SlideShare uma empresa Scribd logo
1 de 26
“Expand Your Horizons” Webinar Series
Cyber Security: Threat and Prevention
February 24, 2015 1:00 – 1:45pm
The Webinar will begin shortly. You can ask
a question in the box on the right hand
side. We will answer them during our Q&A
at the end of the webinar.
2
Cyber Threats and the
Government of Canada
CSE Mandate: National Defence Act
3
Provide advice, guidance
and services to help
ensure the protection of
information and
information systems of
importance to the GC
PART B
PART A
Provide foreign
intelligence in
accordance with
government priorities
PART C
Provide technical
assistance to law
enforcement and
national security
What is the GC Protecting ?
4
Banking & Finance
Border Services & Immigration
Government Administration
Health
Industry & Business Development
International Affairs, Trade & Development
Legal
Natural Resources,
Energy & Environment
Security, Intelligence &
Defence
Social & Cultural
Development
Transportation
GC Cyber Activity in 2014 by Sector
Canadian Personal Information
Trade Secrets
New Technologies
Negotiating Strategies
Natural resources information
Access to everything
What are Threat Actors after?
What are the Threats?
5
State-sponsored threat actors
Foreign intelligence services tasked to collect
intelligence and/or disrupt Canadian services.
Cybercriminals
Criminals that use malware and other programs to
either steal information or coerce others to pay
them for illegitimate reasons (ransomware).
Hacktivists
Political and/or social activists that use computers
or computer networks to channel their message or
prove a point.
Script kiddies
Individuals or groups that target GC and other
organizations for the fun of it, or compete to see
who can cause the most damage.
What are the risks
6
Reputational/Trust
Business Continuity
Financial Impact
Information Loss/Damage
No quick fix for cyber security.
There are a number of mitigation measures you can undertake to significantly hinder
threat actors.
• Patching:
• Operating system;
• Applications;
• Till you can patch no more!
Patching Challenges:
• Timeliness/Costs
• Various versions : operating systems & Internet browsers.
Current malicious activity that could be prevented with
patching:
• 2010 & 2012 Common Vulnerabilities and Exposures (CVEs)
• Every compromise in 2013!
Preventing a Compromise - Patching
7
Cyber security does not stop with patching.
Proactively prepare.
Cyber threat actors will gain access.
Harden your networks:
• design your network and system efficiently;
• know where certain applications are in use;
• apply network segmentation in security zones to protect
sensitive information;
• consolidate Internet access points; and,
• other best practices.
Anticipating a Compromise
8
Shared Services Canada
A Team Sport
9
IT security teams across
the Government of Canada
Public Safety
Canadian
private sector
Canadian industry
IT vendors
Working together is key!
Understand your network and information is
constantly targeted;
Be aware of cyber threat actors and their
methods;
Top 10 Mitigation Measures
IN CONCLUSION:
Cyber threat activity is here to stay;
Compromises and vulnerabilities will increasingly be publicized –
Don’t make the headlines for the wrong reasons; and,
Anticipating compromises is just as important as preventing them.
Where from Here?
10
Ewan Willars
Tuesday 24 February
Cybersecurity:
The challenge for
finance
©ACCA
Cybersecurity: a frontline issue for finance
All organizations need to:
1. understand the nature and
likelihood of cyber-threats
2. identify, assess and mitigate
existing and emerging risks
3. implement and maintain strong
controls and policies to govern
data privacy and security
4. educate users on emerging
risks, such as those associated
with mobile technology
5. plan for increasing complexity,
and
6. make technological risk an
executive-level concern.
©ACCA
Global drivers of change for the profession:
short term (2013)
4.2
4.4
4.6
4.8
5
5.2
5.4
5.6
Public sector Corporates (large) Corporates
(small/medium)
Fuel and Energy
Prices
Cybersecurity
Challenges
Corporate
Governance
Regulation
Meanscore
©ACCA
Percentage of accountants concerned with risks
associated with cybercrime
©ACCA
The changing role of finance:
increasing cyber-risks?
Supporting
strategic direction
and creating value
Traditional control &
stewardship
responsibilities
Emergence of big data
and the data-driven
organization
Extracting insights
and value from data
Data management,
security and
assurance
©ACCA
The future: data-driven finance function
A data-driven finance department has the following
objectives:
• provide data leadership across the organization
• improve decision making across finance and other
functional areas
• manage the ever-increasing regulatory reporting
requirements
• enhance control and risk management capabilities
• improving cost efficiency and lowering the cost-to-serve.
©ACCA
The current state of play
Data challenges
Internal data
Supply
chain data
Customer
data
Poor data
integration
Reporting
funnels
©ACCA
The data-driven organization
New risks or greater resilience?
ERP
General
ledger
Unified Data
Ecosystem
• Create a unified approach
to data across the
organization
• Develop data strategy and
architecture in tandem
• Create a consistent view of
data across departments
• Improve transparency
between reported financial
results, big data analytics
and supporting transaction
detail
©ACCA
What does this mean for public sector
organisations?
• Organised attacks vs low level threats? Get the fundamentals
right!
• Big data is increasing risks and presenting new challenges –
but the opportunities for public organisations are enormous
• Centralised solutions should offer efficiency and greater
protection – but the impact of risks become more severe
• Not just an IT and technology issue. It is a board-level issue
and finance should be at the forefront
• Understand the implications of social tech, mobile and cloud
• Awareness of the issues needs to be turned into action and
leadership
©ACCA
Future challenges
• The internet of things and the growing volume and complexity
of data
• Regulation and public concerns – blurring between public and
private data
• More sophisticated attacks are innevitable
• Need for international collaboration
©ACCA
Find out more…?
DIGITAL
DARWINISM:
Thriving in the face of
technology change
100 DRIVERS OF
CHANGE for the
global accountancy
profession
BIG DATA:
Its power and perils
Enhancing competitive
advantage through
analytical insights
Are you unlocking the
value of your data?
Questions and Answers
Be sure to tune in to our next webinar!
• “A Conversation with the New Auditor General of Nova Scotia”
• Presenter: Michael Pickup – Auditor General of Nova Scotia
• Thursday, March 12 from 12:00 – 1:00pm EDT
• Register at www.fmi.ca/events/webinars
26

