Assessing Cyber Risk Critical Questions For The Board And The C-suite

Transcription

Assessing Cyber RiskCritical questions for the boardand the C-suite

Assessing Cyber Risk Critical questions for the board and the C-suiteRisk powers performanceRisk has traditionally been viewed as something to be minimised or avoided, withsignificant effort spent on protecting value.However, we believe that risk is also a creator of value and, approached in the right way,can play a unique role in driving business performance.Take the issue of cyber risk. Increased use of technology and globalisation are key driversof cyber risk, but they are also key sources of competitive advantage. Organisationsthat pull back from these drivers to try and protect value will likely fall behind, whileorganisations that find better ways to manage cyber risk can power superior performancethrough increased use of technology and globalisation.A key step on this journey is understanding the current state of your organisation's cybercapabilities. This guide and self-assessment tool is designed to help leaders gauge theircyber maturity, build new cyber risk understanding, and answer key questions, including: Do we have the right leader and organisational talent? Are we focused on, and investing in the right things? How do we evaluate the effectiveness of our organisation's cyber risk programme?Today’s leading organisations are those that have learned how to protect their valuethrough risk management. Tomorrow’s leaders will be those that recognise the opportunityfor risk to also create value. Deloitte’s Risk Advisory professionals around the world canguide you on that journey and help you transform your organisation into a place where riskpowers performance.To learn more, please visit us atwww.deloitte.com/ch/riskadvisory.Mark CarterSwiss Risk Advisory Leader1

Assessing Cyber Risk Critical questions for the board and the C-suiteRisk responsibilityCyber risk is an imperative for everyonewithin the enterprise – but ultimateresponsibility for overseeing risk rests withtop leaders.Many Board members and C-Suiteexecutives, however, are far removed fromthe day-to-day challenges of monitoring,detecting, and responding to evolvingcyber risks. Those leaders who develop adeeper view into where their organisationstands when it comes to cyber risk can gaincritical understanding for better managingthe business.Effective cyber risk management startswith awareness at the Board and C-Suitelevel.01. Do we demonstrate duediligence, ownership, andeffective management ofcyber risk?02. Do we have the right leaderand organisational talent?03. Have we established anappropriate cyber riskescalation framework thatincludes our risk appetiteand reporting thresholds?04. Are we focused on, andinvesting in, the right things?And, if so, how do we evaluateand measure the results ofour decisions? How do our cyberrisk programme and capabilitiesalign to industry standardsand peer organisations?2Sharpening your ability to understandrisk, manage performance, and moveyour organisation closer to cyber maturityoften begins with answering importantquestions – and should result in becominga more secure, vigilant, and resilientbusiness. All three traits are criticallyimportant today – although cyber threatmanagement traditionally has focusedon “secure” while paying less attention to””vigilant” (comprehensively monitoring theextensive threat landscape) and “resilient”(responding to and recovering from attacks).Here’s an in-depth look at 10 must-answerquestions that can help top leaders bettercomprehend where they stand when itcomes to “secure, vigilant, resilient.05. Do we have a cyber-focusedmindset and cyber-consciousculture organisation-wide?06. What have we done to protectthe organisation against thirdparty cyber risks?07. Can we rapidly contain damagesand mobilise response resourceswhen a cyber incident occurs?08. How do we evaluate theeffectiveness of ourorganisation’s cyber riskprogramme?09. Are we a strong and secure link inthe highly connected ecosystemsin which we operate?

