cyber security - pwc · cyber security building con˜dence in your digital future 7 cyber security...

12
Cyber security Building confidence in your digital future www.pwc.co.uk November 2013

Upload: others

Post on 27-Apr-2020

5 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Cyber security - PwC · Cyber Security Building con˜dence in your digital future 7 Cyber security at the heart of your business Cyber security isn’t just about technology. It also

Cyber securityBuilding confidence in your digital future

www.pwc.co.uk

November 2013

Page 2: Cyber security - PwC · Cyber Security Building con˜dence in your digital future 7 Cyber security at the heart of your business Cyber security isn’t just about technology. It also

Contents1 Confidenceinyourdigitalfuture

2 Our point of view

3 Buildingconfidence

4 Our services

Page 3: Cyber security - PwC · Cyber Security Building con˜dence in your digital future 7 Cyber security at the heart of your business Cyber security isn’t just about technology. It also

1Cyber Security Building confidence in your digital future

Webelievethatconfidenceinyourdigital future is essential to the growth of your organisation. It means being aware of your cyber security risks, being able to assess which threats could affect your business goals and having the agility to deal with new threats as they arise.

In this paper we look in more detail at how the world has changed and what this means as you operate in an increasingly connected world. We explore the importance of trust in your digital future and how cyber security can help you build digital trust.

Confidence in your digital future

We then look at the importance of focusing your cyber security investment to protect what matters most to your organisation and how historic ways of approaching security are no longer adequate. We also illustrate the wide range of threats that enterprises now face.

Finally we look at what you need to consider to assess the strength of your current cyber security and the steps you can take. We look at six lenses of confidencethathelpyoutoapplycybersecurity to the very heart of your business, where we believe it should be.

Page 4: Cyber security - PwC · Cyber Security Building con˜dence in your digital future 7 Cyber security at the heart of your business Cyber security isn’t just about technology. It also

2 Cyber Security Building confidence in your digital future

Your digital world just got bigger

Enterprise

Industry

JV/Partners

Consumer

Customer

Serviceproviders

Suppliers

Industry

Regulatory

Lega

l

Socio-C

ultura

l

Technology

Geo-Political

Glo

bal

En

viro

nm

enta

l

The new business ecosystem

The issueThe ‘digital age’ is bringing rapid change: new customer connections; tighter supply chain integration; new sourcing models; new ways of exploiting bulk data; faster R&D processes; mobility; and much more. Businesses now operate in an interconnected ecosystem. As a result, securing critical data, transactions and operations means working beyond the walls of the enterprise.

The new reality:

• Increase in reliance on technology

• Organisations are built on trust and collaboration

• Information and data ubiquity throughout the business ecosystem

• Transactions and operations span multiple parties

• New and advanced threats which take advantage of the new reality

Page 5: Cyber security - PwC · Cyber Security Building con˜dence in your digital future 7 Cyber security at the heart of your business Cyber security isn’t just about technology. It also

3Cyber Security Building confidence in your digital future

The impact of an interconnected world

Digital technology has transformed the scope, scale and potential for business over the past decade. In doing so, it has disrupted the business models of traditional organisations at a rate never experienced before. And it won’t stop there.

In an interconnected world, organisations are dependent on digital businessprocesses.Thisamplifies the business impact of cyber attacks, affectingintellectualproperty,financialsecurity, competitive advantage, operational stability, regulatory compliance, and reputation.

Businesses that seize the digital advantagemustbeconfidentthat they are able to manage cyber security risk. Those that are able to build trust with customers and other stakeholders for their digital strategies will be successful. That is, trust that data and transactions will be safe, that identity and privacy issues have been dealt with and trust that systems and processes will be available when needed. Trust takes a long time to build but can be lost in an instant.

In short, successful businesses in the digital age will get to grips with cyber security.

Old security models are no longer adequateWhile cyber security risks have evolved, the approach businesses use to manage them has not kept pace. The traditional information security model – one that is technology focused, compliance-based, perimeter-oriented, and aimed atsecuringtheback-office–doesnotaddress the realities of today.

When looking beyond the enterprise boundaries, organisations need to re-evaluate security priorities. Cyber risk management today is a complex issue, requiring board and management engagement, sophisticated techniques, and new skills and capabilities.

Businesses are facing rapidly increasing exposure to cyber security risk. Cyber security should be treated as an enterprise risk for which boards need to develop a clear risk appetite – to suit their specific business circumstances – and associated action plan; and need to seek regular assurance that risks are appropriately monitored and managed.

