SlideShare una empresa de Scribd logo
1 de 13
Descargar para leer sin conexión
11/01/17 The Business Continuity Institute 1
Continuity and Resilience (CORE)
ISO 22301 BCM Consulting Firm
Presentations by speakers at the
5th India Business & IT Resilience Summit
June 1, 2017 at Meluha – The an Ecotel Hotel
Mumbai, India
Our Contact Details:
UAE INDIA
Continuity and Resilience
P. O. Box 127557
Abu Dhabi, United Arab Emirates
Mobile:+971 50 8460530
Tel: +971 2 8152831
Fax: +971 2 8152888
Email: info@coreconsulting.ae
Continuity and Resilience
Level 15,Eros Corporate Tower
Nehru Place ,New Delhi-110019
Tel: +91 11 41055534/ +91 11 41613033
Fax: ++91 11 41055535
Email: info@coreconsulting.ae
11/01/17 The Business Continuity Institute 22
The BCI Cyber Resilience Report 2017
David West CBCI
11/01/17 The Business Continuity Institute 3
organizations
About the BCI Cyber Resilience Report 2017
countries
• 221 organizations from India – promoted in partnership with Nasscom
• Functional roles include business continuity, risk management and IT disaster recovery
• Top sectors represented include IT and communications (35%), finance and insurance
(29%) and professional services (14%)
• 85% come from large enterprises
745 69
11/01/17 The Business Continuity Institute 4
• Almost three-quarters of Indian organizations (72%) report at least 1 cyber
incident in the last 12 months
• Top drivers of disruption include phishing and social engineering (57%), malware
(35%) and spear phishing (23%)
• Indian organizations outperform the global average in terms of deploying
business continuity arrangements for cyber resilience issues (91% compared to
87%) and top management commitment to cyber resilience (75% compared to
60%)
The headlines
BCI Cyber Resilience Report 2017
11/01/17 The Business Continuity Institute 5
Frequency of cyber disruptions
28
46
9
1
1 3
12
0
1-5
6-10
11-20
21-50
51+
Don’t know
• Almost three-quarters of Indian organizations (72%) report at least 1 cyber incident in
the last 12 months
11/01/17 The Business Continuity Institute 6
Drivers of cyber disruptions
15
15
16
16
23
35
46
Insider threat
Out of date software
Denial of service
Ransomware
Spear phishing
Malware
Phishing and social engineering
0 5 10 15 20 25 30 35 40 45 50
• Top drivers of disruption include phishing and social engineering (57%), malware (35%)
and spear phishing (23%)
11/01/17 The Business Continuity Institute 7
Cumulative cost of cyber disruptions
80
13
1
2
1 1 0
2
0
Up to €50k
€50-250k
€250-500k
€500k-1m
€1-10m
€10-50m
€50-250m
€250-500m
More than €500m
• 80% of Indian organizations report losses of up to €50,000 due to cyber disruptions in
the last 12 months
• 4% of Indian organizations lost at least €1 million during the same time period
11/01/17 The Business Continuity Institute 8
Top management commitment to cyber resilience
75
22
1 0
2
High
Medium
Low
None
Don't know
• Indian organizations outperform the global average in terms of high top management
commitment to cyber resilience issues (75% compared to 60%)
11/01/17 The Business Continuity Institute 9
Deploying business continuity arrangements for
cyber disruptions
91
4
5
YES
NO
Don't know
• Indian organizations also outperform the global average in terms of deploying business
continuity arrangements for cyber disruptions (91% compared to 87%)
11/01/17 The Business Continuity Institute 10
Response time to cyber disruptions
31
31
13
11
14
Less than 1 hour
1-2 hours
2-3 hours
3-4 hours
More than 4 hours
• Almost a third of Indian organizations (31%) respond to cyber disruptions within an
hour of its discovery
11/01/17 The Business Continuity Institute 11
Cyber resilience issues
What are practitioners saying?
Business continuity strategies must take all
potential cyber security events into account,
especially with the emergence of large scale
cyber-attacks.
Business continuity programmes are beginning
to be looked at and invested into as possible
strategic assets for cyber resilience.
Business continuity plans get activated when cyber
security is a threat, so it is no more a domain only for
InfoSec people. The business continuity guys have to
widen their scope and knowledge base to cope.
11/01/17 The Business Continuity Institute 12
• Business continuity professionals should collaborate and engage with their
cyber/information security colleagues.
• Reputation management remains a key driver in pushing the cyber resilience
agenda.
• The cyber resilience of suppliers is expected to increasingly influence
organizations’ cyber resilience in turn.
• Legislative and regulatory changes are expected to drive cyber resilience and
heavily influence efforts in the area.
Key takeaways
BCI Cyber Resilience Report 2017
11/01/17 The Business Continuity Institute 13
Thank you

Más contenido relacionado

La actualidad más candente

Cisco Connect 2018 Philippines - do more than keeping the lights on
Cisco Connect 2018 Philippines - do more than keeping the lights onCisco Connect 2018 Philippines - do more than keeping the lights on
Cisco Connect 2018 Philippines - do more than keeping the lights onNetworkCollaborators
 
