SlideShare una empresa de Scribd logo
1 de 2
Descargar para leer sin conexión
INTRODUCTION
A company’s board of directors is expected to drive market
competitiveness by asking the tough questions—about
executive performance, growth opportunities, compliance,
risk, and more. In 2017, cyber risk is reaching new heights in
both event likelihood and business impact. As boards and
associated executive committees engage in dialogue over this
ever-evolving topic, they need access to the right information
to effectively challenge the security status quo and validate
that the future investment strategy will address the anticipated
cyber risk environment.
As we peer into how business, technology, regulatory, and
cyber threat realities are evolving in the coming year, here is a
reference guide for board members to use in validating their
company’s cybersecurity approach.
TOP 10 CYBER FOCUS AREAS FOR BOARDS IN 2017
External Forces
Key regulatory bodies are becoming increasingly prescriptive
on cyber defense requirements, and the consequences of
noncompliance are becoming more severe.
1.	 EU General Data Protection Regulation (GDPR).
Sweeping EU data protection regulations, effective May
25, 2018, will affect organizations operating within 28 EU
member states. The GDPR harmonizes regulations and
implements significantly more prescriptive requirements,
with significant fines for noncompliance. As a result,
companies will need to place even greater focus on data
security and privacy.
2.	 New York Department of Financial Services (DFS)
Cybersecurity Regulation. Increased efforts to protect
sensitive financial information has resulted in significant,
first-in-the-nation proposed regulation focused on
financial institutions conducting business in New York,
effective March 1, 2017. However, these new regulations
are likely to influence other industries and jurisdictions.
Pragmatically, all companies can take cues from the DFS
regulation’s core mandates, including identifying internal
and external risks, protecting sensitive information,
initiating annual penetration tests of systems, and
conducting routine vulnerability assessments.
Threat Landscape
Adversaries are diversifying their methods and intents—going
beyond traditional theft of personally identifiable information
and intellectual property. Now, disruption of business
operations and destruction of key digital and physical assets
are increasingly becoming part of threat actors’ modus
operandi. In the near term, there are several threat variants
that boards need to stress test with company security leaders.
3.	 Fake News/Disinformation. Russia and other threat
actors have demonstrated that fake news and disinforma-
tion work to drive public opinion and behaviors. Public
corporations, in particular, should be ready for an
increased use of disinformation against them to harm
their brands. Boards must understand that fake news and
disinformation extend the definition of “cyber threat”
from a direct attack against a company to an indirect
attack via information warfare. Organizations will need a
plan of action to handle disinformation.
4.	 Ransomware. Originally aimed at individuals, ransom-
ware is increasingly targeting businesses, particularly as it
continues to grow in sophistication and ransom demands
increase in value. Organizations must be ready for
hyper-targeted ransomware against high-value digital
assets (e.g., applications and databases) and individuals,
including executives, officers, and board members. In
addition, experts predict that we will see an increase in
the diversity and volume of devices—and subsequent
business processes—held for ransom. We will see
ransomware beginning to infiltrate the Internet of Things
(IoT), cloud infrastructure, and industrial control system
(ICS) realms.
5.	 Data Integrity Attacks. Attacks seeking to create
confusion or shape behavior by manipulating data have
long been understood and demonstrated in information
warfare but have seldom been seen in the commercial
cyberspace. This is beginning to change, as manipulation
of Internet Protocol (IP) source code, sensitive financial
information, and the like become real concerns today. The
challenge, of course, is that data does not move in
integrity attacks; therefore, the effects of manipulation,
like fraud, are difficult to detect.
10 CYBER PRIORITIES FOR
BOARDS OF DIRECTORS
BILL PHELPS, EXECUTIVE VICE PRESIDENT, BOOZ ALLEN HAMILTON
About Booz Allen
Booz Allen Hamilton has
been at the forefront of
strategy, technology, and
engineering for more than
100 years. Booz Allen
partners with private and
public sector clients to solve
their most difficult chal-
lenges. To learn more,
visit BoozAllen.com.
(NYSE: BAH)
For more information:
Bill Phelps
Executive Vice President
phelps_bill@bah.com
6.	 Continued Scaling of DDoS. Threat actors will increasingly employ large-scale IoT
device-based botnets to disrupt business systems, processes, and networks. The 2016
distributed denial-of-service (DDoS) attack against an Internet performance manage-
ment company (Dyn), causing major commercial online services to go offline, illustrates
how damaging these attacks can be. DDoS has long been a favorite tool of politically
motivated attackers, but we will likely see it return to its roots as a tool for ransom.
7.	 More ICS/IoT Attacks. Security professionals have long understood the vulnerability of
ICS and connected architectures to cyber attack, but threat actors operating in the
commercial market have not exploited these vulnerabilities at great scale yet. This is
changing. Board members in manufacturing, transportation, energy, oil and gas, and
chemical industries should be especially aware and should press their companies for
increased resilience in this space.
Key Cyber Operational Focus Areas
In spite of tremendous investment in cybersecurity, most organizations are not able to
effectively scale their cyber defenses to the growing attack surface, which leaves exploitable
gaps for threat actors to pursue.
8.	 Red Teaming and Executive Wargames. Despite growing cyber regulations, compliance
assessments are simply not effective in assessing the effectiveness of an organization’s
cyber defense capabilities. Continued testing of operational effectiveness through “red
teaming” employs expert, adversary-minded resources to expose gaps in a company’s
security posture. In complement, wargames test the readiness of cross-functional leaders
and senior executives to respond in the face of a material cyber incident. Boards should
require that they be briefed on the results of both red team and wargame exercises to
understand the readiness of their companies to detect and respond to serious cyber
incidents.
9.	 Security Beyond IT. In many organizations, responsibility for security beyond the core IT
infrastructure remains unclear. It may fall under a corporate chief information security
officer who does not always possess the necessary skill and authority, or in other
instances, responsibility may simply not be well defined. Cybersecurity concerns have
expanded to new realms, including the supply chain, product development, manufac-
turing, and retail operations. Boards must ensure that their organizations possess clarity
on both accountability and responsibility to ensure that security coverage is appropriate
across the extended enterprise.
10.	Getting Cloud Security Right. Migrating applications to the cloud is an ever-increasing
priority for organizations. From a security perspective, cloud providers are generally strong
at protecting their own cloud infrastructure, but too few customers realize that it is their
own responsibility to ensure security of their cloud-based data and applications outside of
the core purview of their service provider. There are services and leading practices available,
but this lack of understanding often represents the Achilles’ heel of cloud security. Boards
need to ensure the organization is counterbalancing the cost savings of moving to the
cloud with investment in security controls and governance.
FINAL WORD
Although computing platforms are slowly becoming more resistant to cyber attack, phishing
and other social engineering techniques that exploit human weakness continue to be the
most effective tools used by adversaries for gaining malicious access to organizations’
systems. Despite a tremendous focus on employee education, the success rates of broad
phishing attacks are still in the 10-percent to 15-percent range, and very carefully targeted
“spear phishing” attacks have success rates much higher than this. In spite of improvements
in technical security, the weakness at the human layer continues.
BOOZALLEN.COM© 2017 Booz Allen Hamilton Inc. VCS-C.02.012.17

