SlideShare a Scribd company logo
4
Most read
6
Most read
9
Most read
UQ Business School
Dr Micheal Axelsen
Lecturer, UQ Business School
WELCOME.
THE NEW FRONTIER FOR BUSINESS
RISK: TOP PRACTICAL TIPS
Cyber Security and the CEO
KEY MESSAGES
Most cyber security incidents
can be addressed with
simple strategies.
No matter what is done, there
is always residual risk.
Cyber security is a business
problem that needs
business solutions.
Businesses need to think
about the future.
WHO IS AT RISK OF
CYBER ATTACK?
• Some industries are targets (health
sector, finance), and also people on a
‘sucker list’ (Everett 2016)
• Those without strong IT practices using
unpatched or out-of-support Windows,
or no off-line data backups
(Australian Signals Directorate 2017)
• Consequently – low-budgets, few
trained IT people, no strong backup
approach
• Also, no strong ‘Should I click on that?’
culture, and of course ineffective
responsible use of email/internet use
policies, no spam filtering
WE ALREADY KNOW WHAT TO DO
We know what to do to prevent, limit,
and recover from cyber security
incidents.
The ‘Top 4’ strategies alone mitigate
over 85% of adversary techniques in
targeted cyber intrusions
We know what to do:
We just don’t do it.
PREVENTING, LIMITING, & RECOVERING FROM
CYBER SECURITY INCIDENTS
(Rees 2017, Australian Signals Directorate 2017)
Prevent Malware Delivery & Execution
1. Application Whitelisting
2. Patch Applications
3. Configure Microsoft Office macro settings
4. User application hardening
These are the ‘Top 4’ strategies.
Limiting Extent of Attack
5. Restrict Administrative Privileges
6. Patch operating systems
7. Multi-factor authentication
Recovering data
8. Daily Backups, ‘disconnected’, restoration
tested (15% of backups actually fail)
(Amvrosiadis & Bhadkamkar, 2016)
WHAT HAPPENED?
(Rees 2017; Australian Signals Directorate 2017)
Detecting and monitoring for data
breaches:
• An ‘Excellent’ (but not essential)
strategy to detect whether a cyber
security incident has occurred is to
maintain continuous incident
detection and response teams
• Important for larger organisations,
and an important factor in
selecting any cloud-based
services.
CYBER INSURANCE
Cyber insurance provides cyber extortion
coverage - particularly in the case of
ransomware (Simms, 2016):
• May provide access to important resources (e.g.
information security experts) (Tuttle 2016)
• Cyber insurance comes in all sorts of flavours –
different policies will have different terms &
conditions
• Be wary of exemptions – will they pay if the
ransomware attack was successful due to poor
processes?
• For example, WannaCry used an exploit that had
been patched for two months on modern operating
systems – is that covered?
This is the ‘last line of defence’ when prevention,
detection, and correction don’t work – it’s not the ‘first
slice’.
WHY DO ANYTHING?
Business Interruption/Distraction
Loss of Reputation
No-one wants to be on a ‘sucker list’
Privacy Act 1988:
• 13 Australian Privacy Principles
($1.8m fine for breach)
• Mandatory Data Breach Notification
from 22 February 2018
(Abrahams and Griffin 2017)
• $1.8m fine for organisations not
reporting an eligible breach
In addition to civil liabilities and individual
penalties ($360k)
Futureproofing the organisation
A BUSINESS PROBLEM:
KEEP IT SIMPLE
A common theme to these solutions:
• Inexpensive and relatively simple
• Mostly to do with practices,
attitudes, awareness and culture.
Yet - these practices are often honoured
in the breach!
It’s not all about expensive systems and
tools – they can create a false sense of
security and don’t work if the
foundations are not right.
Discipline and process - IT governance -
are needed, including monitoring.
(De Haes & Van Grembergen 2015)
WHAT TO DO:
SECURITY PROCESSES
(Cyber Security Working Group, 2017)
• Strong and secure passwords with multi-factor
authentication
• Rule of least access – only provide access where
needed
• Latest security updates for all devices (computers
AND phones)
• Do not use USB/external hard drives from an
unfamiliar source
• Have a spam filter for email, and don’t open
unsolicited messages (phishing awareness)
• Anti-virus software is a given
• Secure wireless, be careful with public wifi
• Be vigilant about what is shared on
social media
• Monitor bank accounts for unusual activity
• Use a PO Box to ensure mail is secure
• Use known legitimate programs
• Do not leave information unattended – secure
devices
WHAT TO DO:
STRUCTURES AND RELATIONSHIPS
• Governance structures with oversight
• Accountability for monitoring – many of the breaches
are due to poor monitoring of what has actually been
done, and accountability for that.
• Do decision-making structures change in a crisis?
Should the ‘normal’ rules apply?
• Decisions we make should be informed by security
considerations.
• External advisors:
• IT Operational Audit
• IT Security Audit
• External monitoring, particularly phishing
awareness
• Who do we work with ‘in the cloud’?
• In case of emergency: who comes when we have to
press the ‘Big Red Button’
Structures Relationships
FORWARD THE
FUTURE
Why are you storing this data, and is it worth
the headache?
The trend is for higher need for strong data
governance and need to protect (at least
notify) about lost data
Are these requirements likely to start going
beyond ‘personal and sensitive’ data?
Who ‘owns’ the data? Was it provided with
‘informed consent’?
If data was ’lost’, do you know to whom it
belongs?
RESOURCES/REFERENCES
Abrahams, N., & Griffin, J. (2017). Privacy law: The end of a long road: Mandatory data breach notification becomes law. Law Society of NSW Journal(32), 2017-
2018.
Amvrosiadis, G., & Bhadkamkar, M. (2016). Getting back up: Understanding how enterprise backups fail. USENIX Annual Technical Conference, 479-492.
Australian Signals Directorate. (2017). Strategies to Mitigate Cyber Security Incidents. Retrieved from https://asd.gov.au/infosec/top-mitigations/mitigations-2017-
table.htm
Cyber Security Working, G. (2017). Security tips for business. Retrieved from
https://www.tpb.gov.au/sites/g/files/net1481/f/business_cyber_security_tips.pdf?v=1491974708
De Haes, S., & Van Grembergen, W. (2015). Enterprise Governance of IT (Chapter 2) (pp. 11-43): Springer.
Everett, C. (2016). Ransomware: To pay or not to pay? Computer Fraud and Security, 2016(4), 8-12. doi:10.1016/S1361-3723(16)30036-7
Mansfield-Devine, S. (2016). Ransomware: taking businesses hostage. Network Security, 2016(10), 8-17. doi:10.1016/S1353-4858(16)30096-4
Rees, G. (2017). 8 cybersecurity strategies to protect you and your business. InTheBlack(April).
Simms, C. (2016). A matter of survival. ITNOW, 58(4), 30-31. doi:10.1093/itnow/bww102
Tuttle, H. (2016). Ransomware Attacks Pose Growing Threat. Risk Management, 63(4), 4-7.