93% of large organisations and87% of small businesses had

a security breach in the last year

93%

87%

Source: PwC 2013 Information Security Breaches Survey.

Page 6: Cyber security - PwC · Cyber Security Building con˜dence in your digital future 7 Cyber security at the heart of your business Cyber security isn’t just about technology. It also

4 Cyber Security Building confidence in your digital future

Cyber threats are business risks

When CEOs and boards evaluated their market threats or competitors, few previously considered cyber threats. Today, the sheer volume and concentration of data and digital transactions, coupled with easy global access throughout the business ecosystem,magnifiesexposureto

cyber attack. The reward of a successful attack and the ability to remain anonymous and undetected presents an opportunity for anyone with a computer and Internet connection toinfiltratethebusinessecosystem.Cyber breaches damage reputations and destroy trust – both are vital ingredients for success in the digital age.

Organisations must establish a capability to provide continual insight and intelligence on the cyber threats facing the business. Armed with this insight, business leaders can anticipate and react dynamically to changes in theircyberthreatprofile. 

Adversary Motives Targets ImpactNation state • Economic, political, and/

or military advantage• Trade secrets

• Sensitive business information

• Emerging technologies

• Critical infrastructure

• Loss of competitive advantage

• Disruption to critical infrastructure

Organised crime • Immediatefinancialgain

• Collect information for futurefinancialgains

• Financial/payment systems

• Personallyidentifiableinformation

• Payment card information

• Protected health information

• Costly regulatory inquiries and penalties

• Consumer and shareholder lawsuits

• Loss of consumer confidence

• Financial loss

Hacktivists • Influencepoliticaland/orsocial change

• Pressure business to change their practices

• Corporate secrets

• Sensitive business information

• Information related to key executives, employees, customers and business partners

• Disruption of business activities

• Brand and reputation

• Loss of consumer confidence

Insiders • Personal advantage, monetary gain

• Professional revenge

• Patriotism

• Sales, deals, market strategies

• Corporate secrets, IP, R&D

• Business operations

• Personnel information

• Trade secret disclosure

• Operational disruption

• Brand and reputation

• National security impact

Page 7: Cyber security - PwC · Cyber Security Building con˜dence in your digital future 7 Cyber security at the heart of your business Cyber security isn’t just about technology. It also

5Cyber Security Building confidence in your digital future

Not all assets are equal.

Information, digital transactions and smart devices continue to proliferate at an extraordinary rate. Safeguarding all at the highest level is not realistic or possible. Incidents in some areas can be troubling; others can destroy key elements of your business.

Adapting your cyber security approach

Targeting security investment in the right places

Traditional information security approach

Cyber security approach

Scope of the challenge • Limited to the ‘four walls’ and the extended enterprise

• Spans your whole business ecosystem

Ownership and accountability • IT led and operated • Business-aligned and owned; CEO and board accountable

Cyber threat characteristics • One-off and opportunistic; motivated by notoriety, technical challenge, and individual gain

• Organised, funded and targeted; motivated by economic, monetary and political gain

Asset protection • One-size-fits-allapproach–focusedon data

• Prioritise and protect the data, transactions and operations that are most important to your business strategy

Defence posture • Protect the perimeter; respond if attacked

• Plan, monitor, and rapidly respond when attacked

Security intelligence and information sharing

• Keep to yourself • Public/private partnerships; collaboration with industry working groups

• Be prepared for regulatory requirement to report breaches

Page 8: Cyber security - PwC · Cyber Security Building con˜dence in your digital future 7 Cyber security at the heart of your business Cyber security isn’t just about technology. It also

6 Cyber Security Building confidence in your digital future

Gaining advantage

Boards and executives that keep a sustained focus on cyber security do more than protect their business; they enable growth in the digital age. All activities and investments are driven by the best available knowledge about information assets, threats, and vulnerabilities, and are evaluated within the context of business activity.

There are three areas we think you should consider when assessing your cyber security posture.

1. Enhance your cyber security strategy and capability

Is an integrated cyber security strategy a pivotal part of your business model? Does the strategy consider the full scope of security: technical, physical, legal process, and people? Have you applied the required resources and investments, including seeking legal advice?

Do you have the security capability to advise internal business leaders on critical threats, emerging technology, and strategic initiatives? Do you have the policies in place to communicate this strategy?

