SlideShare a Scribd company logo
March 9, 2016
The State of Security
In the media industry from a C-level perspective
March 9, 2016
Current Print & Media Industry Landscape
And some of the challenges we face
IN A STATE OF EVOLUTION in an increasingly technology-driven environment
• Social media giants
• Time to market
• Information overload
• People’s behavior, expectations & perceptions
March 9, 2016
Current Threat Landscape
As per KPMG
Cyber security was cited as one of the top
concerns by less than a quarter of small
businesses
23%
Small businesses surveyed who have
experienced a breach said it impacted on their
reputation
89%
83% of consumers surveyed are concerned
about which businesses have access to their
data
83%
Don’t consider data they hold to be
commercially sensitive. This vastly
underestimates the value of their information.
22 %
Source: KPMG UK Small Business & Reputation Cyber Risk Report, Feb 2016
March 9, 2016
Brand damage
31.0%
Loss of clients
30.0%
Ability to win new
business
29.0%
Interpreting the findings
And assessing impact
STATE OF PREPAREDNESS
Many small businesses are unprepared and unconcerned when it comes
to cyber breaches; but customers are increasingly concerned about the
security of their personal data.
Small businesses are putting themselves at huge risk by
underestimating the big impact a cyber attack can have on their
reputation.
UNDERESTIMATION OF IMPACT
The impact of breaches led to:
March 9, 2016
What’s At Stake
Commercially sensitive data
Intellectual Property
Supplier Information
Employee Details
Customer Data
Accounts Information
29%
25%
24%
22%
22%
Source: KPMG UK Small Business & Reputation Cyber Risk Report, Feb 2016
March 9, 2016
2016 Tech Trends
And predictions as per Gartner, 2016
Source: 5 cyber security predictions for 2016, Davey Winder & Gartner
INTERNET OF INSECURE
THINGS
EVOLUTION NOT
REVOLUTION
MORE SOPHISTICATION
ARM THE ANDROIDS
SKILLS GAP OBESITY
March 9, 2016
Mitigating Risks
Realization & making it work
“[..] companies are getting smarter about
protecting themselves against threats, and
more are recognizing the importance of
security and privacy working hand in hand to
mitigate the risk and enhance accountability,”
IAPP President and CEO J. Trevor Hughes, CIPP
“Privacy investments are adding value through
data classification and minimization.
Establishing good policy and effective
communications help to understand the value”
TRUSTe CEO Chris Babel.
Source: HelpNetSecurity, Companies are realizing that security and privacy go hand in hand, March 2016
March 9, 2016
Mitigating Risks
As meet we our challenges
Embrace a
digital first
strategy
Embrace tech Diversify
Adapt
company
culture
Revisit work
processes
Respond to
trends
• Good processes help to mitigate attacks
• Plan to detect and recover from attacks
• Strike a balance between prevention, detection and recovery
• Aim to initiate a response process that significantly reduces the
impact of a breach
• Conversations on security shouldn’t start with cost – they should
start with risk
• Think about legacy technology
• Assign business owners to company information to understand
value Source: Mitigate the risk from Cyber attacks, KPMG UK
March 9, 2016
Conclusions
Final words and parting thoughts
• There is no one-size-fits-all security model.
• An evolving landscape brings about a degree of uncertainty.
• Adopt a risk based approach in line with your company’s risk
appetite.
• Pre-emptive security is always better than reactive security.
• Being prepared is the name of the game. It’s not a matter of
if, but when.
• Don’t ignore residual risk at a corporate risk oversight level.
• Treat cybersecurity as a business imperative not a tech issue.
DISCRIMINATE WHERE YOU PUT YOUR EFFORT AND WHERE
MONEY IS SPENT !
March 9, 2016
THANK YOU!
FOR YOUR ATTENTION
Donald Tabone Email : dtabone@gmail.com
March 9, 2016
The State of Security
In the media industry from a C-level perspective