Mais conteúdo relacionado

Mais procurados

Cyber security
Cyber securityCyber security
Cyber securitymanoj duli
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITYAhmed Moussa
 
Cyber threats
Cyber threatsCyber threats
Cyber threatskelsports
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amosAmos Oyoo
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligencemohamed nasri
 
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...PECB
 
IT Security management and risk assessment
IT Security management and risk assessmentIT Security management and risk assessment
IT Security management and risk assessmentCAS
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in SocietyRubal Sagwal
 
Introduction to cyber security
Introduction to cyber security Introduction to cyber security
Introduction to cyber security RaviPrashant5
 
cyber security presentation.pptx
cyber security presentation.pptxcyber security presentation.pptx
cyber security presentation.pptxkishore golla
 
Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]David Sweigert
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detectionCAS
 
The New Pentest? Rise of the Compromise Assessment
The New Pentest? Rise of the Compromise AssessmentThe New Pentest? Rise of the Compromise Assessment
The New Pentest? Rise of the Compromise AssessmentInfocyte
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber securityAnimesh Roy
 

Mais procurados (20)

Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
MITRE ATT&CK Framework
MITRE ATT&CK FrameworkMITRE ATT&CK Framework
MITRE ATT&CK Framework
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security ppt
Cyber security pptCyber security ppt
Cyber security ppt
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITY
 
Cyber threats
Cyber threatsCyber threats
Cyber threats
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amos
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
 
IT Security management and risk assessment
IT Security management and risk assessmentIT Security management and risk assessment
IT Security management and risk assessment
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
 
Introduction to cyber security
Introduction to cyber security Introduction to cyber security
Introduction to cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
cyber security presentation.pptx
cyber security presentation.pptxcyber security presentation.pptx
cyber security presentation.pptx
 
Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detection
 
The New Pentest? Rise of the Compromise Assessment
The New Pentest? Rise of the Compromise AssessmentThe New Pentest? Rise of the Compromise Assessment
The New Pentest? Rise of the Compromise Assessment
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
 

Semelhante a Cyber Security: Threat and Prevention

Cybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 Trends
Cybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 TrendsCybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 Trends
Cybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 TrendsIvanti
 
A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...Judith Beckhard Cardoso
 
Cyber security general perspective a
Cyber security general perspective aCyber security general perspective a
Cyber security general perspective amarukanda
 
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY IndiaGet Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY IndiaRahul Neel Mani
 
MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?Kurt Hagerman
 
CTEK Cyber Briefing - April 2022.pptx
CTEK Cyber Briefing - April 2022.pptxCTEK Cyber Briefing - April 2022.pptx
CTEK Cyber Briefing - April 2022.pptxSophia Price
 
CynergisTek Cyber Briefing April 2022
CynergisTek Cyber Briefing April 2022CynergisTek Cyber Briefing April 2022
CynergisTek Cyber Briefing April 2022SophiaPalmira1
 
7th ERM - S2 - Cyber security, Cyber Risk and Data Privacy - Kalpesh Doshi (1...
7th ERM - S2 - Cyber security, Cyber Risk and Data Privacy - Kalpesh Doshi (1...7th ERM - S2 - Cyber security, Cyber Risk and Data Privacy - Kalpesh Doshi (1...
7th ERM - S2 - Cyber security, Cyber Risk and Data Privacy - Kalpesh Doshi (1...TraintechTde
 
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Cristian Garcia G.
 