Assessing Cyber Risk Critical questions for the board and the C-suiteBoards and the C-Suite play a criticalrole in helping their organisationsrespond to the constantly evolvingcyber threat landscape.Cyber threats and attackscontinue to grow innumber and complexity– all while the businessworld grows increasinglyconnected and digital.Amid this new landscape,managing cyber threatsbecomes a business andstrategic imperative, withthe stakes higher than ever.These days, cyber crime involves morethan fraud and theft. As the domain of vastcriminal networks, foreign governmentsponsored hackers, and cyber terrorists,cyber crime extends across the riskspectrum – to involve disruption ofservices, corruption or destruction of data,and even “ransomware” activities thatseek to extort money, access, or corporatesecrets from victims.Today, cyber risk and performance aremore tightly intertwined. Tangible costsfrom cyber crime range from stolen fundsand damaged systems to regulatory fines,legal damages, and financial compensationfor affected parties.Intangible costs could include loss ofcompetitive advantage due to stolenintellectual property, loss of customer orbusiness partner trust, and overall damageto an organisation’s reputation andbrand. Beyond the damage to individualorganisations, the sheer scope of cyberattacks now has the potential to causemass-scale infrastructure outages andpotentially affect the reliability of entirenational financial systems and the wellbeing of economies.Top-tier issueWith so much at stake, the Board andC-Suite increasingly realise that cyber riskmust be treated as a top-tier businessrisk, requiring a level of awareness deeplyembedded in the culture of the enterprise.As every aspect of business today toucheson some digital component, cyber riskconcerns stretch well beyond IT and wellbeyond the walls of the enterprise – toevery partner, customer, worker, and toevery business process.Faced with such questions and an evolvingthreat landscape, preparing for everypossibility can prove daunting. So planningfor what’s probable – not just possible –offers a prudent path forward for leaders.There’s no blanket solution to thechallenge, but the Board and C-Suiteleaders can begin developing a customcyber security programme or improve anexisting one. The 10 key questions that welay out in the following pages shouldpromote boardroom discussions aroundmanagement’s ongoing cyber strategies,how leaders effectively address evolvingchallenges, how they mitigate cyber risks,and how they anticipate opportunities.Realising that at some point theorganisation will be breached, leadersshould work to understand the mostsignificant threats and how those threatscan put mission-critical assets at risk.As Boards and the C-Suite take a moreactive role in protecting their organisations,many will struggle to ensure that theirefforts are effective. What are theirresponsibilities? Which competenciesshould they be cultivating? What are theright questions to ask?3

Assessing Cyber Risk Critical questions for the board and the C-suiteAssess your maturity levelThis list of key cyber risk questions andaccompanying range of responses shouldeffectively guide organisations in assessingtheir cyber posture, challenge informationsecurity teams to ask the right questionsand provide critical information, and helpconsistently monitor and improve cyberresilience going forward.These questions are designed to help youidentify specific strengths and weaknesses,as well as paths to improvement.Determine where your organisation’sresponses to the following questions fall onthe cyber maturity scale:Cyber security maturity scaleHigh maturity We have a strong cyber riskposture within the organisation.Moderate maturity Cyber risk measures are in place;some work remains.Low maturity We are lagging on cyber riskmanagement, with few measuresin place and significant work to do.What it means to be secure, vigilant,and resilientSecure Establish and continuallymaintain foundational securitycapabilities – by enhancing riskprioritised controls to protectagainst known and emergingthreats, while also complyingwith industry cyber standardsand regulations.4Vigilant Detect violations and anomaliesthrough better situationalawareness across theenvironment – within all areasof your ecosystem.Resilient Establish the ability to quicklyreturn to normal operations andrepair damage to the businessfollowing the inevitable cyberattack.

Assessing Cyber Risk Critical questions for the board and the C-suite1Do we demonstrate due diligence,ownership, and effective managementof cyber risk?Determining the right degree of accountability at theleadership level is essential. If oversight involves onlya 5-minute update on cyber events every now andthen, you’re probably not doing enough to manage riskeffectively.High maturity Board and C-Suite hold a C-levelexecutive accountable for cyber threatrisk management – and are responsiblefor overseeing development of a cyberrisk programme as well as confirmingits implementation. Board and C-Suite stay informed aboutcyber threats and the potential impacton their organisation. Board has one or more members – orappropriately leverages strategicadvisors – who understand IT andcyber risks.Moderate maturity Leadership and Board oversight areconcerned with cyber issues, butstakeholder communications andoversight of specific structures remainlargely high-level. Board has a working knowledge of ITand cyber risks. Cyber due diligence and the ability tochallenge management on cyber issuesis lacking.Low maturity Tone at the top lacks cyber focus andunderstanding of strategic issues. Little engagement by leadership inspecific IT security issues. Board has no significant experience inIT and cyber risks, and cyber issues areleft to those within IT to resolve. Oversight of cyber risk and assessmentof related budgetary requirementsremains at a very high level. Board intermittently assesses the cyberframework and strategic requirements. An established senior managementlevel committee, or a hybrid committeeconsisting of management andDirectors of the Board, that isdedicated to the issue of cyber risk – oran alternate senior management-levelcommittee has adequate time devotedto the overall cyber programme. Due diligence is evident in regularupdates, budget analysis, andchallenging questions to management.5