National crisis and Emergency Management Authority
National crisis and Emergency Management AuthorityNational crisis and Emergency Management Authority
National crisis and Emergency Management AuthorityContinuity and Resilience
 
Bill Lisse - Communicating Security Across the C-Suite
Bill Lisse - Communicating Security Across the C-SuiteBill Lisse - Communicating Security Across the C-Suite
Bill Lisse - Communicating Security Across the C-Suitecentralohioissa
 
Panel Discussion: Why IT Service and IT Asset Management are Better Together
Panel Discussion: Why IT Service and IT Asset Management are Better TogetherPanel Discussion: Why IT Service and IT Asset Management are Better Together
Panel Discussion: Why IT Service and IT Asset Management are Better TogetherIvanti
 
Compliance la jord
Compliance  la jordCompliance  la jord
Compliance la jordlajord
 
2 ppt final dan shoemaker dd1 stockholm presentation
2 ppt final dan shoemaker dd1 stockholm presentation2 ppt final dan shoemaker dd1 stockholm presentation
2 ppt final dan shoemaker dd1 stockholm presentationGlobalForum
 
Why SMBs Outsource IT to MSPs
Why SMBs Outsource IT to MSPsWhy SMBs Outsource IT to MSPs
Why SMBs Outsource IT to MSPsThe TNS Group
 
5 Perspectives of ISO/IEC 27001 Certification from a Relying Party
5 Perspectives of ISO/IEC 27001 Certification from a Relying Party5 Perspectives of ISO/IEC 27001 Certification from a Relying Party
5 Perspectives of ISO/IEC 27001 Certification from a Relying PartyPECB
 
Why Set It and Forget It Backup Sucks
Why Set It and Forget It Backup SucksWhy Set It and Forget It Backup Sucks
Why Set It and Forget It Backup Sucksmarketingunitrends
 
10 Questions Every Company Should Be Asking Itself About its Business Resilience
10 Questions Every Company Should Be Asking Itself About its Business Resilience10 Questions Every Company Should Be Asking Itself About its Business Resilience
10 Questions Every Company Should Be Asking Itself About its Business ResilienceMichael Bowers
 
Security and PCI: 4 Things You Need to Know
Security and PCI: 4 Things You Need to KnowSecurity and PCI: 4 Things You Need to Know
Security and PCI: 4 Things You Need to KnowThe Internet of Things
 
Chris Clymer & Jack Nichelson - How to Secure Things & Influence People: 10 C...
Chris Clymer & Jack Nichelson - How to Secure Things & Influence People: 10 C...Chris Clymer & Jack Nichelson - How to Secure Things & Influence People: 10 C...
Chris Clymer & Jack Nichelson - How to Secure Things & Influence People: 10 C...centralohioissa
 
Technology Challenges Facing Small Staff Associations
Technology Challenges Facing Small Staff AssociationsTechnology Challenges Facing Small Staff Associations
Technology Challenges Facing Small Staff AssociationsOSIbeyond
 
The Role of Technology in the Legal Industry 1
The Role of Technology in the Legal Industry 1The Role of Technology in the Legal Industry 1
The Role of Technology in the Legal Industry 1E-MIT Solutions
 
Reengineered virtual infrastructure for a leading private equity enterprise.
Reengineered virtual infrastructure for a leading private equity enterprise.Reengineered virtual infrastructure for a leading private equity enterprise.
Reengineered virtual infrastructure for a leading private equity enterprise.Mindtree Ltd.
 
ITIL for those who Don't have the Time
ITIL for those who Don't have the TimeITIL for those who Don't have the Time
ITIL for those who Don't have the TimeManageEngine
 

La actualidad más candente (19)

Cisco Connect 2018 Philippines - do more than keeping the lights on
Cisco Connect 2018 Philippines - do more than keeping the lights onCisco Connect 2018 Philippines - do more than keeping the lights on
Cisco Connect 2018 Philippines - do more than keeping the lights on
 
National crisis and Emergency Management Authority
National crisis and Emergency Management AuthorityNational crisis and Emergency Management Authority
National crisis and Emergency Management Authority
 
Bill Lisse - Communicating Security Across the C-Suite
Bill Lisse - Communicating Security Across the C-SuiteBill Lisse - Communicating Security Across the C-Suite
Bill Lisse - Communicating Security Across the C-Suite
 
Panel Discussion: Why IT Service and IT Asset Management are Better Together
Panel Discussion: Why IT Service and IT Asset Management are Better TogetherPanel Discussion: Why IT Service and IT Asset Management are Better Together
Panel Discussion: Why IT Service and IT Asset Management are Better Together
 
Compliance la jord
Compliance  la jordCompliance  la jord
Compliance la jord
 
2 ppt final dan shoemaker dd1 stockholm presentation
2 ppt final dan shoemaker dd1 stockholm presentation2 ppt final dan shoemaker dd1 stockholm presentation
2 ppt final dan shoemaker dd1 stockholm presentation
 