More Related Content

PPTX
Cyber Security Awareness Session for Executives and Non-IT professionals
PDF
Employee Security Awareness Program
PDF
Cyber Threat Intelligence
PPTX
Zero trust deck 2020
PDF
Secure Design: Threat Modeling
PDF
Strategy considerations for building a security operations center
PPTX
2023.06 - CompTIA Security+ Everything you need to know about the new exam .pptx
PPTX
Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Awareness Session for Executives and Non-IT professionals
Employee Security Awareness Program
Cyber Threat Intelligence
Zero trust deck 2020
Secure Design: Threat Modeling
Strategy considerations for building a security operations center
2023.06 - CompTIA Security+ Everything you need to know about the new exam .pptx
Cyber Security Presentation "It Will Never Happen To Me"

What's hot (20)

PPT
Building An Information Security Awareness Program
PPTX
Hyphenet Security Awareness Training
PDF
Overview of the Cyber Kill Chain [TM]
PPSX
Security Awareness Training
PPTX
Cyber Security Best Practices
PPTX
PPTX
Security Operation Center Fundamental
PPTX
Tictaclabs Managed Cyber Security Services
PPTX
Zero Trust
PPTX
SIEM Primer:
PPTX
Presentation of Social Engineering - The Art of Human Hacking
PPTX
Navigating the Zero Trust Journey for Today's Everywhere Workplace
PPTX
Employee Awareness in Cyber Security - Kloudlearn
PDF
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
PPTX
Privileged Access Management (PAM)
PDF
When and How to Set up a Security Operations Center
PPTX
PPT-Security-for-Management.pptx
PPTX
Cyber Security 101: Training, awareness, strategies for small to medium sized...
PDF
Cyber Security Awareness
PDF
SentinelOne - NOAH19 Tel Aviv
Building An Information Security Awareness Program
Hyphenet Security Awareness Training
Overview of the Cyber Kill Chain [TM]
Security Awareness Training
Cyber Security Best Practices
Security Operation Center Fundamental
Tictaclabs Managed Cyber Security Services
Zero Trust
SIEM Primer:
Presentation of Social Engineering - The Art of Human Hacking
Navigating the Zero Trust Journey for Today's Everywhere Workplace
Employee Awareness in Cyber Security - Kloudlearn
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Privileged Access Management (PAM)
When and How to Set up a Security Operations Center
PPT-Security-for-Management.pptx
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security Awareness
SentinelOne - NOAH19 Tel Aviv
Ad

Similar to Cyber Security and the CEO (20)

PDF
Measure To Avoid Cyber Attacks
PDF
Measures to Avoid Cyber-attacks
PPTX
CyberCare Pro - Cybersecurity for SME's updated.pptx
PPTX
Cyber Security and Healthcare
PPTX
Module 8 - External Crisis – Changing Technology.pptx
PPTX
Showreel ICSA Technology Conference
PPTX
Cyber Security and the Impact on your Business
PPTX
What is Information Security and why you should care ...
PPTX
Best practices to mitigate data breach risk
PDF
Cyber Security small
PDF
Xavier Marguinaud in Corporate Livewire Cyber Security Expert Guide 2017 Dec
PDF
The Small Business Cyber Security Best Practice Guide
PPTX
Cyber Security: Most Important Aspect of a Successful Business
PPTX
The Evolution of Cybercrime
PPTX
Cyber Security - Things you need to know
PDF
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
PDF
1. introduction to cyber security
PDF
Cyber Security - back to basics - webinar slides.pdf
PPTX
IT & Network Security Awareness
PDF
Cybersecurity for Financial Professionals (1).pdf
Measure To Avoid Cyber Attacks
Measures to Avoid Cyber-attacks
CyberCare Pro - Cybersecurity for SME's updated.pptx
Cyber Security and Healthcare
Module 8 - External Crisis – Changing Technology.pptx
Showreel ICSA Technology Conference
Cyber Security and the Impact on your Business
What is Information Security and why you should care ...
Best practices to mitigate data breach risk
Cyber Security small
Xavier Marguinaud in Corporate Livewire Cyber Security Expert Guide 2017 Dec
The Small Business Cyber Security Best Practice Guide
Cyber Security: Most Important Aspect of a Successful Business
The Evolution of Cybercrime
Cyber Security - Things you need to know
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
1. introduction to cyber security
Cyber Security - back to basics - webinar slides.pdf
IT & Network Security Awareness
Cybersecurity for Financial Professionals (1).pdf
Ad

More from Micheal Axelsen (20)

