SlideShare a Scribd company logo
© 2014 IBM Corporation 
Critical Infrastructure: Risk, Business Continuity and Cybersecurity -a Resiliency Point of View 
Paige Poore 
Director of IBM Global Business Continuity, Resiliency Services
© 2014 IBM Corporation 
2 
Critical Infrastructure panel at Securetech 2014 
Focus: 1.Resilience and Risk –lessons learned. Take traditional business continuity to the next level. 2.Cybersecurity -the problem that won't go away. What do risk and continuity professionals need to know? 3.How ready are you?Actions you can take - collaborative actions in managing risks when disruptions occurAlign for Advantage
© 2014 IBM Corporation 
3 
Critical Infrastructure panel at Securetech 2014 
Scanning the Horizon 
NewStrategic Risks 
Enhancing existing approaches 
Are you ready for what’s ahead?
© 2014 IBM Corporation 
4 
Critical Infrastructure panel at Securetech 2014 
New business realities are changing how we approach business continuity 
ISO 22301 
Mergers & acquisitions 
Changing workplace demographics 
Social media 
Expansion into new markets 
Elevated risk awareness 
Consider new risks on your horizon 
Integration and consolidation of operations
© 2014 IBM Corporation 
5 
Critical Infrastructure panel at Securetech 2014 
Reputation risk is driving increased focusSource: The economics of IT risk and reputation What business continuity and IT security really mean to your organizationFindings from the 2013 Ponemon Institute study sponsored by IBM 
Leaders increasingly aware of 
economic and reputational impact of disruptions
© 2014 IBM Corporation 
6 
Critical Infrastructure panel at Securetech 2014 
Vision Critical: Risk of Data Insecurity 
Angus Reid survey thru Vision Critical 
Sponsored by IBM Canada 
Soon to be published ! 
Angus Reid, thru Vision Critical, recently conducted a survey to evaluate Canadian(average user) awareness of IT security and availability issues. 
1.50% of Canadians would likely or very likely get involved with a organization if they took extra steps to protect customer information. 
2.83%+ of Canadians would likely or very likely switch organizations if they felt their personal information was not being adequately protected or if the organization experienced a major breach. 
Private talks with their wallets 
Publictalks with their votes 
Reputation Risk:
© 2014 IBM Corporation 
7 
Critical Infrastructure panel at Securetech 2014 
•STRATEGIC 
•Risk based, prioritize, top 5-10% 
•Prioritize for investment tradeoff decisions 
•HOLISTIC, 360 degree view 
•Look past the silos! 
•SIMPLE. Consistent 
•Consistent, Shared Terminology 
•Impact based planning 
•ISO 22301 –use it as your Rosetta-stone 
•Joint testing and collaboration –it’s the simple things that can trip you up! 
Resilience and Risk -take the traditional business continuity approach to the next level 
It’s a journey…Focus on these key drivers
© 2014 IBM Corporation 
8 
Critical Infrastructure panel at Securetech 2014Incident occursBusiness Continuity management is about keeping the business running afterhealth and safety issues have been addressedPeople 
IT 
SitePlan3#3 Business ContinuityMaintain or resume critical business processes by enacting appropriate business continuity and / or IT Disaster Recovery Plan 
1.Business Continuity Plan(Business Recovery) 2. IT Disaster Recovery Plan(Technology Recovery) 
#1 EmergencyResponse 
Priority: protect people and property; assemble key personnel (Emergency Plan #2 Crisis ManagementAssess, act and recover physical services; Communicate throughout the event1 
4 
2 
8 
Return to Business as Usual 
Event crisis response through return to normal – 
is collaboratively managed with defined declaration, communication and notification protocols
© 2014 IBM Corporation 
9 
Critical Infrastructure panel at Securetech 2014 
9Anything that is connected to the Internet can be hacked. Everything is being connected to the Internet 
Cloud Based Computing 
Resiliency & Risk for Critical Infrastructure-TechnologyTrends 
