SlideShare a Scribd company logo
1 of 4
Download to read offline
Convergence
Section Title

of security risks
Addressing the security dilemma in
today’s age of blended threats
The risks* faced by a typical                                       The whole concept of ‘security’ has                       equally important threats, as well as
organisation have never been more                                   expanded way beyond the traditional                       failing to address the wider issue of
significant, or more complex, and                                   remit into areas like brand and IP                        converged security risks. Converged
as threats have proliferated, it’s no                               protection, human protection, loss                        security risks could seriously
surprise that many Physical and IT                                  prevention, organised crime, parallel                     jeopardise the organisation’s reputation
Security departments are struggling                                 trading, online and traditional fraud.                    and brand, long-term profitability
to keep pace. Safeguarding people,                                  Many security departments are so                          (due to fines from regulators, loss of
process and technology has become                                   busy fighting day-to-day crises that                      contracts and customer churn), or
much more complex.                                                  they’re missing less obvious but                          even its very existence.
                                                                                                                              * Risks = Threat and vulnerabilities




What is convergence                                                                             Why should business demand more
of security risk?                                                                               value from its security functions?
Convergence of security risks is a broad term which cover the multiplicity                      In most organisations, physical and information security are typically
and interdependence of a variety of security risks which face the                               ensured by two separate departments, without an integrated approach to
business. It requires a response which brings together all those dedicated                      indentifying converged risk. It’s all too easy to focus on the wrong things
to the security of the organisation to assess collective corporate risks.                       and therefore overspend on their budget. Most large organisations have
Risks that when looked at in isolation can increase the probability of the                      well-established traditional risk strategies which support clear lines of
risk materialising. As many of the conventional physical and information                        responsibility up to the board-level. This can often lull senior executives
security risks are viewed in isolation, which may converge or overlap                           into a false sense of security. As traditional risks converge with the new
at specific points during the risk lifecycle, and as such, could become                         risks, organisations are often exposed to security and risk gaps that are
a blind spot to the organisation or individuals responsible for risk                            not being managed. This is principally because business functions are
management. Convergence of security risks is important because those                            operating in silos and focusing on ensuring their area of responsibility is
blended or converged risks that pose the greatest risk to our people                            secure or protected (the ‘not in my back-yard’ mentality) or because they
and organisations are often unknown. This includes converged security                           are unaware of such risks.
risks from common and complimentary operating processes. To protect
our people, our businesses and our assets, we need to keep ahead of                             A recent Forrester survey* found that enterprises are overly focused on
those who attack us and work with the business leaders to identify and                          compliance and not focused enough on protecting their secrets. Other
understand those potential blind spots that could cause the business                            key findings included:
most damage.                                                                                    •	 Secrets comprise two-thirds of the vale of the firms’ information portfolios
                                                                                                •	 Compliance, not security drives budgets
This document seeks to define what is security convergence and raise                            •	 Firms focus on protecting accidents, but theft is where the money is
the level of awareness and understanding, so that your organisation
                                                                                                •	 CISOs do not know how effective their security controls are
may be aware of these blended or converged security risks. Leaders
from across the Security, Fraud and Business Continuity sectors have                            Source: * The Value of Corporate Secrets, Forrester March 2010
contributed and given their support to producing this first definition to the
complex subject of convergence of security risks.                                               A wider problem
  Figure 1. Convergence of Security Risks                                                       Even organisations that have audited their security and risk procedures
                                                                                                may find that they’re not as resilient as they first thought. In our
                                                                                                experience, most auditors will focus only on specific aspects of a security
                                  Fraud                                                         programme; with Internal Audit tending to concentrate on auditing
                                                                                                existing procedural details. Yet again, we can understand that ‘Potential
                                               Physical Theft                                   Gaps’ in the security and risk audit programme can leave an organisation
                                                                                                vulnerable to blended or converged security risks.
                    Social Engineering
                                                                                                “A common misconception is that different aspects of
                                          Brand infringement                                    security are being reviewed by internal and external
                                                                                                audit. Unfortunately, this can create gaps in auditing
                   Industrial Espionage
                                                                                                schedules and is undetected until an incident occurs”
                                            Threats to people                                   A quote from a Head of Internal Audit

                              Data loss

This figures depicts how the multiple and complex merging of risk is causing organisations to
rethink their security risk strategy.
What are the business benefits of a converged approach to security risk?

There’s immense value in having a single point of ownership for every          form a risk council. This would meet on a regular basis to assess all
aspect of your organisation’s security. One option for an organisation is      risks and agree appropriate converged responses. Crucially it is those
to appoint a Chief Security Officer (CSO) who can take responsibility for      responsible for a company’s overall security strategy who are best placed
both physical and intangible assets, as well as the increasingly complex       to determine how their organisation can respond to the challenge of
area of compliance. A dotted line to the audit and risk committees is          blended or converged security risks.
vital, and a direct reporting line to the Chief Operating Officer (COO)
can ensure that the issues raised are understood and addressed at              A converged approach will recognise and address the interdependence of
the highest level. Many leading organisations are starting to go this          business functions, overlapping risks, and integrate business processes
way, but for those who do not it’s important to ensure that the Board          or assets i.e. people, technology, information. It will assess the security
and the business have a complete picture of the risks the organisation         profile in terms of actual and potential blended risks, including physical,
really faces, and plans in place to deal with them. If you have one point      people and process risks, rather than specific risks to a single process.
of contact it could also lead to up to 50% fewer meetings for a senior         Therefore these risks should be indentified even if they involve more than
director. A common line of reporting could also be established. This           one process, person or system, or cut across existing departmental lines
will enable the experts from all security areas to examine threats and         of responsibility.
vulnerabilities together and ensure all incidents receive the necessary
attention they deserve. As a consequence, one report will be produced.         The Acronym ‘SIMPLE’ provides an overview of the benefits of a
This will help prioritise the most important risks and give a single view      converged approach to security risk management and can be used to
of the risks facing the business. Another option is for a business to          help build a consistent approach towards security risk convergence:


  Figure 2. A SIMPLE approach equates to greater benefits:




                                                 Effective evaluation Strategic view of
                                                    of corporate audit         organisational risk
                                                           procedures          across all departments
                                              Economies of scale leads to      Less policy, less room
                                          reduced opportunities for crime,     for error, streamlined
                                             crime, reduction in fraud and     process and reporting
                                                         related activities

                               Legislation and                                                                   I
                                                                                                            mproved
                                                                                                 communications by
                               compliance assurance
                                                                                            allocation of appropriate
                               Simplified compliance                  SIMPLE                               resources
                               process, improved legal                  approach                       Responses to crisis,
                               and regulatory position                                      culture and behaviour changes
                                                                                                      can be longer lasting




