SlideShare une entreprise Scribd logo
1  sur  13
Télécharger pour lire hors ligne
How boards can lead the
cyber-resilient organisation
Decode resiliency.
2 willistowerswatson.com
Introduction
In the cyber world, many are attacked but not all are victims.
Some organisations emerge stronger. The most cyber-resilient
organisations can respond to an incident, fix the vulnerabilities
and apply the lessons to strategies for the future. A key
element of their resilience is governance, a task that falls to
the board of directors.
“The board helps us to make sure we’re preparing for the
inevitable – that we have the organisation, the people and the plan
to protect ourselves,” says Richard Rushing, Chief Information
Security Officer (CISO) at Motorola Mobility. “Because when it
comes to being attacked, it’s not a matter of if but when.”
To learn more about the challenges of governing a cyber-
resilient organisation, The Economist Intelligence Unit (EIU)
conducted a global survey, sponsored by Willis Towers Watson,
of 452 large-company board members, C-suite executives and
directors with responsibility for cyber-resilience.
Among the findings:
ƒƒ In the past year, a third of the companies surveyed experienced
a serious cyber-incident — one that disrupted operations,
impaired financials and damaged reputations — and most
placed high odds on another one in the next 12 months.
ƒƒ Many companies lack confidence in their ability to source
talent and develop a cyber-savvy workforce.
ƒƒ Executives cite the size of the financial and reputational risk
as the most important reason for board oversight.
Governing cyber-risks doesn’t require that board members
become experts in the more technical aspects of cyber-
security. Says Ed Amoroso, former CISO of AT&T and a veteran
of several boards: “The key is an understanding of risk and good
intuition: following your nose on issues that aren’t always in the
numbers and perhaps just don’t feel right.”
“It’s no different than the oversight responsibility for other
risks,” adds Ellen Rinaldi, CISO of Vanguard Investments. “It’s
helping management get where it needs to be, which is to
have a strategy for the mitigation of cyber-risk.”
How boards can lead the
cyber-resilient organisation
How boards can lead the cyber-resilient organisation 3
The journey to cyber-resilience
A striking aspect of the EIU survey results is the confidence
that many executives possess in their companies’ cyber-
resilience abilities. Using a scale of one to five, where five is
“well above average” and one is “well below average”, the
survey asked executives to rate themselves relative to their
peers on ten areas of cyber-resilience. (Figure 1)
Any rating over three is above average, and respondents
gave themselves ratings over three in every area of cyber-
resilience. Since not everyone can be above average, at least
some are overconfident. Nevertheless, the relative rankings
of their assessments offer clues as to where companies are
lagging in their journey to resilience.
Specifically, a large number of executives feel they’re not
doing as well as they could in learning from failures. (Figure 2)
Only 13% —the smallest proportion of any
of the competencies measured —give
themselves a rating of well above average
compared with peers in applying the lessons
of security incidents.
About the survey
In March 2018 The Economist Intelligence Unit (EIU)
surveyed 452 senior executives and board members
with cyber responsibilities on how their companies were
attempting to become more cyber-resilient. The survey
was sponsored by Willis Towers Watson.
The survey sample is a senior group: half of the
respondents are CEOs, presidents, owners or board
members; the other half are directors and other C-suite
executives. Among those heading up functions, the most
common titles are CIO or CISO (80), CFO (23), CRO (16)
and CHRO (15).
The companies range in size from US$100m in annual
revenue to more than US$25bn. A third of the companies
are in North America (the US and Canada), a third in Asia
(Tokyo and Singapore) and a third in Europe (100 in the
UK and 52 spread across France, Spain, Italy, Germany
and the Netherlands).
Respondents are widely distributed across industries:
manufacturing and technology (12% each), retail and
construction/real estate (10% each) and financial services
(9%) are the largest sectors.
(Note: Since five is “well above average”, the higher the
number, the higher the self-assessment.)
Figure 1. Average self-assessment on a scale of 1 to 5
0 1 2 3 4
Apply lessons from incidents
ID & fill talent gaps
Cyber-savvy workforce
Incorporate cyber into biz continuity
Balance accept vs transfer
Allocate enough budget
Incident response
Integrate tech/governance post-acquisition
Assess cyber-risk culture
Assess & quantify risks
3.713.71
3.623.62
3.573.57
3.573.57
3.533.53
3.563.56
3.463.46
3.443.44
3.413.41
3.153.15
4 willistowerswatson.com
Figure 2. How companies assess their cyber-resilience competencies
Above average Average or below
0% 10% 20% 30% 40% 50% 60%
Assess & quantify risks
Assess cyber-risk culture
Allocate enough budget
Integrate tech/gov post-acquisition
Incident response
Balance accept vs transfer
ID & fill talent gaps
Incorporate cyber into biz continuity
Cyber-savvy workforce
Apply lessons from incidents
Well above average Somewhat above average Average Somewhat below average Well below average
0% 10% 20% 30% 40% 50% 60%
24% 13%
33% 15%
30% 18%
35% 14%
37% 16%
36% 19%
35% 21%
40% 16%
40% 19%
39% 23%
37% 17% 8%
38% 11%
37% 11%
37% 8% 6%
32% 12%
31% 11%
29% 10% 5%
30% 12%
29% 9%
26% 8%
Two other areas in which executives see a deficit are the
ability of their organisations to identify and fill gaps in cyber-
talent along with the capacity to develop a cyber-savvy
workforce. While boards generally don’t focus on cyber-talent
issues beyond the qualifications of the CISO, these deficits
speak to cultural issues that do fall within the board’s remit.
The human side of cyber-resilience is clearly an area that the
C-suite and board members believe their organisations could
improve. (Figure 3)
Figure 3. How companies assess their cyber-resilience:
Percent who say they’re “well above average” relative to peers
(A closer look at the “well above average” ratings from Figure 2)
0% 5% 10% 15% 20% 25%
Apply lessons from incidents
ID & fill talent gaps
Cyber-savvy workforce
Balance accept vs transfer
Allocate enough budget
Incorporate cyber into biz continuity
Incident response
Assess cyber-risk culture
Integrate tech/gov post-acquisition
Assess & quantify risks
23%23%
21%21%
19%19%
19%19%
16%16%
18%18%
16%16%
15%15%
14%14%
13%13%
How boards can lead the cyber-resilient organisation 5
The survey supports this view. Less than half of companies
surveyed had implemented seemingly basic cyber-related
human resource policies, such as ongoing security
awareness training, identification of at-risk employees
and internal communications after a security incident. The
presence of such policies indicates a strong and broadly
accepted culture of cyber-security governance. Their
absence suggests that many companies are remiss in
building a culture of cyber-resilience — a matter that should
be of concern to the board. (Figure 4)
Who leads?
At the board level, cyber presents a dilemma. It’s both critical
enough to demand the attention of the board as a whole and
specialised enough to require expertise that generalists don’t
have. This problem isn’t unique to cyber: delegating specific
types of risk to subcommittees could lead to mirroring silos at
the board level, countering the board’s need to keep its focus
on risks that affect the entire enterprise.
This dilemma is reflected in the survey results. Executives
were asked two questions: who at the board level oversees
cyber and who should oversee it? A growing proportion of
companies believe in one of two things: that cyber should be
overseen by the board or by a cyber-committee. A shrinking
or stable proportion says it should be the responsibility of
audit, risk or some other subgroup. (Figure 5)
In fact, it’s possible to combine the two approaches: educate
the generalists and simultaneously develop a strong and
consistent working relationship with a smaller group with more
in-depth knowledge. Says Vanguard’s Ms. Rinaldi: “It’s helpful
for the CISO to work with a smaller group that becomes more
deeply informed. But there should be a significant amount of
cyber-education provided to the whole board.”
Figure 4. The % of respondents who employ the following
policies
0% 15% 30% 45%
Behavioral rewards/incentives
Post-breach change management
Post-breach workforce planning
Measurement of training effectiveness
Security incident communication
Identification/action of at-risk employees
Business continuity/workforce planning
Identification of talent/skills deficits in IT/cyber
Ongoing security awareness training
44%44%
44%44%
40%40%
40%40%
38%38%
39%39%
37%37%
32%32%
30%30%
Figure 5. Where oversight should lie: The board or
specialised committee?
0% 10% 20% 30% 40%
Who should oversee
Currently oversees
Who should oversee
Currently oversees
19%19%
24%24%
33%33%
38%38%
The board as a whole
Specialised cyber committee
6 willistowerswatson.com
At the operational level, the specialist-generalist issue also
arises. Cyber requires specialised knowledge and skills —
specialised even within the world of IT — and enterprise-wide
business, workforce and process capabilities. In particular,
because workforce vulnerabilities contribute to so many
intrusions, a strong partnership between HR and IT is
imperative. (Figure 6)
Two-thirds of the companies surveyed point
to this partnership when describing how they
develop their employee-related cyber-risk
policies. At 38%, HR leads with IT advising; at
28%, IT leads with HR advising. Overall, HR leads
the charge at just over half of the companies
surveyed, whether on their own (8%), with
outside advisors (7%) or working with IT (38%).
But HR’s role extends far beyond policy. Just as important is
the day-to-day operational relationship with cyber-security
staff. Says Motorola Mobility’s Mr. Rushing: “When someone
changes locations or roles, it can change their access. Are
they local or remote? Management or staff? Why do they
log in from Chicago one day and Brazil the next? If you get
access wrong, the employee can’t do their job and sets
off alarms unnecessarily. Or you leave yourself open to a
breach. That’s a line you need to walk. And you can’t do it
without HR.”
Few would argue about the benefits of a strong relationship
with HR. Taking it a step further, Mr. Rushing’s comment
reflects a specific instance of a broader idea: A culture of co-
operation across functions helps make organisations more
secure and, in the event of a breach, more resilient.
Getting better at communicating with the board
There’s at least a perceived problem in communicating
cyber-security issues to the board. Many cyber-conferences
offer sessions to train CISOs on how to address
management. And CISOs commiserate about the need to
“dumb down” their presentations.
Yet companies tend to think their cyber-resilience heads do a
good job presenting to the board. Consistent with their high
level of confidence elsewhere, no more than 8% of executives
disagree strongly with the statement that their cyber-
resilience head does a good job communicating the financial,
workforce, reputational or personal consequences of cyber
threats. (Figure 7)
Figure 6. Who takes the leading role in developing
employee-related cyber-risk policies?
0% 10% 20% 30% 40%
IT and outside advisors
HR and outside advisors
Human resources only
IT only
IT, HR takes advisory role
HR, IT takes advisory role
38%38%
28%28%
13%13%
8%8%
6%6%
7%7%
Figure 7. Our cyber-resilience head does a good job presenting:
0% 20% 40% 60% 80% 100%
Personal liability
Reputational risks
Workforce vulnerabities
Financial metrics 24% 48% 25%
6% 22% 48% 23%
5% 23% 49% 21%
5% 26% 45% 22%
Agree strongly
Agree
Neither agree nor disagree
Disagree
Disagree strongly
How boards can lead the cyber-resilient organisation 7
At the same time, there’s room for improvement. Only a
quarter of executives agree strongly (five on a scale of one to
five) that their cyber-resilience heads communicate well, and
under 15% give their CISOs or equivalents the top rating on a
scale of one to ten.
There is always the potential for trouble when specialists
present to generalists. In the case of cyber-resilience, there are
two languages at play, one quite technical and one based on a
risk framework. The question is how to best bridge the gap.
“The board speaks in a language I call boardroom,” says Mr.
Rushing. “Other languages don’t translate well. The common
denominator is dollars at risk. You can say, ‘we would put
US$20m of revenue at risk by doing this,’ knowing that the
CFO will question each number and you need to be prepared
to explain why the number is real.”
Executives don’t believe they’re spending enough
Given the magnitude of the risk, most executives think
they aren’t spending enough on cyber-security and cyber-
resilience. There’s no clear consensus on where the extra
dollars should go. But widely used risk frameworks can
provide some guidance.
Among the 452 companies surveyed, the average spend on
cyber-resilience is about 1.7% of revenue. Spending is close to
normally distributed around the mean: a third spend 1-2% of
revenue, a third spend more and a third spend less. (Figure 8)
However, few think they’re spending enough.
Three-quarters of the survey respondents say
that the risk of cyber-intrusions mandates that
they invest more – half up to 10% more, and
another 23% more than 10%. Only 15% say that
they are spending the right amount, and 12%
believe they should spend less. (Figure 9)
Figure 9. How should our spending on cyber-resilience change?
Figure 8. Cyber-resilience spending as a percent of revenue
0%
5%
10%
15%
20%
25%
30%
35%
Less
than 0.5%
0.5% to
less
than 1%
1% to
less
than 2%
2% to
less
than 3%
3% to
less
than 5%
5% or
more
2%
6%
27%
32%
11%
22%
% of revenue
0%
10%
20%
30%
40%
50%
Down by more
than 50%
Down by
31-50%
Down by
11-30%
Down by
10% or less
No changeUp by
10% or less
Up by
11-30%
Up by
31-50%
Up by more
than 50%
2%
5%
16%
50%
6%
4%
1% 1%
15%
% of revenue
Where should the new dollars go? It’s difficult to generalise
across companies in different situations and industries, and
there is indeed little consensus among executives on how to
allocate new money. The rote answer to all cyber-security
questions is technology, and “technology to harden cyber-
defences” did come in first – but just barely, with 20 cents of
every new dollar. (Figure 10)
However, there is no significant difference between the votes
for spending more on technology and investments in talent and
training (19 cents). In fact, if all of the human capital-related
expenditures is added up, it totals 50 cents out of every new
dollar – and it could be argued that business continuity and
disaster-recovery planning is human capital-related as well.
Insurance comes in last, at 14 cents of every new dollar, even
though sales of insurance against breaches are growing
fast. Nevertheless, 14% of new spending on cyber-resilience
could still be a large sum. And since most large corporations
already have cyber-insurance in place, the survey response
could simply represent first-time buyers.
Cyber-resilience professionals have more definitive ideas
about how to spend new budget. Says Mr. Rushing: “The
NIST Framework has five categories: identify, protect, detect,
respond and recover. You could invest 20% in each bucket.
The technology falls mostly in the protect category, and lots
of companies spend 75% on protect. That means the other
four are shortchanged.”
He also makes a case for spending more on identifying
vulnerable assets. “I laugh when someone estimates how
many computers are on their network. Why is it approximate?
Figure 10. How should new spending on cyber-resilience be
allocated?
0 5 10
Cents of every new dollar spent
15 20
Insurance to cover damages in the event of a breach
Training to shape employee behaviour or corporate culture
Rewards and incentives to motivate the right employee behaviour
Investment in business continuity and disaster recovery planning
IT talent acquisition, skills training/development
Technology to harden cyber-defenses
2020
1919
1616
1616
14
1515
8 willistowerswatson.com
If you don’t know exactly, you should spend more on
identification. You can’t fix your vulnerabilities if you can’t
identify which assets are yours.”
Ms. Rinaldi highlights the need to pay attention to resilience
as well as protection. “I think many companies have
concluded that they have to spend more time and effort
getting recover and respond down,” she says. “But that
doesn’t solve the problem. For that you need to remediate –
to fix whatever the issues are so it doesn’t happen again.”
Learning from failure
Nobody likes to fail. And often a cyber-intrusion is seen as a
failure on the part of the CISO, who might pay for it with their job.
But failure can be seen in a positive light as well. When there
are no intrusions, it’s often unclear what an organisation did
right, and it’s easy to become complacent. “A lack of obvious
problems often causes security processes to suffer,” says Mr.
Rushing. “In the most extreme form, people start saying, ‘look,
we have back-up tapes. Maybe that’s enough.’”
Failure usually teaches a lesson. In the words of Nassim
Taleb, “difficulty is what wakes up the genius.” The key is
to learn from each intrusion. And that’s exactly what many
survey respondents say they aren’t very good at.
The executives surveyed consider their organisations good at
incident response —19% say they are well above average and
another 36% consider themselves above average. But they are
more circumspect about their ability to learn from their failures.
When asked to rate themselves on “incorporating learnings from
incidents into new defensive strategies,” only 13% say they are
well above average (and a quarter admit to being below average,
the highest proportion of any of the ten competencies).
However, the cyber-professionals interviewed have plenty
of advice on learning from failure. “You don’t have to restrict
yourself to failure in your organisation. Intrusions are reported
in the press every day,” says Ms. Rinaldi. “When you see one,
you ask, ‘could this have happened here? What would have
caused it to happen here? What can we put in place so it
won’t happen here?’”
“On the technical side, you now have the availability of
sandboxes to test how the threat would operate within a
particular technological environment,” she continues. “You
figure out the protections you can put in place and then you
put them in place.”
Ms. Rinaldi concludes: “When there’s an incident in your own
organisation, you need the discipline to consistently set up
post-breach meetings, walk through the exact process and
issues, lay out a follow-up plan and follow that plan to the end.”
Remember that a plan is not the same as the real thing,
warns Mr. Rushing: “In some places, after an intrusion, it has
taken three to four weeks to get everything back up and
operational. There was a plan, but that’s all it was—not much
vetting, no dry runs, no tabletops.”
Finally, don’t punish failure. Says Mr. Amoroso: “If a company
gets hacked, the CISO gets fired. That’s the opposite of what
should happen.”
How boards can lead the cyber-resilient organisation 9
Conclusion
Despite the confidence expressed by survey respondents,
there is broad consensus that more cyber-resilience
education is needed, both within the workforce and at the
board level.
Cyber-resilience only came onto the radar when the internet
came of age in the early 2000s. As a result, it is often the
digital natives that have the most exposure to, and knowledge
of, cyber-security issues. “Their instincts are a hundred times
better than even the most experienced board member,”
asserts Mr. Amoroso. “That’s good news. They’re going to
come up through the ranks and they get it.”
Education will speed the transition. It can be argued that
the education that may have the biggest payoff will focus on
the least tech savvy and yet most influential members of the
organisation: those on the board.
That’s not where education should end, of course. The survey
highlights the need for investments to address skills deficits
and win the war for talent. The high marks executives give
themselves on risk assessment and technology integration
also suggest that investments in these areas —associated
with the identify and protect phases of risk management
frameworks —have diminishing returns relative to the more
human capital-related respond and recover phases.
Technology is less of a differentiator than it used to be,
necessary but not sufficient. As the emphasis shifts from
cyber-security to cyber-resilience, the business, process
and workforce aspects increase in importance relative to
specialised technical expertise.
“Resilience is a combination of things. It’s technology, it’s
people, and a lot of it is process and an integration between
the technology side and the business side. It’s what I believe,
and it’s what I believe the board should be looking at as well,”
says Ms Rinaldi.
 