David doughty presentation 181119
David doughty presentation 181119David doughty presentation 181119
David doughty presentation 181119David Doughty
 
NextLevel Cyber Security Executive Briefing
NextLevel Cyber Security Executive BriefingNextLevel Cyber Security Executive Briefing
NextLevel Cyber Security Executive BriefingJoe Nathans
 
Top 10 Cybersecurity Predictions for 2015
Top 10 Cybersecurity Predictions for 2015Top 10 Cybersecurity Predictions for 2015
Top 10 Cybersecurity Predictions for 2015Matthew Rosenquist
 
Securing Fintech: Threats, Challenges & Best Practices
Securing Fintech: Threats, Challenges & Best PracticesSecuring Fintech: Threats, Challenges & Best Practices
Securing Fintech: Threats, Challenges & Best PracticesUlf Mattsson
 
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...WCIT 2014
 
protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...
protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...
protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...James Fisher
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsUlf Mattsson
 
Your organization is at risk! Upgrade your IT security & IT governance now.
Your organization is at risk! Upgrade your IT security & IT governance now.Your organization is at risk! Upgrade your IT security & IT governance now.
Your organization is at risk! Upgrade your IT security & IT governance now.Cyril Soeri
 
Cyber Security - Things you need to know
Cyber Security - Things you need to knowCyber Security - Things you need to know
Cyber Security - Things you need to knowNathan Desfontaines
 

Semelhante a Cyber Security: Threat and Prevention (20)

Cybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 Trends
Cybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 TrendsCybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 Trends
Cybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 Trends
 
A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...
 
Cyber security general perspective a
Cyber security general perspective aCyber security general perspective a
Cyber security general perspective a
 
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY IndiaGet Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
 
MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
CTEK Cyber Briefing - April 2022.pptx
CTEK Cyber Briefing - April 2022.pptxCTEK Cyber Briefing - April 2022.pptx
CTEK Cyber Briefing - April 2022.pptx
 
CynergisTek Cyber Briefing April 2022
CynergisTek Cyber Briefing April 2022CynergisTek Cyber Briefing April 2022
CynergisTek Cyber Briefing April 2022
 
7th ERM - S2 - Cyber security, Cyber Risk and Data Privacy - Kalpesh Doshi (1...
7th ERM - S2 - Cyber security, Cyber Risk and Data Privacy - Kalpesh Doshi (1...7th ERM - S2 - Cyber security, Cyber Risk and Data Privacy - Kalpesh Doshi (1...
7th ERM - S2 - Cyber security, Cyber Risk and Data Privacy - Kalpesh Doshi (1...
 
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
 
David doughty presentation 181119
David doughty presentation 181119David doughty presentation 181119
David doughty presentation 181119
 
NextLevel Cyber Security Executive Briefing
NextLevel Cyber Security Executive BriefingNextLevel Cyber Security Executive Briefing
NextLevel Cyber Security Executive Briefing
 
Top 10 Cybersecurity Predictions for 2015
Top 10 Cybersecurity Predictions for 2015Top 10 Cybersecurity Predictions for 2015
Top 10 Cybersecurity Predictions for 2015
 
Securing Fintech: Threats, Challenges & Best Practices
Securing Fintech: Threats, Challenges & Best PracticesSecuring Fintech: Threats, Challenges & Best Practices
Securing Fintech: Threats, Challenges & Best Practices
 
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
 
ISACA ISSA Presentation
ISACA ISSA PresentationISACA ISSA Presentation
ISACA ISSA Presentation
 
protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...
protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...
protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & Recommendations
 
Your organization is at risk! Upgrade your IT security & IT governance now.
Your organization is at risk! Upgrade your IT security & IT governance now.Your organization is at risk! Upgrade your IT security & IT governance now.
Your organization is at risk! Upgrade your IT security & IT governance now.
 
