How to Connect Your Server Room to the Board Room – Before a Data Breach Occurs
-
Upload
surfwatch-labs -
Category
Technology
-
view
193 -
download
0
Transcript of How to Connect Your Server Room to the Board Room – Before a Data Breach Occurs
![Page 1: How to Connect Your Server Room to the Board Room – Before a Data Breach Occurs](https://reader033.fdocuments.us/reader033/viewer/2022042818/55b366b5bb61ebd66d8b4595/html5/thumbnails/1.jpg)
How to Connect Your Server Room to the Board Room –
Before a Data Breach Occurs
![Page 2: How to Connect Your Server Room to the Board Room – Before a Data Breach Occurs](https://reader033.fdocuments.us/reader033/viewer/2022042818/55b366b5bb61ebd66d8b4595/html5/thumbnails/2.jpg)
Today’s Speakers
2
Jason PolancichFounder & Chief Architect
SurfWatch Labs
Adam MeyerChief Security Strategist
SurfWatch Labs
Anne MiglaresePresident & CEO
PlanetiQ
![Page 3: How to Connect Your Server Room to the Board Room – Before a Data Breach Occurs](https://reader033.fdocuments.us/reader033/viewer/2022042818/55b366b5bb61ebd66d8b4595/html5/thumbnails/3.jpg)
“We believed we were doing things ahead of the industry. We thought we were well-positioned.”
- Frank Blake, Chairman of Home Depot
3
![Page 4: How to Connect Your Server Room to the Board Room – Before a Data Breach Occurs](https://reader033.fdocuments.us/reader033/viewer/2022042818/55b366b5bb61ebd66d8b4595/html5/thumbnails/4.jpg)
Cybersecurity Is No Longer Just a Technical Problem
4
Top 5 Security Risks1.Data security (company information)
2.Brand/reputational damage
3.Regulatory and compliance violations (tie)
4.Data leakage (tie)
5.Viruses and malware
- Protiviti, “From Cybersecurity to Collaboration: Assessing the Top Priorities for Internal Audit Functions”, 2015
![Page 5: How to Connect Your Server Room to the Board Room – Before a Data Breach Occurs](https://reader033.fdocuments.us/reader033/viewer/2022042818/55b366b5bb61ebd66d8b4595/html5/thumbnails/5.jpg)
The Cost Cannot Be Ignored
Increase from previous year of organizations reporting financial hits of $20 million or more
5
$2.7 Million
Annual average financial loss attributed to cybersecurity incidents - up 34% from previous year
92%- The Global State of Information Security® Survey 2015, PWC
![Page 6: How to Connect Your Server Room to the Board Room – Before a Data Breach Occurs](https://reader033.fdocuments.us/reader033/viewer/2022042818/55b366b5bb61ebd66d8b4595/html5/thumbnails/6.jpg)
Examining Cyber Problems and
Connecting Security with the Business
![Page 7: How to Connect Your Server Room to the Board Room – Before a Data Breach Occurs](https://reader033.fdocuments.us/reader033/viewer/2022042818/55b366b5bb61ebd66d8b4595/html5/thumbnails/7.jpg)
Security Spending on the Rise, Yet Companies Getting Hit Hard
7
• The traditional approach to managing cyber risks is not working
• Too much focus on one-off, responsive tactics
• The dots aren’t being connected between cyber risks and business impact
![Page 8: How to Connect Your Server Room to the Board Room – Before a Data Breach Occurs](https://reader033.fdocuments.us/reader033/viewer/2022042818/55b366b5bb61ebd66d8b4595/html5/thumbnails/8.jpg)
Security Spending on the Rise, Yet Companies Getting Hit Hard
• Security is too complex
• Too much data is trapped
• Hard to relate cyber risks to the business
• Too much focus on tools and not enough on process
• Lack of communication and agility and ability to quickly make effective decisions
8
![Page 9: How to Connect Your Server Room to the Board Room – Before a Data Breach Occurs](https://reader033.fdocuments.us/reader033/viewer/2022042818/55b366b5bb61ebd66d8b4595/html5/thumbnails/9.jpg)
Sound Cybersecurity Strategy Involves Everyone
9
![Page 10: How to Connect Your Server Room to the Board Room – Before a Data Breach Occurs](https://reader033.fdocuments.us/reader033/viewer/2022042818/55b366b5bb61ebd66d8b4595/html5/thumbnails/10.jpg)
Cybersecurity Needs to Be Baked Into Your Business
• What does security look like for you?