North America: More attacks, more to
come, more resilience
Cyber-resilience is a global issue. In most areas of
the Economist Intelligence Unit survey executives
respond in similar ways irrespective of where they
are located. But companies in the US and Canada
contrast strongly with their peers in Asia, and to
some extent Europe, in the following areas:
1.	Frequency and impact of attacks and expectations
of new intrusions;
2.	Confidence in their ability to recover from such
intrusions; and
3.	Belief in their board’s expertise and plans to recruit
new board members.
More US and UK survey respondents report that they
have been attacked. The US also ranks first, usually
by a large margin, in the proportion of companies
who say:
ƒƒ The intrusions had a severe impact;
ƒƒ They expect to be attacked in the future;
ƒƒ They’re well prepared for intrusions;
ƒƒ Their boards are well-versed in cyber;
ƒƒ Yet they’re also aggressively recruiting more
cyber-expertise.
10 willistowerswatson.com
How boards can lead the cyber-resilient organisation 11
Figure 12. North America and the UK suffer from intrusions the most (and they’re more serious)
Figure 11. Survey participants by region and country
(1) Respondents who answered “yes.”
(2) Respondents who rated the severity of the impact one on a scale of one to five, averaged across the systems/operations,
financial and reputational impacts.
(3) The average percentage of respondents who rated the probability of a breach one on a scale of one to five.
Asia UKCentral Europe North America
0% 20% 40%10% 30% 50%
We're likely to have breach with a
severe impact in the next 12 months. (3)
The intrusion had a severe impact on
operations, finance and reputation. (2)
We had a cyber-security incident
during the last 12 months. (1)
54%29%14%
21% 41%
14% 18% 36%
Frequency and impact of attacks and expectations of new
intrusions. UK (41%) and North American (40%) companies
were much more likely than those in other regions to have
experienced an intrusion in the last year. (Note that the
North American figure averages the US and Canada, and
a higher proportion of US firms experienced an intrusion.)
North American companies were far more likely to say
the intrusion had a serious impact on their operations and
financial results, and to gird themselves for another attack in
the months to come. (Figure 12)
While a significant proportion of Asian and European companies
said the same, the numbers were far lower. Surprisingly, even
though 41% of UK executives reported an intrusion during the
past year, only 18% expected it to happen again during the
coming year. Indeed, in every region, more executives reported
past intrusions than expected future ones. Is this a sign of
strengthened defenses or one of complacency? The answer is
critical to their cyber-resilience efforts.
Confidence in their ability to recover. North American and
UK firms were attacked far more than those in other regions.
More North American firms characterised the damage from
their attacks as serious and more expected another attack
in the near future. And far more North American firms also
expressed confidence in their capabilities to repair the
damage and proceed with business as usual. (Figure 13)
Note that the chart shows averages across three intrusion
impacts: operations, financial results and reputation. In every
region and across the survey as a whole, the executives said
reputation was the toughest to restore.
You can’t have too much cyber-expertise. A third area in which
North American firms differ is in their active recruitment of board
members with cyber-expertise—even though nearly half of the
North American executives surveyed already gave themselves
high marks for board expertise. The biggest contrast was with
Asia, where relatively few (17%) companies had a high level of
cyber-expertise, and even fewer (9%) saw a strong need to
bring cyber-expertise on their boards. (Figure 14)
Figure 14. North American firms are both confident in board expertise and seeking more (1)
Figure 13. North American firms are most confident in restoration after a breach
Asia UKCentral Europe North America
0% 20% 40%10% 30% 50%
We are confident in restoring operations,
finances and reputation in the event of
a breach. (1)
21% 27%30% 45%
(1) Respondents who rated themselves one on a scale of one to five (average across the operations, financial results and reputation).
(1) Respondents who rated themselves one on a scale of one to five
Asia UKCentral Europe North America
0% 20% 40%10% 30% 50%
We are actively recruiting directors who
know cyber.
We have enough directors who
know cyber.
36%27%9% 18%
17% 46%27%
12 willistowerswatson.com
Copyright © 2018 Willis Towers Watson. All rights reserved.
WTW-GL-18-RES-5381a
willistowerswatson.com
	 	 	 willistowerswatson.com/social-media
About Willis Towers Watson
Willis Towers Watson (NASDAQ: WLTW) is a leading global advisory, broking and
solutions company that helps clients around the world turn risk into a path for
growth. With roots dating to 1828, Willis Towers Watson has over 40,000 employees
serving more than 140 countries. We design and deliver solutions that manage risk,
optimize benefits, cultivate talent, and expand the power of capital to protect and
strengthen institutions and individuals. Our unique perspective allows us to see
the critical intersections between talent, assets and ideas — the dynamic formula
that drives business performance. Together, we unlock potential. Learn more at
willistowerswatson.com.
Recover
Protect
Assess
Cyber Risk
Culture Survey
Cyber Risk
Profile
Diagnostic
Insurance
Advisory
and Broking
Cyber Work
Readiness
Diagnostic
Insurance:
Incident Response
Claims Advocacy
Forensic
Accounting
People + Capital + Technology
People + Capital + Technology
Cyber
Quantified
Cyber
Resiliency
Why Willis Towers Watson
More than half of all cyber incidents begin with employees, so
it’s a people problem. And the average breach costs $4 million,
so it’s a capital problem, too. No one decodes this complexity
better than Willis Towers Watson. As a global leader in human
capital solutions, risk advisory and broking, we are well prepared
to assess your cyber vulnerabilities, protect you through best-in-
class solutions and radically improve your ability to successfully
recover from future attacks. Explore comprehensive
cybersecurity solutions at willistowerswatson.com/cyber.
People + Capital + Technology = Cyber Resiliency