Cyber Security - Things you need to know
Cyber Security - Things you need to knowCyber Security - Things you need to know
Cyber Security - Things you need to know
 

Mais de fmi_igf

''Lean'' for Internal Audit
''Lean'' for Internal Audit''Lean'' for Internal Audit
''Lean'' for Internal Auditfmi_igf
 
PPX-FMI January 26, 2016 Learning Event
PPX-FMI January 26, 2016 Learning EventPPX-FMI January 26, 2016 Learning Event
PPX-FMI January 26, 2016 Learning Eventfmi_igf
 
Costing Centre of Expertise
Costing Centre of ExpertiseCosting Centre of Expertise
Costing Centre of Expertisefmi_igf
 
Operational Capacity Analysis
Operational Capacity AnalysisOperational Capacity Analysis
Operational Capacity Analysisfmi_igf
 
Operational Costing and Capacity Management
Operational Costing and Capacity ManagementOperational Costing and Capacity Management
Operational Costing and Capacity Managementfmi_igf
 
Big data roundtabe intro - canada
Big data roundtabe intro - canadaBig data roundtabe intro - canada
Big data roundtabe intro - canadafmi_igf
 
Communication pendant un conflit
Communication pendant un conflitCommunication pendant un conflit
Communication pendant un conflitfmi_igf
 
Communication durant
Communication durant Communication durant
Communication durant fmi_igf
 
Full Slide Deck
Full Slide DeckFull Slide Deck
Full Slide Deckfmi_igf
 
Webinar slides 2014-12-11
Webinar slides 2014-12-11Webinar slides 2014-12-11
Webinar slides 2014-12-11fmi_igf
 
New Brunswick's Public Service: Pursuing Performance Excellence
New Brunswick's Public Service: Pursuing Performance ExcellenceNew Brunswick's Public Service: Pursuing Performance Excellence
New Brunswick's Public Service: Pursuing Performance Excellencefmi_igf
 
Performance Alignment: Linking Resource Management to Organizational Goals
Performance Alignment: Linking Resource Management to Organizational GoalsPerformance Alignment: Linking Resource Management to Organizational Goals
Performance Alignment: Linking Resource Management to Organizational Goalsfmi_igf
 
Gestion Du Changement
Gestion Du ChangementGestion Du Changement
Gestion Du Changementfmi_igf
 
L'attestation des Dirigeants principals des finances
L'attestation des Dirigeants principals des finances L'attestation des Dirigeants principals des finances
L'attestation des Dirigeants principals des finances fmi_igf
 
Reflections from an International Financial Management Professional
Reflections from an International Financial Management ProfessionalReflections from an International Financial Management Professional
Reflections from an International Financial Management Professionalfmi_igf
 
Identity Theft: Fallout, Investigation, and Prevention
Identity Theft: Fallout, Investigation, and PreventionIdentity Theft: Fallout, Investigation, and Prevention
Identity Theft: Fallout, Investigation, and Preventionfmi_igf
 
Chief Financial Officer Attestation
Chief Financial Officer AttestationChief Financial Officer Attestation
Chief Financial Officer Attestationfmi_igf
 
Change Management
Change ManagementChange Management
Change Managementfmi_igf
 
Fraud in the Public Sector
Fraud in the Public SectorFraud in the Public Sector
Fraud in the Public Sectorfmi_igf
 
2014-10 The Millenial Career Shift
2014-10 The Millenial Career Shift2014-10 The Millenial Career Shift
2014-10 The Millenial Career Shiftfmi_igf
 

Mais de fmi_igf (20)

''Lean'' for Internal Audit
''Lean'' for Internal Audit''Lean'' for Internal Audit
''Lean'' for Internal Audit
 
PPX-FMI January 26, 2016 Learning Event
PPX-FMI January 26, 2016 Learning EventPPX-FMI January 26, 2016 Learning Event
PPX-FMI January 26, 2016 Learning Event
 
Costing Centre of Expertise
Costing Centre of ExpertiseCosting Centre of Expertise
Costing Centre of Expertise
 
Operational Capacity Analysis
Operational Capacity AnalysisOperational Capacity Analysis
Operational Capacity Analysis
 
Operational Costing and Capacity Management
Operational Costing and Capacity ManagementOperational Costing and Capacity Management
Operational Costing and Capacity Management
 
Big data roundtabe intro - canada
Big data roundtabe intro - canadaBig data roundtabe intro - canada
Big data roundtabe intro - canada
 
Communication pendant un conflit
Communication pendant un conflitCommunication pendant un conflit
Communication pendant un conflit
 
Communication durant
Communication durant Communication durant
Communication durant
 
Full Slide Deck
Full Slide DeckFull Slide Deck
Full Slide Deck
 
Webinar slides 2014-12-11
Webinar slides 2014-12-11Webinar slides 2014-12-11
Webinar slides 2014-12-11
 
New Brunswick's Public Service: Pursuing Performance Excellence
New Brunswick's Public Service: Pursuing Performance ExcellenceNew Brunswick's Public Service: Pursuing Performance Excellence
New Brunswick's Public Service: Pursuing Performance Excellence
 