Things, in the IoT, can refer to a wide variety of devices such as -heart monitoring implants, biochip transponders on farm animals, automobileswith built-in sensors, or field operation devices that assist fire-fighters in search and rescue.[3] Current market examples include smart thermostat systems and washer/dryers that utilize wififor remote monitoring. Monitoring and controlling operations of urban and rural infrastructureslike bridges, railway tracks, on-and offshore- wind-farms is a key application of the IoT. Source: https://ibm.biz/BdEqrX
© 2014 IBM Corporation 
10 
Critical Infrastructure panel at Securetech 2014 
$8.98 
Are you ready for an always-on world? The next era of business continuity:
© 2014 IBM Corporation 
11 
Critical Infrastructure panel at Securetech 2014 
Cybersecurity –The problem that isn’t going away 
* >$213 Average cost per compromised record globally, per 2014 Cost of Data Breach Study
© 2014 IBM Corporation 
12 
Critical Infrastructure panel at Securetech 2014 
Economic impact –3 key factorsNote: Graphical Views are US averages (vs. global ) 
Economic impact of critical infrastructure disruptions -How much it will impact you is dependent on a number of factors
© 2014 IBM Corporation 
13 
Critical Infrastructure panel at Securetech 2014 
Looking forward –Economic Impact, Trends & Probability2006 to 2014 –Trends, Components of cost
© 2014 IBM Corporation 
14 
Critical Infrastructure panel at Securetech 2014 
Looking forward -Economic Impact, Trends & Probability 
Within Next 24 Months 
Likelihood in next 24 months
© 2014 IBM Corporation 
15 
Critical Infrastructure panel at Securetech 2014 
How do you measure up?
© 2014 IBM Corporation 
16 
Critical Infrastructure panel at Securetech 2014 
Focus: 1.Resilience and Risk –lessons learned. Take traditional business continuity to the next level. 2.Cybersecurity -the problem that won't go away. What do risk and continuity professionals need to know? 3.How ready are you?Actions you can take -collaborative actions in managing risks when disruptions occur 
Align for Advantage
© 2014 IBM Corporation 
17 
Critical Infrastructure panel at Securetech 2014 
Actions you can take 
Collaborative action in managing risks when disruptions occur
© 2014 IBM Corporation 
18 
Critical Infrastructure panel at Securetech 2014 
Business continuity and cyber security can work in tandem to limit damage 
$145$136Average of $9 
Because data breaches often affect thousands of records, the savings can be significant. 
1. Business continuity helps reduce cost of data breach 
3. However, that involvement occurs too infrequently – 
55%of the organizations studied saidthat business continuity management is either not involved or only informally involved in data breach 
2. Organizations are about 5% percent less likely to suffer a data breach when they involve business continuity in a cyberincident 
5% Less Likely
© 2014 IBM Corporation 
19 
Critical Infrastructure panel at Securetech 2014 
Collaboration-How to involve business continuity with cyber security 
Establish cross-representation 
Conduct joint recovery testing 
Leverage crisis management for coordination 
Speak language the business understands – economic impact 
231 
4 
Align for Advantage 
use the 2014 Cost of Data Breach Study to begin building a persuasive business case
© 2014 IBM Corporation 
20 
Critical Infrastructure panel at Securetech 2014Thank you 
Paige Poore 
Director of IBM Global Business Continuity 
linkedin.com paigepoore 
poore@us.ibm.com 
twitter.com/poore27
© 2014 IBM Corporation 
21 
Critical Infrastructure panel at Securetech 2014 
For more information… 
IBM’s internal implementation of Global Business Continuity Management - Read the IBM Thought Leadership White Paper -How IBM is enhancing BCM to help address changing business realities -A more business-centric approach to help reduce business continuity risk”. 
Download a copy of the paper here: http://ibm.co/1hIruml 
2014 Cost of Data Breach Study: Global Analysis: Read the global analysis for a worldwide view plus new data on security threats and the role of business continuity managementDownload a copy of the paper here:http://ibm.co/1g6STe6