More Related Content

PPTX
BIG DEAL: CYBER SECURITY AND SMALL BUSINESS
PDF
12 Top Talks from the 2017 R-CISC Summit
PDF
2017 in Review: Infosec Pros Look Back on the Year
PDF
Consero Procurement & Strategic Sourcing - Risk Management, Procurement Risk
PDF
Get Connected - Cyber Security Workshop, Prof Tim Watson
PPT
Strategies for cyber resilience - Everyone has a Role
PDF
MP_OneSheet_VulnThreat
PDF
The State of Cybersecurity and Digital Trust 2016
BIG DEAL: CYBER SECURITY AND SMALL BUSINESS
12 Top Talks from the 2017 R-CISC Summit
2017 in Review: Infosec Pros Look Back on the Year
Consero Procurement & Strategic Sourcing - Risk Management, Procurement Risk
Get Connected - Cyber Security Workshop, Prof Tim Watson
Strategies for cyber resilience - Everyone has a Role
MP_OneSheet_VulnThreat
The State of Cybersecurity and Digital Trust 2016

What's hot (15)

PPT
CEOs leading Recovery from Cyber Attack
PDF
Security Awareness: The Best Defence
PDF
brochure
PPTX
Cyber Recovery - Legal Toolkit
PPTX
New Synopsys research uncovers security's biggest challenges
PDF
Threat Lab and Creating a Need for Layered Security
PPTX
Tigerswan: The Basics of Crisis Management
PDF
Futureproof Your Business For The Next Disruption #SXSW2018
PPTX
Countering Cyber Threats
PPTX
Cyber Resilience
PDF
Security confessions of a small country
PDF
How Smart Leaders Anticipate Breach to Protect Their Companies - Michael Sant...
PPTX
Modern Security Risk
PPT
Making Sense of Cybersecurity for Small Business
PDF
SonMax Launches its portfolio of Cyber Security, Risk Advisory and Big Data S...
CEOs leading Recovery from Cyber Attack
Security Awareness: The Best Defence
brochure
Cyber Recovery - Legal Toolkit
New Synopsys research uncovers security's biggest challenges
Threat Lab and Creating a Need for Layered Security
Tigerswan: The Basics of Crisis Management
Futureproof Your Business For The Next Disruption #SXSW2018
Countering Cyber Threats
Cyber Resilience
Security confessions of a small country
How Smart Leaders Anticipate Breach to Protect Their Companies - Michael Sant...
Modern Security Risk
Making Sense of Cybersecurity for Small Business
SonMax Launches its portfolio of Cyber Security, Risk Advisory and Big Data S...
Ad

Similar to MARM State of Security v2 (20)

PDF
Digital trust and cyber challenge now extends beyond the Enterprise
PPTX
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
PPTX
IAPP - Trust is Terrible Thing to Waste
PDF
Seattle Biz-Tech Summit 10-2015 CyberSecurity and the Board
PDF
Seattle Biz-Tech Summit 10-2015 CyberSecurity and the Board
PDF
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
PPTX
2015: The year-ahead-in-cyber-security
PPTX
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
PDF
Fall2015SecurityShow
PPTX
Cybersecurity Course in Chandigarh Join Now
PDF
2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...
PPTX
11 19-2015 - iasaca membership conference - the state of security
PPTX
Information & Cyber Security Risk
PDF
2017 K12 Educators Security Briefing - Matthew Rosenquist
PDF
Encuesta Mundial de Ciberseguridad de la Información 2017
PPT
Presentation to Irish ISSA Conference 12-May-11
PDF
Tech Talent Meetup Hacking Security Event Recap
PPTX
SoCal HIMSS Privacy Security Webinar
PPTX
Empired Convergence 2017 - Keeping Pace, Staying Safe in the Digital World
PPTX
Cyber Security Landscape: Changes, Threats and Challenges
Digital trust and cyber challenge now extends beyond the Enterprise
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
IAPP - Trust is Terrible Thing to Waste
Seattle Biz-Tech Summit 10-2015 CyberSecurity and the Board
Seattle Biz-Tech Summit 10-2015 CyberSecurity and the Board
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
2015: The year-ahead-in-cyber-security
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Fall2015SecurityShow
Cybersecurity Course in Chandigarh Join Now
2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...
11 19-2015 - iasaca membership conference - the state of security
Information & Cyber Security Risk
2017 K12 Educators Security Briefing - Matthew Rosenquist
Encuesta Mundial de Ciberseguridad de la Información 2017
Presentation to Irish ISSA Conference 12-May-11
Tech Talent Meetup Hacking Security Event Recap
SoCal HIMSS Privacy Security Webinar
Empired Convergence 2017 - Keeping Pace, Staying Safe in the Digital World
Cyber Security Landscape: Changes, Threats and Challenges
Ad

More from Donald Tabone (8)