Performance Alignment: Linking Resource Management to Organizational Goals
Performance Alignment: Linking Resource Management to Organizational GoalsPerformance Alignment: Linking Resource Management to Organizational Goals
Performance Alignment: Linking Resource Management to Organizational Goals
 
Gestion Du Changement
Gestion Du ChangementGestion Du Changement
Gestion Du Changement
 
L'attestation des Dirigeants principals des finances
L'attestation des Dirigeants principals des finances L'attestation des Dirigeants principals des finances
L'attestation des Dirigeants principals des finances
 
Reflections from an International Financial Management Professional
Reflections from an International Financial Management ProfessionalReflections from an International Financial Management Professional
Reflections from an International Financial Management Professional
 
Identity Theft: Fallout, Investigation, and Prevention
Identity Theft: Fallout, Investigation, and PreventionIdentity Theft: Fallout, Investigation, and Prevention
Identity Theft: Fallout, Investigation, and Prevention
 
Chief Financial Officer Attestation
Chief Financial Officer AttestationChief Financial Officer Attestation
Chief Financial Officer Attestation
 
Change Management
Change ManagementChange Management
Change Management
 
Fraud in the Public Sector
Fraud in the Public SectorFraud in the Public Sector
Fraud in the Public Sector
 
2014-10 The Millenial Career Shift
2014-10 The Millenial Career Shift2014-10 The Millenial Career Shift
2014-10 The Millenial Career Shift
 

Último

Call Girls Near Surya International Hotel New Delhi 9873777170
Call Girls Near Surya International Hotel New Delhi 9873777170Call Girls Near Surya International Hotel New Delhi 9873777170
Call Girls Near Surya International Hotel New Delhi 9873777170Sonam Pathan
 
history of 1935 philippine constitution.pptx
history of 1935 philippine constitution.pptxhistory of 1935 philippine constitution.pptx
history of 1935 philippine constitution.pptxhellokittymaearciaga
 
In credit? Assessing where Universal Credit’s long rollout has left the benef...
In credit? Assessing where Universal Credit’s long rollout has left the benef...In credit? Assessing where Universal Credit’s long rollout has left the benef...
In credit? Assessing where Universal Credit’s long rollout has left the benef...ResolutionFoundation
 
办理约克大学毕业证成绩单|购买加拿大文凭证书
办理约克大学毕业证成绩单|购买加拿大文凭证书办理约克大学毕业证成绩单|购买加拿大文凭证书
办理约克大学毕业证成绩单|购买加拿大文凭证书zdzoqco
 
2024: The FAR, Federal Acquisition Regulations - Part 26
2024: The FAR, Federal Acquisition Regulations - Part 262024: The FAR, Federal Acquisition Regulations - Part 26
2024: The FAR, Federal Acquisition Regulations - Part 26JSchaus & Associates
 
WORLD CREATIVITY AND INNOVATION DAY 2024.
WORLD CREATIVITY AND INNOVATION DAY 2024.WORLD CREATIVITY AND INNOVATION DAY 2024.
WORLD CREATIVITY AND INNOVATION DAY 2024.Christina Parmionova
 
call girls in Punjabi Bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Punjabi Bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Punjabi Bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Punjabi Bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️saminamagar
 
Yellow is My Favorite Color By Annabelle.pdf
Yellow is My Favorite Color By Annabelle.pdfYellow is My Favorite Color By Annabelle.pdf
Yellow is My Favorite Color By Annabelle.pdfAmir Saranga
 
Stop throwing your old clothes and start donating
Stop throwing your old clothes and start donatingStop throwing your old clothes and start donating
Stop throwing your old clothes and start donatingSERUDS INDIA
 
YHR Fall 2023 Issue (Joseph Manning Interview) (2).pdf
YHR Fall 2023 Issue (Joseph Manning Interview) (2).pdfYHR Fall 2023 Issue (Joseph Manning Interview) (2).pdf
YHR Fall 2023 Issue (Joseph Manning Interview) (2).pdfyalehistoricalreview
 
call girls in DLF Phase 1 gurgaon 🔝 >༒9540349809 🔝 genuine Escort Service 🔝...
call girls in DLF Phase 1  gurgaon  🔝 >༒9540349809 🔝 genuine Escort Service 🔝...call girls in DLF Phase 1  gurgaon  🔝 >༒9540349809 🔝 genuine Escort Service 🔝...
call girls in DLF Phase 1 gurgaon 🔝 >༒9540349809 🔝 genuine Escort Service 🔝...saminamagar
 
