Business IT Conclave - Bengal Chamber of Commerce & Industry

Hackers, insiders, criminals and nations have motives for gaining access
to information and systems to disrupt or destroy them. Keeping in view the
increased pace of technological development, and the growing dependency
of organizations on digital information and their interconnectivity, we are
posed with a challenging business risk in form of cyber security which
requires a dynamic solution.
This report provides a perspective on the overall exposure for organizations
in the current time and the various key factors which need to be considered
upon to deal with this risk in holistic and integrated manner. The challenges
increase due to constant change and adoption of emerging technology and
need of hour is to be more proactive than being reactive to cyber security
incidents.
Further, the implications of cyber risk have led to increased awareness at
the board level, which many organizations today are not being able to
address adequately. This study report also provides suggested methods
which organizations could consider to enhance overall maturity to deal
with cyber security risk and provide board governance on cyber.
I am sure that this report shall assist all of you in addressing the significant
risk to which the entire industry is exposed upon.
Foreword
Ambarish Dasgupta
President
The Bengal Chamber of Commerce and Industry
04
Technology has provided significant opportunities to the global world, however at the same time it has exposed the
organizations to risk. Cyber security has emerged as one of the key risk areas, which has moved up on the board level
agenda. The risk has been constantly evolving due to increased adoption of technology across various business
processes in enterprises. Given the threat environment it’s become imperative for enterprises to proactively manage
this risk.
Stakeholders and regulators are increasingly challenging boards to step up their oversight of cyber security and calling
for greater transparency around major breaches and the impact they have on the business. The cyber security landscape
and the associated threats is not a new thing the speed of evolution is what is changing.
Attackers today are driven by range of motivation, including financial gain, to corporate espionage, to raising the profile
and terrorism. The recent report on Cybercrime in India highlighted that 72% of Indian organizations have suffered
cyber security attack and 65% of these attacks were driven by financial gains. The study also highlighted that 64% of
these attacks were targeted at directors and members of senior management.
What is at stake?
Since many global organizations have been victims of cybercrime over recent years, board oversight of cyber security
is no longer just a leading practice—it is a necessity. Cybercrime has caused various type of losses to the organizations.
Potential impacts across enterprises may include:
l Reputational losses causing impact on market value; loss of goodwill and confidence across stakeholders
l Penalties which may be legal or regulatory fines such as regulatory fines, e.g., for data privacy breaches,
and customer and contractual compensation
l Financial impact due to unauthorized transactions
l Intellectual property losses (covering patented information and trademarked materialand commercially
sensitive data)
l Administrative resource to correct the impact such as restoring client confidence, communications to
authorities, replacing property, and restoring the organization business to its previous levels
Overview
05
Cyber risk has emerged as near the top of board and audit committee agendas. Investors, governments, and global
regulators are increasingly challenging board members to actively demonstrate diligence in this area.As per KPMG’s
Cybercrime survey 2015, 41% of respondents state that cyber security is part of the Board agenda.
This further gets covered in Global Audit Committee Survey conducted by KPMG 2015, which states that nearly 50
percent of global organizations have either board or audit committees with primary oversight responsibility for cybersecurity
risk; yet, only 10 percent say that the quality of information they receive about cybersecurity is excellent.
Which leads to following critical questions
l Are we doing enough to manage the risk from cyber, still not being able to provide the information to
board/ audit committee?
l Do we have adequate means of communication as part of cyber program?
l What framework should be followed such that holistic perspective on cyber security is brought upon?
A robust approach to manage cyber risk, which includes the topic in board level decision making, can reduce volatility
and uncertainty, and deliver value right across to the organization by achieving the best possible outcome. To effectively
address the board room agenda, organizations should be aware of thefollowing :
Cyber security - Boardroom Agenda
Do you know what elements of the cyber threat are particularly
relevant to your business ?
Do you know your key assets that need to be protected ?