More Related Content

PDF
SMi Group's Oil & Gas Cyber Security conference & exhibition
PPTX
Automation of Information (Cyber) Security by Joe Hessmiller
PPTX
Comprehensive risk management for a cyber secure organization
PDF
Security in Mergers and Acquisitions - NTT Security - Miriam Levenstein
PDF
Pulse 2013 - How to run a successful BYOD initiative
PDF
EMA Megatrends in Cyber-Security
PDF
ACT 2014 Business or Pleasure the Challenges of Bring Your Own Device Policie...
PDF
Cyber security framework
SMi Group's Oil & Gas Cyber Security conference & exhibition
Automation of Information (Cyber) Security by Joe Hessmiller
Comprehensive risk management for a cyber secure organization
Security in Mergers and Acquisitions - NTT Security - Miriam Levenstein
Pulse 2013 - How to run a successful BYOD initiative
EMA Megatrends in Cyber-Security
ACT 2014 Business or Pleasure the Challenges of Bring Your Own Device Policie...
Cyber security framework

What's hot (18)

PPTX
PDF
3 Enablers of Successful Cyber Attacks and How to Thwart Them
PDF
IT Position of Trust Designation
PPTX
BYOD (Bring Your Own Device)
PDF
Energy Industry Organizational Strategies to Increase Cyber Resiliency
PPTX
ODP
PDF
Dynamic Cyber Defense
PPTX
The intersection of cool mobility and corporate protection
PPTX
Leveraging Your Security System to Impact Your Bottom line
PDF
Security Trends and Risk Mitigation for the Public Sector
PDF
Bring your own device
PPTX
BYOD (Bring Your Own Device) Risks And Benefits
PPTX
Risks and Benefits of Bringing Your Own Device
PPTX
Bring Your Own Device (BYOD)
PPTX
Nonprofit IT Trends 2018
DOCX
Cmgt 582 Enthusiastic Study / snaptutorial.com
3 Enablers of Successful Cyber Attacks and How to Thwart Them
IT Position of Trust Designation
BYOD (Bring Your Own Device)
Energy Industry Organizational Strategies to Increase Cyber Resiliency
Dynamic Cyber Defense
The intersection of cool mobility and corporate protection
Leveraging Your Security System to Impact Your Bottom line
Security Trends and Risk Mitigation for the Public Sector
Bring your own device
BYOD (Bring Your Own Device) Risks And Benefits
Risks and Benefits of Bringing Your Own Device
Bring Your Own Device (BYOD)
Nonprofit IT Trends 2018
Cmgt 582 Enthusiastic Study / snaptutorial.com
Ad

Similar to SecureTech 2014: Risk, Business Continuity and Cybersecurity - A Resiliency Perspective (20)

PDF
Business Continuity State of the Industry Report 1st Edition Herbert J. Mattord
PDF
Business Continuity State of the Industry Report 1st Edition Herbert J. Mattord
PPTX
Leveraging Compliance to “Help” Prevent a Future Breach
PDF
Securing the C-Suite: Cybersecurity Perspectives from the Boardroom
PDF
Cybersecurity Summit 2020 Slide Deck
PDF
BIFM Risk Management Event 8th September 2016
PDF
Business Continuity State of the Industry Report 1st Edition Herbert J. Mattord
PPT
Holistic Resilience
PPT
Don't risk it presentation
PDF
Dealing with Information Security, Risk Management & Cyber Resilience
PDF
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
PDF
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
PDF
Risksense: 7 Experts on Threat and Vulnerability Management
PDF
Fall2015SecurityShow
PPTX
The Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt
PPSX
Cyber Attacks aren't going away - including Cyber Security in your risk strategy
PDF
PPT
Breaking down the cyber security framework closing critical it security gaps
PDF
Cyber Resilience - Welcoming New Normal - Eryk
Business Continuity State of the Industry Report 1st Edition Herbert J. Mattord
Business Continuity State of the Industry Report 1st Edition Herbert J. Mattord
Leveraging Compliance to “Help” Prevent a Future Breach
Securing the C-Suite: Cybersecurity Perspectives from the Boardroom
Cybersecurity Summit 2020 Slide Deck
BIFM Risk Management Event 8th September 2016
Business Continuity State of the Industry Report 1st Edition Herbert J. Mattord
Holistic Resilience
Don't risk it presentation
Dealing with Information Security, Risk Management & Cyber Resilience
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
Risksense: 7 Experts on Threat and Vulnerability Management
Fall2015SecurityShow
The Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt
Cyber Attacks aren't going away - including Cyber Security in your risk strategy
Breaking down the cyber security framework closing critical it security gaps
Cyber Resilience - Welcoming New Normal - Eryk
Ad

Recently uploaded (20)