Más contenido relacionado

La actualidad más candente

Insurance, Gen Y and Internet of Things: World Insurance Report 2016 Infographic
Insurance, Gen Y and Internet of Things: World Insurance Report 2016 InfographicInsurance, Gen Y and Internet of Things: World Insurance Report 2016 Infographic
Insurance, Gen Y and Internet of Things: World Insurance Report 2016 InfographicCapgemini
 
Vision 2030: A Connected Future
Vision 2030: A Connected FutureVision 2030: A Connected Future
Vision 2030: A Connected FutureWipro Digital
 
[REPORT PREVIEW] The AI Maturity Playbook: Five Pillars of Enterprise Success
[REPORT PREVIEW] The AI Maturity Playbook: Five Pillars of Enterprise Success[REPORT PREVIEW] The AI Maturity Playbook: Five Pillars of Enterprise Success
[REPORT PREVIEW] The AI Maturity Playbook: Five Pillars of Enterprise SuccessAltimeter, a Prophet Company
 
The Race to 2021: The State of Autonomous Vehicles and a "Who's Who" of Indus...
The Race to 2021: The State of Autonomous Vehicles and a "Who's Who" of Indus...The Race to 2021: The State of Autonomous Vehicles and a "Who's Who" of Indus...
The Race to 2021: The State of Autonomous Vehicles and a "Who's Who" of Indus...Altimeter, a Prophet Company
 
27 Facts on the Future of Business in a Digital Marketplace
27 Facts on the Future of Business in a Digital Marketplace27 Facts on the Future of Business in a Digital Marketplace
27 Facts on the Future of Business in a Digital MarketplaceApp Consultants
 
F&S Presentation Whitepaper Cisco Services
F&S Presentation Whitepaper Cisco ServicesF&S Presentation Whitepaper Cisco Services
F&S Presentation Whitepaper Cisco ServicesFelipe Lamus
 
Convergence and Disruption in Manufacturing
Convergence and Disruption in ManufacturingConvergence and Disruption in Manufacturing
Convergence and Disruption in ManufacturingBooz Allen Hamilton
 
The economist intelligence_unit_
The economist intelligence_unit_The economist intelligence_unit_
The economist intelligence_unit_Ali Reza Bakhshi
 
The digital and social media trends to watch. 2015 and beyond seminar: are yo...
The digital and social media trends to watch. 2015 and beyond seminar: are yo...The digital and social media trends to watch. 2015 and beyond seminar: are yo...
The digital and social media trends to watch. 2015 and beyond seminar: are yo...CharityComms
 
White Paper Servicios Frost & Sullivan English
White Paper Servicios Frost & Sullivan EnglishWhite Paper Servicios Frost & Sullivan English
White Paper Servicios Frost & Sullivan EnglishFelipe Lamus
 
Taking control of the big data explosion
Taking control of the big data explosionTaking control of the big data explosion
Taking control of the big data explosionVodafone Business
 
The Impact of Data in Technology Today
The Impact of Data in Technology TodayThe Impact of Data in Technology Today
The Impact of Data in Technology TodayNetApp
 
The 100 Leading Global Fintech Innovators 2015
The 100 Leading Global Fintech Innovators 2015 The 100 Leading Global Fintech Innovators 2015
The 100 Leading Global Fintech Innovators 2015 H2 Ventures
 
Where In The World Is Your Sensitive Data?
Where In The World Is Your Sensitive Data?Where In The World Is Your Sensitive Data?
Where In The World Is Your Sensitive Data?Druva
 
[Survey Data] Detecting Disruption: Interest vs. Investment across Emerging T...
[Survey Data] Detecting Disruption: Interest vs. Investment across Emerging T...[Survey Data] Detecting Disruption: Interest vs. Investment across Emerging T...
[Survey Data] Detecting Disruption: Interest vs. Investment across Emerging T...Altimeter, a Prophet Company
 
Hyperconnected organisations: How businesses are adapting to the hyperconnect...
Hyperconnected organisations: How businesses are adapting to the hyperconnect...Hyperconnected organisations: How businesses are adapting to the hyperconnect...
Hyperconnected organisations: How businesses are adapting to the hyperconnect...The Economist Media Businesses
 
Beyond the Gig Economy: How New Technologies Are Reshaping the Future of Work
Beyond the Gig Economy: How New Technologies Are Reshaping the Future of WorkBeyond the Gig Economy: How New Technologies Are Reshaping the Future of Work
Beyond the Gig Economy: How New Technologies Are Reshaping the Future of WorkThumbtack, Inc.
 

La actualidad más candente (20)

Insurance, Gen Y and Internet of Things: World Insurance Report 2016 Infographic
Insurance, Gen Y and Internet of Things: World Insurance Report 2016 InfographicInsurance, Gen Y and Internet of Things: World Insurance Report 2016 Infographic
Insurance, Gen Y and Internet of Things: World Insurance Report 2016 Infographic
 
Vision 2030: A Connected Future
Vision 2030: A Connected FutureVision 2030: A Connected Future
Vision 2030: A Connected Future
 
[REPORT PREVIEW] The AI Maturity Playbook: Five Pillars of Enterprise Success
[REPORT PREVIEW] The AI Maturity Playbook: Five Pillars of Enterprise Success[REPORT PREVIEW] The AI Maturity Playbook: Five Pillars of Enterprise Success
[REPORT PREVIEW] The AI Maturity Playbook: Five Pillars of Enterprise Success
 
The Race to 2021: The State of Autonomous Vehicles and a "Who's Who" of Indus...
The Race to 2021: The State of Autonomous Vehicles and a "Who's Who" of Indus...The Race to 2021: The State of Autonomous Vehicles and a "Who's Who" of Indus...
The Race to 2021: The State of Autonomous Vehicles and a "Who's Who" of Indus...
 
27 Facts on the Future of Business in a Digital Marketplace
27 Facts on the Future of Business in a Digital Marketplace27 Facts on the Future of Business in a Digital Marketplace
27 Facts on the Future of Business in a Digital Marketplace
 
McKinsey: Understanding shifts in consumer behavior
McKinsey: Understanding shifts in consumer behaviorMcKinsey: Understanding shifts in consumer behavior
McKinsey: Understanding shifts in consumer behavior
 
F&S Presentation Whitepaper Cisco Services
F&S Presentation Whitepaper Cisco ServicesF&S Presentation Whitepaper Cisco Services
F&S Presentation Whitepaper Cisco Services
 
Convergence and Disruption in Manufacturing
Convergence and Disruption in ManufacturingConvergence and Disruption in Manufacturing
Convergence and Disruption in Manufacturing
 
The economist intelligence_unit_
The economist intelligence_unit_The economist intelligence_unit_
The economist intelligence_unit_
 
The digital and social media trends to watch. 2015 and beyond seminar: are yo...
The digital and social media trends to watch. 2015 and beyond seminar: are yo...The digital and social media trends to watch. 2015 and beyond seminar: are yo...
The digital and social media trends to watch. 2015 and beyond seminar: are yo...
 
White Paper Servicios Frost & Sullivan English
White Paper Servicios Frost & Sullivan EnglishWhite Paper Servicios Frost & Sullivan English
White Paper Servicios Frost & Sullivan English
 
Taking control of the big data explosion
Taking control of the big data explosionTaking control of the big data explosion
Taking control of the big data explosion
 
Digital Economy
Digital EconomyDigital Economy
Digital Economy
 
The Impact of Data in Technology Today
The Impact of Data in Technology TodayThe Impact of Data in Technology Today
The Impact of Data in Technology Today
 
The 100 Leading Global Fintech Innovators 2015
The 100 Leading Global Fintech Innovators 2015 The 100 Leading Global Fintech Innovators 2015
The 100 Leading Global Fintech Innovators 2015
 
Where In The World Is Your Sensitive Data?
Where In The World Is Your Sensitive Data?Where In The World Is Your Sensitive Data?
Where In The World Is Your Sensitive Data?
 
[Survey Data] Detecting Disruption: Interest vs. Investment across Emerging T...
[Survey Data] Detecting Disruption: Interest vs. Investment across Emerging T...[Survey Data] Detecting Disruption: Interest vs. Investment across Emerging T...
[Survey Data] Detecting Disruption: Interest vs. Investment across Emerging T...
 
Hyperconnected organisations: How businesses are adapting to the hyperconnect...
Hyperconnected organisations: How businesses are adapting to the hyperconnect...Hyperconnected organisations: How businesses are adapting to the hyperconnect...
Hyperconnected organisations: How businesses are adapting to the hyperconnect...
 
The Retail Reality Check
The Retail Reality CheckThe Retail Reality Check
The Retail Reality Check
 
Beyond the Gig Economy: How New Technologies Are Reshaping the Future of Work
Beyond the Gig Economy: How New Technologies Are Reshaping the Future of WorkBeyond the Gig Economy: How New Technologies Are Reshaping the Future of Work
Beyond the Gig Economy: How New Technologies Are Reshaping the Future of Work
 

Destacado

Examining Flexibility in the Workplace for Working Moms
Examining Flexibility in the Workplace for Working MomsExamining Flexibility in the Workplace for Working Moms
Examining Flexibility in the Workplace for Working MomsBooz Allen Hamilton
 
Preparing for New Healthcare Payment Models
Preparing for New Healthcare Payment ModelsPreparing for New Healthcare Payment Models
Preparing for New Healthcare Payment ModelsBooz Allen Hamilton
 
Homeland Threats: Today and Tomorrow
Homeland Threats: Today and TomorrowHomeland Threats: Today and Tomorrow
Homeland Threats: Today and TomorrowBooz Allen Hamilton
 
Booz Allen Industrial Cybersecurity Threat Briefing
Booz Allen Industrial Cybersecurity Threat BriefingBooz Allen Industrial Cybersecurity Threat Briefing
Booz Allen Industrial Cybersecurity Threat BriefingBooz Allen Hamilton
 