                                                  Process alignment Mitigation of risk
                                                         and increased         Due to the integration of
                                                             efficiency        intelligence, investigation and
                                                                               disaster recovery techniques,
                                                 Up to 50% fewer meeting
                                                                               reduction in business risk
                                                      for the Risk Director,
                                                                               exposure, increased agility
                                                  reduction of overlapping
                                                                               to market conditions
                                                    processes and policies
A way forward                                                                    Recognising it’s a journey
                                                                                 – a case study
Although security risk convergence can be achieved without merging               BP has a converged risk approach despite physical security and digital
different organisations or departments, most companies find it easier to         security being the responsibility of separate functions. Instead of looking
integrate processes and views within a more integrated (physical and             at each risk in isolation, each team work closely together in parallel,
information security) management structure through active collaboration.         ensuring harmonisation of processes, effectiveness of communication,
                                                                                 and use both teams’ collective experience to quickly identify potential
A converged approach should be driven by the board of directors, non             overlapping risk gaps or cracks. This new converged method of working
executive directors and senior management to ensure the risk strategy is         has helped ensure both physical and digital security risks are better
aligned to the corporate strategy and business objectives.                       identified, managed and monitored.
However organisational change, cultural attitudes and staff behaviours           This pragmatic approach continues to help BP to identify potential
can often be a barrier and can hold many back from the real goal of              pitfalls, risks and opportunities early or in advance of any pending risks
a cross-enterprise risk view. Hence the need for each business to                materialising and therefore further safeguarding the future brand and
determine its own security strategy, aligned to the business goals and           reputation of BP.
objectives, in collaboration with the security function is imperative, should
converged security risks be identified and managed appropriately.

The ability to achieve meaningful convergence or a blended approach
to security risk management, is the responsibility of each business
functional risk leader. They need to consider the implications of what they
are doing and how these actions may affect other functions, or cause
other risks. They should constantly challenge their conventional way of
thinking and this requires a commitment in 4 key areas:

1. Developing a deep understanding across each business and security
   function.

2. Building professionalism and increasing capability within each
   function – with clear and repeatable processes, rather than ad hoc
   solutions to individual challenges.

3. A willingness to share information, integrate processes and
   streamline reporting (including measurements).

4. A humility to accept when other risk priorities come above ones own
   function for funding and management attention.




Further evidence to support this paper can be found in the recent PwC Global State
of Information Security Survey 2010. This survey revealed that Business Leaders are
concerned about the more complex and burdensome regulatory environment, whilst
striving for further cost reductions making adequate security more difficult to achieve.
The survey also suggested that the global economic downturn has increased the role
and importance of the security function.



  Figure 3. Percentage of surveys 7200 respondents reporting impacts that the current economic downturn has had an impact on their
  company’s security function
  Regulatory environment
  has become more
                                                                                                                           56%
                                                                                                                         AGREE
  complex and burdensome

  Increased risk environment has
  elevated the role and importance                                                                                   52%
  of the security function                                                                                          AGREE


  Cost reduction efforts
  make adequate security
                                                                                                                     52%
                                                                                                                    AGREE
  more difficult to achieve

  Because our business partners have
  been weakened by the downturn,
                                                                                                        43%
                                                                                                       AGREE
  we face additional security risks

  Risks to the company’s
  data have increased due
                                                                                                        43%
                                                                                                       AGREE
  to employee layoffs


                                               0%           10%            20%            30%            40%           50%            60%           70%
Contributors to this document

                                                                             PricewaterhouseCoopers (www.pwc.com) provides industry-focused assurance, tax
                                                                             and advisory services to build public trust and enhance value for our clients and their
                                                                             stakeholders. More than 163,000 people in 151 countries across our network share their
                                                                             thinking, experience and solutions to develop fresh perspectives and practical advice.
  Our security global practice has more than 30 years experience, with over 200 information security professionals in our OneSecurity UK network,
  and 3,500 globally in153 countries. Our integrated approach recognises the multi-faceted nature of information security and draws on specialists
  in process improvement, value management, change management, human resources, forensics, risk, and our own legal firm. PwC has gained an
  international reputation for its technical expertise and strong security skills in strategy, design, implementation and assessment services, and as
  such, was recognised as a leader in the Information Security And IT Risk Consulting field by Forrester Wave in 2009.
  “PricewaterhouseCoopers” refers to PricewaterhouseCoopers LLP (a limited liability partnership in the United Kingdom) or, as the context requires,
  the PricewaterhouseCoopers global network or other member firms in the network, each of which is a separate and independent legal entity.




  ASIS International is the largest organisation                   The mission of the Institute of Information                      The Information Security Advisory Forum is
  for security professionals, with more than                       Security Professionals (IISP) is to be                           an umbrella organisation incorporating, the
  35,000 members worldwide including 750                           the authoritative body of information                            BCS, the CMA, Eurim, GetSafeOnline, ISC2,
  in the UK. The UK Chapter runs dynamic                           security professionals. We are achieving                         The Jericho Forum, SASIG and 10 other
  seminars and training days throughout                            this by advancing the professionalism of                         organisations. The aim of the forum is not to
  the year, publishes a quarterly Newsletter                       information security practitioners through                       create new information security awareness
  containing articles from some of the                             personal development, exchange of                                material, but to coordinate the efforts of its
  country’s leading security practitioners and                     information, professional assessment and                         member organisations in order to reduce
  acts as a voice for the security profession,                     qualification, liaison with government, and                      overlap and identify gaps for member
  representing members’ views at the highest                       providing other services required and driven                     organisations to fill. For more information,
  levels. For more information, see www.asis.                      by the industry. For more information, see                       see www.theisaf.org.
  org.uk.                                                          www.instisp.org.




  With more than 86,000 constituents in more                       Portsmouth University – Institute of Criminal                    The Information Assurance Advisory Council
  than 160 countries, ISACA® (www.isaca.org)                       Justice Studies is one of the largest centres                    is a unique partnership that brings together
  is a leading global provider of knowledge,                       in research and course provision in the field                    corporate leaders, public policy makers, law
  certifications, community, advocacy                              of security, fraud and criminology. Its cyber                    enforcement and the research community
  and education on information systems                             security group comprises and offers a wide                       to address the challenges of information
  (IS) assurance and security, enterprise                          range of specialist educational programmes at                    infrastructure protection. See www.iaac.org.uk.
  governance of IT, and IT-related risk and                        undergraduate and postgraduate levels. For
  compliance.                                                      more information, see www.port.ac.uk/icjs




  The Security Awareness Special Interest                          The Security Institute is one of the largest                     The National Federation of Fraud Forums is
  Group (www.thesasig.com) is a subscription                       organisations for security professionals in                      a body that represents the 9 regional fraud
  free quarterly networking forum open                             the UK, actively involved in lobbying to raise                   forums as a single voice on national matters.
  to those who have an interest in, or a                           standards in security profession. The group aim
  responsibility for, raising awareness about                      is to help minimise the gap between Information
  security within their organisations.                             and Physical Security through a focus on the
                                                                   element of risk convergence thereby reducing
                                                                   cost efficiencies and security improvement. See
                                                                   http://www.security-institute.org/


www.pwc.com/uk
This publication has been prepared for general guidance on matters of interest only, and does not constitute professional advice. You should not act upon the information contained
in this publication without obtaining specific professional advice. No representation or warranty (express or implied) is given as to the accuracy or completeness of the information
contained in this publication, and, to the extent permitted by law, the authors and distributors do not accept or assume any liability, responsibility or duty of care for any consequences of
you or anyone else acting, or refraining to act, in reliance on the information contained in this publication or for any decision based on it.
Copyright 2010. All rights reserved.
“PricewaterhouseCoopers” refers to PricewaterhouseCoopers LLP (a limited liability partnership in the United Kingdom) or, as the context requires, the PricewaterhouseCoopers global
network or other member firms of the network, each of which is a separate legal entity.

More Related Content

What's hot

Information Security Governance at Board and Executive Level
Information Security Governance at Board and Executive LevelInformation Security Governance at Board and Executive Level
Information Security Governance at Board and Executive LevelKoen Maris
 
Information Security Maturity Model
Information Security Maturity ModelInformation Security Maturity Model
Information Security Maturity ModelCSCJournals
 
Weakest links of an organization's Cybersecurity chain
Weakest links of an organization's Cybersecurity chainWeakest links of an organization's Cybersecurity chain
Weakest links of an organization's Cybersecurity chainSanjay Chadha, CPA, CA
 
Whitepaper - Data Security while outsourcing
Whitepaper - Data Security while outsourcingWhitepaper - Data Security while outsourcing
Whitepaper - Data Security while outsourcingRaghuraman Ramamurthy
 
The safety leadership challenge building soft skills for exemplary safety p...
The safety leadership challenge   building soft skills for exemplary safety p...The safety leadership challenge   building soft skills for exemplary safety p...
The safety leadership challenge building soft skills for exemplary safety p...OHS Leaders Summit
 
Using the IncMan Suite to Manage the Reporting of Cyber Security Risks and In...
Using the IncMan Suite to Manage the Reporting of Cyber Security Risks and In...Using the IncMan Suite to Manage the Reporting of Cyber Security Risks and In...
Using the IncMan Suite to Manage the Reporting of Cyber Security Risks and In...DFLABS SRL
 
Protecting Utilities through Business Continuity - Scott Roe, Corporate Risk ...
Protecting Utilities through Business Continuity - Scott Roe, Corporate Risk ...Protecting Utilities through Business Continuity - Scott Roe, Corporate Risk ...
Protecting Utilities through Business Continuity - Scott Roe, Corporate Risk ...Energy Network marcus evans
 
Putting safety to work the business case for psychology based safety training...
Putting safety to work the business case for psychology based safety training...Putting safety to work the business case for psychology based safety training...
Putting safety to work the business case for psychology based safety training...OHS Leaders Summit
 
2006 issa journal-organizingand-managingforsuccess
2006 issa journal-organizingand-managingforsuccess2006 issa journal-organizingand-managingforsuccess
2006 issa journal-organizingand-managingforsuccessasundaram1
 
CISO_Paper_Oct27_2015
CISO_Paper_Oct27_2015CISO_Paper_Oct27_2015
CISO_Paper_Oct27_2015Scott Smith
 
speaking-to-board-securiity-whitepaper
speaking-to-board-securiity-whitepaperspeaking-to-board-securiity-whitepaper
speaking-to-board-securiity-whitepaperBilha Diaz
 
CISO_Paper_Oct27_2015
CISO_Paper_Oct27_2015CISO_Paper_Oct27_2015
CISO_Paper_Oct27_2015John Budriss
 
THE EFFECT OF INFORMATION TECHNOLOGY USING ENTERPRISE SECURITY RISK MANAGEMENT
THE EFFECT OF INFORMATION TECHNOLOGY USING ENTERPRISE SECURITY RISK MANAGEMENTTHE EFFECT OF INFORMATION TECHNOLOGY USING ENTERPRISE SECURITY RISK MANAGEMENT
THE EFFECT OF INFORMATION TECHNOLOGY USING ENTERPRISE SECURITY RISK MANAGEMENTIJNSA Journal
 
Xavier Marguinaud in Corporate Livewire Cyber Security Expert Guide 2017 Dec
Xavier Marguinaud in Corporate Livewire Cyber Security Expert Guide 2017 DecXavier Marguinaud in Corporate Livewire Cyber Security Expert Guide 2017 Dec
Xavier Marguinaud in Corporate Livewire Cyber Security Expert Guide 2017 DecLaura Tibbo
 
Integrating-Cyber-Security-for-Increased-Effectiveness
Integrating-Cyber-Security-for-Increased-EffectivenessIntegrating-Cyber-Security-for-Increased-Effectiveness
Integrating-Cyber-Security-for-Increased-EffectivenessAyham Kochaji
 
Massbiz Consulting Crede Sed Proba
Massbiz Consulting Crede Sed ProbaMassbiz Consulting Crede Sed Proba
Massbiz Consulting Crede Sed ProbaJames McDonald
 
How Infosec Can Become a Business Enabler: Interview with: Dr Tim Redhead, Di...
How Infosec Can Become a Business Enabler: Interview with: Dr Tim Redhead, Di...How Infosec Can Become a Business Enabler: Interview with: Dr Tim Redhead, Di...
How Infosec Can Become a Business Enabler: Interview with: Dr Tim Redhead, Di...IT Network marcus evans
 
How To Handle Cybersecurity Risk PowerPoint Presentation Slides
How To Handle Cybersecurity Risk PowerPoint Presentation SlidesHow To Handle Cybersecurity Risk PowerPoint Presentation Slides
How To Handle Cybersecurity Risk PowerPoint Presentation SlidesSlideTeam
 

What's hot (19)

Information Security Governance at Board and Executive Level
Information Security Governance at Board and Executive LevelInformation Security Governance at Board and Executive Level
Information Security Governance at Board and Executive Level
 
Information Security Maturity Model
Information Security Maturity ModelInformation Security Maturity Model
Information Security Maturity Model
 
Weakest links of an organization's Cybersecurity chain
Weakest links of an organization's Cybersecurity chainWeakest links of an organization's Cybersecurity chain
Weakest links of an organization's Cybersecurity chain
 
Whitepaper - Data Security while outsourcing
Whitepaper - Data Security while outsourcingWhitepaper - Data Security while outsourcing
Whitepaper - Data Security while outsourcing
 
The safety leadership challenge building soft skills for exemplary safety p...
The safety leadership challenge   building soft skills for exemplary safety p...The safety leadership challenge   building soft skills for exemplary safety p...
The safety leadership challenge building soft skills for exemplary safety p...
 
Using the IncMan Suite to Manage the Reporting of Cyber Security Risks and In...
Using the IncMan Suite to Manage the Reporting of Cyber Security Risks and In...Using the IncMan Suite to Manage the Reporting of Cyber Security Risks and In...
Using the IncMan Suite to Manage the Reporting of Cyber Security Risks and In...
 
Protecting Utilities through Business Continuity - Scott Roe, Corporate Risk ...
Protecting Utilities through Business Continuity - Scott Roe, Corporate Risk ...Protecting Utilities through Business Continuity - Scott Roe, Corporate Risk ...
Protecting Utilities through Business Continuity - Scott Roe, Corporate Risk ...
 
Putting safety to work the business case for psychology based safety training...
Putting safety to work the business case for psychology based safety training...Putting safety to work the business case for psychology based safety training...
Putting safety to work the business case for psychology based safety training...
 
2006 issa journal-organizingand-managingforsuccess
2006 issa journal-organizingand-managingforsuccess2006 issa journal-organizingand-managingforsuccess
2006 issa journal-organizingand-managingforsuccess
 
CISO_Paper_Oct27_2015
CISO_Paper_Oct27_2015CISO_Paper_Oct27_2015
CISO_Paper_Oct27_2015
 
speaking-to-board-securiity-whitepaper
speaking-to-board-securiity-whitepaperspeaking-to-board-securiity-whitepaper
speaking-to-board-securiity-whitepaper
 
CISO_Paper_Oct27_2015
CISO_Paper_Oct27_2015CISO_Paper_Oct27_2015
CISO_Paper_Oct27_2015
 
Security Maturity Model
Security Maturity ModelSecurity Maturity Model
Security Maturity Model
 
THE EFFECT OF INFORMATION TECHNOLOGY USING ENTERPRISE SECURITY RISK MANAGEMENT
THE EFFECT OF INFORMATION TECHNOLOGY USING ENTERPRISE SECURITY RISK MANAGEMENTTHE EFFECT OF INFORMATION TECHNOLOGY USING ENTERPRISE SECURITY RISK MANAGEMENT
THE EFFECT OF INFORMATION TECHNOLOGY USING ENTERPRISE SECURITY RISK MANAGEMENT
 
Xavier Marguinaud in Corporate Livewire Cyber Security Expert Guide 2017 Dec
Xavier Marguinaud in Corporate Livewire Cyber Security Expert Guide 2017 DecXavier Marguinaud in Corporate Livewire Cyber Security Expert Guide 2017 Dec
Xavier Marguinaud in Corporate Livewire Cyber Security Expert Guide 2017 Dec
 
Integrating-Cyber-Security-for-Increased-Effectiveness
Integrating-Cyber-Security-for-Increased-EffectivenessIntegrating-Cyber-Security-for-Increased-Effectiveness
Integrating-Cyber-Security-for-Increased-Effectiveness
 
Massbiz Consulting Crede Sed Proba
Massbiz Consulting Crede Sed ProbaMassbiz Consulting Crede Sed Proba
Massbiz Consulting Crede Sed Proba
 
How Infosec Can Become a Business Enabler: Interview with: Dr Tim Redhead, Di...
How Infosec Can Become a Business Enabler: Interview with: Dr Tim Redhead, Di...How Infosec Can Become a Business Enabler: Interview with: Dr Tim Redhead, Di...
How Infosec Can Become a Business Enabler: Interview with: Dr Tim Redhead, Di...
 
How To Handle Cybersecurity Risk PowerPoint Presentation Slides
How To Handle Cybersecurity Risk PowerPoint Presentation SlidesHow To Handle Cybersecurity Risk PowerPoint Presentation Slides
How To Handle Cybersecurity Risk PowerPoint Presentation Slides
 

Similar to Convergence of Security Risks

To Be Great Enterprise Risk Managers, CISOs Need to Be Great Collaborators
To Be Great Enterprise Risk Managers, CISOs Need to Be Great CollaboratorsTo Be Great Enterprise Risk Managers, CISOs Need to Be Great Collaborators
To Be Great Enterprise Risk Managers, CISOs Need to Be Great CollaboratorsElizabeth Dimit
 
Shifting Risks and IT Complexities Create Demands for New Enterprise Security...
Shifting Risks and IT Complexities Create Demands for New Enterprise Security...Shifting Risks and IT Complexities Create Demands for New Enterprise Security...
Shifting Risks and IT Complexities Create Demands for New Enterprise Security...Booz Allen Hamilton
 
Priming your digital immune system: Cybersecurity in the cognitive era
Priming your digital immune system: Cybersecurity in the cognitive eraPriming your digital immune system: Cybersecurity in the cognitive era
Priming your digital immune system: Cybersecurity in the cognitive eraLuke Farrell
 
Five principles for improving your cyber security
Five principles for improving your cyber securityFive principles for improving your cyber security
Five principles for improving your cyber securityWGroup
 
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...Accenture Technology
 
Cybersecurity - Whose responsibility is it?
Cybersecurity - Whose responsibility is it?Cybersecurity - Whose responsibility is it?
Cybersecurity - Whose responsibility is it?Armor
 
What is cyber security
What is cyber securityWhat is cyber security
What is cyber securitySAHANAHK
 
Making the Business Case for Security Investment
Making the Business Case for Security InvestmentMaking the Business Case for Security Investment
Making the Business Case for Security InvestmentRoger Johnston
 
Provide a MEMO.docx
Provide a MEMO.docxProvide a MEMO.docx
Provide a MEMO.docxwrite30
 
What CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber SecurityWhat CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber SecurityKaryl Scott
 
Hiring Guide to the Information Security Profession
Hiring Guide to the Information Security ProfessionHiring Guide to the Information Security Profession
Hiring Guide to the Information Security Professionamiable_indian
 
Insights from the IBM Chief Information Security Officer Assessment
Insights from the IBM Chief Information Security Officer AssessmentInsights from the IBM Chief Information Security Officer Assessment
Insights from the IBM Chief Information Security Officer AssessmentIBM Security
 
Insuring your future: Cybersecurity and the insurance industry
Insuring your future: Cybersecurity and the insurance industryInsuring your future: Cybersecurity and the insurance industry
Insuring your future: Cybersecurity and the insurance industryAccenture Insurance
 
Cyber security: five leadership issues worthy of Board and executive attention
Cyber security: five leadership issues worthy of Board and executive attentionCyber security: five leadership issues worthy of Board and executive attention
Cyber security: five leadership issues worthy of Board and executive attentionRamón Gómez de Olea y Bustinza
 
Cyber security: Five leadership issues worthy of board and executive attention
Cyber security: Five leadership issues worthy of board and executive attentionCyber security: Five leadership issues worthy of board and executive attention
Cyber security: Five leadership issues worthy of board and executive attentionRamón Gómez de Olea y Bustinza
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security GovernancePriyanka Aash
 
From checkboxes to frameworks
From checkboxes to frameworksFrom checkboxes to frameworks
From checkboxes to frameworksAndréanne Clarke
 

Similar to Convergence of Security Risks (20)

To Be Great Enterprise Risk Managers, CISOs Need to Be Great Collaborators
To Be Great Enterprise Risk Managers, CISOs Need to Be Great CollaboratorsTo Be Great Enterprise Risk Managers, CISOs Need to Be Great Collaborators
To Be Great Enterprise Risk Managers, CISOs Need to Be Great Collaborators
 
Shifting Risks and IT Complexities Create Demands for New Enterprise Security...
Shifting Risks and IT Complexities Create Demands for New Enterprise Security...Shifting Risks and IT Complexities Create Demands for New Enterprise Security...
Shifting Risks and IT Complexities Create Demands for New Enterprise Security...
 
The meaning of security in the 21st century
The meaning of security in the 21st centuryThe meaning of security in the 21st century
The meaning of security in the 21st century
 
Priming your digital immune system: Cybersecurity in the cognitive era
Priming your digital immune system: Cybersecurity in the cognitive eraPriming your digital immune system: Cybersecurity in the cognitive era
Priming your digital immune system: Cybersecurity in the cognitive era
 
Five principles for improving your cyber security
Five principles for improving your cyber securityFive principles for improving your cyber security
Five principles for improving your cyber security
 
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
 
Cybersecurity - Whose responsibility is it?
Cybersecurity - Whose responsibility is it?Cybersecurity - Whose responsibility is it?
Cybersecurity - Whose responsibility is it?
 
What is cyber security
What is cyber securityWhat is cyber security
What is cyber security
 
Making the Business Case for Security Investment
Making the Business Case for Security InvestmentMaking the Business Case for Security Investment
Making the Business Case for Security Investment
 
Provide a MEMO.docx
Provide a MEMO.docxProvide a MEMO.docx
Provide a MEMO.docx
 
What CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber SecurityWhat CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber Security
 
Hiring Guide to the Information Security Profession
Hiring Guide to the Information Security ProfessionHiring Guide to the Information Security Profession
Hiring Guide to the Information Security Profession
 
Finding a strategic voice
Finding a strategic voiceFinding a strategic voice
Finding a strategic voice
 
Insights from the IBM Chief Information Security Officer Assessment
Insights from the IBM Chief Information Security Officer AssessmentInsights from the IBM Chief Information Security Officer Assessment
Insights from the IBM Chief Information Security Officer Assessment
 
Insuring your future: Cybersecurity and the insurance industry
Insuring your future: Cybersecurity and the insurance industryInsuring your future: Cybersecurity and the insurance industry
Insuring your future: Cybersecurity and the insurance industry
 
Cyber security: five leadership issues worthy of Board and executive attention
Cyber security: five leadership issues worthy of Board and executive attentionCyber security: five leadership issues worthy of Board and executive attention
Cyber security: five leadership issues worthy of Board and executive attention
 
Cyber security: Five leadership issues worthy of board and executive attention
Cyber security: Five leadership issues worthy of board and executive attentionCyber security: Five leadership issues worthy of board and executive attention
Cyber security: Five leadership issues worthy of board and executive attention
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
 
Research Paper
Research PaperResearch Paper
Research Paper
 
From checkboxes to frameworks
From checkboxes to frameworksFrom checkboxes to frameworks
From checkboxes to frameworks
 

More from Enterprise Security Risk Management

Critical Infrastructure and Systems of National Significance (Australia)
Critical Infrastructure and Systems of National Significance (Australia)Critical Infrastructure and Systems of National Significance (Australia)
Critical Infrastructure and Systems of National Significance (Australia)Enterprise Security Risk Management
 
Critical Infrastructure & Systems of National Significance: Security Risk Man...
Critical Infrastructure & Systems of National Significance: Security Risk Man...Critical Infrastructure & Systems of National Significance: Security Risk Man...
Critical Infrastructure & Systems of National Significance: Security Risk Man...Enterprise Security Risk Management
 
Why drunk driving, untested medicines and wild guesses are SAFER then your tr...
Why drunk driving, untested medicines and wild guesses are SAFER then your tr...Why drunk driving, untested medicines and wild guesses are SAFER then your tr...
Why drunk driving, untested medicines and wild guesses are SAFER then your tr...Enterprise Security Risk Management
 
Sydney terrorism.media fear and facts.security risk management. tony ridley. ...
Sydney terrorism.media fear and facts.security risk management. tony ridley. ...Sydney terrorism.media fear and facts.security risk management. tony ridley. ...
Sydney terrorism.media fear and facts.security risk management. tony ridley. ...Enterprise Security Risk Management
 
Security risk management as a sport.tony ridley.security consultant
Security risk management as a sport.tony ridley.security consultantSecurity risk management as a sport.tony ridley.security consultant
Security risk management as a sport.tony ridley.security consultantEnterprise Security Risk Management
 
Security regulation, standards and governance.security risk management.tony r...
Security regulation, standards and governance.security risk management.tony r...Security regulation, standards and governance.security risk management.tony r...
Security regulation, standards and governance.security risk management.tony r...Enterprise Security Risk Management
 
Security expert witness.what is it.tony ridley.security risk mangement.securi...
Security expert witness.what is it.tony ridley.security risk mangement.securi...Security expert witness.what is it.tony ridley.security risk mangement.securi...
Security expert witness.what is it.tony ridley.security risk mangement.securi...Enterprise Security Risk Management
 
Security expert witness.preparations.enquiries.tony ridley.security risk mana...
Security expert witness.preparations.enquiries.tony ridley.security risk mana...Security expert witness.preparations.enquiries.tony ridley.security risk mana...
Security expert witness.preparations.enquiries.tony ridley.security risk mana...Enterprise Security Risk Management
 
Security and risk management. from subject matter expert to business leader.t...
Security and risk management. from subject matter expert to business leader.t...Security and risk management. from subject matter expert to business leader.t...
Security and risk management. from subject matter expert to business leader.t...Enterprise Security Risk Management
 
Security and risk management in emerging and developing markets.tony ridley.s...
Security and risk management in emerging and developing markets.tony ridley.s...Security and risk management in emerging and developing markets.tony ridley.s...
Security and risk management in emerging and developing markets.tony ridley.s...Enterprise Security Risk Management
 
8 security masters degrees compared.security risk management.tony ridley.se...
8  security  masters degrees compared.security risk management.tony ridley.se...8  security  masters degrees compared.security risk management.tony ridley.se...
8 security masters degrees compared.security risk management.tony ridley.se...Enterprise Security Risk Management
 
Appreciation process.time critical decision making.security risk management.t...
Appreciation process.time critical decision making.security risk management.t...Appreciation process.time critical decision making.security risk management.t...
Appreciation process.time critical decision making.security risk management.t...Enterprise Security Risk Management
 
Cheap and nasty.security certification.tony ridley.security consultant
Cheap and nasty.security certification.tony ridley.security consultantCheap and nasty.security certification.tony ridley.security consultant
Cheap and nasty.security certification.tony ridley.security consultantEnterprise Security Risk Management
 
Educational levels of professionals.a guide.tony ridley.security risk managem...
Educational levels of professionals.a guide.tony ridley.security risk managem...Educational levels of professionals.a guide.tony ridley.security risk managem...
Educational levels of professionals.a guide.tony ridley.security risk managem...Enterprise Security Risk Management
 
Fat tail distribution hypothesis.tony ridley.security risk management.securit...
Fat tail distribution hypothesis.tony ridley.security risk management.securit...Fat tail distribution hypothesis.tony ridley.security risk management.securit...
Fat tail distribution hypothesis.tony ridley.security risk management.securit...Enterprise Security Risk Management
 
Forecastings.intelligence.predictions.experts.accuracy.security science.risk ...
Forecastings.intelligence.predictions.experts.accuracy.security science.risk ...Forecastings.intelligence.predictions.experts.accuracy.security science.risk ...
Forecastings.intelligence.predictions.experts.accuracy.security science.risk ...Enterprise Security Risk Management
 
Educational levels of professionals.a guide.tony ridley.security risk managem...
Educational levels of professionals.a guide.tony ridley.security risk managem...Educational levels of professionals.a guide.tony ridley.security risk managem...
Educational levels of professionals.a guide.tony ridley.security risk managem...Enterprise Security Risk Management
 
Takes a thief to catch a thief.security ethics.tony ridley.security risk mana...
Takes a thief to catch a thief.security ethics.tony ridley.security risk mana...Takes a thief to catch a thief.security ethics.tony ridley.security risk mana...
Takes a thief to catch a thief.security ethics.tony ridley.security risk mana...Enterprise Security Risk Management
 

More from Enterprise Security Risk Management (20)

Post Pandemic Travel: Terrorism and Security Risks for Tourists
Post Pandemic Travel: Terrorism and Security Risks for TouristsPost Pandemic Travel: Terrorism and Security Risks for Tourists
Post Pandemic Travel: Terrorism and Security Risks for Tourists
 
Critical Infrastructure and Systems of National Significance (Australia)
Critical Infrastructure and Systems of National Significance (Australia)Critical Infrastructure and Systems of National Significance (Australia)
Critical Infrastructure and Systems of National Significance (Australia)
 
Critical Infrastructure & Systems of National Significance: Security Risk Man...
Critical Infrastructure & Systems of National Significance: Security Risk Man...Critical Infrastructure & Systems of National Significance: Security Risk Man...
Critical Infrastructure & Systems of National Significance: Security Risk Man...
 
Why drunk driving, untested medicines and wild guesses are SAFER then your tr...
Why drunk driving, untested medicines and wild guesses are SAFER then your tr...Why drunk driving, untested medicines and wild guesses are SAFER then your tr...
Why drunk driving, untested medicines and wild guesses are SAFER then your tr...
 
Sydney terrorism.media fear and facts.security risk management. tony ridley. ...
Sydney terrorism.media fear and facts.security risk management. tony ridley. ...Sydney terrorism.media fear and facts.security risk management. tony ridley. ...
Sydney terrorism.media fear and facts.security risk management. tony ridley. ...
 
Security risk management as a sport.tony ridley.security consultant
Security risk management as a sport.tony ridley.security consultantSecurity risk management as a sport.tony ridley.security consultant
Security risk management as a sport.tony ridley.security consultant
 
Security regulation, standards and governance.security risk management.tony r...
Security regulation, standards and governance.security risk management.tony r...Security regulation, standards and governance.security risk management.tony r...
Security regulation, standards and governance.security risk management.tony r...
 
Security expert witness.what is it.tony ridley.security risk mangement.securi...
Security expert witness.what is it.tony ridley.security risk mangement.securi...Security expert witness.what is it.tony ridley.security risk mangement.securi...
Security expert witness.what is it.tony ridley.security risk mangement.securi...
 
Security expert witness.preparations.enquiries.tony ridley.security risk mana...
Security expert witness.preparations.enquiries.tony ridley.security risk mana...Security expert witness.preparations.enquiries.tony ridley.security risk mana...
Security expert witness.preparations.enquiries.tony ridley.security risk mana...
 
Security and risk management. from subject matter expert to business leader.t...
Security and risk management. from subject matter expert to business leader.t...Security and risk management. from subject matter expert to business leader.t...
Security and risk management. from subject matter expert to business leader.t...
 
Security and risk management in emerging and developing markets.tony ridley.s...
Security and risk management in emerging and developing markets.tony ridley.s...Security and risk management in emerging and developing markets.tony ridley.s...
Security and risk management in emerging and developing markets.tony ridley.s...
 
8 security masters degrees compared.security risk management.tony ridley.se...
8  security  masters degrees compared.security risk management.tony ridley.se...8  security  masters degrees compared.security risk management.tony ridley.se...
8 security masters degrees compared.security risk management.tony ridley.se...
 
Appreciation process.time critical decision making.security risk management.t...
Appreciation process.time critical decision making.security risk management.t...Appreciation process.time critical decision making.security risk management.t...
Appreciation process.time critical decision making.security risk management.t...
 
Cheap and nasty.security certification.tony ridley.security consultant
Cheap and nasty.security certification.tony ridley.security consultantCheap and nasty.security certification.tony ridley.security consultant
Cheap and nasty.security certification.tony ridley.security consultant
 
Educational levels of professionals.a guide.tony ridley.security risk managem...
Educational levels of professionals.a guide.tony ridley.security risk managem...Educational levels of professionals.a guide.tony ridley.security risk managem...
Educational levels of professionals.a guide.tony ridley.security risk managem...
 
Fat tail distribution hypothesis.tony ridley.security risk management.securit...
Fat tail distribution hypothesis.tony ridley.security risk management.securit...Fat tail distribution hypothesis.tony ridley.security risk management.securit...
Fat tail distribution hypothesis.tony ridley.security risk management.securit...
 
Forecastings.intelligence.predictions.experts.accuracy.security science.risk ...
Forecastings.intelligence.predictions.experts.accuracy.security science.risk ...Forecastings.intelligence.predictions.experts.accuracy.security science.risk ...
Forecastings.intelligence.predictions.experts.accuracy.security science.risk ...
 
Get to the point..faster.tony ridley.security risk management
Get to the point..faster.tony ridley.security risk managementGet to the point..faster.tony ridley.security risk management
Get to the point..faster.tony ridley.security risk management
 
Educational levels of professionals.a guide.tony ridley.security risk managem...
Educational levels of professionals.a guide.tony ridley.security risk managem...Educational levels of professionals.a guide.tony ridley.security risk managem...
Educational levels of professionals.a guide.tony ridley.security risk managem...
 
Takes a thief to catch a thief.security ethics.tony ridley.security risk mana...
Takes a thief to catch a thief.security ethics.tony ridley.security risk mana...Takes a thief to catch a thief.security ethics.tony ridley.security risk mana...
Takes a thief to catch a thief.security ethics.tony ridley.security risk mana...
 

Recently uploaded

Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyotictsugar
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...lizamodels9
 
Call Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any TimeCall Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any Timedelhimodelshub1
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesKeppelCorporation
 
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...lizamodels9
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCRashishs7044
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Riya Pathan
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis UsageNeil Kimberley
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03DallasHaselhorst
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...lizamodels9
 
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In.../:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...lizamodels9
 
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxContemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxMarkAnthonyAurellano
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCRashishs7044
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCRashishs7044
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africaictsugar
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfRbc Rbcua
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfJos Voskuil
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation SlidesKeppelCorporation
 

Recently uploaded (20)

Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyot
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
 
Call Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any TimeCall Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any Time
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation Slides
 
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03
 
Corporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information TechnologyCorporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information Technology
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
 
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In.../:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
 
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxContemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africa
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdf
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdf
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
 

Convergence of Security Risks

  • 1. Convergence Section Title of security risks Addressing the security dilemma in today’s age of blended threats The risks* faced by a typical The whole concept of ‘security’ has equally important threats, as well as organisation have never been more expanded way beyond the traditional failing to address the wider issue of significant, or more complex, and remit into areas like brand and IP converged security risks. Converged as threats have proliferated, it’s no protection, human protection, loss security risks could seriously surprise that many Physical and IT prevention, organised crime, parallel jeopardise the organisation’s reputation Security departments are struggling trading, online and traditional fraud. and brand, long-term profitability to keep pace. Safeguarding people, Many security departments are so (due to fines from regulators, loss of process and technology has become busy fighting day-to-day crises that contracts and customer churn), or much more complex. they’re missing less obvious but even its very existence. * Risks = Threat and vulnerabilities What is convergence Why should business demand more of security risk? value from its security functions? Convergence of security risks is a broad term which cover the multiplicity In most organisations, physical and information security are typically and interdependence of a variety of security risks which face the ensured by two separate departments, without an integrated approach to business. It requires a response which brings together all those dedicated indentifying converged risk. It’s all too easy to focus on the wrong things to the security of the organisation to assess collective corporate risks. and therefore overspend on their budget. Most large organisations have Risks that when looked at in isolation can increase the probability of the well-established traditional risk strategies which support clear lines of risk materialising. As many of the conventional physical and information responsibility up to the board-level. This can often lull senior executives security risks are viewed in isolation, which may converge or overlap into a false sense of security. As traditional risks converge with the new at specific points during the risk lifecycle, and as such, could become risks, organisations are often exposed to security and risk gaps that are a blind spot to the organisation or individuals responsible for risk not being managed. This is principally because business functions are management. Convergence of security risks is important because those operating in silos and focusing on ensuring their area of responsibility is blended or converged risks that pose the greatest risk to our people secure or protected (the ‘not in my back-yard’ mentality) or because they and organisations are often unknown. This includes converged security are unaware of such risks. risks from common and complimentary operating processes. To protect our people, our businesses and our assets, we need to keep ahead of A recent Forrester survey* found that enterprises are overly focused on those who attack us and work with the business leaders to identify and compliance and not focused enough on protecting their secrets. Other understand those potential blind spots that could cause the business key findings included: most damage. • Secrets comprise two-thirds of the vale of the firms’ information portfolios • Compliance, not security drives budgets This document seeks to define what is security convergence and raise • Firms focus on protecting accidents, but theft is where the money is the level of awareness and understanding, so that your organisation • CISOs do not know how effective their security controls are may be aware of these blended or converged security risks. Leaders from across the Security, Fraud and Business Continuity sectors have Source: * The Value of Corporate Secrets, Forrester March 2010 contributed and given their support to producing this first definition to the complex subject of convergence of security risks. A wider problem Figure 1. Convergence of Security Risks Even organisations that have audited their security and risk procedures may find that they’re not as resilient as they first thought. In our experience, most auditors will focus only on specific aspects of a security Fraud programme; with Internal Audit tending to concentrate on auditing existing procedural details. Yet again, we can understand that ‘Potential Physical Theft Gaps’ in the security and risk audit programme can leave an organisation vulnerable to blended or converged security risks. Social Engineering “A common misconception is that different aspects of Brand infringement security are being reviewed by internal and external audit. Unfortunately, this can create gaps in auditing Industrial Espionage schedules and is undetected until an incident occurs” Threats to people A quote from a Head of Internal Audit Data loss This figures depicts how the multiple and complex merging of risk is causing organisations to rethink their security risk strategy.
  • 2. What are the business benefits of a converged approach to security risk? There’s immense value in having a single point of ownership for every form a risk council. This would meet on a regular basis to assess all aspect of your organisation’s security. One option for an organisation is risks and agree appropriate converged responses. Crucially it is those to appoint a Chief Security Officer (CSO) who can take responsibility for responsible for a company’s overall security strategy who are best placed both physical and intangible assets, as well as the increasingly complex to determine how their organisation can respond to the challenge of area of compliance. A dotted line to the audit and risk committees is blended or converged security risks. vital, and a direct reporting line to the Chief Operating Officer (COO) can ensure that the issues raised are understood and addressed at A converged approach will recognise and address the interdependence of the highest level. Many leading organisations are starting to go this business functions, overlapping risks, and integrate business processes way, but for those who do not it’s important to ensure that the Board or assets i.e. people, technology, information. It will assess the security and the business have a complete picture of the risks the organisation profile in terms of actual and potential blended risks, including physical, really faces, and plans in place to deal with them. If you have one point people and process risks, rather than specific risks to a single process. of contact it could also lead to up to 50% fewer meetings for a senior Therefore these risks should be indentified even if they involve more than director. A common line of reporting could also be established. This one process, person or system, or cut across existing departmental lines will enable the experts from all security areas to examine threats and of responsibility. vulnerabilities together and ensure all incidents receive the necessary attention they deserve. As a consequence, one report will be produced. The Acronym ‘SIMPLE’ provides an overview of the benefits of a This will help prioritise the most important risks and give a single view converged approach to security risk management and can be used to of the risks facing the business. Another option is for a business to help build a consistent approach towards security risk convergence: Figure 2. A SIMPLE approach equates to greater benefits: Effective evaluation Strategic view of of corporate audit organisational risk procedures across all departments Economies of scale leads to Less policy, less room reduced opportunities for crime, for error, streamlined crime, reduction in fraud and process and reporting related activities Legislation and I mproved communications by compliance assurance allocation of appropriate Simplified compliance SIMPLE resources process, improved legal approach Responses to crisis, and regulatory position culture and behaviour changes can be longer lasting Process alignment Mitigation of risk and increased Due to the integration of efficiency intelligence, investigation and disaster recovery techniques, Up to 50% fewer meeting reduction in business risk for the Risk Director, exposure, increased agility reduction of overlapping to market conditions processes and policies