Do you know monitor and detect any anomalies on your network?
What is the worst cases scenario? In what way could cyber
threats really harm your business?
Do you have adequate incident management plan to respond
to incidents? Are you sharing and getting intelligence on emerging
threats?
THREAT
MONITOR &
IMPACT
ANALYSY
RESPOND &
SHARE
06
Change is a constant factor in today’s world. That may be a cliché, but it is also the challenging truth when
it comes to cyber security. The cyber threat environment remains chaotic as attacks are not expected to go
down and increasingly they are becoming more innovative and they learn from environment which make them
constantly evolving.
As per KPMG’s Cybercrime survey 2015, 61 per cent respondents indicated that malware, and 41 percent
stated that social engineering, are the nature of cyber-attacks faced by organizations. This indicates that the
attacks are not only focused on technology weaknesses, but there is a large focus on exploiting the human
weakness. Few of the other key elements captured in the report shows that the cyber threat environment has
emerged significantly in India:
l 72 per cent respondents indicated that they witnessed attack during the year, compared to 49 per
cent in the previous year, which indicates the frequency and spread of attacks is much wider.
l 63 per cent respondents indicated that impact of cyber-attacks was financial impact during the year,
compared to 45 per cent in the previous year, which indicates that the attacks are extremely focused.
l 64 per cent respondents indicated that directors/ senior management was most vulnerable to
cybercrime, compared to 32 per cent in the previous year, which clearly indicates that the attacks
are targeted.
While the attacks and threat vectors are constantly emerging, some of the facts/ advancement and adoption
of technology poses constant challenge for organizations.
The internet wasn’t designed to be secure
Cyberspace, which includes the internet and a range of other interconnected systems, was designed to simplify
the sharing of digitally stored information. As such it is inevitable that some will use this interconnected network
to circumvent the privacy of others to access, disrupt or even destroy information. Security has therefore been
something of an afterthought, often retro-fitted onto an internet that has flourished owing to the ability to access
information, as well as benefit from freedoms of expression and anonymity.
Machine to machine attacks
Studies suggest that the rise in the connected machine to the internet have increased exponentially on a
yearly basis.The usage of smartphones and gadgets such as smart watches, tablets which constitute the
“Internet of Things (IoT)” are an easy playground for cyber criminals which have been targeting them to launch
a host of machine initiated attacks. These attacks are targeted to either acquire sensitive information and/or
exploit them to sabotage the machines.
Constantly evolving cyber threat environment
07
Convergence of non IT networks (traditionally known as Operational Technology network) with IT network
has resulted in exposure of control systems, such as ICS, SCADA, etc.
Third party vendors and service providers
Suppliers and third party vendors are integral part of global organizations today and they provide services
which ranges from operational services to strategic services, including cloud based computing services. These
service providers provide own set of challenges to organizations, considering that the information gets exposed
to external environment which may not be always secured and the concept of having strong external perimeter
also diminishes.
Adoption of mobility
Mobility has transformed the way information is exchanged, accessed and processed across corporates.
While on one side it has brought in huge productivity but at the same time it has brought unique set of
challenges from cyber security view point. Mobility has resulted in proliferation of devices and the concepts
of BYOD (Bring your own device) has added on to ensuring consistent security measures being deployed
across set of devices.
There have been multiple industry sectors which have been targeted by cyber attackers or have the potential
of being targets in the future, including:
08
New Techniques to conceal identity
As computer forensics has evolved to identify and trace malicious activities, the cyber criminals have also developed
techniques to avoid detection. One such technique being used is “Ghostware” which does not leave any trace behind
while performing the malicious activity.
Other technique being used is “Two faced Malware”. Many organizations use sandbox testing before deploying any
new software in the environment. In sandbox testing the codes are subjected to deeper inspection to observe it they
change their behaviors under any circumstances. The two faced malware behaves differently when under inspection/
surveillance and turn into a malicious code once it not under any suspicion or surveillance.
Cloud Services
