SlideShare a Scribd company logo
www.holivia.com
WHAT
MATTERS IN
SECURITY
www.holivia.com
YOUR
CYBERSECURTY
LANDSCAPE
www.holivia.com
C-LEVEL CONCERNS AND ATTITUDES
1.30%
8.40%
14%
16%
23%
28%
28%
31%
35%
36%
42%
45%
0% 10% 20% 30% 40% 50%
Other
Integration
Compliance
Data-driven decision-making
Innovation
Automation
Monetisation/transformation
Employee productivity
Business agility
Customer/user experience
Business continuity and resilience
Information Security
Which tech objectives are priority?
35%
43%
48%
50%
50%
53%
66%
0% 10% 20% 30% 40% 50% 60% 70%
Another global outbreak of COVID-
19 or other different infectuous
disease
Tighter restrictions on the cross-
border movement of people and
goods
Protracted disription of global
supply chains
Failure of industries or sectors in
certain countries to properly recover
Cyberattacks and data fraud due to
a sustained shift in working
patterns
Surge in bankrupcies and industy
consolidations
Prolonged recession of the global
economy
Most worrisome for your company?
Source: World Economic Form, 2021
Directly related to security
www.holivia.com
ORGANISATIONS COMPROMISED BY
AT LEAST 1 ATTACK
62%
71%
76%
79%
77% 78%
81%
86%
0%
10%
20%
30%
40%
50%
60%
70%
80%
90%
100%
2014 2015 2016 2017 2018 2019 2020 2021
www.holivia.com
NO SECTOR LEFT BEHIND
Source: Enisa, October 2021
0
50
100
150
200
www.holivia.com
SECURITY REPRESENTS YOUR STATE
Free from danger
or threat
Continuity
Enabled to advance
value
www.holivia.com
MULTI-VECTOR RISKS
• Disruption of services
• Compromised accounts
• Phishing
• Ransomware/Extortionware
• Denial of Service (DDoS)
attacks
• Employee ignorance
• Social Engineering
• Right precautions
• Impact of digital
transformation (on-prem,
cloud, hybrid)
• Control over IT Systems
• Systems security
• System vulnerabilities
• Layered security solutions
(Endpoint/Gateway)
• Data insecurity
• Improper backup/recovery
systems
• Regulatory compliance per
industry/area under
management
• Leaving default settings
• Sharing data with
unintended audiences
• Deletion of data
• Hardware failures
Knowledge /
Awareness
Cybercrime Mistakes
Due Diligence /
Regulatory
www.holivia.com
WHAT ATTACKERS TYPICALLY WANT
Disable
your ability
to work
Discredit
you
Your
digital
resources
or money
For personal
entertainment
or gain
Their Job / Hired
Service
or
www.holivia.com
CYBERCRIME
Source: Purplesec, Datto , Verison, 2021
600%
Cybercrime growth in
2020/2021, of which
86% are motivated by
financial gain.
43%
Of cyber-attacks target
small businesses, of which
70% are not equipped to
deal with such attacks
89%
Of MSPs reporting
ransomware as the
most common malware
threat to SMBs
90%
Of MSPs “very concerned”
about ransomware threats
with only 24% SMB clients
feeling the same
7.3 days
Average number of
days a ransomware
incident lasts
274K
Average cost (USD) of
ransomware incident
www.holivia.com
HIGHLY DISRUPTIVE
60 62
78
105
116
189 190
219
0
50
100
150
200
250
20 Q1 20 Q2 20 Q3 20 Q4 21 Q1 21 Q2 21 Q3 21 Q4 (Est)
Millions
Quarterly Attacks
Source: Datto, Sonicwall
2.5X
More damaging than
other incidents
5,600
(USD) Average global
ransom demand
274,000
(USD) Average downtime
cost of a ransomware attack
www.holivia.com
FINANCIAL IMPACT CATEGORIES
Additional Costs
Assistance & Emergency
Measures
Loss of Turnover &
Increase in cost of work
Liability Coverage
• Identification, assessment
and containment of security
incident (IT Forensic)
• Provision of external
expertise
• Provision of legal assistance
(Data breach of
confidentiality)
• Provision of crises
management or
communication assistance
• Restoring the IT system to
its state prior to the incident
• Maintaining operability of
the IT system
