Cybersecurity @ Rabobank · Cybersecurity @ Rabobank Wim Hafkamp - CISO NBA 20 May 2016 ‘Doing...

Post on 24-Jul-2020

2 views 0 download

Transcript of Cybersecurity @ Rabobank · Cybersecurity @ Rabobank Wim Hafkamp - CISO NBA 20 May 2016 ‘Doing...

Cybersecurity @ Rabobank

Wim Hafkamp - CISO NBA 20 May 2016

‘Doing nothing’ is not an option

2

Changing World

3

New Entrants • Fintech • Non-financials

More Regulations The Netherlands Pan-Europe U.S.A.

New Technologies New distribution channels Product innovations Sociale media

Customer expections Expect 24/7 services 100% reliability Willing to change to other home bank

Social pressure Lower profit marges

lead to cost focus Sustainability Breach of Trust

The financial Sector is changing fast.…

Intense Pressure

on banks

4

The Ultimate

IT Challenge New Entrants

▪ Cheap and Time-to-market solutions

▪ Joint solutions (e.g. iDEAL) ▪ Lean IT

More Regulations ▪ IRM (Integrated Risk Management) ▪ Need for more flexibility

New technologies ▪ New interaction methods

(video, chat, etc.) ▪ Mobile ▪ Cloud ▪ Analytics

Customers expectations ▪ Multichannel ▪ Customized en

personalized services ▪ High(er) Quality

Social pressure ▪ Green IT ▪ Outsourcing &

Offshoring

…and technology is getting more important

Superb Customer Services

Regulatory Compliance

Innovate & ‘Disrupt’

Response to Cyber Threats

Manage priorities

Ambition : Rock-Solid Security

• Up-to-date security at acceptable costs

• Security explicit part of service delivery process

• Strong and robust IT infrastructure

• Capable and adequate security organisation to meet threats and requirements.

Use adequate language!

7

In the boardroom…

8

Questions

9

Where are we?

What is our inspiration?

What is needed?

When will we get there?

Which practice to choose?

Detailed Questions

10

How secure are you? Serious security and privacy incidents

Are you getting more or less secure? Key indicators

How do you set priorities and risk appetite? Downtime and data lost

How are you organized to mange issues? First vs Second line and reporting

Are you spending at the right level? Spending's over next years and is appropriated

How do you manage third party suppliers? How to avoiding unacceptable risk

Threats

Cybersecurity….more than technology

11

Threats

Threat actor Actor

Capability Attack

immediacy

Vulnerabilities

People Process Technology

Assets

Information assets

Systems Applications

Protect and defend

Technical controls

Behavior controls

Respond

Immediate incident response

Investigations

Business drivers Regulations

Business, Resilience and contingency

Environment

Controls and Response Capability's

Different perspective (1)

12

Shift

from prevent to

detect & respond

Human is weakest link,

unless…

Cooperation is required ISAC,

Sector, NCSC, (IT) Partners

How to react if you are hacked (and you

will)..

Protect your ‘crown jewels’

Different Perspective (2)

13

Protect & Defend

Technical Controls

Behavior

Controls

Respond

Immediate Incident response

Investigation

Critical steps

14

Minimize exposure

1. Assess your readiness to

respond/ Resilience 2. Identify your critical assets 3. Select your defense 4. Boost your security awareness

and education 5. Enhance monitoring & incident

response

The role of the CISO

15

6. Hand- shakes

5. Projects/ Key Action Plans

1. Security Compliance

2. Security Risks

3. Incident & findings

4. Security Awareness