Contenu connexe

Tendances

Under cyber attack: EY's Global information security survey 2013
Under cyber attack: EY's Global information security survey 2013Under cyber attack: EY's Global information security survey 2013
Under cyber attack: EY's Global information security survey 2013EY
 
The Work Ahead for Healthcare Payers: Gaining a Foothold in the Digital Healt...
The Work Ahead for Healthcare Payers: Gaining a Foothold in the Digital Healt...The Work Ahead for Healthcare Payers: Gaining a Foothold in the Digital Healt...
The Work Ahead for Healthcare Payers: Gaining a Foothold in the Digital Healt...Cognizant
 
Accenture Saudi Arabia Innovation Maturity Index​
Accenture Saudi Arabia Innovation Maturity Index​Accenture Saudi Arabia Innovation Maturity Index​
Accenture Saudi Arabia Innovation Maturity Index​accenture
 
Insuring your future: Cybersecurity and the insurance industry
Insuring your future: Cybersecurity and the insurance industryInsuring your future: Cybersecurity and the insurance industry
Insuring your future: Cybersecurity and the insurance industryAccenture Insurance
 
PwC 2016 CEO Survey Insurance report
PwC 2016 CEO Survey Insurance report PwC 2016 CEO Survey Insurance report
PwC 2016 CEO Survey Insurance report PwC
 
Telecom’s future is Social (GSMA Mobile Asia 2013)
Telecom’s future is Social  (GSMA Mobile Asia 2013)Telecom’s future is Social  (GSMA Mobile Asia 2013)
Telecom’s future is Social (GSMA Mobile Asia 2013)Rob Van Den Dam
 
Scott Neuman: The Social Business Imperative
Scott Neuman: The Social Business ImperativeScott Neuman: The Social Business Imperative
Scott Neuman: The Social Business ImperativeUnited Partners
 
Measuring and Managing Credit Risk With Machine Learning and Artificial Intel...
Measuring and Managing Credit Risk With Machine Learning and Artificial Intel...Measuring and Managing Credit Risk With Machine Learning and Artificial Intel...
Measuring and Managing Credit Risk With Machine Learning and Artificial Intel...accenture
 
The way forward. Insurance in an age of customer intimacy and Internet of Things
The way forward. Insurance in an age of customer intimacy and Internet of ThingsThe way forward. Insurance in an age of customer intimacy and Internet of Things
The way forward. Insurance in an age of customer intimacy and Internet of ThingsThe Economist Media Businesses
 
Exploring Consumer Attitudes & Actions on Key Tech Policy Issues 2014
Exploring Consumer Attitudes & Actions on Key Tech Policy Issues 2014Exploring Consumer Attitudes & Actions on Key Tech Policy Issues 2014
Exploring Consumer Attitudes & Actions on Key Tech Policy Issues 2014Edelman
 