PDF
20220114 Typecasting on the lettera 22
PDF
20210214 Adventures in Typewriting - In Australia
PDF
Speakers at MNCs in Emerging Markets: International Human Resource Management...
PDF
Seminar Invitation to UQ BS Event: MNCs in Emerging Markets: International H...
PDF
Review tversky & kahnemann (1974) judgment under uncertainty
PPTX
What if I told you you doing insane hours is not the same as doing your phd?
PPTX
Workshop: Processes and practices for effective information governance
DOTX
Sergeant Major Eats Sugar Cookies
PPTX
IDAS and the Accounting Professional
PDF
Academic paper template
DOC
Example business continuity plan
PPTX
Online Social Networking and the Workplace draft #3 final
PDF
Judgment Under Uncertainty: Anchoring and Adjustment Bias
PDF
The Data Dynamic
PPT
NGERS and Data Capture Systems: Reporting Requirements
PPTX
Overview of Key Performance Indicators
DOC
Data Management Strategies - Speakers Notes
PPT
Data Management Strategies
PPT
Research in an e-enabled world
PPT
Continued Use Of IDAs And Knowledge Acquisition
20220114 Typecasting on the lettera 22
20210214 Adventures in Typewriting - In Australia
Speakers at MNCs in Emerging Markets: International Human Resource Management...
Seminar Invitation to UQ BS Event: MNCs in Emerging Markets: International H...
Review tversky & kahnemann (1974) judgment under uncertainty
What if I told you you doing insane hours is not the same as doing your phd?
Workshop: Processes and practices for effective information governance
Sergeant Major Eats Sugar Cookies
IDAS and the Accounting Professional
Academic paper template
Example business continuity plan
Online Social Networking and the Workplace draft #3 final
Judgment Under Uncertainty: Anchoring and Adjustment Bias
The Data Dynamic
NGERS and Data Capture Systems: Reporting Requirements
Overview of Key Performance Indicators
Data Management Strategies - Speakers Notes
Data Management Strategies
Research in an e-enabled world
Continued Use Of IDAs And Knowledge Acquisition

Recently uploaded (20)

PDF
Elevate Cleaning Efficiency Using Tallfly Hair Remover Roller Factory Expertise
PPTX
ICG2025_ICG 6th steering committee 30-8-24.pptx
PDF
kom-180-proposal-for-a-directive-amending-directive-2014-45-eu-and-directive-...
PPTX
Lecture (1)-Introduction.pptx business communication
PPTX
New Microsoft PowerPoint Presentation - Copy.pptx
PPTX
HR Introduction Slide (1).pptx on hr intro
PDF
How to Get Funding for Your Trucking Business
PDF
BsN 7th Sem Course GridNNNNNNNN CCN.pdf
PPTX
Belch_12e_PPT_Ch18_Accessible_university.pptx
PDF
WRN_Investor_Presentation_August 2025.pdf
PDF
Unit 1 Cost Accounting - Cost sheet
PPTX
Dragon_Fruit_Cultivation_in Nepal ppt.pptx
PDF
Reconciliation AND MEMORANDUM RECONCILATION
PDF
COST SHEET- Tender and Quotation unit 2.pdf
PDF
pdfcoffee.com-opt-b1plus-sb-answers.pdfvi
PDF
A Brief Introduction About Julia Allison
PDF
Katrina Stoneking: Shaking Up the Alcohol Beverage Industry
PPTX
job Avenue by vinith.pptxvnbvnvnvbnvbnbmnbmbh
PPTX
CkgxkgxydkydyldylydlydyldlyddolydyoyyU2.pptx
PPT
Chapter four Project-Preparation material
Elevate Cleaning Efficiency Using Tallfly Hair Remover Roller Factory Expertise
ICG2025_ICG 6th steering committee 30-8-24.pptx
kom-180-proposal-for-a-directive-amending-directive-2014-45-eu-and-directive-...
Lecture (1)-Introduction.pptx business communication
New Microsoft PowerPoint Presentation - Copy.pptx
HR Introduction Slide (1).pptx on hr intro
How to Get Funding for Your Trucking Business
BsN 7th Sem Course GridNNNNNNNN CCN.pdf
Belch_12e_PPT_Ch18_Accessible_university.pptx
WRN_Investor_Presentation_August 2025.pdf
Unit 1 Cost Accounting - Cost sheet
Dragon_Fruit_Cultivation_in Nepal ppt.pptx
Reconciliation AND MEMORANDUM RECONCILATION
COST SHEET- Tender and Quotation unit 2.pdf
pdfcoffee.com-opt-b1plus-sb-answers.pdfvi
A Brief Introduction About Julia Allison
Katrina Stoneking: Shaking Up the Alcohol Beverage Industry
job Avenue by vinith.pptxvnbvnvnvbnvbnbmnbmbh
CkgxkgxydkydyldylydlydyldlyddolydyoyyU2.pptx
Chapter four Project-Preparation material