Nuclear Promise: Reducing Cost While Improving Performance
Nuclear Promise: Reducing Cost While Improving PerformanceNuclear Promise: Reducing Cost While Improving Performance
Nuclear Promise: Reducing Cost While Improving PerformanceBooz Allen Hamilton
 
Booz Allen Hamilton and Market Connections: C4ISR Survey Report
Booz Allen Hamilton and Market Connections: C4ISR Survey ReportBooz Allen Hamilton and Market Connections: C4ISR Survey Report
Booz Allen Hamilton and Market Connections: C4ISR Survey ReportBooz Allen Hamilton
 
Booz Allen Hamilton's Methodology for Platform Modernization Infographic
Booz Allen Hamilton's Methodology for Platform Modernization InfographicBooz Allen Hamilton's Methodology for Platform Modernization Infographic
Booz Allen Hamilton's Methodology for Platform Modernization InfographicBooz Allen Hamilton
 
Immersive Learning: The Future of Training is Here
Immersive Learning: The Future of Training is HereImmersive Learning: The Future of Training is Here
Immersive Learning: The Future of Training is HereBooz Allen Hamilton
 
The Product Owner’s Universe: Agile Coaching
The Product Owner’s Universe: Agile CoachingThe Product Owner’s Universe: Agile Coaching
The Product Owner’s Universe: Agile CoachingBooz Allen Hamilton
 
Cloud Computing: Big Data Technology
Cloud Computing: Big Data TechnologyCloud Computing: Big Data Technology
Cloud Computing: Big Data TechnologyBooz Allen Hamilton
 
Cloud Computing Technology: A Mechanism for Achieving Sustainable IT Goals
Cloud Computing Technology: A Mechanism for Achieving Sustainable IT GoalsCloud Computing Technology: A Mechanism for Achieving Sustainable IT Goals
Cloud Computing Technology: A Mechanism for Achieving Sustainable IT GoalsBooz Allen Hamilton
 
Pin for the Win: How to Market Your Brand on Pinterest
Pin for the Win: How to Market Your Brand on PinterestPin for the Win: How to Market Your Brand on Pinterest
Pin for the Win: How to Market Your Brand on PinterestMarketo
 
Rails and Content Security Policies
Rails and Content Security PoliciesRails and Content Security Policies
Rails and Content Security PoliciesMatias Korhonen
 
5 Marketing Strategies for Customer Engagement
5 Marketing Strategies for Customer Engagement5 Marketing Strategies for Customer Engagement
5 Marketing Strategies for Customer EngagementMarketo
 
Create a Content Powerhouse: How to Structure and Optimize Your Content Marke...
Create a Content Powerhouse: How to Structure and Optimize Your Content Marke...Create a Content Powerhouse: How to Structure and Optimize Your Content Marke...
Create a Content Powerhouse: How to Structure and Optimize Your Content Marke...Marketo
 
Quarterly Feature Round Up Webinar
Quarterly Feature Round Up WebinarQuarterly Feature Round Up Webinar
Quarterly Feature Round Up WebinarMarketo
 
A New Era of Email Deliverability: Tools of 250ok
A New Era of Email Deliverability: Tools of 250okA New Era of Email Deliverability: Tools of 250ok
A New Era of Email Deliverability: Tools of 250okMarketo
 

Destacado (20)

Examining Flexibility in the Workplace for Working Moms
Examining Flexibility in the Workplace for Working MomsExamining Flexibility in the Workplace for Working Moms
Examining Flexibility in the Workplace for Working Moms
 
The True Cost of Childcare
The True Cost of ChildcareThe True Cost of Childcare
The True Cost of Childcare
 
Preparing for New Healthcare Payment Models
Preparing for New Healthcare Payment ModelsPreparing for New Healthcare Payment Models
Preparing for New Healthcare Payment Models
 
Homeland Threats: Today and Tomorrow
Homeland Threats: Today and TomorrowHomeland Threats: Today and Tomorrow
Homeland Threats: Today and Tomorrow
 
Booz Allen Industrial Cybersecurity Threat Briefing
Booz Allen Industrial Cybersecurity Threat BriefingBooz Allen Industrial Cybersecurity Threat Briefing
Booz Allen Industrial Cybersecurity Threat Briefing
 
Nuclear Promise: Reducing Cost While Improving Performance
Nuclear Promise: Reducing Cost While Improving PerformanceNuclear Promise: Reducing Cost While Improving Performance
Nuclear Promise: Reducing Cost While Improving Performance
 
Booz Allen Hamilton and Market Connections: C4ISR Survey Report
Booz Allen Hamilton and Market Connections: C4ISR Survey ReportBooz Allen Hamilton and Market Connections: C4ISR Survey Report
Booz Allen Hamilton and Market Connections: C4ISR Survey Report
 
Military Spouse Career Roadmap
Military Spouse Career Roadmap Military Spouse Career Roadmap
Military Spouse Career Roadmap
 
Booz Allen Hamilton's Methodology for Platform Modernization Infographic
Booz Allen Hamilton's Methodology for Platform Modernization InfographicBooz Allen Hamilton's Methodology for Platform Modernization Infographic
Booz Allen Hamilton's Methodology for Platform Modernization Infographic
 
Immersive Learning: The Future of Training is Here
Immersive Learning: The Future of Training is HereImmersive Learning: The Future of Training is Here
Immersive Learning: The Future of Training is Here
 
The Product Owner’s Universe: Agile Coaching
The Product Owner’s Universe: Agile CoachingThe Product Owner’s Universe: Agile Coaching
The Product Owner’s Universe: Agile Coaching
 
The Connected Vehicle Ecosystem
The Connected Vehicle EcosystemThe Connected Vehicle Ecosystem
The Connected Vehicle Ecosystem
 
Cloud Computing: Big Data Technology
Cloud Computing: Big Data TechnologyCloud Computing: Big Data Technology
Cloud Computing: Big Data Technology
 