• What does it mean for your customers, partners, suppliers?
• How quickly and effectively can you respond to a security incident?
• What’s the effect of not being secure enough?
10
![Page 11: How to Connect Your Server Room to the Board Room – Before a Data Breach Occurs](https://reader033.fdocuments.us/reader033/viewer/2022042818/55b366b5bb61ebd66d8b4595/html5/thumbnails/11.jpg)
Sound Cybersecurity is a Competitive Advantage
11
69%of US executives are worried that cyber threats will impact growth.
— PwC, 17th Annual Global CEO Survey
![Page 12: How to Connect Your Server Room to the Board Room – Before a Data Breach Occurs](https://reader033.fdocuments.us/reader033/viewer/2022042818/55b366b5bb61ebd66d8b4595/html5/thumbnails/12.jpg)
Bridge the Gap Between Security Operations and the Business
12
![Page 13: How to Connect Your Server Room to the Board Room – Before a Data Breach Occurs](https://reader033.fdocuments.us/reader033/viewer/2022042818/55b366b5bb61ebd66d8b4595/html5/thumbnails/13.jpg)
Using Cyber Risk Intelligence to Drive Better Security Decisions
13
![Page 14: How to Connect Your Server Room to the Board Room – Before a Data Breach Occurs](https://reader033.fdocuments.us/reader033/viewer/2022042818/55b366b5bb61ebd66d8b4595/html5/thumbnails/14.jpg)
14
Using Cyber Risk Intelligence to Drive Better Security Decisions
![Page 15: How to Connect Your Server Room to the Board Room – Before a Data Breach Occurs](https://reader033.fdocuments.us/reader033/viewer/2022042818/55b366b5bb61ebd66d8b4595/html5/thumbnails/15.jpg)
You Gotta Get the Board on Board with Cyber
• Cybersecurity improvement includes the involvement of Board Directors
• Only 30% of Boards are highly engaged with information security risks and include cybersecurity in their audit and risk acceptance process.
15
Source: From Cybersecurity to Collaboration: Assessing the Top Priorities for Internal Audit Functions
![Page 16: How to Connect Your Server Room to the Board Room – Before a Data Breach Occurs](https://reader033.fdocuments.us/reader033/viewer/2022042818/55b366b5bb61ebd66d8b4595/html5/thumbnails/16.jpg)
Where Do We Go From Here?
1. Unlock trapped cyber data and look at cyber risks through a business intelligence/KPI lens.
2. Build the right strategy and foundation for a long-lasting cyber-resilient approach.
3. Facilitate communication and collaboration across IT teams, business analysts, legal and executives.
16
![Page 17: How to Connect Your Server Room to the Board Room – Before a Data Breach Occurs](https://reader033.fdocuments.us/reader033/viewer/2022042818/55b366b5bb61ebd66d8b4595/html5/thumbnails/17.jpg)
Q&A and Additional SurfWatch Labs Resources
17
How to Understand Cyber Risks and Ensure Governance: info.surfwatchlabs.com/cyber-risk-governance
SurfWatch C-Suite Datasheet: info.surfwatchlabs.com/SurfWatch-C-Suite-Datasheet
SurfWatch C-Suite Product Overview Video: www.youtube.com/watch?v=9J0Ae6VTmHU
SurfWatch C-Suite Product Review: www.scmagazine.com/surfwatch-c-suite/review/4324/
Schedule a Personal SurfWatch C-Suite Demo:info.surfwatchlabs.com/request-demo
![Page 18: How to Connect Your Server Room to the Board Room – Before a Data Breach Occurs](https://reader033.fdocuments.us/reader033/viewer/2022042818/55b366b5bb61ebd66d8b4595/html5/thumbnails/18.jpg)
Thank You!
www.surfwatchlabs.comFollow us at: