SlideShare a Scribd company logo
How to Raise 
Cyber Risk Awareness and 
Management to the C-Suite
Today’s Speakers 
2 
Jason Polancich 
Founder & Chief 
Architect 
SurfWatch Labs
Today’s Speakers 
Chris Broderick 
President & CEO 
TerraGo Technologies 
Company Confidential 3
Cybersecurity Accountability 
Has Shifted to the C-Suite 
4 
“… boards that choose to ignore, 
or minimize, the importance of 
cybersecurity oversight responsibility, 
do so at their own peril.” 
- Luis A. Aguilar, SEC Commissioner
Cybersecurity Needs to be Part 
of the Overall Business Strategy 
5 
• What cyber events are 
occurring in our industry? 
• What Cyber Risk KPI’s 
should we track? 
• Are we spending in the 
right areas? 
• Have any suppliers been 
breached recently?
Cyber Risks Lost in Translation 
6 
Antivirus 
Firewalls 
Citadel 
Trojan 
Zeus 
Man-in-the- 
Middle 
IDS/IPS 
Backoff 
POS 
Netflow 
Analysis 
Packet 
Reflection 
Packet 
Inspection 
Malware 
Detection 
What does this all mean to the business?
Cybersecurity Management is 
Being Elevated in Organizations 
7 
From Facilities… 
to Server Rooms… 
to Board Rooms
Rising Costs of Insecurity 
$5.9M 
is the Average Cost 
of a Data Breach 
• Cost/compromised record increased from $188 to $201 
• Customer turnover rate increased by 15% 
8 
Source: 2014 Cost of Data Breach Study: Global Analysis, Ponemon Institute
Aligning Cybersecurity Spend 
with Your Cyber Risk Reality 
9
Sound Cybersecurity is a 
Competitive Advantage 
10 
69% of US executives are 
worried that cyber threats 
will impact growth. 
— PwC, 17th Annual Global CEO Survey
11
Address Cyber Risks Now, 
Instead of Responding to Threats 
12
Tracking Cyber Risks as Part of 
Overall Risk Management 
• Elevate cybersecurity 
to higher level 
discussion and strategy 
through business 
intelligence approach 
• Measure cyber risks 
through Key 
Performance Indicators 
(KPI’s) 
13
Cybersecurity Requirements 
Being Specified in RFPs 
14 
Request for Proposal 
ACME Corp 
Cybersecurity Practices 
1.Describe the safeguards in place to protect 
customer information. 
2.Who has access (physical and/or remote) 
to systems that house sensitive information? 
3.Describe your network segmentation 
architecture. 
4.What policies and controls are in place with 
regards to laptops and mobile devices? 
5.How do you monitor and assess cyber 
risks? 
• Customers are concerned 
about how their sensitive 
information is safeguarded 
• Cybersecurity is now an 
important requirement for 
winning a contract
C-Suite Dashboard App 
Get Instant Visibility of Your 
Cyber Risk KPI’s 
•Real-time and trending views of cyber 
risks and business impacts 
•Provides easy-to-understand insights 
for Executives and Boards to make 
faster, more informed risk management 
decisions 
•SaaS-based app ─ easy to access 
and use in Web Browser and Mobile 
15
Cybersecurity Tips 
1. Take a business intelligence approach 
to understanding and analyzing 
cybersecurity data 
2. Common language among C-Suite 
and cybersecurity professionals 
3. Proactively mitigate cyber risks as 
opposed to responding to threats 
16
SurfWatch Labs Resources 
17 
• Download the Whitepaper: How Executives Can 
Understand Cyber Risks and Ensure Governance 
http://info.surfwatchlabs.com/cyber-risk-governance 
• Read an Overview of SurfWatch C-Suite 
https://www.surfwatchlabs.com/apps/c-suite 
• Try SurfWatch C-Suite for Free 
https://www.surfwatchlabs.com/apps/c-suite/new
Thank You! 
www.surfwatchlabs.com 
Follow us at:

More Related Content

PPTX
Global Security threats from 5G leads to new selection of 5G vendors
PPTX
5G SA security: a comprehensive overview of threats, vulnerabilities and rem...
PDF
Cybersecurity and continuous intelligence
PPTX
Security course: exclusive 5G SA pitfalls and new changes to legislation
PPTX
5G mission diary: Houston, we have a problem
PDF
Positive approach to security of Core networks
PPTX
SS7: the bad neighbor you're stuck with during the 5G migration and far beyond
PPTX
Telecom incidents investigation: daily work behind the scenes
Global Security threats from 5G leads to new selection of 5G vendors
5G SA security: a comprehensive overview of threats, vulnerabilities and rem...
Cybersecurity and continuous intelligence
Security course: exclusive 5G SA pitfalls and new changes to legislation
5G mission diary: Houston, we have a problem
Positive approach to security of Core networks
SS7: the bad neighbor you're stuck with during the 5G migration and far beyond
Telecom incidents investigation: daily work behind the scenes

What's hot (20)

PPTX
Telecom under attack: demo of fraud scenarios and countermeasures
PPTX
5G Security Training
PDF
Telecom Security in the Era of 5G and IoT
PDF
SS7: 2G/3G's weakest link
PDF
Simjacker: how to protect your network from the latest hot vulnerability
PDF
Signaling security essentials. Ready, steady, 5G!
PPTX
iotmaship - Webinos iot and m2m - allott
PDF
Creating a fuzzer for telecom protocol 4G LTE case study
PDF
SS7 Vulnerabilities
PDF
SMi Group's 4th annual European Smart Grid Cyber and SCADA Security conferenc...
PDF
European smart grid cyber and scada security
PDF
Fortinet Broşür
PDF
Ngfw overview
PPTX
An Approach to Closing the Gaps between Physical, Process Control, and Cybers...
PPTX
5G Security, 5G Wireless Security Training 2019
PDF
Alcatel Wimax Whitepaper (quantumwimax.com)
PPTX
Network Control Access for Non-IT Professionals
PPTX
160415 lan and-wan-secure-access-architecture
PDF
Attacks you can't combat: vulnerabilities of most robust MNOs
DOCX
Aiman Alhajjah-Resume-07-29-16
Telecom under attack: demo of fraud scenarios and countermeasures
5G Security Training
Telecom Security in the Era of 5G and IoT
SS7: 2G/3G's weakest link
Simjacker: how to protect your network from the latest hot vulnerability
Signaling security essentials. Ready, steady, 5G!
iotmaship - Webinos iot and m2m - allott
Creating a fuzzer for telecom protocol 4G LTE case study
SS7 Vulnerabilities
SMi Group's 4th annual European Smart Grid Cyber and SCADA Security conferenc...
European smart grid cyber and scada security
Fortinet Broşür
Ngfw overview
An Approach to Closing the Gaps between Physical, Process Control, and Cybers...
5G Security, 5G Wireless Security Training 2019
Alcatel Wimax Whitepaper (quantumwimax.com)
Network Control Access for Non-IT Professionals
160415 lan and-wan-secure-access-architecture
Attacks you can't combat: vulnerabilities of most robust MNOs
Aiman Alhajjah-Resume-07-29-16
Ad

Similar to How to Raise Cyber Risk Awareness and Management to the C-Suite (20)

PPT
How to Connect Your Server Room to the Board Room – Before a Data Breach Occurs
PDF
BIZGrowth Strategies - Cybersecurity Special Edition
PDF
Digital Beachhead Quarterly Magazine Vol 2, September 2024
PDF
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
PPTX
Global Megatrends in Cybersecurity – A Survey of 1,000 CxOs
PDF
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
PDF
2017 K12 Educators Security Briefing - Matthew Rosenquist
PDF
Integrating-Cyber-Security-for-Increased-Effectiveness
PDF
Department of Homeland Security Guidance
PDF
DHS Guidelines
PDF
NextLevel Cyber Security Executive Briefing
PPTX
How to present information security risks to Board)
PPTX
The Board and Cyber Security
PPTX
2018 State of Cyber Resilience Insurance
PPTX
Draft_ppt_dmss[1][2] (1) FINAL123455667.pptx
PPTX
How to Make Your Enterprise Cyber Resilient
PDF
Strategic Cybersecurity
PPTX
Information & Cyber Security Risk
PDF
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
PDF
Security Incident Response Readiness Survey
How to Connect Your Server Room to the Board Room – Before a Data Breach Occurs
BIZGrowth Strategies - Cybersecurity Special Edition
Digital Beachhead Quarterly Magazine Vol 2, September 2024
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Global Megatrends in Cybersecurity – A Survey of 1,000 CxOs
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
2017 K12 Educators Security Briefing - Matthew Rosenquist
Integrating-Cyber-Security-for-Increased-Effectiveness
Department of Homeland Security Guidance
DHS Guidelines
NextLevel Cyber Security Executive Briefing
How to present information security risks to Board)
The Board and Cyber Security
2018 State of Cyber Resilience Insurance
Draft_ppt_dmss[1][2] (1) FINAL123455667.pptx
How to Make Your Enterprise Cyber Resilient
Strategic Cybersecurity
Information & Cyber Security Risk
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
Security Incident Response Readiness Survey
Ad

More from SurfWatch Labs (20)

PPTX
Using SurfWatch Labs' Threat Intelligence to Understand Third-Party Risk
PPTX
Know Your Adversary: Analyzing the Human Element in Evolving Cyber Threats
PPTX
Using SurfWatch Labs' Threat Intelligence to Monitor Your Digital Risk
PPTX
Using Threat Intelligence to Address Your Growing Digital Risk
PPTX
Using SurfWatch Labs' Threat Intelligence to Understand Dark Web Threats
PPTX
How to Mitigate Risk From Your Expanding Digital Presence
PPTX
IoT Devices Expanding Your Digital Footprint
PPTX
How to Reduce Avenues of Attack: Using Intel to Plan for Cyber Threats in 2017
PPTX
Cyber Threat Intelligence Solution Demonstration
PPTX
Cyber Threat Intelligence Solution Demonstration
PPTX
SurfWatch Labs Threat Intelligence Solution Demo
PPTX
Connecting the Dots Between Your Threat Tntelligence Tradecraft and Business ...
PPTX
Cyber Threat Intelligence: Knowing What Specific Threats Your Business Should...
PPTX
Gathering Intel from the Dark Web to Identify and Prioritize Critical Risks
PPTX
Shining a Light on Cyber Threats from the Dark Web
PPTX
Credit Unions Caught in the Cybercrime Cross Hairs: How to Get Ahead of the C...
PPT
Treat Cyber Like a Disease
PPTX
SANS Report: The State of Security in Control Systems Today
PPT
Point of Sale Insecurity: A Threat to Your Business
PPTX
Using Threat Information to Build Your Cyber Risk Intelligence Program
Using SurfWatch Labs' Threat Intelligence to Understand Third-Party Risk
Know Your Adversary: Analyzing the Human Element in Evolving Cyber Threats
Using SurfWatch Labs' Threat Intelligence to Monitor Your Digital Risk
Using Threat Intelligence to Address Your Growing Digital Risk
Using SurfWatch Labs' Threat Intelligence to Understand Dark Web Threats
How to Mitigate Risk From Your Expanding Digital Presence
IoT Devices Expanding Your Digital Footprint
How to Reduce Avenues of Attack: Using Intel to Plan for Cyber Threats in 2017
Cyber Threat Intelligence Solution Demonstration
Cyber Threat Intelligence Solution Demonstration
SurfWatch Labs Threat Intelligence Solution Demo
Connecting the Dots Between Your Threat Tntelligence Tradecraft and Business ...
Cyber Threat Intelligence: Knowing What Specific Threats Your Business Should...
Gathering Intel from the Dark Web to Identify and Prioritize Critical Risks
Shining a Light on Cyber Threats from the Dark Web
Credit Unions Caught in the Cybercrime Cross Hairs: How to Get Ahead of the C...
Treat Cyber Like a Disease
SANS Report: The State of Security in Control Systems Today
Point of Sale Insecurity: A Threat to Your Business
Using Threat Information to Build Your Cyber Risk Intelligence Program

Recently uploaded (20)

PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Machine learning based COVID-19 study performance prediction
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
sap open course for s4hana steps from ECC to s4
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPTX
Big Data Technologies - Introduction.pptx
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Electronic commerce courselecture one. Pdf
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
MIND Revenue Release Quarter 2 2025 Press Release
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Machine learning based COVID-19 study performance prediction
Advanced methodologies resolving dimensionality complications for autism neur...
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
MYSQL Presentation for SQL database connectivity
Per capita expenditure prediction using model stacking based on satellite ima...
Dropbox Q2 2025 Financial Results & Investor Presentation
sap open course for s4hana steps from ECC to s4
Building Integrated photovoltaic BIPV_UPV.pdf
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
The Rise and Fall of 3GPP – Time for a Sabbatical?
Review of recent advances in non-invasive hemoglobin estimation
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Spectral efficient network and resource selection model in 5G networks
20250228 LYD VKU AI Blended-Learning.pptx
Big Data Technologies - Introduction.pptx
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Electronic commerce courselecture one. Pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm
MIND Revenue Release Quarter 2 2025 Press Release

How to Raise Cyber Risk Awareness and Management to the C-Suite

  • 1. How to Raise Cyber Risk Awareness and Management to the C-Suite
  • 2. Today’s Speakers 2 Jason Polancich Founder & Chief Architect SurfWatch Labs
  • 3. Today’s Speakers Chris Broderick President & CEO TerraGo Technologies Company Confidential 3
  • 4. Cybersecurity Accountability Has Shifted to the C-Suite 4 “… boards that choose to ignore, or minimize, the importance of cybersecurity oversight responsibility, do so at their own peril.” - Luis A. Aguilar, SEC Commissioner
  • 5. Cybersecurity Needs to be Part of the Overall Business Strategy 5 • What cyber events are occurring in our industry? • What Cyber Risk KPI’s should we track? • Are we spending in the right areas? • Have any suppliers been breached recently?
  • 6. Cyber Risks Lost in Translation 6 Antivirus Firewalls Citadel Trojan Zeus Man-in-the- Middle IDS/IPS Backoff POS Netflow Analysis Packet Reflection Packet Inspection Malware Detection What does this all mean to the business?
  • 7. Cybersecurity Management is Being Elevated in Organizations 7 From Facilities… to Server Rooms… to Board Rooms
  • 8. Rising Costs of Insecurity $5.9M is the Average Cost of a Data Breach • Cost/compromised record increased from $188 to $201 • Customer turnover rate increased by 15% 8 Source: 2014 Cost of Data Breach Study: Global Analysis, Ponemon Institute
  • 9. Aligning Cybersecurity Spend with Your Cyber Risk Reality 9
  • 10. Sound Cybersecurity is a Competitive Advantage 10 69% of US executives are worried that cyber threats will impact growth. — PwC, 17th Annual Global CEO Survey
  • 11. 11
  • 12. Address Cyber Risks Now, Instead of Responding to Threats 12
  • 13. Tracking Cyber Risks as Part of Overall Risk Management • Elevate cybersecurity to higher level discussion and strategy through business intelligence approach • Measure cyber risks through Key Performance Indicators (KPI’s) 13
  • 14. Cybersecurity Requirements Being Specified in RFPs 14 Request for Proposal ACME Corp Cybersecurity Practices 1.Describe the safeguards in place to protect customer information. 2.Who has access (physical and/or remote) to systems that house sensitive information? 3.Describe your network segmentation architecture. 4.What policies and controls are in place with regards to laptops and mobile devices? 5.How do you monitor and assess cyber risks? • Customers are concerned about how their sensitive information is safeguarded • Cybersecurity is now an important requirement for winning a contract
  • 15. C-Suite Dashboard App Get Instant Visibility of Your Cyber Risk KPI’s •Real-time and trending views of cyber risks and business impacts •Provides easy-to-understand insights for Executives and Boards to make faster, more informed risk management decisions •SaaS-based app ─ easy to access and use in Web Browser and Mobile 15
  • 16. Cybersecurity Tips 1. Take a business intelligence approach to understanding and analyzing cybersecurity data 2. Common language among C-Suite and cybersecurity professionals 3. Proactively mitigate cyber risks as opposed to responding to threats 16
  • 17. SurfWatch Labs Resources 17 • Download the Whitepaper: How Executives Can Understand Cyber Risks and Ensure Governance http://info.surfwatchlabs.com/cyber-risk-governance • Read an Overview of SurfWatch C-Suite https://www.surfwatchlabs.com/apps/c-suite • Try SurfWatch C-Suite for Free https://www.surfwatchlabs.com/apps/c-suite/new

Editor's Notes

  • #5: C-suite and board is ultimately responsible as we’ve seen in the Target breach and others…
  • #9: Cost of Data breach up 10% from 2013