Cloud Computing Technology: A Mechanism for Achieving Sustainable IT Goals
Cloud Computing Technology: A Mechanism for Achieving Sustainable IT GoalsCloud Computing Technology: A Mechanism for Achieving Sustainable IT Goals
Cloud Computing Technology: A Mechanism for Achieving Sustainable IT Goals
 
Pin for the Win: How to Market Your Brand on Pinterest
Pin for the Win: How to Market Your Brand on PinterestPin for the Win: How to Market Your Brand on Pinterest
Pin for the Win: How to Market Your Brand on Pinterest
 
Rails and Content Security Policies
Rails and Content Security PoliciesRails and Content Security Policies
Rails and Content Security Policies
 
5 Marketing Strategies for Customer Engagement
5 Marketing Strategies for Customer Engagement5 Marketing Strategies for Customer Engagement
5 Marketing Strategies for Customer Engagement
 
Create a Content Powerhouse: How to Structure and Optimize Your Content Marke...
Create a Content Powerhouse: How to Structure and Optimize Your Content Marke...Create a Content Powerhouse: How to Structure and Optimize Your Content Marke...
Create a Content Powerhouse: How to Structure and Optimize Your Content Marke...
 
Quarterly Feature Round Up Webinar
Quarterly Feature Round Up WebinarQuarterly Feature Round Up Webinar
Quarterly Feature Round Up Webinar
 
A New Era of Email Deliverability: Tools of 250ok
A New Era of Email Deliverability: Tools of 250okA New Era of Email Deliverability: Tools of 250ok
A New Era of Email Deliverability: Tools of 250ok
 

Similar a Booz Allen's 10 Cyber Priorities for Boards of Directors

Five principles for improving your cyber security
Five principles for improving your cyber securityFive principles for improving your cyber security
Five principles for improving your cyber securityWGroup
 
White paper cyber risk appetite defining and understanding risk in the moder...
White paper cyber risk appetite  defining and understanding risk in the moder...White paper cyber risk appetite  defining and understanding risk in the moder...
White paper cyber risk appetite defining and understanding risk in the moder...balejandre
 
What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?PECB
 
Norman Broadbent Cybersecurity Report - How should boards respond
Norman Broadbent Cybersecurity Report - How should boards respondNorman Broadbent Cybersecurity Report - How should boards respond
Norman Broadbent Cybersecurity Report - How should boards respondLydia Shepherd
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...International Federation of Accountants
 
Top 3 security concerns for enterprises
Top 3 security concerns for enterprisesTop 3 security concerns for enterprises
Top 3 security concerns for enterprisesTaranggg11
 
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?Sarah Nirschl
 
White Paper Example - Brafton for NIP Group.pdf
White Paper Example - Brafton for NIP Group.pdfWhite Paper Example - Brafton for NIP Group.pdf
White Paper Example - Brafton for NIP Group.pdfBrafton
 
Networkers cyber security market intelligence report
Networkers cyber security market intelligence reportNetworkers cyber security market intelligence report
Networkers cyber security market intelligence reportSimon Clements FIRP DipRP
 
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)Sarah Jarvis
 
Why Accountants Can’t Afford to Ignore Cyber Security in 2023
Why Accountants Can’t Afford to Ignore Cyber Security in 2023Why Accountants Can’t Afford to Ignore Cyber Security in 2023
Why Accountants Can’t Afford to Ignore Cyber Security in 2023incmagazineseo
 
Cyber Security Trends - Where the Industry Is Heading in an Uncertainty
Cyber Security Trends - Where the Industry Is Heading in an UncertaintyCyber Security Trends - Where the Industry Is Heading in an Uncertainty
Cyber Security Trends - Where the Industry Is Heading in an UncertaintyOrganization
 
A CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk ManagementA CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk ManagementDaren Dunkel
 
Provide a MEMO.docx
Provide a MEMO.docxProvide a MEMO.docx
Provide a MEMO.docxwrite30
 
The top cybersecurity challenges post-lockdow
The top cybersecurity challenges post-lockdowThe top cybersecurity challenges post-lockdow
The top cybersecurity challenges post-lockdowDharmendra Rama
 
Security - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperSecurity - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperCMR WORLD TECH
 
Executive Summary on the Cyber Risk Webinar
Executive Summary on the Cyber Risk WebinarExecutive Summary on the Cyber Risk Webinar
Executive Summary on the Cyber Risk WebinarFERMA
 
Cover and CyberSecurity Essay
Cover and CyberSecurity EssayCover and CyberSecurity Essay
Cover and CyberSecurity EssayMichael Solomon
 
7th ERM - S2 - Cyber security, Cyber Risk and Data Privacy - Kalpesh Doshi (1...
7th ERM - S2 - Cyber security, Cyber Risk and Data Privacy - Kalpesh Doshi (1...7th ERM - S2 - Cyber security, Cyber Risk and Data Privacy - Kalpesh Doshi (1...
7th ERM - S2 - Cyber security, Cyber Risk and Data Privacy - Kalpesh Doshi (1...TraintechTde
 

Similar a Booz Allen's 10 Cyber Priorities for Boards of Directors (20)

Five principles for improving your cyber security
Five principles for improving your cyber securityFive principles for improving your cyber security
Five principles for improving your cyber security
 
White paper cyber risk appetite defining and understanding risk in the moder...
White paper cyber risk appetite  defining and understanding risk in the moder...White paper cyber risk appetite  defining and understanding risk in the moder...
White paper cyber risk appetite defining and understanding risk in the moder...
 
What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?
 
Norman Broadbent Cybersecurity Report - How should boards respond
Norman Broadbent Cybersecurity Report - How should boards respondNorman Broadbent Cybersecurity Report - How should boards respond
Norman Broadbent Cybersecurity Report - How should boards respond
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
 
Top 3 security concerns for enterprises
Top 3 security concerns for enterprisesTop 3 security concerns for enterprises
Top 3 security concerns for enterprises
 
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
 
idg_secops-solutions
idg_secops-solutionsidg_secops-solutions
idg_secops-solutions
 
White Paper Example - Brafton for NIP Group.pdf
White Paper Example - Brafton for NIP Group.pdfWhite Paper Example - Brafton for NIP Group.pdf
White Paper Example - Brafton for NIP Group.pdf
 
Networkers cyber security market intelligence report
Networkers cyber security market intelligence reportNetworkers cyber security market intelligence report
Networkers cyber security market intelligence report
 
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
 
Why Accountants Can’t Afford to Ignore Cyber Security in 2023
Why Accountants Can’t Afford to Ignore Cyber Security in 2023Why Accountants Can’t Afford to Ignore Cyber Security in 2023
Why Accountants Can’t Afford to Ignore Cyber Security in 2023
 
Cyber Security Trends - Where the Industry Is Heading in an Uncertainty
Cyber Security Trends - Where the Industry Is Heading in an UncertaintyCyber Security Trends - Where the Industry Is Heading in an Uncertainty
Cyber Security Trends - Where the Industry Is Heading in an Uncertainty
 
A CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk ManagementA CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk Management
 
Provide a MEMO.docx
Provide a MEMO.docxProvide a MEMO.docx
Provide a MEMO.docx
 
The top cybersecurity challenges post-lockdow
The top cybersecurity challenges post-lockdowThe top cybersecurity challenges post-lockdow
The top cybersecurity challenges post-lockdow
 
Security - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperSecurity - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaper
 
Executive Summary on the Cyber Risk Webinar
Executive Summary on the Cyber Risk WebinarExecutive Summary on the Cyber Risk Webinar
Executive Summary on the Cyber Risk Webinar
 
Cover and CyberSecurity Essay
Cover and CyberSecurity EssayCover and CyberSecurity Essay
Cover and CyberSecurity Essay
 
7th ERM - S2 - Cyber security, Cyber Risk and Data Privacy - Kalpesh Doshi (1...
7th ERM - S2 - Cyber security, Cyber Risk and Data Privacy - Kalpesh Doshi (1...7th ERM - S2 - Cyber security, Cyber Risk and Data Privacy - Kalpesh Doshi (1...
7th ERM - S2 - Cyber security, Cyber Risk and Data Privacy - Kalpesh Doshi (1...
 

Más de Booz Allen Hamilton

You Can Hack That: How to Use Hackathons to Solve Your Toughest Challenges
You Can Hack That: How to Use Hackathons to Solve Your Toughest ChallengesYou Can Hack That: How to Use Hackathons to Solve Your Toughest Challenges
You Can Hack That: How to Use Hackathons to Solve Your Toughest ChallengesBooz Allen Hamilton
 
Frenemies – When Unlikely Partners Join Forces
Frenemies – When Unlikely Partners Join ForcesFrenemies – When Unlikely Partners Join Forces
Frenemies – When Unlikely Partners Join ForcesBooz Allen Hamilton
 
Booz Allen Secure Agile Development
Booz Allen Secure Agile DevelopmentBooz Allen Secure Agile Development
Booz Allen Secure Agile DevelopmentBooz Allen Hamilton
 
Modern C4ISR Integrates, Innovates and Secures Military Networks
Modern C4ISR Integrates, Innovates and Secures Military NetworksModern C4ISR Integrates, Innovates and Secures Military Networks
Modern C4ISR Integrates, Innovates and Secures Military NetworksBooz Allen Hamilton
 
Agile and Open C4ISR Systems - Helping the Military Integrate, Innovate and S...
Agile and Open C4ISR Systems - Helping the Military Integrate, Innovate and S...Agile and Open C4ISR Systems - Helping the Military Integrate, Innovate and S...
Agile and Open C4ISR Systems - Helping the Military Integrate, Innovate and S...Booz Allen Hamilton
 
Booz Allen Field Guide to Data Science
Booz Allen Field Guide to Data Science Booz Allen Field Guide to Data Science
Booz Allen Field Guide to Data Science Booz Allen Hamilton
 
The Enterprise Integrator - C4ISR
The Enterprise Integrator - C4ISRThe Enterprise Integrator - C4ISR
The Enterprise Integrator - C4ISRBooz Allen Hamilton
 
Data is Growing at a Veracious Rate
Data is Growing at a Veracious RateData is Growing at a Veracious Rate
Data is Growing at a Veracious RateBooz Allen Hamilton
 
The Power and Importance of Failure in Business
The Power and Importance of Failure in BusinessThe Power and Importance of Failure in Business
The Power and Importance of Failure in BusinessBooz Allen Hamilton
 
Bridging Mission and Management: A Survey of Government Chief Operating Officers
Bridging Mission and Management: A Survey of Government Chief Operating OfficersBridging Mission and Management: A Survey of Government Chief Operating Officers
Bridging Mission and Management: A Survey of Government Chief Operating OfficersBooz Allen Hamilton
 
Cyber In-Security II: Closing the Federal Gap
Cyber In-Security II: Closing the Federal GapCyber In-Security II: Closing the Federal Gap
Cyber In-Security II: Closing the Federal GapBooz Allen Hamilton
 
Enterprise Integration Architect
Enterprise Integration ArchitectEnterprise Integration Architect
Enterprise Integration ArchitectBooz Allen Hamilton
 
Creating Value in Health through Big Data
Creating Value in Health through Big DataCreating Value in Health through Big Data
Creating Value in Health through Big DataBooz Allen Hamilton
 
Vampire Tactical Forensic Device - Product Sheet
Vampire Tactical Forensic Device - Product SheetVampire Tactical Forensic Device - Product Sheet
Vampire Tactical Forensic Device - Product SheetBooz Allen Hamilton
 

Más de Booz Allen Hamilton (19)

You Can Hack That: How to Use Hackathons to Solve Your Toughest Challenges
You Can Hack That: How to Use Hackathons to Solve Your Toughest ChallengesYou Can Hack That: How to Use Hackathons to Solve Your Toughest Challenges
You Can Hack That: How to Use Hackathons to Solve Your Toughest Challenges
 
Inaugural Addresses
Inaugural AddressesInaugural Addresses
Inaugural Addresses
 
Frenemies – When Unlikely Partners Join Forces
Frenemies – When Unlikely Partners Join ForcesFrenemies – When Unlikely Partners Join Forces
Frenemies – When Unlikely Partners Join Forces
 
Booz Allen Secure Agile Development
Booz Allen Secure Agile DevelopmentBooz Allen Secure Agile Development
Booz Allen Secure Agile Development
 
CITRIX IN AMAZON WEB SERVICES
CITRIX IN AMAZON WEB SERVICESCITRIX IN AMAZON WEB SERVICES
CITRIX IN AMAZON WEB SERVICES
 
Modern C4ISR Integrates, Innovates and Secures Military Networks
Modern C4ISR Integrates, Innovates and Secures Military NetworksModern C4ISR Integrates, Innovates and Secures Military Networks
Modern C4ISR Integrates, Innovates and Secures Military Networks
 
Agile and Open C4ISR Systems - Helping the Military Integrate, Innovate and S...
Agile and Open C4ISR Systems - Helping the Military Integrate, Innovate and S...Agile and Open C4ISR Systems - Helping the Military Integrate, Innovate and S...
Agile and Open C4ISR Systems - Helping the Military Integrate, Innovate and S...
 
Women On The Leading Edge
Women On The Leading Edge Women On The Leading Edge
Women On The Leading Edge
 
Booz Allen Field Guide to Data Science
Booz Allen Field Guide to Data Science Booz Allen Field Guide to Data Science
Booz Allen Field Guide to Data Science
 
The Enterprise Integrator - C4ISR
The Enterprise Integrator - C4ISRThe Enterprise Integrator - C4ISR
The Enterprise Integrator - C4ISR
 
ISR Systems Development
ISR Systems DevelopmentISR Systems Development
ISR Systems Development
 
Data is Growing at a Veracious Rate
Data is Growing at a Veracious RateData is Growing at a Veracious Rate
Data is Growing at a Veracious Rate
 
The Power and Importance of Failure in Business
The Power and Importance of Failure in BusinessThe Power and Importance of Failure in Business
The Power and Importance of Failure in Business
 
Bridging Mission and Management: A Survey of Government Chief Operating Officers
Bridging Mission and Management: A Survey of Government Chief Operating OfficersBridging Mission and Management: A Survey of Government Chief Operating Officers
Bridging Mission and Management: A Survey of Government Chief Operating Officers
 
Talent InSight Infographic
Talent InSight InfographicTalent InSight Infographic
Talent InSight Infographic
 
Cyber In-Security II: Closing the Federal Gap
Cyber In-Security II: Closing the Federal GapCyber In-Security II: Closing the Federal Gap
Cyber In-Security II: Closing the Federal Gap
 
Enterprise Integration Architect
Enterprise Integration ArchitectEnterprise Integration Architect
Enterprise Integration Architect
 
Creating Value in Health through Big Data
Creating Value in Health through Big DataCreating Value in Health through Big Data
Creating Value in Health through Big Data
 
Vampire Tactical Forensic Device - Product Sheet
Vampire Tactical Forensic Device - Product SheetVampire Tactical Forensic Device - Product Sheet
Vampire Tactical Forensic Device - Product Sheet
 

Último

Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...ictsugar
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCRashishs7044
 
Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Americas Got Grants
 
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!Doge Mining Website
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMVoces Mineras
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfrichard876048
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesKeppelCorporation
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessSeta Wicaksana
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Seta Wicaksana
 
Financial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptxFinancial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptxsaniyaimamuddin
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyotictsugar
 
Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Peter Ward
 
Chapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal auditChapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal auditNhtLNguyn9
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCRashishs7044
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607dollysharma2066
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy Verified Accounts
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...ssuserf63bd7
 
Darshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfDarshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfShashank Mehta
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03DallasHaselhorst
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckHajeJanKamps
 

Último (20)

Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
 
Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...
 
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQM
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdf
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation Slides
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful Business
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...
 
Financial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptxFinancial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptx
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyot
 
Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...
 
Chapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal auditChapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal audit
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail Accounts
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...
 
Darshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfDarshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdf
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
 