PDF
cuic standard and advanced reporting.pdf
PDF
Accuracy of neural networks in brain wave diagnosis of schizophrenia
PDF
Approach and Philosophy of On baking technology
PPTX
Spectroscopy.pptx food analysis technology
PPTX
Big Data Technologies - Introduction.pptx
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
MYSQL Presentation for SQL database connectivity
cuic standard and advanced reporting.pdf
Accuracy of neural networks in brain wave diagnosis of schizophrenia
Approach and Philosophy of On baking technology
Spectroscopy.pptx food analysis technology
Big Data Technologies - Introduction.pptx
Network Security Unit 5.pdf for BCA BBA.
Agricultural_Statistics_at_a_Glance_2022_0.pdf
NewMind AI Weekly Chronicles - August'25-Week II
Mobile App Security Testing_ A Comprehensive Guide.pdf
Reach Out and Touch Someone: Haptics and Empathic Computing
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
“AI and Expert System Decision Support & Business Intelligence Systems”
A comparative analysis of optical character recognition models for extracting...
Spectral efficient network and resource selection model in 5G networks
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Building Integrated photovoltaic BIPV_UPV.pdf
Dropbox Q2 2025 Financial Results & Investor Presentation
MYSQL Presentation for SQL database connectivity

SecureTech 2014: Risk, Business Continuity and Cybersecurity - A Resiliency Perspective

  • 1. © 2014 IBM Corporation Critical Infrastructure: Risk, Business Continuity and Cybersecurity -a Resiliency Point of View Paige Poore Director of IBM Global Business Continuity, Resiliency Services
  • 2. © 2014 IBM Corporation 2 Critical Infrastructure panel at Securetech 2014 Focus: 1.Resilience and Risk –lessons learned. Take traditional business continuity to the next level. 2.Cybersecurity -the problem that won't go away. What do risk and continuity professionals need to know? 3.How ready are you?Actions you can take - collaborative actions in managing risks when disruptions occurAlign for Advantage
  • 3. © 2014 IBM Corporation 3 Critical Infrastructure panel at Securetech 2014 Scanning the Horizon NewStrategic Risks Enhancing existing approaches Are you ready for what’s ahead?
  • 4. © 2014 IBM Corporation 4 Critical Infrastructure panel at Securetech 2014 New business realities are changing how we approach business continuity ISO 22301 Mergers & acquisitions Changing workplace demographics Social media Expansion into new markets Elevated risk awareness Consider new risks on your horizon Integration and consolidation of operations
  • 5. © 2014 IBM Corporation 5 Critical Infrastructure panel at Securetech 2014 Reputation risk is driving increased focusSource: The economics of IT risk and reputation What business continuity and IT security really mean to your organizationFindings from the 2013 Ponemon Institute study sponsored by IBM Leaders increasingly aware of economic and reputational impact of disruptions
  • 6. © 2014 IBM Corporation 6 Critical Infrastructure panel at Securetech 2014 Vision Critical: Risk of Data Insecurity Angus Reid survey thru Vision Critical Sponsored by IBM Canada Soon to be published ! Angus Reid, thru Vision Critical, recently conducted a survey to evaluate Canadian(average user) awareness of IT security and availability issues. 1.50% of Canadians would likely or very likely get involved with a organization if they took extra steps to protect customer information. 2.83%+ of Canadians would likely or very likely switch organizations if they felt their personal information was not being adequately protected or if the organization experienced a major breach. Private talks with their wallets Publictalks with their votes Reputation Risk:
  • 7. © 2014 IBM Corporation 7 Critical Infrastructure panel at Securetech 2014 •STRATEGIC •Risk based, prioritize, top 5-10% •Prioritize for investment tradeoff decisions •HOLISTIC, 360 degree view •Look past the silos! •SIMPLE. Consistent •Consistent, Shared Terminology •Impact based planning •ISO 22301 –use it as your Rosetta-stone •Joint testing and collaboration –it’s the simple things that can trip you up! Resilience and Risk -take the traditional business continuity approach to the next level It’s a journey…Focus on these key drivers
  • 8. © 2014 IBM Corporation 8 Critical Infrastructure panel at Securetech 2014Incident occursBusiness Continuity management is about keeping the business running afterhealth and safety issues have been addressedPeople IT SitePlan3#3 Business ContinuityMaintain or resume critical business processes by enacting appropriate business continuity and / or IT Disaster Recovery Plan 1.Business Continuity Plan(Business Recovery) 2. IT Disaster Recovery Plan(Technology Recovery) #1 EmergencyResponse Priority: protect people and property; assemble key personnel (Emergency Plan #2 Crisis ManagementAssess, act and recover physical services; Communicate throughout the event1 4 2 8 Return to Business as Usual Event crisis response through return to normal – is collaboratively managed with defined declaration, communication and notification protocols
  • 9. © 2014 IBM Corporation 9 Critical Infrastructure panel at Securetech 2014 9Anything that is connected to the Internet can be hacked. Everything is being connected to the Internet Cloud Based Computing Resiliency & Risk for Critical Infrastructure-TechnologyTrends Things, in the IoT, can refer to a wide variety of devices such as -heart monitoring implants, biochip transponders on farm animals, automobileswith built-in sensors, or field operation devices that assist fire-fighters in search and rescue.[3] Current market examples include smart thermostat systems and washer/dryers that utilize wififor remote monitoring. Monitoring and controlling operations of urban and rural infrastructureslike bridges, railway tracks, on-and offshore- wind-farms is a key application of the IoT. Source: https://ibm.biz/BdEqrX
  • 10. © 2014 IBM Corporation 10 Critical Infrastructure panel at Securetech 2014 $8.98 Are you ready for an always-on world? The next era of business continuity:
  • 11. © 2014 IBM Corporation 11 Critical Infrastructure panel at Securetech 2014 Cybersecurity –The problem that isn’t going away * >$213 Average cost per compromised record globally, per 2014 Cost of Data Breach Study
  • 12. © 2014 IBM Corporation 12 Critical Infrastructure panel at Securetech 2014 Economic impact –3 key factorsNote: Graphical Views are US averages (vs. global ) Economic impact of critical infrastructure disruptions -How much it will impact you is dependent on a number of factors
  • 13. © 2014 IBM Corporation 13 Critical Infrastructure panel at Securetech 2014 Looking forward –Economic Impact, Trends & Probability2006 to 2014 –Trends, Components of cost
  • 14. © 2014 IBM Corporation 14 Critical Infrastructure panel at Securetech 2014 Looking forward -Economic Impact, Trends & Probability Within Next 24 Months Likelihood in next 24 months
  • 15. © 2014 IBM Corporation 15 Critical Infrastructure panel at Securetech 2014 How do you measure up?
  • 16. © 2014 IBM Corporation 16 Critical Infrastructure panel at Securetech 2014 Focus: 1.Resilience and Risk –lessons learned. Take traditional business continuity to the next level. 2.Cybersecurity -the problem that won't go away. What do risk and continuity professionals need to know? 3.How ready are you?Actions you can take -collaborative actions in managing risks when disruptions occur Align for Advantage
  • 17. © 2014 IBM Corporation 17 Critical Infrastructure panel at Securetech 2014 Actions you can take Collaborative action in managing risks when disruptions occur
  • 18. © 2014 IBM Corporation 18 Critical Infrastructure panel at Securetech 2014 Business continuity and cyber security can work in tandem to limit damage $145$136Average of $9 Because data breaches often affect thousands of records, the savings can be significant. 1. Business continuity helps reduce cost of data breach 3. However, that involvement occurs too infrequently – 55%of the organizations studied saidthat business continuity management is either not involved or only informally involved in data breach 2. Organizations are about 5% percent less likely to suffer a data breach when they involve business continuity in a cyberincident 5% Less Likely
  • 19. © 2014 IBM Corporation 19 Critical Infrastructure panel at Securetech 2014 Collaboration-How to involve business continuity with cyber security Establish cross-representation Conduct joint recovery testing Leverage crisis management for coordination Speak language the business understands – economic impact 231 4 Align for Advantage use the 2014 Cost of Data Breach Study to begin building a persuasive business case
  • 20. © 2014 IBM Corporation 20 Critical Infrastructure panel at Securetech 2014Thank you Paige Poore Director of IBM Global Business Continuity linkedin.com paigepoore poore@us.ibm.com twitter.com/poore27
  • 21. © 2014 IBM Corporation 21 Critical Infrastructure panel at Securetech 2014 For more information… IBM’s internal implementation of Global Business Continuity Management - Read the IBM Thought Leadership White Paper -How IBM is enhancing BCM to help address changing business realities -A more business-centric approach to help reduce business continuity risk”. Download a copy of the paper here: http://ibm.co/1hIruml 2014 Cost of Data Breach Study: Global Analysis: Read the global analysis for a worldwide view plus new data on security threats and the role of business continuity managementDownload a copy of the paper here:http://ibm.co/1g6STe6