Madurai Call Girls 7001305949 WhatsApp Number 24x7 Best Services
Madurai Call Girls 7001305949 WhatsApp Number 24x7 Best ServicesMadurai Call Girls 7001305949 WhatsApp Number 24x7 Best Services
Madurai Call Girls 7001305949 WhatsApp Number 24x7 Best Servicesnajka9823
 
Press Freedom in Europe - Time to turn the tide.
Press Freedom in Europe - Time to turn the tide.Press Freedom in Europe - Time to turn the tide.
Press Freedom in Europe - Time to turn the tide.Christina Parmionova
 
Monastic-Supremacy-in-the-Philippines-_20240328_092725_0000.pdf
Monastic-Supremacy-in-the-Philippines-_20240328_092725_0000.pdfMonastic-Supremacy-in-the-Philippines-_20240328_092725_0000.pdf
Monastic-Supremacy-in-the-Philippines-_20240328_092725_0000.pdfCharlynTorres1
 
Call Girl Benson Town - Phone No 7001305949 For Ultimate Sexual Urges
Call Girl Benson Town - Phone No 7001305949 For Ultimate Sexual UrgesCall Girl Benson Town - Phone No 7001305949 For Ultimate Sexual Urges
Call Girl Benson Town - Phone No 7001305949 For Ultimate Sexual Urgesnarwatsonia7
 
call girls in Mukherjee Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝...
call girls in Mukherjee Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝...call girls in Mukherjee Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝...
call girls in Mukherjee Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝...saminamagar
 
Powering Britain: Can we decarbonise electricity without disadvantaging poore...
Powering Britain: Can we decarbonise electricity without disadvantaging poore...Powering Britain: Can we decarbonise electricity without disadvantaging poore...
Powering Britain: Can we decarbonise electricity without disadvantaging poore...ResolutionFoundation
 
Angels_EDProgrammes & Services 2024.pptx
Angels_EDProgrammes & Services 2024.pptxAngels_EDProgrammes & Services 2024.pptx
Angels_EDProgrammes & Services 2024.pptxLizelle Coombs
 
If there is a Hell on Earth, it is the Lives of Children in Gaza.pdf
If there is a Hell on Earth, it is the Lives of Children in Gaza.pdfIf there is a Hell on Earth, it is the Lives of Children in Gaza.pdf
If there is a Hell on Earth, it is the Lives of Children in Gaza.pdfKatrina Sriranpong
 
Panet vs.Plastics - Earth Day 2024 - 22 APRIL
Panet vs.Plastics - Earth Day 2024 - 22 APRILPanet vs.Plastics - Earth Day 2024 - 22 APRIL
Panet vs.Plastics - Earth Day 2024 - 22 APRILChristina Parmionova
 

Último (20)

Call Girls Near Surya International Hotel New Delhi 9873777170
Call Girls Near Surya International Hotel New Delhi 9873777170Call Girls Near Surya International Hotel New Delhi 9873777170
Call Girls Near Surya International Hotel New Delhi 9873777170
 
history of 1935 philippine constitution.pptx
history of 1935 philippine constitution.pptxhistory of 1935 philippine constitution.pptx
history of 1935 philippine constitution.pptx
 
In credit? Assessing where Universal Credit’s long rollout has left the benef...
In credit? Assessing where Universal Credit’s long rollout has left the benef...In credit? Assessing where Universal Credit’s long rollout has left the benef...
In credit? Assessing where Universal Credit’s long rollout has left the benef...
 
办理约克大学毕业证成绩单|购买加拿大文凭证书
办理约克大学毕业证成绩单|购买加拿大文凭证书办理约克大学毕业证成绩单|购买加拿大文凭证书
办理约克大学毕业证成绩单|购买加拿大文凭证书
 
2024: The FAR, Federal Acquisition Regulations - Part 26
2024: The FAR, Federal Acquisition Regulations - Part 262024: The FAR, Federal Acquisition Regulations - Part 26
2024: The FAR, Federal Acquisition Regulations - Part 26
 
WORLD CREATIVITY AND INNOVATION DAY 2024.
WORLD CREATIVITY AND INNOVATION DAY 2024.WORLD CREATIVITY AND INNOVATION DAY 2024.
WORLD CREATIVITY AND INNOVATION DAY 2024.
 
call girls in Punjabi Bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Punjabi Bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Punjabi Bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Punjabi Bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
 
Yellow is My Favorite Color By Annabelle.pdf
Yellow is My Favorite Color By Annabelle.pdfYellow is My Favorite Color By Annabelle.pdf
Yellow is My Favorite Color By Annabelle.pdf
 
Stop throwing your old clothes and start donating
Stop throwing your old clothes and start donatingStop throwing your old clothes and start donating
Stop throwing your old clothes and start donating
 