• Preparing claims
• Preventing or mitigating
liability exposure / improper
use of personal data (data
breach)
• Communication Strategy
• Notification to the
authorities and individuals
(data breach)
• Ransom
• Defense costs from an
investigation by a regulator
• Regulatory fines
• Defense costs and damages
arising out of claims made
by 3rd parties:
• Breach of confidentiality of
personal data
• Defamation, damage to
reputation, breach of
intellectual property,
violation of privacy etc.
• Business Interruption
• Extra expenses
www.holivia.com
GOVERNMENT & MARKET EXPECTATIONS
Scope
PCI DSS
Data
Sources
Security
Auditing
Right to
be
forgotten
Tooling
GDPR
Manage
Personal
Data
Law
Data
Training
Monitor
Use the effort to
implement to
differentiate your
brand by promoting
what you do to keep
your customers safe
www.holivia.com
FOR YOU THIS MEANS
Due Diligence
Due Care
Reasonable amount of
careful and persistent work to avoid
wilful ignorance, negligence, loss and
liability e.g., keeping policies and
standards, training, installing and
configuring security solutions like
antivirus, firewalls, VPNs
Pro-active processes invested in to
maintain and ensure the highest level of
performance while keeping your and third-
party assets
e.g., periodic audits, enforcing of policies, keeping solutions up to date e.g., AV and security updates,
implementing frameworks like ISO 127001, having formal change management processes,
researching and understanding legal responsibilities, conducting SLA negotiations
BUSINESS ASSETS
Core Products People
Operations
Value Chain
www.holivia.com
PROACTIVELY HANDLE YOUR
LEVEL OF RISK
DIGITAL ASSETS
READINESS TO
GROW
DIGITAL DEBT
COST BRAND EQUITY
PRIORITIES
TIMELINE
www.holivia.com
EXPANDING DIGITAL LANDSCAPE TO SECURE
Cloud Infrastructure
Desktops & Laptops
Applications
SaaS
Solutions
Servers
Networks
On-premise/ Hybrid
apps
Storage
(Local & Distributed)
Telecommunications
WFH Devices
Databases
Development &
Production
environments
Portable Devices &
Wearables
Data &
Data Management
Security
Data Centers
Operating Systems
Websites, Web APIs
and Web Portals
Email
Passwords
Audit info
www.holivia.com
CYBER-RELATED INSURANCE CLAIMS PER YEAR
80
249
495
849
1,114
1,217
0
200
400
600
800
1000
1200
1400
2016 2017 2018 2019 2020 1H 2021 (556) +
15% uplift on H2
Attacks
(all
-
including
ransomware)
Source: Allianz Insurance
www.holivia.com
READY TO DIVE
DEEPER?
www.holivia.com
LET’S TALK…WWW.HOLIVIA.COM
Macro and strategic trends in digital security for leaders trying to
understand and communicate what matters to be assured and secured.
Master the connection between business value and cybersecurity
management through a non-technical lens.
START
YOUR
CYBERSECURITY
LANDSCAPE
CYBERCRIME AS A
SERVICE
YES, YOU ARE A
TARGET OF INTEREST
DIGITAL
TRANSFORMATION
CYBER
RESILIENCE
www.holivia.com
This publication contains general information only and is being made available under the Terms of Services as published on
www.holivia.com.
This is an informational piece of work. In no way or means of this material, are we rendering accounting, business, financial, investment,
legal, tax, or other professional advice or services. This publication is not a substitute for engaged professional advice or services, nor
should it be used as a basis for any decision or action that may affect your business.
Before making any decision or taking any action that may affect your business, you should consult a qualified professional advisor to fully
assess your situation and context.
Holivia Ltd. shall not be responsible for any loss sustained by any person or organisation that relies on this publication.
Copyright © 2022 Holivia Ltd. All rights reserved
ABOUT

