dubai
Dubai Call Girls O525547&19 (Asii) Call Girls Dubai
 
Top Rated Pune Call Girls Talegaon Dabhade ⟟ 6297143586 ⟟ Call Me For Genuin...
Top Rated  Pune Call Girls Talegaon Dabhade ⟟ 6297143586 ⟟ Call Me For Genuin...Top Rated  Pune Call Girls Talegaon Dabhade ⟟ 6297143586 ⟟ Call Me For Genuin...
Top Rated Pune Call Girls Talegaon Dabhade ⟟ 6297143586 ⟟ Call Me For Genuin...
 

Working Together to Build a Cyber Security Program

  • 1. 6/28/2017 1 Working Together to Build a Cyber Security Program David Johnston, Sr. Director, Loss Prevention & Corporate Security, Dunkin' Brands, Inc. Working Together to Build a Cyber Security Program David Johnston Dunkin’ Brands, Inc.
  • 2. 6/28/2017 2 Working Together to Build a Cyber Security Program • Understanding the Cyber Threat Landscape • Building stronger LP / IT Security Relationships • The Value of LP in a Cyber World • Malware • Ransomware • DDoS Attacks • Botnets • Phishing / Social Engineering • Insider Threats • 3rd Party Threat • Data Breaches – Data Loss • Business Disruption • Online / Mobile Fraud • Business Email Compromise • Loyalty Abuse And more… “Cybercrimes costs the global economy more than $450B” – CNBC.com “ Average cost to a US retailer for a successful cyber attack $15.4M” – Forbes “33% of customers will delay shopping at a retailer post data breach; 19% will stop shopping there altogether” - KPMG
  • 3. 6/28/2017 3 • 20,000+ restaurants in 62+ countries • 100% franchised environment • Highly visible brand recognition • Strong digital landscape – Mobile Application (with SVC payment) – Loyalty Program – Points/Coupons – Mobile and Online Ordering • Loyal customer base • Everything touches IT • IT Departments more role-specific • Help Desk • Data and Systems • IT Security • Applications (by Department) • IT Security engaged at higher level • Accreditations / Credentials • Gatekeepers of Control • “Protectors of the Brand” The Evolution of Information Technology Security
  • 4. 6/28/2017 4 Physical Security Loss Prevention Information Technology THEN NOW Physical Security Information Security With increased use of technology and data in regards to protecting assets, people and property, Physical Security and Information Security now have similar responsibilities How do we play well together to best protect a company? What role can we play as loss prevention? How does LP become part of the core team?
  • 5. 6/28/2017 5 Getting into the Discussions • Education & knowledge • Understand your environment • Build strong relationships • Engage IT in your world • Educate on your value • Educate ourselves • Cyber Security • Attack Methods • Prevention Techniques • Applications (by Department) • Understand Your/The Environment • What is happening now? • How does it affect your company? • How could your team help? Education is a must!
  • 6. 6/28/2017 6 • Include IT in your world • Investigative Support • Corporate Security Support • Planning Sessions • Tabletop Exercises • Explain how LP can assist IT • Systems and Technologies • Resources & Process • Connections Build Partnerships with IT March / April 2017 LP’s Role in a Cyber Security Program Physical Security System Management Investigative Process / Deductive Reasoning Interviewing Skills Auditing / Evidence Collection Law Enforcement Engagement
  • 7. 6/28/2017 7 LP’s Role in a Cyber Security Program • Security System Review • Access & CCTV Systems • Lead Physical Loss Events • Evidence Collection • Interviewing Suspects • Insider Threat Assessment • Auditing / System Checks • Store Incidents & Events • Provide Contacts • Assistance for/by LE Law Enforcement Engagement Field Support Investigative SupportPhysical Security Assistance Interviewing Skills What role do you play? • Do you have a copy of your company’s cybersecurity program? • Is your function listed as a role within the program? • Are you engaged in tabletop exercises related to cyber/data security? • Are you called upon when an incident or event occurs?
  • 8. 6/28/2017 8 Working Together to Build a Cyber Security Program • Cyber Threats will continue to increase and cause retail business loss • LP/Security professionals need to educate ourselves and talk more frequently about these threats/loss • LP/Security has a role and should be a core member of the program Resources Groups • Infragard (FBI/DHS public-private community) • HSIN (Homeland Security Information Network) • DSAC (FBI public-private CSO group) • Search Cybersecurity Associations THANK YOU FOR YOUR TIME Send Email with Subject Line: Cyber Resources To david.johnston@dunkinbrands.com Resources • Infosecurity-magazine.com • CSO Online • ASIS (store – books and publications) • SANS Institute • Online Training (search cybersecurity classes)