YHR Fall 2023 Issue (Joseph Manning Interview) (2).pdf
YHR Fall 2023 Issue (Joseph Manning Interview) (2).pdfYHR Fall 2023 Issue (Joseph Manning Interview) (2).pdf
YHR Fall 2023 Issue (Joseph Manning Interview) (2).pdf
 
call girls in DLF Phase 1 gurgaon 🔝 >༒9540349809 🔝 genuine Escort Service 🔝...
call girls in DLF Phase 1  gurgaon  🔝 >༒9540349809 🔝 genuine Escort Service 🔝...call girls in DLF Phase 1  gurgaon  🔝 >༒9540349809 🔝 genuine Escort Service 🔝...
call girls in DLF Phase 1 gurgaon 🔝 >༒9540349809 🔝 genuine Escort Service 🔝...
 
Madurai Call Girls 7001305949 WhatsApp Number 24x7 Best Services
Madurai Call Girls 7001305949 WhatsApp Number 24x7 Best ServicesMadurai Call Girls 7001305949 WhatsApp Number 24x7 Best Services
Madurai Call Girls 7001305949 WhatsApp Number 24x7 Best Services
 
Press Freedom in Europe - Time to turn the tide.
Press Freedom in Europe - Time to turn the tide.Press Freedom in Europe - Time to turn the tide.
Press Freedom in Europe - Time to turn the tide.
 
Monastic-Supremacy-in-the-Philippines-_20240328_092725_0000.pdf
Monastic-Supremacy-in-the-Philippines-_20240328_092725_0000.pdfMonastic-Supremacy-in-the-Philippines-_20240328_092725_0000.pdf
Monastic-Supremacy-in-the-Philippines-_20240328_092725_0000.pdf
 
Call Girl Benson Town - Phone No 7001305949 For Ultimate Sexual Urges
Call Girl Benson Town - Phone No 7001305949 For Ultimate Sexual UrgesCall Girl Benson Town - Phone No 7001305949 For Ultimate Sexual Urges
Call Girl Benson Town - Phone No 7001305949 For Ultimate Sexual Urges
 
call girls in Mukherjee Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝...
call girls in Mukherjee Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝...call girls in Mukherjee Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝...
call girls in Mukherjee Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝...
 
Powering Britain: Can we decarbonise electricity without disadvantaging poore...
Powering Britain: Can we decarbonise electricity without disadvantaging poore...Powering Britain: Can we decarbonise electricity without disadvantaging poore...
Powering Britain: Can we decarbonise electricity without disadvantaging poore...
 
Angels_EDProgrammes & Services 2024.pptx
Angels_EDProgrammes & Services 2024.pptxAngels_EDProgrammes & Services 2024.pptx
Angels_EDProgrammes & Services 2024.pptx
 
If there is a Hell on Earth, it is the Lives of Children in Gaza.pdf
If there is a Hell on Earth, it is the Lives of Children in Gaza.pdfIf there is a Hell on Earth, it is the Lives of Children in Gaza.pdf
If there is a Hell on Earth, it is the Lives of Children in Gaza.pdf
 
Panet vs.Plastics - Earth Day 2024 - 22 APRIL
Panet vs.Plastics - Earth Day 2024 - 22 APRILPanet vs.Plastics - Earth Day 2024 - 22 APRIL
Panet vs.Plastics - Earth Day 2024 - 22 APRIL
 