Assessing Cyber Risk Critical questions for the board and the C-suite2Do we have the right leader andorganisational talent?Everyone within an organisation holds someresponsibility for cyber risk. With everyone responsibleand with many leaders busy performing their legacyduties, organisations can fail to designate an appropriateleader – the “right” leader – who will ultimately beaccountable for cyber risk.High maturity Cyber leader has the right mix oftechnical and business acumen tounderstand how the organisationoperates, to engage with the business,and to know where to prioritise efforts. Teams of passionate and energisedstaff stay up-to-date on the latest cybertrends, threats, and implications fortheir business. Cyber risk discussions take place atBoard and C-Suite level. There is a sufficient number of skilledstaff with relevant industry experiencefocused on the right areas. Compensation and total rewardprogrammes are in line with industryand risk profile/importance to theorganisation.6Moderate maturity Cyber leader is in place but is primarilyfocused on technical risks associatedwith cyber security. Cyber leader has a working knowledgeof the industry but does not fullyunderstand and appreciate how theorganisation operates. Cyber risk is a significant focus butremains relatively high-level. Cyber risk issues often stall at the IT ormanagement level. Skilled staff is present in IT and somebusiness areas, but with limitedindustry-specific threat knowledge.Low maturity Little focus on cyber risk fromleadership. Cyber knowledge and talent arecompartmentalised in the IT function. Ad hoc training programmesare developed for specific newtechnologies. High turnover of staff due to a lack ofinvestment in talent strategy.

Assessing Cyber Risk Critical questions for the board and the C-suite3Have we established an appropriatecyber risk escalation frameworkthat includes our risk appetite andreporting thresholds?Developing meaningful cyber-related messages forthe broader organisation can help foster the flow ofinformation when there are cyber incidents or concerns.But clearly defining the triggers or threshold events,as well as the actual process for moving informationup to management, can make the difference betweenfunctional and effective.High maturity Clearly articulated risk appetiteand cyber risks are incorporated intoexisting risk management andgovernance processes. Established enterprise-wide cyber riskpolicy is approved and challenged,when necessary, by the Board. Clearly described and operationalisedroles and responsibilities across thecyber risk program. Key risk and performance indicatorsexist, and processes are in placeto escalate breaches of limits andthresholds to senior management forsignificant or critical cyber incidents.Moderate maturity Established cyber risk policy is not fullyimplemented outside IT. Cyber risks are addressed onlygenerally in overall risk managementand governance processes.Low maturity No formalised cyber framework isin place. Any risk escalation is ad hoc and only inresponse to incidents. Risk appetite is not integrated intocyber risk framework. Cyber risk response tends to bereactive rather than proactive. An alternative senior managementcommittee has adequate time devotedto the discussion of the implementationof the cyber framework. Incident management frameworkincludes escalation criteria aligned withthe cyber risk programme. Evaluation and monitoring of the valueof cyber insurance is in place.7

Assessing Cyber Risk Critical questions for the board and the C-suite4Are we focused on, and investing in,the right things? And how do weevaluate and measure the results ofour decisions?With risk and performance tightly linked, leaders shouldknow what they’re expending on resources – and theyshould know that they’re bringing the right resourcesto bear on cyber challenges. Failing to develop a peoplestrategy, overpaying for services, and other drags onoperating costs are all very real risks.High maturity Cyber risk is considered in allactivities – from strategic planning today-to-day operations – in every part ofthe organisation. Investments are focused on baselinesecurity controls to address themajority of threats, and strategicallytargeted funds are used to managerisks against the organisation’s mostcritical processes and information. Organisation has made an effort toidentify their “black swan” risks and hasa programme to anticipate andavoid these unlikely, but potentiallycatastrophic threats. Organisation’s investments andbudgets align to risk (clear businesscases for investments exist) and arereflected within the cyber strategy. Senior management provides adequatefunding and sufficient resources tosupport the implementation of theorganisation’s cyber framework. A mechanism for crediblechallenge exists.8Moderate maturity Cyber framework is internally focusedwithout added industry-basedprocesses. Cyber strategy and investmentsare neither aligned nor supportive ofone another. Imbalance of security investmentacross baseline security controls andthose required for highly sophisticatedattacks. Strong threat awareness is focusedon enterprise-wide infrastructure andapplication protection. Implementation of identity-awareinformation protection. Automated IT asset vulnerabilitymonitoring is in place. No significant mechanism foranticipating “black swan” risks.Low maturity Lack of cyber strategy, initiatives, andinvestment plan. Only basic network protection/traditional signature-based securitycontrols exist, with minimal concern fornew technologies and methodologies. Occasional IT asset vulnerabilityassessments are performed. Business case for cyber investment israrely made.

