how to connect your server room to the board room – before a data breach occurs

18
How to Connect Your Server Room to the Board Room – Before a Data Breach Occurs

Upload: surfwatch-labs

Post on 25-Jul-2015

189 views

Category:

Technology


0 download

TRANSCRIPT

Page 1: How to Connect Your Server Room to the Board Room – Before a Data Breach Occurs

How to Connect Your Server Room to the Board Room –

Before a Data Breach Occurs

Page 2: How to Connect Your Server Room to the Board Room – Before a Data Breach Occurs

Today’s Speakers

2

Jason PolancichFounder & Chief Architect

SurfWatch Labs

Adam MeyerChief Security Strategist

SurfWatch Labs

Anne MiglaresePresident & CEO

PlanetiQ

Page 3: How to Connect Your Server Room to the Board Room – Before a Data Breach Occurs

“We believed we were doing things ahead of the industry. We thought we were well-positioned.”

- Frank Blake, Chairman of Home Depot

3

Page 4: How to Connect Your Server Room to the Board Room – Before a Data Breach Occurs

Cybersecurity Is No Longer Just a Technical Problem

4

Top 5 Security Risks1.Data security (company information)

2.Brand/reputational damage

3.Regulatory and compliance violations (tie)

4.Data leakage (tie)

5.Viruses and malware

- Protiviti, “From Cybersecurity to Collaboration: Assessing the Top Priorities for Internal Audit Functions”, 2015

Page 5: How to Connect Your Server Room to the Board Room – Before a Data Breach Occurs

The Cost Cannot Be Ignored

Increase from previous year of organizations reporting financial hits of $20 million or more

5

$2.7 Million

Annual average financial loss attributed to cybersecurity incidents - up 34% from previous year

92%- The Global State of Information Security® Survey 2015, PWC

Page 6: How to Connect Your Server Room to the Board Room – Before a Data Breach Occurs

Examining Cyber Problems and

Connecting Security with the Business

Page 7: How to Connect Your Server Room to the Board Room – Before a Data Breach Occurs

Security Spending on the Rise, Yet Companies Getting Hit Hard

7

• The traditional approach to managing cyber risks is not working

• Too much focus on one-off, responsive tactics

• The dots aren’t being connected between cyber risks and business impact

Page 8: How to Connect Your Server Room to the Board Room – Before a Data Breach Occurs

Security Spending on the Rise, Yet Companies Getting Hit Hard

• Security is too complex

• Too much data is trapped

• Hard to relate cyber risks to the business

• Too much focus on tools and not enough on process

• Lack of communication and agility and ability to quickly make effective decisions

8

Page 9: How to Connect Your Server Room to the Board Room – Before a Data Breach Occurs

Sound Cybersecurity Strategy Involves Everyone

9

Page 10: How to Connect Your Server Room to the Board Room – Before a Data Breach Occurs

Cybersecurity Needs to Be Baked Into Your Business

• What does security look like for you?

• What does it mean for your customers, partners, suppliers?

• How quickly and effectively can you respond to a security incident?

• What’s the effect of not being secure enough?

10

Page 11: How to Connect Your Server Room to the Board Room – Before a Data Breach Occurs

Sound Cybersecurity is a Competitive Advantage

11

69%of US executives are worried that cyber threats will impact growth.

— PwC, 17th Annual Global CEO Survey

Page 12: How to Connect Your Server Room to the Board Room – Before a Data Breach Occurs

Bridge the Gap Between Security Operations and the Business

12

Page 13: How to Connect Your Server Room to the Board Room – Before a Data Breach Occurs

Using Cyber Risk Intelligence to Drive Better Security Decisions

13

Page 14: How to Connect Your Server Room to the Board Room – Before a Data Breach Occurs

14

Using Cyber Risk Intelligence to Drive Better Security Decisions

Page 15: How to Connect Your Server Room to the Board Room – Before a Data Breach Occurs

You Gotta Get the Board on Board with Cyber

• Cybersecurity improvement includes the involvement of Board Directors

• Only 30% of Boards are highly engaged with information security risks and include cybersecurity in their audit and risk acceptance process.

15

Source: From Cybersecurity to Collaboration: Assessing the Top Priorities for Internal Audit Functions

Page 16: How to Connect Your Server Room to the Board Room – Before a Data Breach Occurs

Where Do We Go From Here?

1. Unlock trapped cyber data and look at cyber risks through a business intelligence/KPI lens.

2. Build the right strategy and foundation for a long-lasting cyber-resilient approach.

3. Facilitate communication and collaboration across IT teams, business analysts, legal and executives.

16

Page 17: How to Connect Your Server Room to the Board Room – Before a Data Breach Occurs

Q&A and Additional SurfWatch Labs Resources

17

How to Understand Cyber Risks and Ensure Governance: info.surfwatchlabs.com/cyber-risk-governance

SurfWatch C-Suite Datasheet: info.surfwatchlabs.com/SurfWatch-C-Suite-Datasheet

SurfWatch C-Suite Product Overview Video: www.youtube.com/watch?v=9J0Ae6VTmHU

SurfWatch C-Suite Product Review: www.scmagazine.com/surfwatch-c-suite/review/4324/

Schedule a Personal SurfWatch C-Suite Demo:info.surfwatchlabs.com/request-demo

Page 18: How to Connect Your Server Room to the Board Room – Before a Data Breach Occurs

Thank You!

www.surfwatchlabs.comFollow us at: