31
Cyber Risk – a threat to energy security By Vincent Loy, PwC October 2014

Cyber Risk A Threat to Energy Security

Embed Size (px)

Citation preview

Page 1: Cyber Risk A Threat to Energy Security

Cyber Risk– a threat to energy securityBy Vincent Loy, PwC

October 2014

Page 2: Cyber Risk A Threat to Energy Security

PwC

Agenda

1

• Cyber- Opportunities and Threats

• Cyber Threats – Why, Who, What and How?

• Where are We?

• Putting Cyber Threats in Perspective

Page 3: Cyber Risk A Threat to Energy Security

PwC

2

• Cyber- Opportunities and Threats

Page 4: Cyber Risk A Threat to Energy Security

PwCDRAFT

Page 5: Cyber Risk A Threat to Energy Security

PwC

The New Global Business Ecosystem- The Opportunities

Enterprise

Consumer

Suppliers

JV/Partners

ServiceProviders

Customer

Industry/Competitors

Technology

En

vir

on

me

nta

l

Economic

• An increase in reliance on technology

• Technology-led innovation has enabledbusiness models to evolve

• Convergence of information technology,operational technology and consumertechnology

• Information and data throughout thebusiness ecosystem

• The extended enterprise has movedbeyond supply chain and consumerintegration

• Connectivity and collaboration nowextends to all facets of business

• Transactions and operations spanningmultiple parties

• Organisations built on trust andcollaboration

Page 6: Cyber Risk A Threat to Energy Security

PwC

The New Global Business Ecosystem- The Risks

5

Pressures and changes whichcreate opportunity and risk

• Traditional boundaries have shifted; companiesoperate in a dynamic environment that isincreasingly interconnected, integrated, andinterdependent.

• The ecosystem is built around a model ofopen collaboration and trust—the veryattributes being exploited by an increasingnumber of global adversaries.

• Constant information flow is the lifebloodof the business ecosystem. Data isdistributed and disbursed throughout theecosystem, expanding the domain requiringprotection.

• Adversaries are actively targeting criticalassets throughout the ecosystem—significantlyincreasing the exposure and impact tobusinesses.

• Years of underinvestment in security hasimpacted organizations’ ability to adapt andrespond to evolving, dynamic cyber risks.

Page 7: Cyber Risk A Threat to Energy Security

PwC

6

• Cyber Threats – Who, What and How?

Page 8: Cyber Risk A Threat to Energy Security

PwC

Who are we protecting against

NationState

Hacktivism

OrganisedCrime

CyberTerrorists

INSIDER

DRAFT

Page 9: Cyber Risk A Threat to Energy Security

PwC

The Actors and The Information They Target

8

Adversary

Input from Office of the National Counterintelligence Executive, Report to Congresson the Foreign Economic Collection and Industrial Espionage, 2009-2011, October2011.

Emergingtechnologies

Militarytechnologies

Advanced materials andmanufacturing techniques

Healthcare,pharmaceuticals, andrelated technologies

Business dealsinformation

What’s most at risk?

Nation State

Organized Crime

Insiders

Hacktivists

Health records andother personal data

Industrial ControlSystems (SCADA)

R&D and / or productdesign data

$ Payment card and relatedinformation / financialmarkets

Adversary motives and tactics evolve as business strategies change and business activities are executed;‘crown jewels’ must be identified and their protection prioritized, monitored and adjusted accordingly.

Information andcommunicationtechnology and data

Page 10: Cyber Risk A Threat to Energy Security

PwC

Profiles of Threat Actors

9

Nation State

Insiders

OrganizedCrime

Hacktivists

• Economic, political,and/or military advantage

• Immediate financial gain• Collect information for

future financial gains

• Personal advantage,monetary gain

• Professional revenge• Patriotism

• Influence political and /orsocial change

• Pressure business to changetheir practices

MotivesAdversary

• Trade secrets• Sensitive business

information• Emerging technologies• Critical infrastructure

• Financial / Payment Systems• Personally Identifiable

Information• Payment Card Information• Protected Health Information

• Sales, deals, market strategies• Corporate secrets, IP, R&D• Business operations• Personnel information

• Corporate secrets• Sensitive business information• Information related to key

executives, employees,customers & business partners

Targets

• Loss of competitiveadvantage

• Disruption to criticalinfrastructure

• Costly regulatory inquiriesand penalties

• Consumer and shareholderlawsuits

• Loss of consumer confidence

• Trade secret disclosure• Operational disruption• Brand and reputation• National security impact

• Disruption of businessactivities

• Brand and reputation• Loss of consumer confidence

Impact

Page 11: Cyber Risk A Threat to Energy Security

PwCDRAFT

Page 12: Cyber Risk A Threat to Energy Security

PwC

Organizations have not kept pace

11

Years of underinvestment in certain areas has left organizations unable to adequately adapt andrespond to dynamic cyber risks.

Product & ServiceSecurity

PhysicalSecurity

OperationalTechnology

Security

Public/PrivateInformation

Sharing

ThreatModeling

& ScenarioPlanning

TechnologyAdoption andEnablement

Ecosystem &Supply Chain

Security

GlobalSecurity

Operations

BreachInvestigationand Response

Notificationand

Disclosure

Privileged AccessManagement

SecurityTechnology

Rationalization

Patch &ConfigurationManagement

consecteturadipiscing elit

InsiderThreat

UserAdministration

TechnologyDebt

Management

Secure Mobileand CloudComputing

Security Strategy and Roadmap

Board, Audit Committee, and Executive Leadership Engagement

Business Alignment and Enablement

Process andTechnology

Fundamentals

ThreatIntelligence

Incidentand Crisis

Management

Ris

ka

nd

Imp

ac

tE

va

lua

tio

nR

es

ou

rc

eP

rio

ritiz

atio

n

Security Program, Functions, Resources and Capabilities

ComplianceRemediation

Security Cultureand Mindset

Monitoringand Detection

Critical AssetIdentification and

Protection

Page 13: Cyber Risk A Threat to Energy Security

PwC

12

• Where are We?

(Based on PwC Global Information Security Survey 2015)

Page 14: Cyber Risk A Threat to Energy Security

PwC

High growth in high-profile crimes

13

86% jump in incidents by

nation-states (with China, HK

and India with the highest values)

64% rise in compromises

by competitors

26% increase in incidents by

organised crime.

Incidents attributed to nation-states, organised crime, and

competitors increased sharply in 2014.

Page 15: Cyber Risk A Threat to Energy Security

PwC

The number of security incidents continues

to soar

The total number of security incidents

detected globally by survey respondents

climbed to 42.8 million this year, an

increase of 48% over 2013.

14

It’s the equivalent of 117,339 incoming

attacks per day, every day. And that’s

just the compromises that were

discovered.

Page 16: Cyber Risk A Threat to Energy Security

PwC15

As security incidents grow in frequency, the costs of managing

and mitigating breaches also are rising.

Globally, the annual estimated reported average financial loss

attributed to cybersecurity incidents was US$2.7 million,

a jump of 34% over 2013.

Not surprising, but certainly attention grabbing, is the finding

that big losses are more common: Organisations reporting

financial hits of US$20 million or more increased 92% over

2013.

The financial cost of security incidents is

high and rising

• Incidents and financial impacts continue to soar

Page 17: Cyber Risk A Threat to Energy Security

PwC

Number of Security incidents detected in thepast 12 months

Page 18: Cyber Risk A Threat to Energy Security

PwC

Estimated total financial losses as a result of allsecurity incidents (USD)

Page 19: Cyber Risk A Threat to Energy Security

PwC

Monetary losses stretch into the billions of dollars…

The estimated global cost of cybercrime detected by respondents this year is more than US$23

billion.

Again, it’s important to note this figure represents only detected compromises.

It is almost important to note that the value of certain kinds of information – intellectual property

and trade secrets, in particular – is very difficult to ascertain.

18

Page 20: Cyber Risk A Threat to Energy Security

PwC

Despite elevated risks, security budgets decline in 2014

19

Many organisations are undoubtedly worried about the

rising tide of cybercrime, yet most have not increased their

investment security initiatives.

In fact, global IS budgets actually decreased 4%

compared with 2013. And security spending as a percentage

of the total IT budget has remained stalled at 4% or less

for the past five years.

Page 21: Cyber Risk A Threat to Energy Security

PwC

Incidents attributed to insiders rises while security preparedness falls

20

Current and former employees are the most-cited

culprits of security incidents, but implementation of

key insider-threat safeguards is declining.

• 56% have privileged user-access tools (65% in

2013) as compared to 61% of respondents in APAC.

• 51% have an employee security training and

awareness program

(60% in 2013) as compared to 55.6% in APAC.

Compromises attributed to third parties with

trusted access increases while due diligence

weakens.

• In Asia Pacific, 55% of respondents require third

parties to comply with their privacy policies

(vs. 53.55% of the global average).

• Employees are the most cited culprits of incidents

Page 22: Cyber Risk A Threat to Energy Security

PwC

21

• Putting Cyber Threats in Perspective

Page 23: Cyber Risk A Threat to Energy Security

PwC

Putting cybersecurity into perspective

22

• Cybersecurity represents many things to many different people

• Key characteristics and attributes of cybersecurity:

─ Broader than just information technology and not limited to just the enterprise

─ Increasing attack surface due to technology connectivity and convergence

─ An ‘outside-in view’ of the threats and potential impact facing an organization

─ Shared responsibility that requires cross functional disciplines in order to plan,protect, defend and respond

Page 24: Cyber Risk A Threat to Energy Security

PwC

HistoricalIT Security

Perspectives

Today’s LeadingCybersecurity

Insights

Scope of the challenge • Limited to your “four walls” andthe extended enterprise

• Spans your interconnected globalbusiness ecosystem

Ownership andaccountability

• IT led and operated • Business-aligned and owned; CEO andboard accountable

Adversaries’characteristics

• One-off and opportunistic;motivated by notoriety, technicalchallenge, and individual gain

• Organized, funded and targeted;motivated by economic, monetary andpolitical gain

Information assetprotection

• One-size-fits-all approach • Prioritize and protect your “crownjewels”

Defense posture • Protect the perimeter; respond ifattacked

• Plan, monitor, and rapidly respondwhen attacked

Security intelligence andinformation sharing

• Keep to yourself • Public/private partnerships;collaboration with industry workinggroups

23

Evolving perspectivesConsiderations for businesses adapting to the new reality

Page 25: Cyber Risk A Threat to Energy Security

PwCDRAFT

Page 26: Cyber Risk A Threat to Energy Security

PwC

Product & ServiceSecurity

PhysicalSecurity

OperationalTechnology

Security

Public/PrivateInformation

Sharing

ThreatModeling

& ScenarioPlanning

TechnologyAdoption andEnablement

Ecosystem &Supply Chain

Security

GlobalSecurity

Operations

BreachInvestigationand Response

Notificationand

Disclosure

Privileged AccessManagement

SecurityTechnology

Rationalization

Patch &ConfigurationManagement

consecteturadipiscing elit

InsiderThreat

UserAdministration

TechnologyDebt

Management

Secure Mobileand CloudComputing

Security Strategy and Roadmap

Board, Audit Committee, and Executive Leadership Engagement

Business Alignment and Enablement

Ris

ka

nd

Imp

ac

tE

va

lua

tio

nR

es

ou

rc

eP

rio

ritiz

atio

n

Security Program, Functions, Resources and Capabilities

ComplianceRemediation

Have you kept pace?

25

Questions to consider when evaluating your ability to respond to thenew challenges.

Security Cultureand Mindset

Process andTechnology

Fundamentals

ThreatIntelligence

Monitoringand Detection

Critical AssetIdentification and

Protection

Incidentand Crisis

Management

Develop a cross-functional incidentresponse plan for effective crisismanagement

• Have your business leaders undertakencyberattack scenario planning?

• Do you have a defined cross functionalstructure, process and capability to respond?

• Are you enhancing and aligning your plan toongoing business changes?

Evaluate and improve effectiveness ofexisting processes and technologies

• Have you patched and upgraded your coreplatforms and technology?

• How are you securing new technology adoptionand managing vulnerability with your legacytechnology?

• Have you evolved your security architecture andassociated processes?

Enhance situational awareness to detect andrespond to security events

• How are you gaining visibility into internal andexternal security events and activities?

• Are you applying correlation and analytics toidentify patterns or exceptions?

• How do you timely and efficiently determinewhen to take action?

Identify, prioritize, and protect the assetsmost essential to the business

• Have you identified your most critical assetsand know where they are stored andtransmitted?

• How do you evaluate their value and impact tothe business if compromised?

• Do you prioritize the protection of your crownjewels differently than other informationassets?

Establish values and behaviors to create andpromote security effectiveness

• How is leadership engaged and committed toaddressing cyber risks facing the business?

• What sustained activities are in place to improveawareness and sensitivity to cyber risks?

• How have your business practices evolved toaddress the threats to your business?

Understand the threats to your industry andyour business

• Who are your adversaries and what are theirmotivations?

• What information are they targeting and whattactics are they using?

• How are you anticipating and adapting yourstrategy and controls?

Page 27: Cyber Risk A Threat to Energy Security

PwC

Recap of Key points to takeaway

Proprietary - Confidential - Internal Use Only

New Ecosystem - Business models have evolved into a moreinterconnected, integrated, and interdependent environment.

Q: What is the cyber risk strategy of your service provider?

Crown Jewels - identify and enhance the protection of “crown jewels”.

Q: What information assets can impact your market value?

Tone at the top - awareness and commitment from the highestexecutive levels.

Q: What is your role in cybersecurity?

OSHI - Sophisticated groups are actively exploiting cyber weaknesses;organized crime , State Sponsored, Hacktivists and Internal.

Q: Who are your enemies and what is being said about your company insocial media?

Know your ecosystem and therisk landscape

Know your Crown Jewels

Know your culture

Know youradversary – motives, means,

and methods

26

Know your business risksEmbed cyber risk into board oversight and executive-level decisionmakingQ: How has cyber risk been considered as a business issue?

Page 28: Cyber Risk A Threat to Energy Security

PwC

For more information on Cyber Risks…

Section 1 – Appendix

United States:www.pwc.com/cybersecurity

− Results of 2014 Global State of Information Security

− 10Minutes on the stark realities of cybersecurity (available in severallanguages)

− Cybersecurity risk on the board’s agenda

− Cyber Video Series

− A response to the President’s Cybersecurity Executive Order

United Kingdom:http://www.pwc.co.uk/cyber-security/cyber-security

− Insights

− Cyber Video Series

Australia:http://www.pwc.com.au/consulting/cyber/

Others:Belgium

GermanySwitzerland

Scandinavia

27

Page 29: Cyber Risk A Threat to Energy Security

PwC

Our global team and credentialsOur team helps organizations understand dynamic cyber challenges, adapt and respond to risksinherent to their business ecosystem, and prioritize and protect the most valuable assetsfundamental to their business strategy.

"PwC has very strong global deliverycapabilities, and the firm offers solid,comprehensive services with the abilityto address almost all of the security andrisk challenges that clients will face”2

• Focused on consulting, solutionimplementation, incident response,and forensic investigation

• Knowledge and experience acrosskey industries and sectors

• Largest professional securityconsulting provider as ranked byGartner1

• Technical security and forensicslabs located in forty countries

• Designed to conduct assessments,design and test security solutions,and conduct cyber forensic analysisand investigations

.

• Extensive library of templates,tools, and accelerators

• Cyber threat intelligence fusionand big data analysis platforms toprocess data related to cyberthreats and incidents

• Advanced degrees and certifications including

─ Certified Information System Security Professional (CISSP)

─ Encase Certified Examiner (EnCE)

─ Certified Information Security Manager (CISM)

─ Certified Ethical Hacker (CEH)

─ Oracle Diamond Partner – Identity Management Specialization

• Former federal and international law enforcementand intelligence officers

• Security clearances that allow for classifieddiscussions that often stem from cyber relatedincidents

We provide pragmatic insight and a balanced view ofhow to prioritize investments in people, processesand technology solutions needed to address thecybersecurity challenge

Knowledge & Experience1,600+ professionals

‘Leader’ ranking by

Forrester Research

60+ labs

Proprietarytools and methods

1Gartner: Competitive Landscape: Professional Security Consulting Services, Worldwide, 20132The Forrester Wave: Information Security and Risk Consulting Services, Q1 2013, Forrester Research, Ed Ferrara and Andrew Rose, February 1, 2013

28

Page 30: Cyber Risk A Threat to Energy Security

PwC

Questions

Page 31: Cyber Risk A Threat to Energy Security

© 2014 PricewaterhouseCoopers Consulting Hong Kong Limited. All rights reserved. In this document, "PwC" refers to PricewaterhouseCoopers Consulting HongKong Limited, which is a member firm of PricewaterhouseCoopers International Limited, each member firm of which is a separate legal entity.

This proposal is provided solely in connection with your Request for Proposal received 24th October 2013 - MetLife Asia Digital Direct 2.0 Project. This is a proposaland does not constitute a contract of engagement with PwC. In the event that our proposal to you is successful, we will agree formal contractual terms with youbefore we begin any substantive work. In the meantime, this document is provided on the basis that PwC accepts no liability—whether in contract, tort (includingnegligence), or otherwise—to MetLife, Inc ("MetLife") or to any other person in respect of MetLife Asia Digital Direct 2.0 Project. In addition, our acceptance of theengagement will be contingent upon the completion of all our internal engagement acceptance procedures.This proposal must not be made available or copied in whole or in part to any other person without our express written permission.

Thank you.