Proliferation of cloud has led to wider adoption of technology across various streams in organizations. With the increase
in cloud based services, cyber criminals are also enhancing their techniques to break into them due to the information
they contain. The attacks today are launched through various techniques including malwares.
Attacking cloud services and the related applications on mobile devices will give cyber criminals access to the mobile
devices there by acting as remote sites to launch and perform attacks.
Social Media
Social media continues to be providing new ways to connect across set of people and is today an integral part of the
strategy of organizations. These platforms not only helps one to be connected with their family and friends but also to
exchange thoughts and ideas.
Today the power of this medium is widely recognized to grow and expand business. But this medium is also on the
target of cyber criminals which use social engineering to extract information from individuals and then use the same
for their vested interests.
Hackers have been using the information posted though posts and share and then use authentic looking phishing emails
in order.
Emerging technologies adding to complexities
09
Cyber security may appear to be driven by technology, but the reality is that unless adequate balanced approach
focusing on people, technology and process is not brought upon, it will not be feasible for management to deal with
this threat.
Studies suggest that Executive Board considers Cyber security as a technical issue, and a certain section stating that
cyber security focuses too much on technology. This clearly implies a lack of attention to the other two pillars of a
complete and balanced strategy: that is people and processes.This view is closely interlinked with the fact that cyber
security is a relatively young issue.
The reality is that technology is just one part of the equation in the domain of cyber security and an isolated technological
approach will lead to a false sense of security. In other words, an organization using a tool without having clarity on
the issue at hand is doing nothing but disservice to the practice.
Closer look at most of the global incidents which have been captured extensively by the media makes us realize that
the impact on these organizations was primarily due to not being able to respond and recover from incidents in structured
manner. Studies suggest that controls have been looked at or revised on occurrences of incidents, rather than being
more proactive.
It’s imperative for organizations to have following key elements as part of the overall cyber security framework:
l Awareness of employees and other key stakeholders
l Comprehensive cyber security incident management framework
l Roles and responsibility of key stakeholders during incident
l Communication management framework during incidents
l Recovery process from cyber security incidents
l Forum to get alerts on threat intelligence and threat sharing
Organizations must develop their Cyber capabilities and shift from a reactive to proactive approach with a holistic view.
Two key drivers for multiple organizations continue to be:
1. Incidents act as main driving force for cyber security investments
2. Compliance due to contractual requirement/ statutory requirements
Reactive investments in security are driven by fear. There are organizations which continuously scan threats and
analyze data patterns and have been able to develop capabilities to predict the character of nature of future incidents.The
maturity level of organizations can roughly be divided into four stages of cyber strategies, ranging from reactive,
structured, and integrated to predictive. To achieve the highest level of maturity which is key for high-profile organizations
where the stakes are high organizations must find new ways.They should of course focus on being well informed of
possible threats and invest in a proper defense. However, they should not do this in an isolated way, but rather use
the knowledge and experience of peers, both in the public and private sector. A joint effort is essential to the maintenance
of a high level of intelligence.
A multidisciplinary approach helps to avoid specialist blindness and brings in the necessary new perspectives to improve
predictions of risk areas.
It’s not only about technology
10
At this moment, we are going through transformation which is blurring the lines between physical, digital, and
biological spheres. This creates massive strategic challenges and opportunities for many companies. And it
also changes the dynamics of cyber security as the interconnectedness of the world accelerates.
Objects and machines, including cars to utilities to health care devices and life support systems are now
connected 24/7. In this shift towards complete connectivity it is evident that part of our longstanding technology
can no longer keep up with the pace.
We have witnessed media reports that show how new (and sometimes unexpected) vulnerabilities emerge.
These examples draw a lot of public attention as their character is media-savvy. However the biggest risk is