Assessing Cyber Risk Critical questions for the board and the C-suite5How do our cyber risk programme andcapabilities align to industry standardsand peer organisations?It’s important to know if your organisation is lagging– to know how you stand against businesses that areeffectively addressing cyber risk. But what do you doif you discover you are lagging? If the Board and theC-Suite aren’t actively in charge of the challenge, who is?High maturity Comprehensive cyber programmeleverages industry standards and bestpractices to protect and detect againstexisting threats, remain informed ofemerging threats, and enable timelyresponse and recovery. Adoption of an industry frameworkto establish, operate, maintain, andimprove/adapt cyber programmes. Organisation has conducted anexternal benchmarking review of itscyber programme.Moderate maturity Cyber programme implements anumber of industry best practicesand capabilities, including basic onlinebrand monitoring, automated malwareforensics, manual e-discovery, criminal/hacker surveillance, workforce/customer behaviour profiling, andtargeted cross-platform monitoring forinternal users.Low maturity Cyber measures are ad hoc, with littlereference to industry standards andbest practices. May conduct intermittent high-levelreviews in support of compliance andregulatory requirements. Compliance and other internalprogramme reviews may beundertaken occasionally but notconsistently. Organisation periodically verifiesinternal compliance with policies,industry standards, and regulations. Organisation has formally certifiedcritical and applicable areas oftheir business (e.g., ISO 27001:2013certification).9

Assessing Cyber Risk Critical questions for the board and the C-suite6Do we have a cyber-focused mindsetand cyber-conscious cultureorganisation-wide?As they try to strengthen their posture to become moresecure, vigilant, and resilient, many businesses focus oneducation and awareness. But the need runs deeper.How do you change behaviour? Guidance on the answershould come from the Board and the C-Suite.High maturity Strong tone at the top; the Board andC-Suite promote a strong risk cultureand sustainable risk/return thinking. People’s individual interests, values,and ethics are aligned with theorganisation’s cyber risk strategy,appetite, tolerance, and approach. Executives are comfortable talkingopenly and honestly about cyberrisk using a common vocabulary thatpromotes shared understanding. Company-wide education andawareness campaign establishedaround cyber risk (all employees, thirdparties, contractors, etc.). Awareness and training specific toindividual job descriptions helps staffunderstand their cyber responsibilities. People take personal responsibility forthe management of risk and proactivelyseek to involve others when needed.10Moderate maturity General information security trainingand awareness is in place. Targeted, intelligence-based cyberawareness focused on asset risks andthreat types is in place.Low maturity Acceptable usage policy is in place. Little emphasis on cyber risk outsideof IT. Awareness and training issues arereactively addressed, in that trainingis given only after a breach ornoncompliance is discovered, and onlyto a small subset of individuals.

Assessing Cyber Risk Critical questions for the board and the C-suite7What have we done to protect theorganisation against third-partycyber risks?The roots of many breaches have their origins withbusiness partners, such as contractors and vendors.Cyber concerns extend far beyond the four walls ofyour business, requiring you to align with your partners,to understand what they are doing, and to ensurethat you’re comfortable with the risk factors thoserelationships present.High maturity Cyber risks are seen as part of thedue diligence process for criticaloutsourcing and subcontractingarrangements. All third parties are engaged througha consistent process, and policiesand controls are in place (e.g., right toaudit), aligned to the organisation’sexpectations and risk tolerance. Third parties receive specific trainingon cyber issues, tailored to relevantneeds and risks.Moderate maturity Steps are taken to mitigate potentialcyber risks from outsourcingarrangements. Due diligence around outsourcingand subcontracting arrangements isencouraged but inconsistently applied.Low maturity Only basic network protection isin place. Third-party due diligence and cyber riskprotection measures are nonexistent. Communication from third partiesrespecting cyber incidents is notcontractually embedded. Some correlation of external andinternal threat intelligence. Risk management programmeincludes profiling and assessing allmaterial third-party relationships andinformation flows. Processes are in place to ensuretimely notification of cyber incidentsfrom third parties. Steps are taken to mitigate potentialcyber risks from outsourcingarrangements based on third-partyprofiling and risk assessments.11