More Related Content

PDF
Redington Value Journal - June 2017
PPTX
Unfolding the next growth chapter in the Middle East
PPTX
Automotive Cybersecurity: Shifting into Overdrive
PDF
Redington Value Journal - June 2018
PDF
Bridging the gap: cyber security skills
PDF
Marlink IMO 2021 Guide to Cyber Risk Management
PDF
EY Digital Deal Economy - Nederland
PDF
Cisco_Services_dynamics_magazine_issue_5-2012
Redington Value Journal - June 2017
Unfolding the next growth chapter in the Middle East
Automotive Cybersecurity: Shifting into Overdrive
Redington Value Journal - June 2018
Bridging the gap: cyber security skills
Marlink IMO 2021 Guide to Cyber Risk Management
EY Digital Deal Economy - Nederland
Cisco_Services_dynamics_magazine_issue_5-2012

What's hot (20)

PPTX
Preparing for the Future of Enterprise Mobility -- Insights Not to Miss
PDF
Women in Technology Leadership
PDF
Challenges and Risks for the CIO from Outsourcing in the digital era
PPTX
Accenture + Red Hat
PPTX
Innovate for Cyber Resilience
PDF
Third Annual State of Cyber Resilience | Portugal
PPTX
The Software Defined Business
PPTX
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...
PDF
symc_annual2000
PDF
AUTOMATING CYBER RISK DETECTION AND PROTECTION WITH SOC 2.0
PDF
Cybersecurity at a premium: The state of cyber resilience in insurance
PDF
Accenture Technology Vision 2020: Infographic
PDF
2016 CIO Agenda
PDF
Accenture Technology Vision 2019 Ireland Findings: The Post Digital Era is Here
PDF
Securing the Industrial Enterprise
PDF
Building Bridges: Security Metrics to Narrow the Chasm Between Perception and...
PPTX
Ninth Annual Cost of Cybercrime Study in Financial Services – 2019 Report
PDF
The state of cyber resilience in the UK
PPTX
Technology Vision for Insurance 2019
PDF
Deloitte stay ahed of the game
Preparing for the Future of Enterprise Mobility -- Insights Not to Miss
Women in Technology Leadership
Challenges and Risks for the CIO from Outsourcing in the digital era
Accenture + Red Hat
Innovate for Cyber Resilience
Third Annual State of Cyber Resilience | Portugal
The Software Defined Business
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...
symc_annual2000
AUTOMATING CYBER RISK DETECTION AND PROTECTION WITH SOC 2.0
Cybersecurity at a premium: The state of cyber resilience in insurance
Accenture Technology Vision 2020: Infographic
2016 CIO Agenda
Accenture Technology Vision 2019 Ireland Findings: The Post Digital Era is Here
Securing the Industrial Enterprise
Building Bridges: Security Metrics to Narrow the Chasm Between Perception and...
Ninth Annual Cost of Cybercrime Study in Financial Services – 2019 Report
The state of cyber resilience in the UK
Technology Vision for Insurance 2019
Deloitte stay ahed of the game
Ad

Similar to What matters in security - A highlighter (20)

PPT
Presentation to Irish ISSA Conference 12-May-11
PPT
Mr Jackson Verizon IP at all stages
PDF
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
PPT
Cybercrime future perspectives
PPTX
Security and Accountability in the Cloud (in partnership with SANS)
PDF
Data centric security key to digital business success - ulf mattsson - bright...
PDF
CyberArk Stock Pitch
PPTX
SolarWinds Federal Cybersecurity Survey 2016
PDF
Deep Dive into Operational Technology Security - USCSI®.pdf
PPT
2008 Trends
PDF
Cyber Security Conference - A deeper look at Microsoft Security Strategy, Tec...
PDF
2010 Sc World Congress Nyc
PDF
Building Cyber Resilience
PDF
Building Cyber Resilience in the Digital Economy
PPT
Smart security solutions for SMBs
PDF
Cybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 Trends
PPTX
Cisco Security DNA
PPT
Don't risk it presentation
PDF
EndpointSecurityConcerns2014
PDF
Future Watch: Cybersecurity market in South Africa
Presentation to Irish ISSA Conference 12-May-11
Mr Jackson Verizon IP at all stages
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Cybercrime future perspectives
Security and Accountability in the Cloud (in partnership with SANS)
Data centric security key to digital business success - ulf mattsson - bright...
CyberArk Stock Pitch
SolarWinds Federal Cybersecurity Survey 2016
Deep Dive into Operational Technology Security - USCSI®.pdf
2008 Trends
Cyber Security Conference - A deeper look at Microsoft Security Strategy, Tec...
2010 Sc World Congress Nyc
Building Cyber Resilience
Building Cyber Resilience in the Digital Economy
Smart security solutions for SMBs
Cybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 Trends
Cisco Security DNA
Don't risk it presentation
EndpointSecurityConcerns2014
Future Watch: Cybersecurity market in South Africa
Ad

Recently uploaded (20)

PPTX
Spectroscopy.pptx food analysis technology
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPT
Teaching material agriculture food technology
PDF
Approach and Philosophy of On baking technology
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Encapsulation theory and applications.pdf
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
sap open course for s4hana steps from ECC to s4
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
cuic standard and advanced reporting.pdf
PPTX
MYSQL Presentation for SQL database connectivity
Spectroscopy.pptx food analysis technology
Unlocking AI with Model Context Protocol (MCP)
Building Integrated photovoltaic BIPV_UPV.pdf
Teaching material agriculture food technology
Approach and Philosophy of On baking technology
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
20250228 LYD VKU AI Blended-Learning.pptx
Encapsulation theory and applications.pdf
Mobile App Security Testing_ A Comprehensive Guide.pdf
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
“AI and Expert System Decision Support & Business Intelligence Systems”
Encapsulation_ Review paper, used for researhc scholars
Reach Out and Touch Someone: Haptics and Empathic Computing
Spectral efficient network and resource selection model in 5G networks
A comparative analysis of optical character recognition models for extracting...
The Rise and Fall of 3GPP – Time for a Sabbatical?
sap open course for s4hana steps from ECC to s4
Per capita expenditure prediction using model stacking based on satellite ima...
cuic standard and advanced reporting.pdf
MYSQL Presentation for SQL database connectivity

What matters in security - A highlighter

  • 3. www.holivia.com C-LEVEL CONCERNS AND ATTITUDES 1.30% 8.40% 14% 16% 23% 28% 28% 31% 35% 36% 42% 45% 0% 10% 20% 30% 40% 50% Other Integration Compliance Data-driven decision-making Innovation Automation Monetisation/transformation Employee productivity Business agility Customer/user experience Business continuity and resilience Information Security Which tech objectives are priority? 35% 43% 48% 50% 50% 53% 66% 0% 10% 20% 30% 40% 50% 60% 70% Another global outbreak of COVID- 19 or other different infectuous disease Tighter restrictions on the cross- border movement of people and goods Protracted disription of global supply chains Failure of industries or sectors in certain countries to properly recover Cyberattacks and data fraud due to a sustained shift in working patterns Surge in bankrupcies and industy consolidations Prolonged recession of the global economy Most worrisome for your company? Source: World Economic Form, 2021 Directly related to security
  • 4. www.holivia.com ORGANISATIONS COMPROMISED BY AT LEAST 1 ATTACK 62% 71% 76% 79% 77% 78% 81% 86% 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% 2014 2015 2016 2017 2018 2019 2020 2021
  • 5. www.holivia.com NO SECTOR LEFT BEHIND Source: Enisa, October 2021 0 50 100 150 200
  • 6. www.holivia.com SECURITY REPRESENTS YOUR STATE Free from danger or threat Continuity Enabled to advance value
  • 7. www.holivia.com MULTI-VECTOR RISKS • Disruption of services • Compromised accounts • Phishing • Ransomware/Extortionware • Denial of Service (DDoS) attacks • Employee ignorance • Social Engineering • Right precautions • Impact of digital transformation (on-prem, cloud, hybrid) • Control over IT Systems • Systems security • System vulnerabilities • Layered security solutions (Endpoint/Gateway) • Data insecurity • Improper backup/recovery systems • Regulatory compliance per industry/area under management • Leaving default settings • Sharing data with unintended audiences • Deletion of data • Hardware failures Knowledge / Awareness Cybercrime Mistakes Due Diligence / Regulatory
  • 8. www.holivia.com WHAT ATTACKERS TYPICALLY WANT Disable your ability to work Discredit you Your digital resources or money For personal entertainment or gain Their Job / Hired Service or
  • 9. www.holivia.com CYBERCRIME Source: Purplesec, Datto , Verison, 2021 600% Cybercrime growth in 2020/2021, of which 86% are motivated by financial gain. 43% Of cyber-attacks target small businesses, of which 70% are not equipped to deal with such attacks 89% Of MSPs reporting ransomware as the most common malware threat to SMBs 90% Of MSPs “very concerned” about ransomware threats with only 24% SMB clients feeling the same 7.3 days Average number of days a ransomware incident lasts 274K Average cost (USD) of ransomware incident
  • 10. www.holivia.com HIGHLY DISRUPTIVE 60 62 78 105 116 189 190 219 0 50 100 150 200 250 20 Q1 20 Q2 20 Q3 20 Q4 21 Q1 21 Q2 21 Q3 21 Q4 (Est) Millions Quarterly Attacks Source: Datto, Sonicwall 2.5X More damaging than other incidents 5,600 (USD) Average global ransom demand 274,000 (USD) Average downtime cost of a ransomware attack
  • 11. www.holivia.com FINANCIAL IMPACT CATEGORIES Additional Costs Assistance & Emergency Measures Loss of Turnover & Increase in cost of work Liability Coverage • Identification, assessment and containment of security incident (IT Forensic) • Provision of external expertise • Provision of legal assistance (Data breach of confidentiality) • Provision of crises management or communication assistance • Restoring the IT system to its state prior to the incident • Maintaining operability of the IT system • Preparing claims • Preventing or mitigating liability exposure / improper use of personal data (data breach) • Communication Strategy • Notification to the authorities and individuals (data breach) • Ransom • Defense costs from an investigation by a regulator • Regulatory fines • Defense costs and damages arising out of claims made by 3rd parties: • Breach of confidentiality of personal data • Defamation, damage to reputation, breach of intellectual property, violation of privacy etc. • Business Interruption • Extra expenses
  • 12. www.holivia.com GOVERNMENT & MARKET EXPECTATIONS Scope PCI DSS Data Sources Security Auditing Right to be forgotten Tooling GDPR Manage Personal Data Law Data Training Monitor Use the effort to implement to differentiate your brand by promoting what you do to keep your customers safe
  • 13. www.holivia.com FOR YOU THIS MEANS Due Diligence Due Care Reasonable amount of careful and persistent work to avoid wilful ignorance, negligence, loss and liability e.g., keeping policies and standards, training, installing and configuring security solutions like antivirus, firewalls, VPNs Pro-active processes invested in to maintain and ensure the highest level of performance while keeping your and third- party assets e.g., periodic audits, enforcing of policies, keeping solutions up to date e.g., AV and security updates, implementing frameworks like ISO 127001, having formal change management processes, researching and understanding legal responsibilities, conducting SLA negotiations BUSINESS ASSETS Core Products People Operations Value Chain
  • 14. www.holivia.com PROACTIVELY HANDLE YOUR LEVEL OF RISK DIGITAL ASSETS READINESS TO GROW DIGITAL DEBT COST BRAND EQUITY PRIORITIES TIMELINE
  • 15. www.holivia.com EXPANDING DIGITAL LANDSCAPE TO SECURE Cloud Infrastructure Desktops & Laptops Applications SaaS Solutions Servers Networks On-premise/ Hybrid apps Storage (Local & Distributed) Telecommunications WFH Devices Databases Development & Production environments Portable Devices & Wearables Data & Data Management Security Data Centers Operating Systems Websites, Web APIs and Web Portals Email Passwords Audit info
  • 16. www.holivia.com CYBER-RELATED INSURANCE CLAIMS PER YEAR 80 249 495 849 1,114 1,217 0 200 400 600 800 1000 1200 1400 2016 2017 2018 2019 2020 1H 2021 (556) + 15% uplift on H2 Attacks (all - including ransomware) Source: Allianz Insurance
  • 18. www.holivia.com LET’S TALK…WWW.HOLIVIA.COM Macro and strategic trends in digital security for leaders trying to understand and communicate what matters to be assured and secured. Master the connection between business value and cybersecurity management through a non-technical lens. START YOUR CYBERSECURITY LANDSCAPE CYBERCRIME AS A SERVICE YES, YOU ARE A TARGET OF INTEREST DIGITAL TRANSFORMATION CYBER RESILIENCE
  • 19. www.holivia.com This publication contains general information only and is being made available under the Terms of Services as published on www.holivia.com. This is an informational piece of work. In no way or means of this material, are we rendering accounting, business, financial, investment, legal, tax, or other professional advice or services. This publication is not a substitute for engaged professional advice or services, nor should it be used as a basis for any decision or action that may affect your business. Before making any decision or taking any action that may affect your business, you should consult a qualified professional advisor to fully assess your situation and context. Holivia Ltd. shall not be responsible for any loss sustained by any person or organisation that relies on this publication. Copyright © 2022 Holivia Ltd. All rights reserved ABOUT