Can you explain your cyber security strategy to your stakeholders: your investors? Your regulators? Your business partners? Your customers?

2. Understand and adapt to changes in the security risk environment

Do you know what information and transactions are most valuable to your business? Have you prioritised security to protect those assets accordingly? Haveyouquantifiedthebusinessimpact if the assets were impaired or manipulated?

Doyouunderstandthesignificantchanges in the threats facing your business? Who are your adversaries? What would they target? What techniques might they use?

Are you actively acquiring and adapting to internal and external sources of intelligence? How are your controls and countermeasures responsive to events and activities? Are you actively involved in relevant public-private partnerships?

Are you investigating incidents when they occur and communicating with regulators?

3. Advance your security posture through a shared vision and culture

Does the chief information security officerrolereport,independentofIT,to the board or an executive leadership team committed to cyber security?

Do your people understand their role in protecting information assets and digital transactions – have you provided the necessary tools and training? Does the HR function understand how to deal with security breaches by employees?

What measures do you have in place to manage risk associated with the loss of trust? How do you currently preserve the trust of your customers when launching a new digital experience?

What contractual and other assurances do you require from suppliers and service providers? Do you actively monitor, audit, and remediate your risk portfolio? Do you have standards in place to protect your assets throughout the ecosystem?

61%According to the Global CEO Survey, one-third of CEOs don’t think a cyber attack would negatively impact their business. Yet 61% of consumers1 would stop using a company’s product or services if an attack resulted in a known breach.

1. 2012 PwC Consumer Intelligence Series

Page 9: Cyber security - PwC · Cyber Security Building con˜dence in your digital future 7 Cyber security at the heart of your business Cyber security isn’t just about technology. It also

7Cyber Security Building confidence in your digital future

Cyber security at the heart of your business

Cyber security isn’t just about technology. It also involves people, information, systems, processes, culture and physical surroundings. It aims to create a secure environment where businesses can remain resilient in the event of an attack.

Below are the six confidences that will help you to apply cyber security to the heart of your business.

People Confidence in your people

Technology Confidence in your technology

Connections Confidence in your connections

Your people make critical security decisions every day.

Disappearing organisational boundaries mean that you can no longer rely on technology alone. You need to make sure your people understand security and act securely.

We can help you foster secure behaviours by shaping your culture and designing processes, systems and roles with human vulnerability in mind.

Technology underpins your business.

As your business changes so should your technology. While embracing the new, you still need to protect legacy technology and information against cyber threats.

We can help you understand the inherent risks of your technology and how to mitigate them.

Organisations exist in an increasingly complex digital ecosystem.

We share information and transact digitally more than ever before. Your digital relationships with customers, suppliers and others expose you to new areas of risk which need to be managed.

We can help you assess your connections, negotiate robust contracts and build an agile risk management framework, adept at keeping pace as your collaborative networks evolve.

Risk Confidence to take risks

Crisis Confidence during a crisis

Priorities Confidence in your priorities

Digital opportunities cannot be realised without managing the inherent risks.

Some risks are worth taking, but if you’re struggling to manage the downside, you won’t be able to take advantage of the upside.

We can help you consider your interactions within the digital world and assess where and how they impact your past, present and future.

Cyber attacks are now commonplace.

Resilience means being able to react quickly and effectively when compromised. Being aware of and prepared for threats will help you prevent incidents and react to them quickly enough to reduce their impact, and prevent them becoming a crisis.

We can help you protect what’s important, detect intruders, deal with the regulators and minimise your exposure when you are compromised.

Addressing cyber threats helps you prioritise what matters most.

Being prepared for changes in the digital era will help you get your priorities straight. A ‘cyber savvy’ governance and management structure means you can prioritise opportunities and know where you can afford to take risks.

We can help you to recognise your key tangible and intangible assets and align your security strategy to your priorities.

Page 10: Cyber security - PwC · Cyber Security Building con˜dence in your digital future 7 Cyber security at the heart of your business Cyber security isn’t just about technology. It also

8 Cyber Security Building confidence in your digital future

Building confidence

We view cyber security through a series of interconnected lenses. This rounded approach is designed to provide you with confidence: in your people, technology and connections, how you manage risk, set priorities and respond to an incident or during a crisis. Our approach typically begins with an assessment of your current capability and a recommendation of areas for improvement. This will enable you to develop a cyber security strategy to build confidence in your digital future.