Assessing Cyber Risk Critical questions for the board and the C-suite8Can we rapidly contain damages andmobilise diverse response resourceswhen a cyber incident occurs?Even among highly secure businesses, it can often takedays or weeks to discover a breach. What matters isconfidence in your ability to respond – confidence inyour processes – once you do detect the active threat.From leadership’s perspective, critical incident response capabilities include aclear and current chain of command, a thorough communication plan (includingback-up contacts), and a broad view of legal issues, public relations needs, brandimplications, and operational impacts.High maturity Clear reporting and decision pathsexist for action and communicationin response to a security failure oraccident. Cyber incident response policies andprocedures are integrated with existingbusiness continuity management anddisaster recovery plans. Crisis management and cyberincident response plans andprocedures are documented andrehearsed through wargaming,simulations, and team interaction. External and internal communicationsplans exist to address cyber incidentsfor key stakeholders. Organisation is actively involved inindustry simulations and trainingexercises.12Moderate maturity Basic cyber incident response policiesand procedures are in place but noteffectively integrated with existingbusiness continuity management anddisaster recovery plans. IT cyber attack simulations are regularlyundertaken. Cyber attack exercises are implementedintermittently across the business.Low maturity Some IT business continuity anddisaster recovery exercises occur. Cyber incident policies, responseplans, and communications are minimalor nonexistent.

Assessing Cyber Risk Critical questions for the board and the C-suite9How do we evaluate the effectiveness ofour organisation’s cyber risk program?The answer to this question is simple. You evaluate fromend to end. Execution is the difficult part. The otherchallenge: seeing beyond systems – to understandbusiness-wide implications and to examine businessprocesses, not just IT, through a critical lens. They’rechallenges that demand leadership and involvementfrom the Board and the C-Suite.High maturity Board and C-Suite ensure that the cybersecurity programme is reviewed foreffectiveness and that any identifiedgaps are appropriately managed in linewith risk appetite. The Board, or a committee of theBoard, is engaged on a regular basis toreview and discuss the implementationof the organisation’s cyber securityframework and implementation plan,including the adequacy of existingmitigating controls.Moderate maturity Basic cyber risk assessments take placeon a fixed, unvarying schedule and arenot industry-specific. Internal audit evaluates cyber riskmanagement effectiveness no morethan once a year.Low maturity Cyber assessments and internalaudit evaluations are sporadic ornonexistent. Cyber measures remain relativelystatic and any improvements lack anexperiential basis. Lessons learned are sometimes, butinconsistently, applied to improvemanagement of cyber risk. Regular internal and externalassessments (health checks,penetration testing, etc.) ofvulnerabilities are conducted to identifycyber security control gaps appropriatefor the industry. Oversight activities include regularcyber security budget evaluation,service outsourcing, incident reports,assessment of results, and policyreviews/approvals. Internal audit evaluates cyber riskmanagement effectiveness as part oftheir quarterly reviews. Organisation takes time to absorbimportant lessons and modify thesecure and vigilant aspects of theprogramme to emerge strongerthan before.13

Assessing Cyber Risk Critical questions for the board and the C-suite10Are we a strong and secure link inthe highly connected ecosystemsin which we operate?The cyber readiness of your partners influences yourcyber posture. But cyber risk is a two-way street when itcomes to partners. Are you a weak link? Are you a leaderon cyber risk? Are you making a positive impact when itcomes to cyber and the broader business landscape?Collaborating with peer organisations and partners to share intelligence onthreats is just one example of how business leaders can develop a more relevant,more holistic approach to cyber risk.High maturity Strong relationships are maintainedwith internal stakeholders, externalpartners, law enforcement,regulators, etc. Supportive of innovative sharinginitiatives that do not compromiseinformation security and privacy. Knowledge and information sharingwith industry sector, independentanalysis centres, government andintelligence agencies, academicinstitutions, and research firms. Expansion of sharing efforts andrelationships, to include partners,customers, and end users. Preference for vendors thatsupport industry standards andcyber advancements. Independently maintain matureprogrammes to avoid being theweakest link.14Moderate maturity Ad hoc threat intelligence sharing withpeers, or active collaboration withgovernment and private sector onthreat intelligence.Low maturity Minimal external relationshipdevelopment and no informationor knowledge sharing with peers,government, or external groups.