SAT 2020 slide deck
SAT 2020 slide deckSAT 2020 slide deck
SAT 2020 slide deck
 
Why SMBs Outsource IT to MSPs
Why SMBs Outsource IT to MSPsWhy SMBs Outsource IT to MSPs
Why SMBs Outsource IT to MSPs
 
5 Perspectives of ISO/IEC 27001 Certification from a Relying Party
5 Perspectives of ISO/IEC 27001 Certification from a Relying Party5 Perspectives of ISO/IEC 27001 Certification from a Relying Party
5 Perspectives of ISO/IEC 27001 Certification from a Relying Party
 
Why Set It and Forget It Backup Sucks
Why Set It and Forget It Backup SucksWhy Set It and Forget It Backup Sucks
Why Set It and Forget It Backup Sucks
 
10 Questions Every Company Should Be Asking Itself About its Business Resilience
10 Questions Every Company Should Be Asking Itself About its Business Resilience10 Questions Every Company Should Be Asking Itself About its Business Resilience
10 Questions Every Company Should Be Asking Itself About its Business Resilience
 
Managed Services
Managed ServicesManaged Services
Managed Services
 
Security and PCI: 4 Things You Need to Know
Security and PCI: 4 Things You Need to KnowSecurity and PCI: 4 Things You Need to Know
Security and PCI: 4 Things You Need to Know
 
Chris Clymer & Jack Nichelson - How to Secure Things & Influence People: 10 C...
Chris Clymer & Jack Nichelson - How to Secure Things & Influence People: 10 C...Chris Clymer & Jack Nichelson - How to Secure Things & Influence People: 10 C...
Chris Clymer & Jack Nichelson - How to Secure Things & Influence People: 10 C...
 
Technology Challenges Facing Small Staff Associations
Technology Challenges Facing Small Staff AssociationsTechnology Challenges Facing Small Staff Associations
Technology Challenges Facing Small Staff Associations
 
The Role of Technology in the Legal Industry 1
The Role of Technology in the Legal Industry 1The Role of Technology in the Legal Industry 1
The Role of Technology in the Legal Industry 1
 
Symantec Infographic
Symantec InfographicSymantec Infographic
Symantec Infographic
 
Reengineered virtual infrastructure for a leading private equity enterprise.
Reengineered virtual infrastructure for a leading private equity enterprise.Reengineered virtual infrastructure for a leading private equity enterprise.
Reengineered virtual infrastructure for a leading private equity enterprise.
 
ITIL for those who Don't have the Time
ITIL for those who Don't have the TimeITIL for those who Don't have the Time
ITIL for those who Don't have the Time
 

Similar a The BCI Cyber Resilience Report 2017

5th ME Business & IT Resilience Summit 2016 - IT Resilience and Service Manag...
5th ME Business & IT Resilience Summit 2016 - IT Resilience and Service Manag...5th ME Business & IT Resilience Summit 2016 - IT Resilience and Service Manag...
5th ME Business & IT Resilience Summit 2016 - IT Resilience and Service Manag...Continuity and Resilience
 
Cisco Connect 2018 Thailand - Changing the security equation demetris booth_c...
Cisco Connect 2018 Thailand - Changing the security equation demetris booth_c...Cisco Connect 2018 Thailand - Changing the security equation demetris booth_c...
Cisco Connect 2018 Thailand - Changing the security equation demetris booth_c...NetworkCollaborators
 
Cybersecurity in the Workplace is Everyone's Business
 Cybersecurity in the Workplace is Everyone's Business  Cybersecurity in the Workplace is Everyone's Business
Cybersecurity in the Workplace is Everyone's Business Symantec
 
Executive Perspective Building an OT Security Program from the Top Down
Executive Perspective Building an OT Security Program from the Top DownExecutive Perspective Building an OT Security Program from the Top Down
Executive Perspective Building an OT Security Program from the Top Downaccenture
 
Ensuring Continuous PCI-DSS 3.0 Compliance for Your Firewalls and Routers
Ensuring Continuous PCI-DSS 3.0 Compliance for Your Firewalls and RoutersEnsuring Continuous PCI-DSS 3.0 Compliance for Your Firewalls and Routers
Ensuring Continuous PCI-DSS 3.0 Compliance for Your Firewalls and RoutersAlgoSec
 
IREC165473PR RP 2017 Security Outlook
IREC165473PR RP 2017 Security OutlookIREC165473PR RP 2017 Security Outlook
IREC165473PR RP 2017 Security OutlookChris Cornillie
 
Infrastructure Monitoring Maturity: Modeling Technology, Process, & Culture
Infrastructure Monitoring Maturity: Modeling Technology, Process, & CultureInfrastructure Monitoring Maturity: Modeling Technology, Process, & Culture
Infrastructure Monitoring Maturity: Modeling Technology, Process, & CultureEnterprise Management Associates
 
The 2018 Threatscape
The 2018 ThreatscapeThe 2018 Threatscape
The 2018 ThreatscapePeter Wood
 
SBIC Enterprise Information Security Strategic Technologies
SBIC Enterprise Information Security Strategic TechnologiesSBIC Enterprise Information Security Strategic Technologies
SBIC Enterprise Information Security Strategic TechnologiesEMC
 