probably in other area; for instance, how hackers may exploit devices to gain entry to corporate and government
networks and databases.
This may result in obtaining control over industrial systems that control power plants, the energy grid, water
supply, and damming traffic infrastructure. The changing dynamics has two perspectives. On the one hand
the variety and number of devices is exploding, which brings new challenges to manage the multitude of
devices and systems; on the other hand the level of interaction between all these devices also increases,
which allows a domino effect and thus multiplies the impact of a possible disturbance.
With India as a country developing multiple smart cities, there is a huge challenge of protecting cyber space
including systems and cloud systems as the cyber threat would increase manifold.
There are no easy answers in this domain. But it is clear that this trend leads us to a new reality in cyber
security which is no longer confined to cyber space but also comprises our physical world.Thus, cyber security
is in fact a license to operate. It will become a prerequisite for success and a differentiator in the market space.
“All the attacker needs to do in order to get to the data is identify a weak link in the chain of connected devices”
Privacy is also a major concern for the “Internet of Things” as information is now shared on various devices.
Users do believe to take the necessary precautions while storing information but at times there are things
beyond their control.
It is also a point for the industry to take lessons as they are in the process of providing gadget and smart
devices to user’s, they must also ensure that best practices relating to coding, patching, usage of secure
protocols which can prevent vulnerabilities are also embedded in their culture to minimize impacts from them.
Immediate future: machines getting on internet
11
Organizations should create a risk profile for their organization based on the following factors:
Business Environment
l What is the business environment?
l In which market does the organization work?
l What all linkages does the organization have with other parties which can add cyber security risk?
Threats
In which sector does the organization works or is involved with, which could lead it to be a possible target
for attackers?
Vulnerabilities
Which all vulnerabilities does the organization have from a technical, people, process perspective which can
be exploited?
Intended Targets
What could be the intended targets within the chain or relationships?
Legislation
What all legislations related to cyber security the organization needs to adhere to?
By covering the above domains, organizations can then come up with their cyber risk exposure which would
help them in concentrating on the exact areas requiring attention. There are various approaches available
which can be followed by organizations and more recently there is a mobile application (Cyber KARE) launched
by KPMG for conducting the same.
Way Forward
There is no silver bullet which addresses all the concerns and risks to which organizations are exposed due to cyber
security. The most optimal answer lies in having an integrated approach focusing on elements, including risk assessments,
governance, culture, technology and cyber insurance.
Cyber security risk assessment
12
Organization should ensure that cyber-attack simulation drills are performed on a periodic basis to enable
the employees with the protocol to be followed and also imbibe it in the organization culture. The primary
purpose is to provide training which helps in better response to such cyber incidents.
The challenge posed by cyber threats are very dynamic. It is also related on how organizations respond to
it. As the response to cyber-attack must be quick and precise because a wrong judgment could further escalate
the damage or the compromise.
Cyber security simulation drills
Knowing the enemy
The threats that emanate from cyberspace are many and varied, and not all of them apply to every
organization. The less informed may assume that all cyber threats are relevant to their business and
some commentators who seek to spread fear, uncertainty and doubt do nothing to dispel these
assumptions.
There is great commercial advantage to be gained from better understanding those that seek to target
organizations for their valuable information. Appreciating their motivations and intentions allows
organizations to plan their business activities with a clear sight of what the risks are.
Knowing your enemy can drastically reduce the chances of successful threats. The key is to have
good cyber threat intelligence in place as a basis for prioritizing threats, assessing the risk exposure
and being able to respond.
Threat intelligence can help organizations anticipate threats by distilling the relevant intelligence from
the myriad information feeds available in and outside their organization. Mastering threat intelligence
is key to an agile and adaptive cyber governance. To live up to this promise, threat intelligence should