Cyber Security and the CEO

  • 1. UQ Business School Dr Micheal Axelsen Lecturer, UQ Business School WELCOME.
  • 2. THE NEW FRONTIER FOR BUSINESS RISK: TOP PRACTICAL TIPS
  • 4. KEY MESSAGES Most cyber security incidents can be addressed with simple strategies. No matter what is done, there is always residual risk. Cyber security is a business problem that needs business solutions. Businesses need to think about the future.
  • 5. WHO IS AT RISK OF CYBER ATTACK? • Some industries are targets (health sector, finance), and also people on a ‘sucker list’ (Everett 2016) • Those without strong IT practices using unpatched or out-of-support Windows, or no off-line data backups (Australian Signals Directorate 2017) • Consequently – low-budgets, few trained IT people, no strong backup approach • Also, no strong ‘Should I click on that?’ culture, and of course ineffective responsible use of email/internet use policies, no spam filtering
  • 6. WE ALREADY KNOW WHAT TO DO We know what to do to prevent, limit, and recover from cyber security incidents. The ‘Top 4’ strategies alone mitigate over 85% of adversary techniques in targeted cyber intrusions We know what to do: We just don’t do it.
  • 7. PREVENTING, LIMITING, & RECOVERING FROM CYBER SECURITY INCIDENTS (Rees 2017, Australian Signals Directorate 2017) Prevent Malware Delivery & Execution 1. Application Whitelisting 2. Patch Applications 3. Configure Microsoft Office macro settings 4. User application hardening These are the ‘Top 4’ strategies. Limiting Extent of Attack 5. Restrict Administrative Privileges 6. Patch operating systems 7. Multi-factor authentication Recovering data 8. Daily Backups, ‘disconnected’, restoration tested (15% of backups actually fail) (Amvrosiadis & Bhadkamkar, 2016)
  • 8. WHAT HAPPENED? (Rees 2017; Australian Signals Directorate 2017) Detecting and monitoring for data breaches: • An ‘Excellent’ (but not essential) strategy to detect whether a cyber security incident has occurred is to maintain continuous incident detection and response teams • Important for larger organisations, and an important factor in selecting any cloud-based services.
  • 9. CYBER INSURANCE Cyber insurance provides cyber extortion coverage - particularly in the case of ransomware (Simms, 2016): • May provide access to important resources (e.g. information security experts) (Tuttle 2016) • Cyber insurance comes in all sorts of flavours – different policies will have different terms & conditions • Be wary of exemptions – will they pay if the ransomware attack was successful due to poor processes? • For example, WannaCry used an exploit that had been patched for two months on modern operating systems – is that covered? This is the ‘last line of defence’ when prevention, detection, and correction don’t work – it’s not the ‘first slice’.
  • 10. WHY DO ANYTHING? Business Interruption/Distraction Loss of Reputation No-one wants to be on a ‘sucker list’ Privacy Act 1988: • 13 Australian Privacy Principles ($1.8m fine for breach) • Mandatory Data Breach Notification from 22 February 2018 (Abrahams and Griffin 2017) • $1.8m fine for organisations not reporting an eligible breach In addition to civil liabilities and individual penalties ($360k) Futureproofing the organisation