OT Security Architecture & Resilience: Designing for Security Success
OT Security Architecture & Resilience:  Designing for Security SuccessOT Security Architecture & Resilience:  Designing for Security Success
OT Security Architecture & Resilience: Designing for Security Successaccenture
 
Meeting your Compliance objectives with ease and without incurring a high cost
 Meeting your Compliance objectives with ease and without incurring a high cost  Meeting your Compliance objectives with ease and without incurring a high cost
Meeting your Compliance objectives with ease and without incurring a high cost Mithi Software Technologies Pvt Ltd
 
How Digital Business is Shaping the Next Wave of Automation
How Digital Business is Shaping the Next Wave of AutomationHow Digital Business is Shaping the Next Wave of Automation
How Digital Business is Shaping the Next Wave of AutomationEnterprise Management Associates
 
IBM InterConnect 2013: DevOps Keynote
IBM InterConnect 2013: DevOps KeynoteIBM InterConnect 2013: DevOps Keynote
IBM InterConnect 2013: DevOps KeynoteIBM Events
 
It's Behind You! Managing Insider Threats to Digital Security with RES Software
It's Behind You! Managing Insider Threats to Digital Security with RES SoftwareIt's Behind You! Managing Insider Threats to Digital Security with RES Software
It's Behind You! Managing Insider Threats to Digital Security with RES SoftwareRES
 

Similar a The BCI Cyber Resilience Report 2017 (20)

5th ME Business & IT Resilience Summit 2016 - IT Resilience and Service Manag...
5th ME Business & IT Resilience Summit 2016 - IT Resilience and Service Manag...5th ME Business & IT Resilience Summit 2016 - IT Resilience and Service Manag...
5th ME Business & IT Resilience Summit 2016 - IT Resilience and Service Manag...
 
ISMS implementation challenges-KASYS
ISMS implementation challenges-KASYSISMS implementation challenges-KASYS
ISMS implementation challenges-KASYS
 
Cisco Connect 2018 Thailand - Changing the security equation demetris booth_c...
Cisco Connect 2018 Thailand - Changing the security equation demetris booth_c...Cisco Connect 2018 Thailand - Changing the security equation demetris booth_c...
Cisco Connect 2018 Thailand - Changing the security equation demetris booth_c...
 
Cybersecurity in the Workplace is Everyone's Business
 Cybersecurity in the Workplace is Everyone's Business  Cybersecurity in the Workplace is Everyone's Business
Cybersecurity in the Workplace is Everyone's Business
 
Executive Perspective Building an OT Security Program from the Top Down
Executive Perspective Building an OT Security Program from the Top DownExecutive Perspective Building an OT Security Program from the Top Down
Executive Perspective Building an OT Security Program from the Top Down
 
Ensuring Continuous PCI-DSS 3.0 Compliance for Your Firewalls and Routers
Ensuring Continuous PCI-DSS 3.0 Compliance for Your Firewalls and RoutersEnsuring Continuous PCI-DSS 3.0 Compliance for Your Firewalls and Routers
Ensuring Continuous PCI-DSS 3.0 Compliance for Your Firewalls and Routers
 
IREC165473PR RP 2017 Security Outlook
IREC165473PR RP 2017 Security OutlookIREC165473PR RP 2017 Security Outlook
IREC165473PR RP 2017 Security Outlook
 
Paritosh Kalra Resume
Paritosh Kalra ResumeParitosh Kalra Resume
Paritosh Kalra Resume
 
Infrastructure Monitoring Maturity: Modeling Technology, Process, & Culture
Infrastructure Monitoring Maturity: Modeling Technology, Process, & CultureInfrastructure Monitoring Maturity: Modeling Technology, Process, & Culture
Infrastructure Monitoring Maturity: Modeling Technology, Process, & Culture
 
The 2018 Threatscape
The 2018 ThreatscapeThe 2018 Threatscape
The 2018 Threatscape
 
SBIC Enterprise Information Security Strategic Technologies
SBIC Enterprise Information Security Strategic TechnologiesSBIC Enterprise Information Security Strategic Technologies
SBIC Enterprise Information Security Strategic Technologies
 
Cissp Training |IEVISION
Cissp Training |IEVISION Cissp Training |IEVISION
Cissp Training |IEVISION
 
Cissp training and certification in mumbai
Cissp training and certification in mumbaiCissp training and certification in mumbai
Cissp training and certification in mumbai
 
Cissp Training |IEVISION
Cissp Training |IEVISION Cissp Training |IEVISION
Cissp Training |IEVISION
 
OT Security Architecture & Resilience: Designing for Security Success
OT Security Architecture & Resilience:  Designing for Security SuccessOT Security Architecture & Resilience:  Designing for Security Success
OT Security Architecture & Resilience: Designing for Security Success
 
Meeting your Compliance objectives with ease and without incurring a high cost
 Meeting your Compliance objectives with ease and without incurring a high cost  Meeting your Compliance objectives with ease and without incurring a high cost
Meeting your Compliance objectives with ease and without incurring a high cost
 