be more than raw information. The intelligence has to be both consumable and actionable. If not,
even start-of the-art information is only interesting at best.
Awareness on changing threat
13
Adopting industry established frameworks
Organizations may vary in their approach to address cyber security issues at hand by either designing their
own frameworks based on the business environment or use industry practices standard, such as the one
developed by National Institute of Standards and Technology (NIST).The NIST standard is at the discretion
of the organization whether they wish to use the same or not but it may be fruitful as it covers practices from
a large number of other bodies such as International Standardization Organization (ISO) which have been
successfully implemented. The framework is a risk based guidelines which helps organization identify,
implement and improve cyber security practices cutting across industries.
The basis of the framework is on risk management. While cyber security is to be addressed and taken care
by the board and senior management, having it expressed in terms of risk makes it easier to understand and
deal with it. And, accordingly prioritize investments.
The framework guides organizations to assess themselves by gauging their current approach against the
recommended practices which are processes, procedures and risk assessment techniques. This if followed
by identification of a target profile where organizations identify the outcomes necessary to improve their
approach to cyber security.Once the current assessment has been done and a target profile is selected the
framework helps identify the gaps that should be worked upon in order to increase the cyber security
preparedness.
The framework defines five activities that are core for having an effective cyber security mechanism:
l Identify: Understanding of how cyber security risks should be managed related to systems, assets,
data, and capabilities;
l Protect: Controls and safeguards required for protection against cyber security threats;
l Detect: Monitoring of the activities to provide real time inputs on cyber security;
l Respond: Incident response capabilities
l Recover: Plans in place for business continuity in the event of a cyber-breach.
Designing a comprehensive framework
14
Board Governance
Management should develop comprehensive process for governance with board and audit committee to
ensure that the key stakeholders are comprehensively informed on the overall position of the organization.
Some of the key areas which organizations should consider answering as part of overall governance framework
should include:
l What are the new cyber security threats and risks, and how do they affect our organization?
l Is our organization’s cyber security program ready to meet the challenges of today’s and tomorrow’s
cyber threat landscape?
l What key risk indicators should I be reviewing at the executive management and board levels to
perform effective risk management in this area?
Management should also develop board level dashboards which can be presented on quarterly basis to
provide an overview of the progress being made across cyber security domain
Cyber insurance is emerging as one of the risk treatment measures for organizations, which would not
solve the problem at hand or mitigate the risk but it does limit the damage to an extent.
Cyber insurance is a domain which is getting more mature globally and increasingly being adopted
across regions. In country, this has emerged as an option which organizations have started evaluating
and insurance providers within the country are also coming up with solutions which are aligned with the
local cyber security laws and implications.
With the increase in awareness and understanding, the studies indicate this will be an option which shall
be considered by many organizations.
Cyber Insurance
15
References
1 Cyber Risk: An executive overview by Philip Hodgins KPMG UK
2 Cyber Security from the Front lines, June 2015 by Greg Bell, KPMG US
3 Cyber Risk in the Boardroom for Global Platinum Clients, March 2016 by Malcolm Marshall, Greg Bell and Paul Taylor, KPMG
US
4 Connecting the dots: A proactive approach to cyber security oversight in the boardroom by KPMG US
5 Cyber Security: A theme for the Boardroom by John Hermans, KPMG Netharlands
6 Cyber watch report by KPMG Canada
7 Cyber Risk: What does it mean for your organization? June 2015, by Philip Hodgins KPMG UK
8 Cybercrime survey report 2015 by KPMG India
9 Clarity on Cyber security, May 2015 by KPMG Switzerland
10 Clarity on Cyber security, May 2016 by KPMG Switzerland
11 Security: Time Indian Firms Start Looking From Insurance Prism by T M Arun Kumar. www.itroadmap.in
12 Cyber insurance sees growing demand among corporates By M Saraswathy, June 2015, Business Standard
13 Digital India, Smart City initiatives face cyber threats by Dibyendu Mondal
 

Please reload

Featured Posts

DoyenGC-ApON gets recognition in US

November 19, 2017

1/1
Please reload

Recent Posts

June 14, 2019

January 27, 2019

Please reload

Archive