Cyber Security: Threat and Prevention

  • 1. “Expand Your Horizons” Webinar Series Cyber Security: Threat and Prevention February 24, 2015 1:00 – 1:45pm The Webinar will begin shortly. You can ask a question in the box on the right hand side. We will answer them during our Q&A at the end of the webinar.
  • 2. 2 Cyber Threats and the Government of Canada
  • 3. CSE Mandate: National Defence Act 3 Provide advice, guidance and services to help ensure the protection of information and information systems of importance to the GC PART B PART A Provide foreign intelligence in accordance with government priorities PART C Provide technical assistance to law enforcement and national security
  • 4. What is the GC Protecting ? 4 Banking & Finance Border Services & Immigration Government Administration Health Industry & Business Development International Affairs, Trade & Development Legal Natural Resources, Energy & Environment Security, Intelligence & Defence Social & Cultural Development Transportation GC Cyber Activity in 2014 by Sector Canadian Personal Information Trade Secrets New Technologies Negotiating Strategies Natural resources information Access to everything What are Threat Actors after?
  • 5. What are the Threats? 5 State-sponsored threat actors Foreign intelligence services tasked to collect intelligence and/or disrupt Canadian services. Cybercriminals Criminals that use malware and other programs to either steal information or coerce others to pay them for illegitimate reasons (ransomware). Hacktivists Political and/or social activists that use computers or computer networks to channel their message or prove a point. Script kiddies Individuals or groups that target GC and other organizations for the fun of it, or compete to see who can cause the most damage.
  • 6. What are the risks 6 Reputational/Trust Business Continuity Financial Impact Information Loss/Damage
  • 7. No quick fix for cyber security. There are a number of mitigation measures you can undertake to significantly hinder threat actors. • Patching: • Operating system; • Applications; • Till you can patch no more! Patching Challenges: • Timeliness/Costs • Various versions : operating systems & Internet browsers. Current malicious activity that could be prevented with patching: • 2010 & 2012 Common Vulnerabilities and Exposures (CVEs) • Every compromise in 2013! Preventing a Compromise - Patching 7
  • 8. Cyber security does not stop with patching. Proactively prepare. Cyber threat actors will gain access. Harden your networks: • design your network and system efficiently; • know where certain applications are in use; • apply network segmentation in security zones to protect sensitive information; • consolidate Internet access points; and, • other best practices. Anticipating a Compromise 8
  • 9. Shared Services Canada A Team Sport 9 IT security teams across the Government of Canada Public Safety Canadian private sector Canadian industry IT vendors Working together is key!
  • 10. Understand your network and information is constantly targeted; Be aware of cyber threat actors and their methods; Top 10 Mitigation Measures IN CONCLUSION: Cyber threat activity is here to stay; Compromises and vulnerabilities will increasingly be publicized – Don’t make the headlines for the wrong reasons; and, Anticipating compromises is just as important as preventing them. Where from Here? 10
  • 11. Ewan Willars Tuesday 24 February Cybersecurity: The challenge for finance
  • 12. ©ACCA Cybersecurity: a frontline issue for finance All organizations need to: 1. understand the nature and likelihood of cyber-threats 2. identify, assess and mitigate existing and emerging risks 3. implement and maintain strong controls and policies to govern data privacy and security 4. educate users on emerging risks, such as those associated with mobile technology 5. plan for increasing complexity, and 6. make technological risk an executive-level concern.
  • 13. ©ACCA Global drivers of change for the profession: short term (2013) 4.2 4.4 4.6 4.8 5 5.2 5.4 5.6 Public sector Corporates (large) Corporates (small/medium) Fuel and Energy Prices Cybersecurity Challenges Corporate Governance Regulation Meanscore
  • 14. ©ACCA Percentage of accountants concerned with risks associated with cybercrime
  • 15. ©ACCA The changing role of finance: increasing cyber-risks? Supporting strategic direction and creating value Traditional control & stewardship responsibilities Emergence of big data and the data-driven organization Extracting insights and value from data Data management, security and assurance
  • 16. ©ACCA The future: data-driven finance function A data-driven finance department has the following objectives: • provide data leadership across the organization • improve decision making across finance and other functional areas • manage the ever-increasing regulatory reporting requirements • enhance control and risk management capabilities • improving cost efficiency and lowering the cost-to-serve.
  • 17. ©ACCA The current state of play Data challenges Internal data Supply chain data Customer data Poor data integration Reporting funnels
  • 18. ©ACCA The data-driven organization New risks or greater resilience? ERP General ledger Unified Data Ecosystem • Create a unified approach to data across the organization • Develop data strategy and architecture in tandem • Create a consistent view of data across departments • Improve transparency between reported financial results, big data analytics and supporting transaction detail
  • 19. ©ACCA What does this mean for public sector organisations? • Organised attacks vs low level threats? Get the fundamentals right! • Big data is increasing risks and presenting new challenges – but the opportunities for public organisations are enormous • Centralised solutions should offer efficiency and greater protection – but the impact of risks become more severe • Not just an IT and technology issue. It is a board-level issue and finance should be at the forefront • Understand the implications of social tech, mobile and cloud • Awareness of the issues needs to be turned into action and leadership
  • 20. ©ACCA Future challenges • The internet of things and the growing volume and complexity of data • Regulation and public concerns – blurring between public and private data • More sophisticated attacks are innevitable • Need for international collaboration
  • 22. DIGITAL DARWINISM: Thriving in the face of technology change
  • 23. 100 DRIVERS OF CHANGE for the global accountancy profession
  • 24. BIG DATA: Its power and perils
  • 25. Enhancing competitive advantage through analytical insights Are you unlocking the value of your data?
  • 26. Questions and Answers Be sure to tune in to our next webinar! • “A Conversation with the New Auditor General of Nova Scotia” • Presenter: Michael Pickup – Auditor General of Nova Scotia • Thursday, March 12 from 12:00 – 1:00pm EDT • Register at www.fmi.ca/events/webinars 26