20180528 reflex presentation
20180528 reflex presentation20180528 reflex presentation
20180528 reflex presentation
 
How Digital Business is Shaping the Next Wave of Automation
How Digital Business is Shaping the Next Wave of AutomationHow Digital Business is Shaping the Next Wave of Automation
How Digital Business is Shaping the Next Wave of Automation
 
IBM InterConnect 2013: DevOps Keynote
IBM InterConnect 2013: DevOps KeynoteIBM InterConnect 2013: DevOps Keynote
IBM InterConnect 2013: DevOps Keynote
 
It's Behind You! Managing Insider Threats to Digital Security with RES Software
It's Behind You! Managing Insider Threats to Digital Security with RES SoftwareIt's Behind You! Managing Insider Threats to Digital Security with RES Software
It's Behind You! Managing Insider Threats to Digital Security with RES Software
 

Más de Continuity and Resilience

The Business Continuity Conference, 25th October 2023 in Riyadh - Mr. Atiq Bajwa
The Business Continuity Conference, 25th October 2023 in Riyadh - Mr. Atiq BajwaThe Business Continuity Conference, 25th October 2023 in Riyadh - Mr. Atiq Bajwa
The Business Continuity Conference, 25th October 2023 in Riyadh - Mr. Atiq BajwaContinuity and Resilience
 
The Business Continuity Conference, 25th October 2023 in Riyadh - Nuha Eltinay
The Business Continuity Conference, 25th October 2023 in Riyadh - Nuha EltinayThe Business Continuity Conference, 25th October 2023 in Riyadh - Nuha Eltinay
The Business Continuity Conference, 25th October 2023 in Riyadh - Nuha EltinayContinuity and Resilience
 
The Business Continuity Conference, 25th October 2023 in Riyadh - Paul Gant
The Business Continuity Conference, 25th October 2023 in Riyadh -  Paul GantThe Business Continuity Conference, 25th October 2023 in Riyadh -  Paul Gant
The Business Continuity Conference, 25th October 2023 in Riyadh - Paul GantContinuity and Resilience
 
The Business Continuity Conference, 25th October 2023 in Riyadh - David Boll...
The Business Continuity Conference, 25th October 2023 in Riyadh - David Boll...The Business Continuity Conference, 25th October 2023 in Riyadh - David Boll...
The Business Continuity Conference, 25th October 2023 in Riyadh - David Boll...Continuity and Resilience
 
The Business Continuity Conference, 25th October 2023 in Riyadh - Abdulrahma...
The Business Continuity Conference, 25th October 2023 in Riyadh - Abdulrahma...The Business Continuity Conference, 25th October 2023 in Riyadh - Abdulrahma...
The Business Continuity Conference, 25th October 2023 in Riyadh - Abdulrahma...Continuity and Resilience
 
Advancing the Enterprise Towards Enterprise Resilience
Advancing the Enterprise Towards Enterprise ResilienceAdvancing the Enterprise Towards Enterprise Resilience
Advancing the Enterprise Towards Enterprise ResilienceContinuity and Resilience
 
Value of Work Place Services in the Middle East
Value of Work Place Services in the Middle EastValue of Work Place Services in the Middle East
Value of Work Place Services in the Middle EastContinuity and Resilience
 
Social Media Influence in the field of Crisis Management– Case Studies
Social Media Influence in the field of Crisis Management– Case StudiesSocial Media Influence in the field of Crisis Management– Case Studies
Social Media Influence in the field of Crisis Management– Case StudiesContinuity and Resilience
 
Cyber Resilience Tips and Techniques For Protection & Response
Cyber ResilienceTips and Techniques For Protection & Response Cyber ResilienceTips and Techniques For Protection & Response
Cyber Resilience Tips and Techniques For Protection & Response Continuity and Resilience
 
Business Continuity and Information Security- An Excellent Fit!
Business Continuity and Information Security- An Excellent Fit!Business Continuity and Information Security- An Excellent Fit!
Business Continuity and Information Security- An Excellent Fit!Continuity and Resilience
 
Crisis Communication & BCM in Aviation Sector
Crisis Communication & BCM in Aviation SectorCrisis Communication & BCM in Aviation Sector
Crisis Communication & BCM in Aviation SectorContinuity and Resilience
 
Effectiveness of Disaster Management Ground Reality and Potential.
Effectiveness of Disaster Management Ground Reality and Potential.Effectiveness of Disaster Management Ground Reality and Potential.
Effectiveness of Disaster Management Ground Reality and Potential.Continuity and Resilience
 

Más de Continuity and Resilience (20)

The Business Continuity Conference, 25th October 2023 in Riyadh - Mr. Atiq Bajwa
The Business Continuity Conference, 25th October 2023 in Riyadh - Mr. Atiq BajwaThe Business Continuity Conference, 25th October 2023 in Riyadh - Mr. Atiq Bajwa
The Business Continuity Conference, 25th October 2023 in Riyadh - Mr. Atiq Bajwa
 