  • 3. A way forward Recognising it’s a journey – a case study Although security risk convergence can be achieved without merging BP has a converged risk approach despite physical security and digital different organisations or departments, most companies find it easier to security being the responsibility of separate functions. Instead of looking integrate processes and views within a more integrated (physical and at each risk in isolation, each team work closely together in parallel, information security) management structure through active collaboration. ensuring harmonisation of processes, effectiveness of communication, and use both teams’ collective experience to quickly identify potential A converged approach should be driven by the board of directors, non overlapping risk gaps or cracks. This new converged method of working executive directors and senior management to ensure the risk strategy is has helped ensure both physical and digital security risks are better aligned to the corporate strategy and business objectives. identified, managed and monitored. However organisational change, cultural attitudes and staff behaviours This pragmatic approach continues to help BP to identify potential can often be a barrier and can hold many back from the real goal of pitfalls, risks and opportunities early or in advance of any pending risks a cross-enterprise risk view. Hence the need for each business to materialising and therefore further safeguarding the future brand and determine its own security strategy, aligned to the business goals and reputation of BP. objectives, in collaboration with the security function is imperative, should converged security risks be identified and managed appropriately. The ability to achieve meaningful convergence or a blended approach to security risk management, is the responsibility of each business functional risk leader. They need to consider the implications of what they are doing and how these actions may affect other functions, or cause other risks. They should constantly challenge their conventional way of thinking and this requires a commitment in 4 key areas: 1. Developing a deep understanding across each business and security function. 2. Building professionalism and increasing capability within each function – with clear and repeatable processes, rather than ad hoc solutions to individual challenges. 3. A willingness to share information, integrate processes and streamline reporting (including measurements). 4. A humility to accept when other risk priorities come above ones own function for funding and management attention. Further evidence to support this paper can be found in the recent PwC Global State of Information Security Survey 2010. This survey revealed that Business Leaders are concerned about the more complex and burdensome regulatory environment, whilst striving for further cost reductions making adequate security more difficult to achieve. The survey also suggested that the global economic downturn has increased the role and importance of the security function. Figure 3. Percentage of surveys 7200 respondents reporting impacts that the current economic downturn has had an impact on their company’s security function Regulatory environment has become more 56% AGREE complex and burdensome Increased risk environment has elevated the role and importance 52% of the security function AGREE Cost reduction efforts make adequate security 52% AGREE more difficult to achieve Because our business partners have been weakened by the downturn, 43% AGREE we face additional security risks Risks to the company’s data have increased due 43% AGREE to employee layoffs 0% 10% 20% 30% 40% 50% 60% 70%
  • 4. Contributors to this document PricewaterhouseCoopers (www.pwc.com) provides industry-focused assurance, tax and advisory services to build public trust and enhance value for our clients and their stakeholders. More than 163,000 people in 151 countries across our network share their thinking, experience and solutions to develop fresh perspectives and practical advice. Our security global practice has more than 30 years experience, with over 200 information security professionals in our OneSecurity UK network, and 3,500 globally in153 countries. Our integrated approach recognises the multi-faceted nature of information security and draws on specialists in process improvement, value management, change management, human resources, forensics, risk, and our own legal firm. PwC has gained an international reputation for its technical expertise and strong security skills in strategy, design, implementation and assessment services, and as such, was recognised as a leader in the Information Security And IT Risk Consulting field by Forrester Wave in 2009. “PricewaterhouseCoopers” refers to PricewaterhouseCoopers LLP (a limited liability partnership in the United Kingdom) or, as the context requires, the PricewaterhouseCoopers global network or other member firms in the network, each of which is a separate and independent legal entity. ASIS International is the largest organisation The mission of the Institute of Information The Information Security Advisory Forum is for security professionals, with more than Security Professionals (IISP) is to be an umbrella organisation incorporating, the 35,000 members worldwide including 750 the authoritative body of information BCS, the CMA, Eurim, GetSafeOnline, ISC2, in the UK. The UK Chapter runs dynamic security professionals. We are achieving The Jericho Forum, SASIG and 10 other seminars and training days throughout this by advancing the professionalism of organisations. The aim of the forum is not to the year, publishes a quarterly Newsletter information security practitioners through create new information security awareness containing articles from some of the personal development, exchange of material, but to coordinate the efforts of its country’s leading security practitioners and information, professional assessment and member organisations in order to reduce acts as a voice for the security profession, qualification, liaison with government, and overlap and identify gaps for member representing members’ views at the highest providing other services required and driven organisations to fill. For more information, levels. For more information, see www.asis. by the industry. For more information, see see www.theisaf.org. org.uk. www.instisp.org. With more than 86,000 constituents in more Portsmouth University – Institute of Criminal The Information Assurance Advisory Council than 160 countries, ISACA® (www.isaca.org) Justice Studies is one of the largest centres is a unique partnership that brings together is a leading global provider of knowledge, in research and course provision in the field corporate leaders, public policy makers, law certifications, community, advocacy of security, fraud and criminology. Its cyber enforcement and the research community and education on information systems security group comprises and offers a wide to address the challenges of information (IS) assurance and security, enterprise range of specialist educational programmes at infrastructure protection. See www.iaac.org.uk. governance of IT, and IT-related risk and undergraduate and postgraduate levels. For compliance. more information, see www.port.ac.uk/icjs The Security Awareness Special Interest The Security Institute is one of the largest The National Federation of Fraud Forums is Group (www.thesasig.com) is a subscription organisations for security professionals in a body that represents the 9 regional fraud free quarterly networking forum open the UK, actively involved in lobbying to raise forums as a single voice on national matters. to those who have an interest in, or a standards in security profession. The group aim responsibility for, raising awareness about is to help minimise the gap between Information security within their organisations. and Physical Security through a focus on the element of risk convergence thereby reducing cost efficiencies and security improvement. See http://www.security-institute.org/ www.pwc.com/uk This publication has been prepared for general guidance on matters of interest only, and does not constitute professional advice. You should not act upon the information contained in this publication without obtaining specific professional advice. No representation or warranty (express or implied) is given as to the accuracy or completeness of the information contained in this publication, and, to the extent permitted by law, the authors and distributors do not accept or assume any liability, responsibility or duty of care for any consequences of you or anyone else acting, or refraining to act, in reliance on the information contained in this publication or for any decision based on it. Copyright 2010. All rights reserved. “PricewaterhouseCoopers” refers to PricewaterhouseCoopers LLP (a limited liability partnership in the United Kingdom) or, as the context requires, the PricewaterhouseCoopers global network or other member firms of the network, each of which is a separate legal entity.