Booz Allen's 10 Cyber Priorities for Boards of Directors

  • 1. INTRODUCTION A company’s board of directors is expected to drive market competitiveness by asking the tough questions—about executive performance, growth opportunities, compliance, risk, and more. In 2017, cyber risk is reaching new heights in both event likelihood and business impact. As boards and associated executive committees engage in dialogue over this ever-evolving topic, they need access to the right information to effectively challenge the security status quo and validate that the future investment strategy will address the anticipated cyber risk environment. As we peer into how business, technology, regulatory, and cyber threat realities are evolving in the coming year, here is a reference guide for board members to use in validating their company’s cybersecurity approach. TOP 10 CYBER FOCUS AREAS FOR BOARDS IN 2017 External Forces Key regulatory bodies are becoming increasingly prescriptive on cyber defense requirements, and the consequences of noncompliance are becoming more severe. 1. EU General Data Protection Regulation (GDPR). Sweeping EU data protection regulations, effective May 25, 2018, will affect organizations operating within 28 EU member states. The GDPR harmonizes regulations and implements significantly more prescriptive requirements, with significant fines for noncompliance. As a result, companies will need to place even greater focus on data security and privacy. 2. New York Department of Financial Services (DFS) Cybersecurity Regulation. Increased efforts to protect sensitive financial information has resulted in significant, first-in-the-nation proposed regulation focused on financial institutions conducting business in New York, effective March 1, 2017. However, these new regulations are likely to influence other industries and jurisdictions. Pragmatically, all companies can take cues from the DFS regulation’s core mandates, including identifying internal and external risks, protecting sensitive information, initiating annual penetration tests of systems, and conducting routine vulnerability assessments. Threat Landscape Adversaries are diversifying their methods and intents—going beyond traditional theft of personally identifiable information and intellectual property. Now, disruption of business operations and destruction of key digital and physical assets are increasingly becoming part of threat actors’ modus operandi. In the near term, there are several threat variants that boards need to stress test with company security leaders. 3. Fake News/Disinformation. Russia and other threat actors have demonstrated that fake news and disinforma- tion work to drive public opinion and behaviors. Public corporations, in particular, should be ready for an increased use of disinformation against them to harm their brands. Boards must understand that fake news and disinformation extend the definition of “cyber threat” from a direct attack against a company to an indirect attack via information warfare. Organizations will need a plan of action to handle disinformation. 4. Ransomware. Originally aimed at individuals, ransom- ware is increasingly targeting businesses, particularly as it continues to grow in sophistication and ransom demands increase in value. Organizations must be ready for hyper-targeted ransomware against high-value digital assets (e.g., applications and databases) and individuals, including executives, officers, and board members. In addition, experts predict that we will see an increase in the diversity and volume of devices—and subsequent business processes—held for ransom. We will see ransomware beginning to infiltrate the Internet of Things (IoT), cloud infrastructure, and industrial control system (ICS) realms. 5. Data Integrity Attacks. Attacks seeking to create confusion or shape behavior by manipulating data have long been understood and demonstrated in information warfare but have seldom been seen in the commercial cyberspace. This is beginning to change, as manipulation of Internet Protocol (IP) source code, sensitive financial information, and the like become real concerns today. The challenge, of course, is that data does not move in integrity attacks; therefore, the effects of manipulation, like fraud, are difficult to detect. 10 CYBER PRIORITIES FOR BOARDS OF DIRECTORS BILL PHELPS, EXECUTIVE VICE PRESIDENT, BOOZ ALLEN HAMILTON
  • 2. About Booz Allen Booz Allen Hamilton has been at the forefront of strategy, technology, and engineering for more than 100 years. Booz Allen partners with private and public sector clients to solve their most difficult chal- lenges. To learn more, visit BoozAllen.com. (NYSE: BAH) For more information: Bill Phelps Executive Vice President phelps_bill@bah.com 6. Continued Scaling of DDoS. Threat actors will increasingly employ large-scale IoT device-based botnets to disrupt business systems, processes, and networks. The 2016 distributed denial-of-service (DDoS) attack against an Internet performance manage- ment company (Dyn), causing major commercial online services to go offline, illustrates how damaging these attacks can be. DDoS has long been a favorite tool of politically motivated attackers, but we will likely see it return to its roots as a tool for ransom. 7. More ICS/IoT Attacks. Security professionals have long understood the vulnerability of ICS and connected architectures to cyber attack, but threat actors operating in the commercial market have not exploited these vulnerabilities at great scale yet. This is changing. Board members in manufacturing, transportation, energy, oil and gas, and chemical industries should be especially aware and should press their companies for increased resilience in this space. Key Cyber Operational Focus Areas In spite of tremendous investment in cybersecurity, most organizations are not able to effectively scale their cyber defenses to the growing attack surface, which leaves exploitable gaps for threat actors to pursue. 8. Red Teaming and Executive Wargames. Despite growing cyber regulations, compliance assessments are simply not effective in assessing the effectiveness of an organization’s cyber defense capabilities. Continued testing of operational effectiveness through “red teaming” employs expert, adversary-minded resources to expose gaps in a company’s security posture. In complement, wargames test the readiness of cross-functional leaders and senior executives to respond in the face of a material cyber incident. Boards should require that they be briefed on the results of both red team and wargame exercises to understand the readiness of their companies to detect and respond to serious cyber incidents. 9. Security Beyond IT. In many organizations, responsibility for security beyond the core IT infrastructure remains unclear. It may fall under a corporate chief information security officer who does not always possess the necessary skill and authority, or in other instances, responsibility may simply not be well defined. Cybersecurity concerns have expanded to new realms, including the supply chain, product development, manufac- turing, and retail operations. Boards must ensure that their organizations possess clarity on both accountability and responsibility to ensure that security coverage is appropriate across the extended enterprise. 10. Getting Cloud Security Right. Migrating applications to the cloud is an ever-increasing priority for organizations. From a security perspective, cloud providers are generally strong at protecting their own cloud infrastructure, but too few customers realize that it is their own responsibility to ensure security of their cloud-based data and applications outside of the core purview of their service provider. There are services and leading practices available, but this lack of understanding often represents the Achilles’ heel of cloud security. Boards need to ensure the organization is counterbalancing the cost savings of moving to the cloud with investment in security controls and governance. FINAL WORD Although computing platforms are slowly becoming more resistant to cyber attack, phishing and other social engineering techniques that exploit human weakness continue to be the most effective tools used by adversaries for gaining malicious access to organizations’ systems. Despite a tremendous focus on employee education, the success rates of broad phishing attacks are still in the 10-percent to 15-percent range, and very carefully targeted “spear phishing” attacks have success rates much higher than this. In spite of improvements in technical security, the weakness at the human layer continues. BOOZALLEN.COM© 2017 Booz Allen Hamilton Inc. VCS-C.02.012.17