The Business Continuity Conference, 25th October 2023 in Riyadh - Nuha Eltinay
The Business Continuity Conference, 25th October 2023 in Riyadh - Nuha EltinayThe Business Continuity Conference, 25th October 2023 in Riyadh - Nuha Eltinay
The Business Continuity Conference, 25th October 2023 in Riyadh - Nuha Eltinay
 
The Business Continuity Conference, 25th October 2023 in Riyadh - Paul Gant
The Business Continuity Conference, 25th October 2023 in Riyadh -  Paul GantThe Business Continuity Conference, 25th October 2023 in Riyadh -  Paul Gant
The Business Continuity Conference, 25th October 2023 in Riyadh - Paul Gant
 
The Business Continuity Conference, 25th October 2023 in Riyadh - David Boll...
The Business Continuity Conference, 25th October 2023 in Riyadh - David Boll...The Business Continuity Conference, 25th October 2023 in Riyadh - David Boll...
The Business Continuity Conference, 25th October 2023 in Riyadh - David Boll...
 
The Business Continuity Conference, 25th October 2023 in Riyadh - Abdulrahma...
The Business Continuity Conference, 25th October 2023 in Riyadh - Abdulrahma...The Business Continuity Conference, 25th October 2023 in Riyadh - Abdulrahma...
The Business Continuity Conference, 25th October 2023 in Riyadh - Abdulrahma...
 
DEFLUFFING RESILIENCE
DEFLUFFING RESILIENCEDEFLUFFING RESILIENCE
DEFLUFFING RESILIENCE
 
CREATING AND MAINTAINING A BCM PROGRAM
CREATING AND MAINTAINING A BCM PROGRAMCREATING AND MAINTAINING A BCM PROGRAM
CREATING AND MAINTAINING A BCM PROGRAM
 
BCM Challenges and Compliance
BCM Challenges and Compliance BCM Challenges and Compliance
BCM Challenges and Compliance
 
Thriving in the Crisis Situation
Thriving in the Crisis SituationThriving in the Crisis Situation
Thriving in the Crisis Situation
 
Cyber Security & IT Resilience
Cyber Security & IT Resilience Cyber Security & IT Resilience
Cyber Security & IT Resilience
 
Enterprise Resilience
Enterprise ResilienceEnterprise Resilience
Enterprise Resilience
 
Advancing the Enterprise Towards Enterprise Resilience
Advancing the Enterprise Towards Enterprise ResilienceAdvancing the Enterprise Towards Enterprise Resilience
Advancing the Enterprise Towards Enterprise Resilience
 
Bcm is all about people!
Bcm   is all about people!Bcm   is all about people!
Bcm is all about people!
 
SAMA BCM Framework
SAMA BCM Framework SAMA BCM Framework
SAMA BCM Framework
 
Value of Work Place Services in the Middle East
Value of Work Place Services in the Middle EastValue of Work Place Services in the Middle East
Value of Work Place Services in the Middle East
 
Social Media Influence in the field of Crisis Management– Case Studies
Social Media Influence in the field of Crisis Management– Case StudiesSocial Media Influence in the field of Crisis Management– Case Studies
Social Media Influence in the field of Crisis Management– Case Studies
 
Cyber Resilience Tips and Techniques For Protection & Response
Cyber ResilienceTips and Techniques For Protection & Response Cyber ResilienceTips and Techniques For Protection & Response
Cyber Resilience Tips and Techniques For Protection & Response
 
Business Continuity and Information Security- An Excellent Fit!
Business Continuity and Information Security- An Excellent Fit!Business Continuity and Information Security- An Excellent Fit!
Business Continuity and Information Security- An Excellent Fit!
 
Crisis Communication & BCM in Aviation Sector
Crisis Communication & BCM in Aviation SectorCrisis Communication & BCM in Aviation Sector
Crisis Communication & BCM in Aviation Sector
 
Effectiveness of Disaster Management Ground Reality and Potential.
Effectiveness of Disaster Management Ground Reality and Potential.Effectiveness of Disaster Management Ground Reality and Potential.
Effectiveness of Disaster Management Ground Reality and Potential.
 

Último

Independent Escorts Vikaspuri / 9899900591 High Profile Escort Service in Delhi
Independent Escorts Vikaspuri  / 9899900591 High Profile Escort Service in DelhiIndependent Escorts Vikaspuri  / 9899900591 High Profile Escort Service in Delhi
Independent Escorts Vikaspuri / 9899900591 High Profile Escort Service in Delhiguptaswati8536
 
internal analysis on strategic management
internal analysis on strategic managementinternal analysis on strategic management
internal analysis on strategic managementharfimakarim
 
Agile Coaching Change Management Framework.pptx
Agile Coaching Change Management Framework.pptxAgile Coaching Change Management Framework.pptx
Agile Coaching Change Management Framework.pptxalinstan901
 
International Ocean Transportation p.pdf
International Ocean Transportation p.pdfInternational Ocean Transportation p.pdf
International Ocean Transportation p.pdfAlejandromexEspino
 