PPTX
Manning Information Security Strategy
PDF
ICTSA v2
PPTX
ISACA_21st century technologist
PPT
ELPUB_2015
PPTX
Selling security to the C-level
PDF
Dealing with Information Security, Risk Management & Cyber Resilience
PDF
Mca Erg Oct 09
PDF
The Realm Of Digital Forensics
Manning Information Security Strategy
ICTSA v2
ISACA_21st century technologist
ELPUB_2015
Selling security to the C-level
Dealing with Information Security, Risk Management & Cyber Resilience
Mca Erg Oct 09
The Realm Of Digital Forensics

MARM State of Security v2

  • 1. March 9, 2016 The State of Security In the media industry from a C-level perspective
  • 2. March 9, 2016 Current Print & Media Industry Landscape And some of the challenges we face IN A STATE OF EVOLUTION in an increasingly technology-driven environment • Social media giants • Time to market • Information overload • People’s behavior, expectations & perceptions
  • 3. March 9, 2016 Current Threat Landscape As per KPMG Cyber security was cited as one of the top concerns by less than a quarter of small businesses 23% Small businesses surveyed who have experienced a breach said it impacted on their reputation 89% 83% of consumers surveyed are concerned about which businesses have access to their data 83% Don’t consider data they hold to be commercially sensitive. This vastly underestimates the value of their information. 22 % Source: KPMG UK Small Business & Reputation Cyber Risk Report, Feb 2016
  • 4. March 9, 2016 Brand damage 31.0% Loss of clients 30.0% Ability to win new business 29.0% Interpreting the findings And assessing impact STATE OF PREPAREDNESS Many small businesses are unprepared and unconcerned when it comes to cyber breaches; but customers are increasingly concerned about the security of their personal data. Small businesses are putting themselves at huge risk by underestimating the big impact a cyber attack can have on their reputation. UNDERESTIMATION OF IMPACT The impact of breaches led to:
  • 5. March 9, 2016 What’s At Stake Commercially sensitive data Intellectual Property Supplier Information Employee Details Customer Data Accounts Information 29% 25% 24% 22% 22% Source: KPMG UK Small Business & Reputation Cyber Risk Report, Feb 2016
  • 6. March 9, 2016 2016 Tech Trends And predictions as per Gartner, 2016 Source: 5 cyber security predictions for 2016, Davey Winder & Gartner INTERNET OF INSECURE THINGS EVOLUTION NOT REVOLUTION MORE SOPHISTICATION ARM THE ANDROIDS SKILLS GAP OBESITY
  • 7. March 9, 2016 Mitigating Risks Realization & making it work “[..] companies are getting smarter about protecting themselves against threats, and more are recognizing the importance of security and privacy working hand in hand to mitigate the risk and enhance accountability,” IAPP President and CEO J. Trevor Hughes, CIPP “Privacy investments are adding value through data classification and minimization. Establishing good policy and effective communications help to understand the value” TRUSTe CEO Chris Babel. Source: HelpNetSecurity, Companies are realizing that security and privacy go hand in hand, March 2016
  • 8. March 9, 2016 Mitigating Risks As meet we our challenges Embrace a digital first strategy Embrace tech Diversify Adapt company culture Revisit work processes Respond to trends • Good processes help to mitigate attacks • Plan to detect and recover from attacks • Strike a balance between prevention, detection and recovery • Aim to initiate a response process that significantly reduces the impact of a breach • Conversations on security shouldn’t start with cost – they should start with risk • Think about legacy technology • Assign business owners to company information to understand value Source: Mitigate the risk from Cyber attacks, KPMG UK
  • 9. March 9, 2016 Conclusions Final words and parting thoughts • There is no one-size-fits-all security model. • An evolving landscape brings about a degree of uncertainty. • Adopt a risk based approach in line with your company’s risk appetite. • Pre-emptive security is always better than reactive security. • Being prepared is the name of the game. It’s not a matter of if, but when. • Don’t ignore residual risk at a corporate risk oversight level. • Treat cybersecurity as a business imperative not a tech issue. DISCRIMINATE WHERE YOU PUT YOUR EFFORT AND WHERE MONEY IS SPENT !
  • 10. March 9, 2016 THANK YOU! FOR YOUR ATTENTION Donald Tabone Email : dtabone@gmail.com
  • 11. March 9, 2016 The State of Security In the media industry from a C-level perspective