  • 11. A BUSINESS PROBLEM: KEEP IT SIMPLE A common theme to these solutions: • Inexpensive and relatively simple • Mostly to do with practices, attitudes, awareness and culture. Yet - these practices are often honoured in the breach! It’s not all about expensive systems and tools – they can create a false sense of security and don’t work if the foundations are not right. Discipline and process - IT governance - are needed, including monitoring. (De Haes & Van Grembergen 2015)
  • 12. WHAT TO DO: SECURITY PROCESSES (Cyber Security Working Group, 2017) • Strong and secure passwords with multi-factor authentication • Rule of least access – only provide access where needed • Latest security updates for all devices (computers AND phones) • Do not use USB/external hard drives from an unfamiliar source • Have a spam filter for email, and don’t open unsolicited messages (phishing awareness) • Anti-virus software is a given • Secure wireless, be careful with public wifi • Be vigilant about what is shared on social media • Monitor bank accounts for unusual activity • Use a PO Box to ensure mail is secure • Use known legitimate programs • Do not leave information unattended – secure devices
  • 13. WHAT TO DO: STRUCTURES AND RELATIONSHIPS • Governance structures with oversight • Accountability for monitoring – many of the breaches are due to poor monitoring of what has actually been done, and accountability for that. • Do decision-making structures change in a crisis? Should the ‘normal’ rules apply? • Decisions we make should be informed by security considerations. • External advisors: • IT Operational Audit • IT Security Audit • External monitoring, particularly phishing awareness • Who do we work with ‘in the cloud’? • In case of emergency: who comes when we have to press the ‘Big Red Button’ Structures Relationships
  • 14. FORWARD THE FUTURE Why are you storing this data, and is it worth the headache? The trend is for higher need for strong data governance and need to protect (at least notify) about lost data Are these requirements likely to start going beyond ‘personal and sensitive’ data? Who ‘owns’ the data? Was it provided with ‘informed consent’? If data was ’lost’, do you know to whom it belongs?
  • 15. RESOURCES/REFERENCES Abrahams, N., & Griffin, J. (2017). Privacy law: The end of a long road: Mandatory data breach notification becomes law. Law Society of NSW Journal(32), 2017- 2018. Amvrosiadis, G., & Bhadkamkar, M. (2016). Getting back up: Understanding how enterprise backups fail. USENIX Annual Technical Conference, 479-492. Australian Signals Directorate. (2017). Strategies to Mitigate Cyber Security Incidents. Retrieved from https://asd.gov.au/infosec/top-mitigations/mitigations-2017- table.htm Cyber Security Working, G. (2017). Security tips for business. Retrieved from https://www.tpb.gov.au/sites/g/files/net1481/f/business_cyber_security_tips.pdf?v=1491974708 De Haes, S., & Van Grembergen, W. (2015). Enterprise Governance of IT (Chapter 2) (pp. 11-43): Springer. Everett, C. (2016). Ransomware: To pay or not to pay? Computer Fraud and Security, 2016(4), 8-12. doi:10.1016/S1361-3723(16)30036-7 Mansfield-Devine, S. (2016). Ransomware: taking businesses hostage. Network Security, 2016(10), 8-17. doi:10.1016/S1353-4858(16)30096-4 Rees, G. (2017). 8 cybersecurity strategies to protect you and your business. InTheBlack(April). Simms, C. (2016). A matter of survival. ITNOW, 58(4), 30-31. doi:10.1093/itnow/bww102 Tuttle, H. (2016). Ransomware Attacks Pose Growing Threat. Risk Management, 63(4), 4-7.