Dealing with Poor Performance - get the full picture from 3C Performance Mana...
Dealing with Poor Performance - get the full picture from 3C Performance Mana...Dealing with Poor Performance - get the full picture from 3C Performance Mana...
Dealing with Poor Performance - get the full picture from 3C Performance Mana...Hedda Bird
 
Strategic Management, Vision Mission, Internal Analsysis
Strategic Management, Vision Mission, Internal AnalsysisStrategic Management, Vision Mission, Internal Analsysis
Strategic Management, Vision Mission, Internal Analsysistanmayarora45
 
Leaders enhance communication by actively listening, providing constructive f...
Leaders enhance communication by actively listening, providing constructive f...Leaders enhance communication by actively listening, providing constructive f...
Leaders enhance communication by actively listening, providing constructive f...Ram V Chary
 
Beyond the Codes_Repositioning towards sustainable development
Beyond the Codes_Repositioning towards sustainable developmentBeyond the Codes_Repositioning towards sustainable development
Beyond the Codes_Repositioning towards sustainable developmentNimot Muili
 
How Software Developers Destroy Business Value.pptx
How Software Developers Destroy Business Value.pptxHow Software Developers Destroy Business Value.pptx
How Software Developers Destroy Business Value.pptxAaron Stannard
 
BDSM⚡Call Girls in Sector 99 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 99 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 99 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 99 Noida Escorts >༒8448380779 Escort ServiceDelhi Call girls
 
Marketing Management 16th edition by Philip Kotler test bank.docx
Marketing Management 16th edition by Philip Kotler test bank.docxMarketing Management 16th edition by Philip Kotler test bank.docx
Marketing Management 16th edition by Philip Kotler test bank.docxssuserf63bd7
 
Reviewing and summarization of university ranking system to.pptx
Reviewing and summarization of university ranking system  to.pptxReviewing and summarization of university ranking system  to.pptx
Reviewing and summarization of university ranking system to.pptxAss.Prof. Dr. Mogeeb Mosleh
 
Safety T fire missions army field Artillery
Safety T fire missions army field ArtillerySafety T fire missions army field Artillery
Safety T fire missions army field ArtilleryKennethSwanberg
 

Último (15)

Independent Escorts Vikaspuri / 9899900591 High Profile Escort Service in Delhi
Independent Escorts Vikaspuri  / 9899900591 High Profile Escort Service in DelhiIndependent Escorts Vikaspuri  / 9899900591 High Profile Escort Service in Delhi
Independent Escorts Vikaspuri / 9899900591 High Profile Escort Service in Delhi
 
internal analysis on strategic management
internal analysis on strategic managementinternal analysis on strategic management
internal analysis on strategic management
 
Agile Coaching Change Management Framework.pptx
Agile Coaching Change Management Framework.pptxAgile Coaching Change Management Framework.pptx
Agile Coaching Change Management Framework.pptx
 
International Ocean Transportation p.pdf
International Ocean Transportation p.pdfInternational Ocean Transportation p.pdf
International Ocean Transportation p.pdf
 
Abortion pills in Jeddah |• +966572737505 ] GET CYTOTEC
Abortion pills in Jeddah |• +966572737505 ] GET CYTOTECAbortion pills in Jeddah |• +966572737505 ] GET CYTOTEC
Abortion pills in Jeddah |• +966572737505 ] GET CYTOTEC
 
Dealing with Poor Performance - get the full picture from 3C Performance Mana...
Dealing with Poor Performance - get the full picture from 3C Performance Mana...Dealing with Poor Performance - get the full picture from 3C Performance Mana...
Dealing with Poor Performance - get the full picture from 3C Performance Mana...
 
Strategic Management, Vision Mission, Internal Analsysis
Strategic Management, Vision Mission, Internal AnalsysisStrategic Management, Vision Mission, Internal Analsysis
Strategic Management, Vision Mission, Internal Analsysis
 
Leaders enhance communication by actively listening, providing constructive f...
Leaders enhance communication by actively listening, providing constructive f...Leaders enhance communication by actively listening, providing constructive f...
Leaders enhance communication by actively listening, providing constructive f...
 
Intro_University_Ranking_Introduction.pptx
Intro_University_Ranking_Introduction.pptxIntro_University_Ranking_Introduction.pptx
Intro_University_Ranking_Introduction.pptx
 
Beyond the Codes_Repositioning towards sustainable development
Beyond the Codes_Repositioning towards sustainable developmentBeyond the Codes_Repositioning towards sustainable development
Beyond the Codes_Repositioning towards sustainable development
 
How Software Developers Destroy Business Value.pptx
How Software Developers Destroy Business Value.pptxHow Software Developers Destroy Business Value.pptx
How Software Developers Destroy Business Value.pptx
 
BDSM⚡Call Girls in Sector 99 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 99 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 99 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 99 Noida Escorts >༒8448380779 Escort Service
 
Marketing Management 16th edition by Philip Kotler test bank.docx
Marketing Management 16th edition by Philip Kotler test bank.docxMarketing Management 16th edition by Philip Kotler test bank.docx
Marketing Management 16th edition by Philip Kotler test bank.docx
 