Pwc 2015 Technology Sector Sec Comment Letter Trends
Pwc 2015 Technology Sector Sec Comment Letter TrendsPwc 2015 Technology Sector Sec Comment Letter Trends
Pwc 2015 Technology Sector Sec Comment Letter TrendsPwC
 
Whitepaper: Rules Harvesting from Source Code - Happiest Minds
Whitepaper: Rules Harvesting from Source Code - Happiest MindsWhitepaper: Rules Harvesting from Source Code - Happiest Minds
Whitepaper: Rules Harvesting from Source Code - Happiest MindsHappiest Minds Technologies
 
APEC Building Better Cities
APEC Building Better CitiesAPEC Building Better Cities
APEC Building Better CitiesPwC
 
The Digital Multiplier: Five Steps To Digital Success In The Insurance Sector
The Digital Multiplier: Five Steps To Digital Success In The Insurance SectorThe Digital Multiplier: Five Steps To Digital Success In The Insurance Sector
The Digital Multiplier: Five Steps To Digital Success In The Insurance SectorAccenture Insurance
 
The 2018 Deloitte Global Outsourcing Survey Presentation
The 2018 Deloitte Global Outsourcing Survey PresentationThe 2018 Deloitte Global Outsourcing Survey Presentation
The 2018 Deloitte Global Outsourcing Survey PresentationDeloitte United States
 
HEALTHCARE IT SERVICES MARKET: THE OUTLOOK FOR 2017
HEALTHCARE IT SERVICES MARKET: THE OUTLOOK FOR 2017HEALTHCARE IT SERVICES MARKET: THE OUTLOOK FOR 2017
HEALTHCARE IT SERVICES MARKET: THE OUTLOOK FOR 2017Damo Consulting Inc.
 

Tendances (20)

Executive summary - App nations
Executive summary - App nationsExecutive summary - App nations
Executive summary - App nations
 
Under cyber attack: EY's Global information security survey 2013
Under cyber attack: EY's Global information security survey 2013Under cyber attack: EY's Global information security survey 2013
Under cyber attack: EY's Global information security survey 2013
 
The Work Ahead for Healthcare Payers: Gaining a Foothold in the Digital Healt...
The Work Ahead for Healthcare Payers: Gaining a Foothold in the Digital Healt...The Work Ahead for Healthcare Payers: Gaining a Foothold in the Digital Healt...
The Work Ahead for Healthcare Payers: Gaining a Foothold in the Digital Healt...
 
Accenture Saudi Arabia Innovation Maturity Index​
Accenture Saudi Arabia Innovation Maturity Index​Accenture Saudi Arabia Innovation Maturity Index​
Accenture Saudi Arabia Innovation Maturity Index​
 
Insuring your future: Cybersecurity and the insurance industry
Insuring your future: Cybersecurity and the insurance industryInsuring your future: Cybersecurity and the insurance industry
Insuring your future: Cybersecurity and the insurance industry
 
PwC 2016 CEO Survey Insurance report
PwC 2016 CEO Survey Insurance report PwC 2016 CEO Survey Insurance report
PwC 2016 CEO Survey Insurance report
 
Telecom’s future is Social (GSMA Mobile Asia 2013)
Telecom’s future is Social  (GSMA Mobile Asia 2013)Telecom’s future is Social  (GSMA Mobile Asia 2013)
Telecom’s future is Social (GSMA Mobile Asia 2013)
 
Scott Neuman: The Social Business Imperative
Scott Neuman: The Social Business ImperativeScott Neuman: The Social Business Imperative
Scott Neuman: The Social Business Imperative
 
Measuring and Managing Credit Risk With Machine Learning and Artificial Intel...
Measuring and Managing Credit Risk With Machine Learning and Artificial Intel...Measuring and Managing Credit Risk With Machine Learning and Artificial Intel...
Measuring and Managing Credit Risk With Machine Learning and Artificial Intel...
 
The way forward. Insurance in an age of customer intimacy and Internet of Things
The way forward. Insurance in an age of customer intimacy and Internet of ThingsThe way forward. Insurance in an age of customer intimacy and Internet of Things
The way forward. Insurance in an age of customer intimacy and Internet of Things
 
Exploring Consumer Attitudes & Actions on Key Tech Policy Issues 2014
Exploring Consumer Attitudes & Actions on Key Tech Policy Issues 2014Exploring Consumer Attitudes & Actions on Key Tech Policy Issues 2014
Exploring Consumer Attitudes & Actions on Key Tech Policy Issues 2014
 
Pwc 2015 Technology Sector Sec Comment Letter Trends
Pwc 2015 Technology Sector Sec Comment Letter TrendsPwc 2015 Technology Sector Sec Comment Letter Trends
Pwc 2015 Technology Sector Sec Comment Letter Trends
 
Whitepaper: Rules Harvesting from Source Code - Happiest Minds
Whitepaper: Rules Harvesting from Source Code - Happiest MindsWhitepaper: Rules Harvesting from Source Code - Happiest Minds
Whitepaper: Rules Harvesting from Source Code - Happiest Minds
 
APEC Building Better Cities
APEC Building Better CitiesAPEC Building Better Cities
APEC Building Better Cities
 
The Digital Multiplier: Five Steps To Digital Success In The Insurance Sector
The Digital Multiplier: Five Steps To Digital Success In The Insurance SectorThe Digital Multiplier: Five Steps To Digital Success In The Insurance Sector
The Digital Multiplier: Five Steps To Digital Success In The Insurance Sector
 
The 2018 Deloitte Global Outsourcing Survey Presentation
The 2018 Deloitte Global Outsourcing Survey PresentationThe 2018 Deloitte Global Outsourcing Survey Presentation
The 2018 Deloitte Global Outsourcing Survey Presentation
 
Pwc AI analyse
Pwc AI analysePwc AI analyse
Pwc AI analyse
 
Mark Lynch - Importance of Big Data and Analytics for the Insurance Market
Mark Lynch - Importance of Big Data and Analytics for the Insurance MarketMark Lynch - Importance of Big Data and Analytics for the Insurance Market
Mark Lynch - Importance of Big Data and Analytics for the Insurance Market
 
HEALTHCARE IT SERVICES MARKET: THE OUTLOOK FOR 2017
HEALTHCARE IT SERVICES MARKET: THE OUTLOOK FOR 2017HEALTHCARE IT SERVICES MARKET: THE OUTLOOK FOR 2017
HEALTHCARE IT SERVICES MARKET: THE OUTLOOK FOR 2017
 
Harnham_Salary_Guide_2015
Harnham_Salary_Guide_2015Harnham_Salary_Guide_2015
Harnham_Salary_Guide_2015
 

Similaire à How boards can lead the cyber-resilient organisation

How close is your organization to being breached | Safe Security
How close is your organization to being breached | Safe SecurityHow close is your organization to being breached | Safe Security
How close is your organization to being breached | Safe SecurityRahul Tyagi
 
Managing Cyber Risk: Are Companies Safeguarding Their Assets?
Managing Cyber Risk: Are Companies Safeguarding Their Assets?Managing Cyber Risk: Are Companies Safeguarding Their Assets?
Managing Cyber Risk: Are Companies Safeguarding Their Assets?EMC
 
Managing Cyber Risk: Are Companies Safeguarding Their Assets?
Managing Cyber Risk: Are Companies Safeguarding Their Assets?Managing Cyber Risk: Are Companies Safeguarding Their Assets?
Managing Cyber Risk: Are Companies Safeguarding Their Assets?EMC
 
Securing the Digital Future
Securing the Digital FutureSecuring the Digital Future
Securing the Digital FutureCognizant
 
The cyber-chasm: How the disconnect between the C-suite and security endanger...
The cyber-chasm: How the disconnect between the C-suite and security endanger...The cyber-chasm: How the disconnect between the C-suite and security endanger...
The cyber-chasm: How the disconnect between the C-suite and security endanger...The Economist Media Businesses
 
Ask the Experts final
Ask the Experts finalAsk the Experts final
Ask the Experts finalDaren Dunkel
 
A CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk ManagementA CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk ManagementDaren Dunkel
 
AP_Cybersecurity_and_Risk_Management_Lead_from_the_C-suite_Mar_2016
AP_Cybersecurity_and_Risk_Management_Lead_from_the_C-suite_Mar_2016AP_Cybersecurity_and_Risk_Management_Lead_from_the_C-suite_Mar_2016
AP_Cybersecurity_and_Risk_Management_Lead_from_the_C-suite_Mar_2016Ben Browning
 
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)Sarah Jarvis
 
Data security: How a proactive C-suite can reduce cyber-risk for the enterprise
Data security: How a proactive C-suite can reduce cyber-risk for the enterpriseData security: How a proactive C-suite can reduce cyber-risk for the enterprise
Data security: How a proactive C-suite can reduce cyber-risk for the enterpriseThe Economist Media Businesses
 
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?Sarah Nirschl
 
Cybersecurity: Perceptions & Practices
Cybersecurity: Perceptions & PracticesCybersecurity: Perceptions & Practices
Cybersecurity: Perceptions & PracticesJoseph DeFever
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...International Federation of Accountants
 
Enterprise Risk Management for the Digital Transformation Age
Enterprise Risk Management for the Digital Transformation AgeEnterprise Risk Management for the Digital Transformation Age
Enterprise Risk Management for the Digital Transformation AgeCareer Communications Group
 
Norman Broadbent Cybersecurity Report - How should boards respond
Norman Broadbent Cybersecurity Report - How should boards respondNorman Broadbent Cybersecurity Report - How should boards respond
Norman Broadbent Cybersecurity Report - How should boards respondLydia Shepherd
 

Similaire à How boards can lead the cyber-resilient organisation (20)

How close is your organization to being breached | Safe Security
How close is your organization to being breached | Safe SecurityHow close is your organization to being breached | Safe Security
How close is your organization to being breached | Safe Security
 
7350_RiskWatch-Summer2015-Maligec
7350_RiskWatch-Summer2015-Maligec7350_RiskWatch-Summer2015-Maligec
7350_RiskWatch-Summer2015-Maligec
 
Managing Cyber Risk: Are Companies Safeguarding Their Assets?
Managing Cyber Risk: Are Companies Safeguarding Their Assets?Managing Cyber Risk: Are Companies Safeguarding Their Assets?
Managing Cyber Risk: Are Companies Safeguarding Their Assets?
 
Managing Cyber Risk: Are Companies Safeguarding Their Assets?
Managing Cyber Risk: Are Companies Safeguarding Their Assets?Managing Cyber Risk: Are Companies Safeguarding Their Assets?
Managing Cyber Risk: Are Companies Safeguarding Their Assets?
 
Securing the Digital Future
Securing the Digital FutureSecuring the Digital Future
Securing the Digital Future
 
The cyber-chasm: How the disconnect between the C-suite and security endanger...
The cyber-chasm: How the disconnect between the C-suite and security endanger...The cyber-chasm: How the disconnect between the C-suite and security endanger...
The cyber-chasm: How the disconnect between the C-suite and security endanger...
 
Ask the Experts final
Ask the Experts finalAsk the Experts final
Ask the Experts final
 
Breaches Are Bad for Business. How Will You Detect and Respond to Your Next C...
Breaches Are Bad for Business. How Will You Detect and Respond to Your Next C...Breaches Are Bad for Business. How Will You Detect and Respond to Your Next C...
Breaches Are Bad for Business. How Will You Detect and Respond to Your Next C...
 
A CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk ManagementA CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk Management
 
AP_Cybersecurity_and_Risk_Management_Lead_from_the_C-suite_Mar_2016
AP_Cybersecurity_and_Risk_Management_Lead_from_the_C-suite_Mar_2016AP_Cybersecurity_and_Risk_Management_Lead_from_the_C-suite_Mar_2016
AP_Cybersecurity_and_Risk_Management_Lead_from_the_C-suite_Mar_2016
 
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
 
Data security: How a proactive C-suite can reduce cyber-risk for the enterprise
Data security: How a proactive C-suite can reduce cyber-risk for the enterpriseData security: How a proactive C-suite can reduce cyber-risk for the enterprise
Data security: How a proactive C-suite can reduce cyber-risk for the enterprise
 
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
 
Cybersecurity: Perceptions & Practices
Cybersecurity: Perceptions & PracticesCybersecurity: Perceptions & Practices
Cybersecurity: Perceptions & Practices
 
Digital Resilience flipbook
Digital Resilience flipbookDigital Resilience flipbook
Digital Resilience flipbook
 
Digital Resilience flipbook
Digital Resilience flipbookDigital Resilience flipbook
Digital Resilience flipbook
 
Cyber Risks - Maligec and Eskins
Cyber Risks - Maligec and EskinsCyber Risks - Maligec and Eskins
Cyber Risks - Maligec and Eskins
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
 
Enterprise Risk Management for the Digital Transformation Age
Enterprise Risk Management for the Digital Transformation AgeEnterprise Risk Management for the Digital Transformation Age
Enterprise Risk Management for the Digital Transformation Age
 
Norman Broadbent Cybersecurity Report - How should boards respond
Norman Broadbent Cybersecurity Report - How should boards respondNorman Broadbent Cybersecurity Report - How should boards respond
Norman Broadbent Cybersecurity Report - How should boards respond
 

Plus de The Economist Media Businesses

Digital platforms and services: A development opportunity for ASEAN
Digital platforms and services: A development opportunity for ASEANDigital platforms and services: A development opportunity for ASEAN
Digital platforms and services: A development opportunity for ASEANThe Economist Media Businesses
 
Sustainable and actionable: A study of asset-owner priorities for ESG investi...
Sustainable and actionable: A study of asset-owner priorities for ESG investi...Sustainable and actionable: A study of asset-owner priorities for ESG investi...
Sustainable and actionable: A study of asset-owner priorities for ESG investi...The Economist Media Businesses
 
Lung cancer in Latin America: Time to stop looking away
Lung cancer in Latin America: Time to stop looking awayLung cancer in Latin America: Time to stop looking away
Lung cancer in Latin America: Time to stop looking awayThe Economist Media Businesses
 
An entrepreneur’s perspective: Today’s world through the eyes of the young in...
An entrepreneur’s perspective: Today’s world through the eyes of the young in...An entrepreneur’s perspective: Today’s world through the eyes of the young in...
An entrepreneur’s perspective: Today’s world through the eyes of the young in...The Economist Media Businesses
 
EIU - Fostering exploration and excellence in 21st century schools
EIU - Fostering exploration and excellence in 21st century schoolsEIU - Fostering exploration and excellence in 21st century schools
EIU - Fostering exploration and excellence in 21st century schoolsThe Economist Media Businesses
 
Accountability in Marketing - Linking Tactics to Strategy, Customer Focus and...
Accountability in Marketing - Linking Tactics to Strategy, Customer Focus and...Accountability in Marketing - Linking Tactics to Strategy, Customer Focus and...
Accountability in Marketing - Linking Tactics to Strategy, Customer Focus and...The Economist Media Businesses
 
M&A in a changing world: Opportunities amidst disruption
M&A in a changing world: Opportunities amidst disruptionM&A in a changing world: Opportunities amidst disruption
M&A in a changing world: Opportunities amidst disruptionThe Economist Media Businesses
 
Briefing paper: Third-Party Risks: The cyber dimension
Briefing paper: Third-Party Risks: The cyber dimensionBriefing paper: Third-Party Risks: The cyber dimension
Briefing paper: Third-Party Risks: The cyber dimensionThe Economist Media Businesses
 
In Asia-Pacific, low-yields and regulations drive new asset allocations
In Asia-Pacific, low-yields and regulations drive new asset allocationsIn Asia-Pacific, low-yields and regulations drive new asset allocations
In Asia-Pacific, low-yields and regulations drive new asset allocationsThe Economist Media Businesses
 
Asia-pacific Investors Seek Balance Between Risk and Responsibility
Asia-pacific Investors Seek Balance Between Risk and ResponsibilityAsia-pacific Investors Seek Balance Between Risk and Responsibility
Asia-pacific Investors Seek Balance Between Risk and ResponsibilityThe Economist Media Businesses
 
Risks Drive Noth American Investors to Equities, For Now
Risks Drive Noth American Investors to Equities, For NowRisks Drive Noth American Investors to Equities, For Now
Risks Drive Noth American Investors to Equities, For NowThe Economist Media Businesses
 
In North America, Risks Drive Reallocation to Equities
In North America, Risks Drive Reallocation to EquitiesIn North America, Risks Drive Reallocation to Equities
In North America, Risks Drive Reallocation to EquitiesThe Economist Media Businesses
 
Balancing Long-term Liabilities with Market Opportunities in EMEA
Balancing Long-term Liabilities with Market Opportunities in EMEABalancing Long-term Liabilities with Market Opportunities in EMEA
Balancing Long-term Liabilities with Market Opportunities in EMEAThe Economist Media Businesses
 
EMEA: Investors keeping their focus on the longer-term
EMEA: Investors keeping their focus on the longer-termEMEA: Investors keeping their focus on the longer-term
EMEA: Investors keeping their focus on the longer-termThe Economist Media Businesses
 
A Road to a Better Normal: Breast Cancer Patients and Survivors in the EU Wor...
A Road to a Better Normal: Breast Cancer Patients and Survivors in the EU Wor...A Road to a Better Normal: Breast Cancer Patients and Survivors in the EU Wor...
A Road to a Better Normal: Breast Cancer Patients and Survivors in the EU Wor...The Economist Media Businesses
 

Plus de The Economist Media Businesses (20)

Food for thought: Eating better
Food for thought: Eating betterFood for thought: Eating better
Food for thought: Eating better
 
Digital platforms and services: A development opportunity for ASEAN
Digital platforms and services: A development opportunity for ASEANDigital platforms and services: A development opportunity for ASEAN
Digital platforms and services: A development opportunity for ASEAN
 
Sustainable and actionable: A study of asset-owner priorities for ESG investi...
Sustainable and actionable: A study of asset-owner priorities for ESG investi...Sustainable and actionable: A study of asset-owner priorities for ESG investi...
Sustainable and actionable: A study of asset-owner priorities for ESG investi...
 
Next-Generation Connectivity
Next-Generation ConnectivityNext-Generation Connectivity
Next-Generation Connectivity
 
Lung cancer in Latin America: Time to stop looking away
Lung cancer in Latin America: Time to stop looking awayLung cancer in Latin America: Time to stop looking away
Lung cancer in Latin America: Time to stop looking away
 
Communication barriers in the modern workplace
Communication barriers in the modern workplaceCommunication barriers in the modern workplace
Communication barriers in the modern workplace
 
An entrepreneur’s perspective: Today’s world through the eyes of the young in...
An entrepreneur’s perspective: Today’s world through the eyes of the young in...An entrepreneur’s perspective: Today’s world through the eyes of the young in...
An entrepreneur’s perspective: Today’s world through the eyes of the young in...
 
EIU - Fostering exploration and excellence in 21st century schools
EIU - Fostering exploration and excellence in 21st century schoolsEIU - Fostering exploration and excellence in 21st century schools
EIU - Fostering exploration and excellence in 21st century schools
 
Accountability in Marketing - Linking Tactics to Strategy, Customer Focus and...
Accountability in Marketing - Linking Tactics to Strategy, Customer Focus and...Accountability in Marketing - Linking Tactics to Strategy, Customer Focus and...
Accountability in Marketing - Linking Tactics to Strategy, Customer Focus and...
 
M&A in a changing world: Opportunities amidst disruption
M&A in a changing world: Opportunities amidst disruptionM&A in a changing world: Opportunities amidst disruption
M&A in a changing world: Opportunities amidst disruption
 
Infographic: Third-Party Risks: The cyber dimension
Infographic: Third-Party Risks: The cyber dimensionInfographic: Third-Party Risks: The cyber dimension
Infographic: Third-Party Risks: The cyber dimension
 
Briefing paper: Third-Party Risks: The cyber dimension
Briefing paper: Third-Party Risks: The cyber dimensionBriefing paper: Third-Party Risks: The cyber dimension
Briefing paper: Third-Party Risks: The cyber dimension
 
In Asia-Pacific, low-yields and regulations drive new asset allocations
In Asia-Pacific, low-yields and regulations drive new asset allocationsIn Asia-Pacific, low-yields and regulations drive new asset allocations
In Asia-Pacific, low-yields and regulations drive new asset allocations
 
Asia-pacific Investors Seek Balance Between Risk and Responsibility
Asia-pacific Investors Seek Balance Between Risk and ResponsibilityAsia-pacific Investors Seek Balance Between Risk and Responsibility
Asia-pacific Investors Seek Balance Between Risk and Responsibility
 
Risks Drive Noth American Investors to Equities, For Now
Risks Drive Noth American Investors to Equities, For NowRisks Drive Noth American Investors to Equities, For Now
Risks Drive Noth American Investors to Equities, For Now
 
In North America, Risks Drive Reallocation to Equities
In North America, Risks Drive Reallocation to EquitiesIn North America, Risks Drive Reallocation to Equities
In North America, Risks Drive Reallocation to Equities
 
Balancing Long-term Liabilities with Market Opportunities in EMEA
Balancing Long-term Liabilities with Market Opportunities in EMEABalancing Long-term Liabilities with Market Opportunities in EMEA
Balancing Long-term Liabilities with Market Opportunities in EMEA
 
EMEA: Investors keeping their focus on the longer-term
EMEA: Investors keeping their focus on the longer-termEMEA: Investors keeping their focus on the longer-term
EMEA: Investors keeping their focus on the longer-term
 
Infographic: Demystifying ageing
Infographic: Demystifying ageingInfographic: Demystifying ageing
Infographic: Demystifying ageing
 
A Road to a Better Normal: Breast Cancer Patients and Survivors in the EU Wor...
A Road to a Better Normal: Breast Cancer Patients and Survivors in the EU Wor...A Road to a Better Normal: Breast Cancer Patients and Survivors in the EU Wor...
A Road to a Better Normal: Breast Cancer Patients and Survivors in the EU Wor...
 

Dernier

Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 

Dernier (20)

Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 

How boards can lead the cyber-resilient organisation

  • 1. How boards can lead the cyber-resilient organisation Decode resiliency.
  • 2. 2 willistowerswatson.com Introduction In the cyber world, many are attacked but not all are victims. Some organisations emerge stronger. The most cyber-resilient organisations can respond to an incident, fix the vulnerabilities and apply the lessons to strategies for the future. A key element of their resilience is governance, a task that falls to the board of directors. “The board helps us to make sure we’re preparing for the inevitable – that we have the organisation, the people and the plan to protect ourselves,” says Richard Rushing, Chief Information Security Officer (CISO) at Motorola Mobility. “Because when it comes to being attacked, it’s not a matter of if but when.” To learn more about the challenges of governing a cyber- resilient organisation, The Economist Intelligence Unit (EIU) conducted a global survey, sponsored by Willis Towers Watson, of 452 large-company board members, C-suite executives and directors with responsibility for cyber-resilience. Among the findings: ƒƒ In the past year, a third of the companies surveyed experienced a serious cyber-incident — one that disrupted operations, impaired financials and damaged reputations — and most placed high odds on another one in the next 12 months. ƒƒ Many companies lack confidence in their ability to source talent and develop a cyber-savvy workforce. ƒƒ Executives cite the size of the financial and reputational risk as the most important reason for board oversight. Governing cyber-risks doesn’t require that board members become experts in the more technical aspects of cyber- security. Says Ed Amoroso, former CISO of AT&T and a veteran of several boards: “The key is an understanding of risk and good intuition: following your nose on issues that aren’t always in the numbers and perhaps just don’t feel right.” “It’s no different than the oversight responsibility for other risks,” adds Ellen Rinaldi, CISO of Vanguard Investments. “It’s helping management get where it needs to be, which is to have a strategy for the mitigation of cyber-risk.” How boards can lead the cyber-resilient organisation
  • 3. How boards can lead the cyber-resilient organisation 3 The journey to cyber-resilience A striking aspect of the EIU survey results is the confidence that many executives possess in their companies’ cyber- resilience abilities. Using a scale of one to five, where five is “well above average” and one is “well below average”, the survey asked executives to rate themselves relative to their peers on ten areas of cyber-resilience. (Figure 1) Any rating over three is above average, and respondents gave themselves ratings over three in every area of cyber- resilience. Since not everyone can be above average, at least some are overconfident. Nevertheless, the relative rankings of their assessments offer clues as to where companies are lagging in their journey to resilience. Specifically, a large number of executives feel they’re not doing as well as they could in learning from failures. (Figure 2) Only 13% —the smallest proportion of any of the competencies measured —give themselves a rating of well above average compared with peers in applying the lessons of security incidents. About the survey In March 2018 The Economist Intelligence Unit (EIU) surveyed 452 senior executives and board members with cyber responsibilities on how their companies were attempting to become more cyber-resilient. The survey was sponsored by Willis Towers Watson. The survey sample is a senior group: half of the respondents are CEOs, presidents, owners or board members; the other half are directors and other C-suite executives. Among those heading up functions, the most common titles are CIO or CISO (80), CFO (23), CRO (16) and CHRO (15). The companies range in size from US$100m in annual revenue to more than US$25bn. A third of the companies are in North America (the US and Canada), a third in Asia (Tokyo and Singapore) and a third in Europe (100 in the UK and 52 spread across France, Spain, Italy, Germany and the Netherlands). Respondents are widely distributed across industries: manufacturing and technology (12% each), retail and construction/real estate (10% each) and financial services (9%) are the largest sectors. (Note: Since five is “well above average”, the higher the number, the higher the self-assessment.) Figure 1. Average self-assessment on a scale of 1 to 5 0 1 2 3 4 Apply lessons from incidents ID & fill talent gaps Cyber-savvy workforce Incorporate cyber into biz continuity Balance accept vs transfer Allocate enough budget Incident response Integrate tech/governance post-acquisition Assess cyber-risk culture Assess & quantify risks 3.713.71 3.623.62 3.573.57 3.573.57 3.533.53 3.563.56 3.463.46 3.443.44 3.413.41 3.153.15
  • 4. 4 willistowerswatson.com Figure 2. How companies assess their cyber-resilience competencies Above average Average or below 0% 10% 20% 30% 40% 50% 60% Assess & quantify risks Assess cyber-risk culture Allocate enough budget Integrate tech/gov post-acquisition Incident response Balance accept vs transfer ID & fill talent gaps Incorporate cyber into biz continuity Cyber-savvy workforce Apply lessons from incidents Well above average Somewhat above average Average Somewhat below average Well below average 0% 10% 20% 30% 40% 50% 60% 24% 13% 33% 15% 30% 18% 35% 14% 37% 16% 36% 19% 35% 21% 40% 16% 40% 19% 39% 23% 37% 17% 8% 38% 11% 37% 11% 37% 8% 6% 32% 12% 31% 11% 29% 10% 5% 30% 12% 29% 9% 26% 8% Two other areas in which executives see a deficit are the ability of their organisations to identify and fill gaps in cyber- talent along with the capacity to develop a cyber-savvy workforce. While boards generally don’t focus on cyber-talent issues beyond the qualifications of the CISO, these deficits speak to cultural issues that do fall within the board’s remit. The human side of cyber-resilience is clearly an area that the C-suite and board members believe their organisations could improve. (Figure 3) Figure 3. How companies assess their cyber-resilience: Percent who say they’re “well above average” relative to peers (A closer look at the “well above average” ratings from Figure 2) 0% 5% 10% 15% 20% 25% Apply lessons from incidents ID & fill talent gaps Cyber-savvy workforce Balance accept vs transfer Allocate enough budget Incorporate cyber into biz continuity Incident response Assess cyber-risk culture Integrate tech/gov post-acquisition Assess & quantify risks 23%23% 21%21% 19%19% 19%19% 16%16% 18%18% 16%16% 15%15% 14%14% 13%13%
  • 5. How boards can lead the cyber-resilient organisation 5 The survey supports this view. Less than half of companies surveyed had implemented seemingly basic cyber-related human resource policies, such as ongoing security awareness training, identification of at-risk employees and internal communications after a security incident. The presence of such policies indicates a strong and broadly accepted culture of cyber-security governance. Their absence suggests that many companies are remiss in building a culture of cyber-resilience — a matter that should be of concern to the board. (Figure 4) Who leads? At the board level, cyber presents a dilemma. It’s both critical enough to demand the attention of the board as a whole and specialised enough to require expertise that generalists don’t have. This problem isn’t unique to cyber: delegating specific types of risk to subcommittees could lead to mirroring silos at the board level, countering the board’s need to keep its focus on risks that affect the entire enterprise. This dilemma is reflected in the survey results. Executives were asked two questions: who at the board level oversees cyber and who should oversee it? A growing proportion of companies believe in one of two things: that cyber should be overseen by the board or by a cyber-committee. A shrinking or stable proportion says it should be the responsibility of audit, risk or some other subgroup. (Figure 5) In fact, it’s possible to combine the two approaches: educate the generalists and simultaneously develop a strong and consistent working relationship with a smaller group with more in-depth knowledge. Says Vanguard’s Ms. Rinaldi: “It’s helpful for the CISO to work with a smaller group that becomes more deeply informed. But there should be a significant amount of cyber-education provided to the whole board.” Figure 4. The % of respondents who employ the following policies 0% 15% 30% 45% Behavioral rewards/incentives Post-breach change management Post-breach workforce planning Measurement of training effectiveness Security incident communication Identification/action of at-risk employees Business continuity/workforce planning Identification of talent/skills deficits in IT/cyber Ongoing security awareness training 44%44% 44%44% 40%40% 40%40% 38%38% 39%39% 37%37% 32%32% 30%30% Figure 5. Where oversight should lie: The board or specialised committee? 0% 10% 20% 30% 40% Who should oversee Currently oversees Who should oversee Currently oversees 19%19% 24%24% 33%33% 38%38% The board as a whole Specialised cyber committee
  • 6. 6 willistowerswatson.com At the operational level, the specialist-generalist issue also arises. Cyber requires specialised knowledge and skills — specialised even within the world of IT — and enterprise-wide business, workforce and process capabilities. In particular, because workforce vulnerabilities contribute to so many intrusions, a strong partnership between HR and IT is imperative. (Figure 6) Two-thirds of the companies surveyed point to this partnership when describing how they develop their employee-related cyber-risk policies. At 38%, HR leads with IT advising; at 28%, IT leads with HR advising. Overall, HR leads the charge at just over half of the companies surveyed, whether on their own (8%), with outside advisors (7%) or working with IT (38%). But HR’s role extends far beyond policy. Just as important is the day-to-day operational relationship with cyber-security staff. Says Motorola Mobility’s Mr. Rushing: “When someone changes locations or roles, it can change their access. Are they local or remote? Management or staff? Why do they log in from Chicago one day and Brazil the next? If you get access wrong, the employee can’t do their job and sets off alarms unnecessarily. Or you leave yourself open to a breach. That’s a line you need to walk. And you can’t do it without HR.” Few would argue about the benefits of a strong relationship with HR. Taking it a step further, Mr. Rushing’s comment reflects a specific instance of a broader idea: A culture of co- operation across functions helps make organisations more secure and, in the event of a breach, more resilient. Getting better at communicating with the board There’s at least a perceived problem in communicating cyber-security issues to the board. Many cyber-conferences offer sessions to train CISOs on how to address management. And CISOs commiserate about the need to “dumb down” their presentations. Yet companies tend to think their cyber-resilience heads do a good job presenting to the board. Consistent with their high level of confidence elsewhere, no more than 8% of executives disagree strongly with the statement that their cyber- resilience head does a good job communicating the financial, workforce, reputational or personal consequences of cyber threats. (Figure 7) Figure 6. Who takes the leading role in developing employee-related cyber-risk policies? 0% 10% 20% 30% 40% IT and outside advisors HR and outside advisors Human resources only IT only IT, HR takes advisory role HR, IT takes advisory role 38%38% 28%28% 13%13% 8%8% 6%6% 7%7% Figure 7. Our cyber-resilience head does a good job presenting: 0% 20% 40% 60% 80% 100% Personal liability Reputational risks Workforce vulnerabities Financial metrics 24% 48% 25% 6% 22% 48% 23% 5% 23% 49% 21% 5% 26% 45% 22% Agree strongly Agree Neither agree nor disagree Disagree Disagree strongly
  • 7. How boards can lead the cyber-resilient organisation 7 At the same time, there’s room for improvement. Only a quarter of executives agree strongly (five on a scale of one to five) that their cyber-resilience heads communicate well, and under 15% give their CISOs or equivalents the top rating on a scale of one to ten. There is always the potential for trouble when specialists present to generalists. In the case of cyber-resilience, there are two languages at play, one quite technical and one based on a risk framework. The question is how to best bridge the gap. “The board speaks in a language I call boardroom,” says Mr. Rushing. “Other languages don’t translate well. The common denominator is dollars at risk. You can say, ‘we would put US$20m of revenue at risk by doing this,’ knowing that the CFO will question each number and you need to be prepared to explain why the number is real.” Executives don’t believe they’re spending enough Given the magnitude of the risk, most executives think they aren’t spending enough on cyber-security and cyber- resilience. There’s no clear consensus on where the extra dollars should go. But widely used risk frameworks can provide some guidance. Among the 452 companies surveyed, the average spend on cyber-resilience is about 1.7% of revenue. Spending is close to normally distributed around the mean: a third spend 1-2% of revenue, a third spend more and a third spend less. (Figure 8) However, few think they’re spending enough. Three-quarters of the survey respondents say that the risk of cyber-intrusions mandates that they invest more – half up to 10% more, and another 23% more than 10%. Only 15% say that they are spending the right amount, and 12% believe they should spend less. (Figure 9) Figure 9. How should our spending on cyber-resilience change? Figure 8. Cyber-resilience spending as a percent of revenue 0% 5% 10% 15% 20% 25% 30% 35% Less than 0.5% 0.5% to less than 1% 1% to less than 2% 2% to less than 3% 3% to less than 5% 5% or more 2% 6% 27% 32% 11% 22% % of revenue 0% 10% 20% 30% 40% 50% Down by more than 50% Down by 31-50% Down by 11-30% Down by 10% or less No changeUp by 10% or less Up by 11-30% Up by 31-50% Up by more than 50% 2% 5% 16% 50% 6% 4% 1% 1% 15% % of revenue
  • 8. Where should the new dollars go? It’s difficult to generalise across companies in different situations and industries, and there is indeed little consensus among executives on how to allocate new money. The rote answer to all cyber-security questions is technology, and “technology to harden cyber- defences” did come in first – but just barely, with 20 cents of every new dollar. (Figure 10) However, there is no significant difference between the votes for spending more on technology and investments in talent and training (19 cents). In fact, if all of the human capital-related expenditures is added up, it totals 50 cents out of every new dollar – and it could be argued that business continuity and disaster-recovery planning is human capital-related as well. Insurance comes in last, at 14 cents of every new dollar, even though sales of insurance against breaches are growing fast. Nevertheless, 14% of new spending on cyber-resilience could still be a large sum. And since most large corporations already have cyber-insurance in place, the survey response could simply represent first-time buyers. Cyber-resilience professionals have more definitive ideas about how to spend new budget. Says Mr. Rushing: “The NIST Framework has five categories: identify, protect, detect, respond and recover. You could invest 20% in each bucket. The technology falls mostly in the protect category, and lots of companies spend 75% on protect. That means the other four are shortchanged.” He also makes a case for spending more on identifying vulnerable assets. “I laugh when someone estimates how many computers are on their network. Why is it approximate? Figure 10. How should new spending on cyber-resilience be allocated? 0 5 10 Cents of every new dollar spent 15 20 Insurance to cover damages in the event of a breach Training to shape employee behaviour or corporate culture Rewards and incentives to motivate the right employee behaviour Investment in business continuity and disaster recovery planning IT talent acquisition, skills training/development Technology to harden cyber-defenses 2020 1919 1616 1616 14 1515 8 willistowerswatson.com
  • 9. If you don’t know exactly, you should spend more on identification. You can’t fix your vulnerabilities if you can’t identify which assets are yours.” Ms. Rinaldi highlights the need to pay attention to resilience as well as protection. “I think many companies have concluded that they have to spend more time and effort getting recover and respond down,” she says. “But that doesn’t solve the problem. For that you need to remediate – to fix whatever the issues are so it doesn’t happen again.” Learning from failure Nobody likes to fail. And often a cyber-intrusion is seen as a failure on the part of the CISO, who might pay for it with their job. But failure can be seen in a positive light as well. When there are no intrusions, it’s often unclear what an organisation did right, and it’s easy to become complacent. “A lack of obvious problems often causes security processes to suffer,” says Mr. Rushing. “In the most extreme form, people start saying, ‘look, we have back-up tapes. Maybe that’s enough.’” Failure usually teaches a lesson. In the words of Nassim Taleb, “difficulty is what wakes up the genius.” The key is to learn from each intrusion. And that’s exactly what many survey respondents say they aren’t very good at. The executives surveyed consider their organisations good at incident response —19% say they are well above average and another 36% consider themselves above average. But they are more circumspect about their ability to learn from their failures. When asked to rate themselves on “incorporating learnings from incidents into new defensive strategies,” only 13% say they are well above average (and a quarter admit to being below average, the highest proportion of any of the ten competencies). However, the cyber-professionals interviewed have plenty of advice on learning from failure. “You don’t have to restrict yourself to failure in your organisation. Intrusions are reported in the press every day,” says Ms. Rinaldi. “When you see one, you ask, ‘could this have happened here? What would have caused it to happen here? What can we put in place so it won’t happen here?’” “On the technical side, you now have the availability of sandboxes to test how the threat would operate within a particular technological environment,” she continues. “You figure out the protections you can put in place and then you put them in place.” Ms. Rinaldi concludes: “When there’s an incident in your own organisation, you need the discipline to consistently set up post-breach meetings, walk through the exact process and issues, lay out a follow-up plan and follow that plan to the end.” Remember that a plan is not the same as the real thing, warns Mr. Rushing: “In some places, after an intrusion, it has taken three to four weeks to get everything back up and operational. There was a plan, but that’s all it was—not much vetting, no dry runs, no tabletops.” Finally, don’t punish failure. Says Mr. Amoroso: “If a company gets hacked, the CISO gets fired. That’s the opposite of what should happen.” How boards can lead the cyber-resilient organisation 9
  • 10. Conclusion Despite the confidence expressed by survey respondents, there is broad consensus that more cyber-resilience education is needed, both within the workforce and at the board level. Cyber-resilience only came onto the radar when the internet came of age in the early 2000s. As a result, it is often the digital natives that have the most exposure to, and knowledge of, cyber-security issues. “Their instincts are a hundred times better than even the most experienced board member,” asserts Mr. Amoroso. “That’s good news. They’re going to come up through the ranks and they get it.” Education will speed the transition. It can be argued that the education that may have the biggest payoff will focus on the least tech savvy and yet most influential members of the organisation: those on the board. That’s not where education should end, of course. The survey highlights the need for investments to address skills deficits and win the war for talent. The high marks executives give themselves on risk assessment and technology integration also suggest that investments in these areas —associated with the identify and protect phases of risk management frameworks —have diminishing returns relative to the more human capital-related respond and recover phases. Technology is less of a differentiator than it used to be, necessary but not sufficient. As the emphasis shifts from cyber-security to cyber-resilience, the business, process and workforce aspects increase in importance relative to specialised technical expertise. “Resilience is a combination of things. It’s technology, it’s people, and a lot of it is process and an integration between the technology side and the business side. It’s what I believe, and it’s what I believe the board should be looking at as well,” says Ms Rinaldi.   North America: More attacks, more to come, more resilience Cyber-resilience is a global issue. In most areas of the Economist Intelligence Unit survey executives respond in similar ways irrespective of where they are located. But companies in the US and Canada contrast strongly with their peers in Asia, and to some extent Europe, in the following areas: 1. Frequency and impact of attacks and expectations of new intrusions; 2. Confidence in their ability to recover from such intrusions; and 3. Belief in their board’s expertise and plans to recruit new board members. More US and UK survey respondents report that they have been attacked. The US also ranks first, usually by a large margin, in the proportion of companies who say: ƒƒ The intrusions had a severe impact; ƒƒ They expect to be attacked in the future; ƒƒ They’re well prepared for intrusions; ƒƒ Their boards are well-versed in cyber; ƒƒ Yet they’re also aggressively recruiting more cyber-expertise. 10 willistowerswatson.com
  • 11. How boards can lead the cyber-resilient organisation 11 Figure 12. North America and the UK suffer from intrusions the most (and they’re more serious) Figure 11. Survey participants by region and country (1) Respondents who answered “yes.” (2) Respondents who rated the severity of the impact one on a scale of one to five, averaged across the systems/operations, financial and reputational impacts. (3) The average percentage of respondents who rated the probability of a breach one on a scale of one to five. Asia UKCentral Europe North America 0% 20% 40%10% 30% 50% We're likely to have breach with a severe impact in the next 12 months. (3) The intrusion had a severe impact on operations, finance and reputation. (2) We had a cyber-security incident during the last 12 months. (1) 54%29%14% 21% 41% 14% 18% 36% Frequency and impact of attacks and expectations of new intrusions. UK (41%) and North American (40%) companies were much more likely than those in other regions to have experienced an intrusion in the last year. (Note that the North American figure averages the US and Canada, and a higher proportion of US firms experienced an intrusion.) North American companies were far more likely to say the intrusion had a serious impact on their operations and financial results, and to gird themselves for another attack in the months to come. (Figure 12)
  • 12. While a significant proportion of Asian and European companies said the same, the numbers were far lower. Surprisingly, even though 41% of UK executives reported an intrusion during the past year, only 18% expected it to happen again during the coming year. Indeed, in every region, more executives reported past intrusions than expected future ones. Is this a sign of strengthened defenses or one of complacency? The answer is critical to their cyber-resilience efforts. Confidence in their ability to recover. North American and UK firms were attacked far more than those in other regions. More North American firms characterised the damage from their attacks as serious and more expected another attack in the near future. And far more North American firms also expressed confidence in their capabilities to repair the damage and proceed with business as usual. (Figure 13) Note that the chart shows averages across three intrusion impacts: operations, financial results and reputation. In every region and across the survey as a whole, the executives said reputation was the toughest to restore. You can’t have too much cyber-expertise. A third area in which North American firms differ is in their active recruitment of board members with cyber-expertise—even though nearly half of the North American executives surveyed already gave themselves high marks for board expertise. The biggest contrast was with Asia, where relatively few (17%) companies had a high level of cyber-expertise, and even fewer (9%) saw a strong need to bring cyber-expertise on their boards. (Figure 14) Figure 14. North American firms are both confident in board expertise and seeking more (1) Figure 13. North American firms are most confident in restoration after a breach Asia UKCentral Europe North America 0% 20% 40%10% 30% 50% We are confident in restoring operations, finances and reputation in the event of a breach. (1) 21% 27%30% 45% (1) Respondents who rated themselves one on a scale of one to five (average across the operations, financial results and reputation). (1) Respondents who rated themselves one on a scale of one to five Asia UKCentral Europe North America 0% 20% 40%10% 30% 50% We are actively recruiting directors who know cyber. We have enough directors who know cyber. 36%27%9% 18% 17% 46%27% 12 willistowerswatson.com
  • 13. Copyright © 2018 Willis Towers Watson. All rights reserved. WTW-GL-18-RES-5381a willistowerswatson.com willistowerswatson.com/social-media About Willis Towers Watson Willis Towers Watson (NASDAQ: WLTW) is a leading global advisory, broking and solutions company that helps clients around the world turn risk into a path for growth. With roots dating to 1828, Willis Towers Watson has over 40,000 employees serving more than 140 countries. We design and deliver solutions that manage risk, optimize benefits, cultivate talent, and expand the power of capital to protect and strengthen institutions and individuals. Our unique perspective allows us to see the critical intersections between talent, assets and ideas — the dynamic formula that drives business performance. Together, we unlock potential. Learn more at willistowerswatson.com. Recover Protect Assess Cyber Risk Culture Survey Cyber Risk Profile Diagnostic Insurance Advisory and Broking Cyber Work Readiness Diagnostic Insurance: Incident Response Claims Advocacy Forensic Accounting People + Capital + Technology People + Capital + Technology Cyber Quantified Cyber Resiliency Why Willis Towers Watson More than half of all cyber incidents begin with employees, so it’s a people problem. And the average breach costs $4 million, so it’s a capital problem, too. No one decodes this complexity better than Willis Towers Watson. As a global leader in human capital solutions, risk advisory and broking, we are well prepared to assess your cyber vulnerabilities, protect you through best-in- class solutions and radically improve your ability to successfully recover from future attacks. Explore comprehensive cybersecurity solutions at willistowerswatson.com/cyber. People + Capital + Technology = Cyber Resiliency