Technology People

Crisis Connections

Confidence in

your digital future

Cyber security services

Assess Build Manage Respond

Connections

Priorities Risk

Technology People

Crisis

Confidence in

your digital future

Connections

Priorities Risk

Technology People

Crisis

You can’t secure everythingWe help you set the right priorities.

• Enterprise security architecture

• Protect what matters

• Strategy, organisation and governance

• Threat intelligence

Seize the advantageWe help you exploit digital opportunitywithconfidence.

• Digital trust is embedded in the strategy

• Privacy and cyber security legal compliance

• Risk management and risk appetite

It’s not if but whenWe help you build an intelligence-led defence, enabling rapid detection and containment.

• Continuity and resilience

• Crisis management

• Incident response and forensics

• Monitoring and detection

Their risk is your riskWe help you understand and manage risk in your interconnected business ecosystem.

• Digital channels

• Partner and supplier management

• Robust contracts

Fix the basicsWe help you use technology to your advantage, deriving maximum return from your technology investments.

• Identity and access management

• Information technology, operations technology and consumer technology

• IT security hygiene

• Security intelligence and analytics

People matterWe help you build and maintain a secure culture, where people are aware of their critical security decisions.

• Insider threat management

• People and ‘moments that matter’

• Security culture and awareness

Page 11: Cyber security - PwC · Cyber Security Building con˜dence in your digital future 7 Cyber security at the heart of your business Cyber security isn’t just about technology. It also

Our services

We provide a comprehensive range of integrated cyber security services that help you assess, build and manage your cyber security capabilities, and respond to incidents and crises. Our services are designed to help you build confidence, understand your threats and vulnerabilities, and secure your environment. Our cyber security service delivery team includes incident response, legal, risk, technology and change management specialists.

RespondManageAssessBuild BuildRespondManage

Understanding your capabilities and maturity to help you prioritise your investment

• Board-led maturity assessment

• Breach discovery assessment

• Cyber security diagnostic

• Cyber threat assessments and modelling

• Penetration testing

• Policy and contract review

• Privacy and cyber security legal assessment

• Standards compliance and certification

• Strategy and roadmap

• Third party assurance, including cloud

• Threat intelligence, detection and response maturity assessment

Assess Build RespondManage

Rapid, global access to leading cyber incident containment, investigation and crisis management expertise

•Breachnotification

• Computer, network and malware forensics

• Crisis management

• Cyber incident legal advice including privilege

• Cyber incident response and forensic investigation

• e-Discovery and disclosure

• Fraud and eCrime data analytics

• Human resource advice – employee breaches

• Network intrusion containment and remediation

• Regulatory proceedings

• Third party litigation

Designing and delivering cyber security improvement programmes

Framework development• Enterprise risk management• Enterprise security

architecture• Information governance• Privacy and cyber security

legal strategy

Capability build• Cyber security programme

delivery• Security technologies and SOC

development• Threat intelligence, detection

and response capability development

Embedding security• Awareness and training• Contracting for security• CSIRT and policy development• Cyber security programme

assurance• Insider threat management• Legal policy development• Product development support• Security intelligence and

analytics

RespondManageAssess Build

Managing and maintaining control of your business, enabling you to focus on strategic priorities

• Advanced threat detection and monitoring

• Cyber defence team augmentation

• Data leakage monitoring

• Integrated managed security services

• Legal support to compliance officersandgeneralcounsel

• Managed vulnerability as sessment

• Retained incident response services

• Threat intelligence

• Training

Assess

Page 12: Cyber security - PwC · Cyber Security Building con˜dence in your digital future 7 Cyber security at the heart of your business Cyber security isn’t just about technology. It also

www.pwc.co.ukThis publication has been prepared for general guidance on matters of interest only, and does not constitute professional advice. You should not act upon the information contained in this publication without obtaining specific professional advice. No representation or warranty (express or implied) is given as to the accuracy or completeness of the information contained in this publication, and, to the extent permitted by law, PwC does not accept or assume any liability, responsibility or duty of care for any consequences of you or anyone else acting, or refraining to act, in reliance on the information contained in this publication or for any decision based on it.

© 2013 PwC. All rights reserved. PwC refers to the PwC network and/or one or more of its member firms, each of which is a separate legal entity. Please see www.pwc.com/structure for further details.

The Design Group 21564 (10/13)