Reviewing and summarization of university ranking system to.pptx
Reviewing and summarization of university ranking system  to.pptxReviewing and summarization of university ranking system  to.pptx
Reviewing and summarization of university ranking system to.pptx
 
Safety T fire missions army field Artillery
Safety T fire missions army field ArtillerySafety T fire missions army field Artillery
Safety T fire missions army field Artillery
 

The BCI Cyber Resilience Report 2017

  • 1. 11/01/17 The Business Continuity Institute 1 Continuity and Resilience (CORE) ISO 22301 BCM Consulting Firm Presentations by speakers at the 5th India Business & IT Resilience Summit June 1, 2017 at Meluha – The an Ecotel Hotel Mumbai, India Our Contact Details: UAE INDIA Continuity and Resilience P. O. Box 127557 Abu Dhabi, United Arab Emirates Mobile:+971 50 8460530 Tel: +971 2 8152831 Fax: +971 2 8152888 Email: info@coreconsulting.ae Continuity and Resilience Level 15,Eros Corporate Tower Nehru Place ,New Delhi-110019 Tel: +91 11 41055534/ +91 11 41613033 Fax: ++91 11 41055535 Email: info@coreconsulting.ae
  • 2. 11/01/17 The Business Continuity Institute 22 The BCI Cyber Resilience Report 2017 David West CBCI
  • 3. 11/01/17 The Business Continuity Institute 3 organizations About the BCI Cyber Resilience Report 2017 countries • 221 organizations from India – promoted in partnership with Nasscom • Functional roles include business continuity, risk management and IT disaster recovery • Top sectors represented include IT and communications (35%), finance and insurance (29%) and professional services (14%) • 85% come from large enterprises 745 69
  • 4. 11/01/17 The Business Continuity Institute 4 • Almost three-quarters of Indian organizations (72%) report at least 1 cyber incident in the last 12 months • Top drivers of disruption include phishing and social engineering (57%), malware (35%) and spear phishing (23%) • Indian organizations outperform the global average in terms of deploying business continuity arrangements for cyber resilience issues (91% compared to 87%) and top management commitment to cyber resilience (75% compared to 60%) The headlines BCI Cyber Resilience Report 2017
  • 5. 11/01/17 The Business Continuity Institute 5 Frequency of cyber disruptions 28 46 9 1 1 3 12 0 1-5 6-10 11-20 21-50 51+ Don’t know • Almost three-quarters of Indian organizations (72%) report at least 1 cyber incident in the last 12 months
  • 6. 11/01/17 The Business Continuity Institute 6 Drivers of cyber disruptions 15 15 16 16 23 35 46 Insider threat Out of date software Denial of service Ransomware Spear phishing Malware Phishing and social engineering 0 5 10 15 20 25 30 35 40 45 50 • Top drivers of disruption include phishing and social engineering (57%), malware (35%) and spear phishing (23%)
  • 7. 11/01/17 The Business Continuity Institute 7 Cumulative cost of cyber disruptions 80 13 1 2 1 1 0 2 0 Up to €50k €50-250k €250-500k €500k-1m €1-10m €10-50m €50-250m €250-500m More than €500m • 80% of Indian organizations report losses of up to €50,000 due to cyber disruptions in the last 12 months • 4% of Indian organizations lost at least €1 million during the same time period
  • 8. 11/01/17 The Business Continuity Institute 8 Top management commitment to cyber resilience 75 22 1 0 2 High Medium Low None Don't know • Indian organizations outperform the global average in terms of high top management commitment to cyber resilience issues (75% compared to 60%)
  • 9. 11/01/17 The Business Continuity Institute 9 Deploying business continuity arrangements for cyber disruptions 91 4 5 YES NO Don't know • Indian organizations also outperform the global average in terms of deploying business continuity arrangements for cyber disruptions (91% compared to 87%)
  • 10. 11/01/17 The Business Continuity Institute 10 Response time to cyber disruptions 31 31 13 11 14 Less than 1 hour 1-2 hours 2-3 hours 3-4 hours More than 4 hours • Almost a third of Indian organizations (31%) respond to cyber disruptions within an hour of its discovery
  • 11. 11/01/17 The Business Continuity Institute 11 Cyber resilience issues What are practitioners saying? Business continuity strategies must take all potential cyber security events into account, especially with the emergence of large scale cyber-attacks. Business continuity programmes are beginning to be looked at and invested into as possible strategic assets for cyber resilience. Business continuity plans get activated when cyber security is a threat, so it is no more a domain only for InfoSec people. The business continuity guys have to widen their scope and knowledge base to cope.
  • 12. 11/01/17 The Business Continuity Institute 12 • Business continuity professionals should collaborate and engage with their cyber/information security colleagues. • Reputation management remains a key driver in pushing the cyber resilience agenda. • The cyber resilience of suppliers is expected to increasingly influence organizations’ cyber resilience in turn. • Legislative and regulatory changes are expected to drive cyber resilience and heavily influence efforts in the area. Key takeaways BCI Cyber Resilience Report 2017
  • 13. 11/01/17 The Business Continuity Institute 13 Thank you