Assessing Cyber Risk Critical questions for the board and the C-suiteSetting higher goals, settingstrategic goalsWhether you’re building or revamping, it’s importantfor organisational risk leaders to set a target state forcyber maturity.Effectively defining that target staterequires an understanding of thebusiness context and resulting priorities,along with discussions between cyberleaders and decision-makers in therest of the organisation. While not allorganisations need to be at the highestlevel in all areas of cyber maturity,the target state should support theorganisation in achieving its strategicgoals – balanced with the cost and timeof achieving it. In many instances, thisapproach drives the organisation towardhigher levels of maturity for areas inwhich cyber risk practices are deemedcritical.Developing a mature, advanced cyberrisk programme is not just aboutspending money differently. It’s abouttaking a fundamentally differentapproach – investing in an organisationspecific balance of secure, vigilant,and resilient capabilities to develop aprogramme unique to your needs.Where do you stand?Based on the results of your assessment,does your current state of maturitysupport or hinder your strategy andmission?If your maturity index is not aligned withyour target state of maturity – or if youhave not yet developed appropriatecyber goals – it’s time to start enhancingyour cyber risk posture.Of course, it isn’t possible for anyorganisation to be 100 percent secure,but it’s entirely possible to manage andsignificantly mitigate the impacts ofcyber threats, including theft, regulatorypenalties, legal compensation, andreputational damage. By workingcollectively, we can minimise the growingpotential for broad scale infrastructureoutages and business disruption at thenational, or even the global, level.For more information, contactone of our leaders:Nick GallettoGlobal Cyber Risk Services Leader 1 416 601 6734ngalletto@deloitte.caJames Nunn-PriceAsia Pacific Cyber Risk Services Leader 61 2 9322 7971jamesnunnprice@deloitte.com.auEd PowersUS Cyber Risk Services Leader 1 212 436 5599epowers@deloitte.comChris VerdonckEMEA Cyber Risk Services Leader 32 2 800 24 20cverdonck@deloitte.comKlaus JulischSwiss Cyber Risk Leader 41 58 279 6231kjulisch@deloitte.chAsh RaghavanGlobal Cyber Center of Excellence Leader 1 212 436 2097araghavan@deloitte.comMark CarterSwiss Risk Advisory Leader 41 58 279 7380markjcarter@deloitte.ch15

Assessing Cyber Risk Critical questions for the board and the C-suiteAdditional corporate governanceresourcesswissVR Monitor surveyswissVR Monitor is a survey conducted jointly by swissVR, Deloitte and the University of Applied Sciences and Arts,Lucerne. Every six months, this survey gauges the attitudes of members of Swiss company Boards of Directorstowards the outlook for the country’s economy and their sector and towards current matters of relevance toBoards. The surveyed Board members represent firms from SMEs to listed companies across a range of sectors.As a result, swissVR Monitor is an accurate reflection of the attitudes of Boards of Directors in Swiss companies,as well as the challenges facing them. It illustrates the views of individuals with a long-term influence on theircompany’s success and includes prospects for the economy, their sector and their business.EMEA 360Boardroom surveyAgenda prioritiesacross the regionJune 2016EMEA 360 Boardroom Survey Agenda priorities across the regionDeloitte is pleased to present the inaugural EMEA 360 Boardroom Survey. The survey presents the views of271 directors across 20 countries in the EMEA region, providing a

cyber risk framework. Cyber risk response tends to be reactive rather than proactive. An alternative senior management committee has adequate time devoted to the discussion of the implementation of the cyber framework. Low maturity No formalised cyber framework is in place. Any risk escalation is ad hoc and only in response to incidents.