25
Cyber and the Cloud- What are the risks? WorkSmart Morning Keynote Heather Bearfield, Principal, MARCUM LLP May 12, 2016

MORNING KEYNOTE PRESENTATION: CYBER AND THE CLOUD – WHAT ARE THE RISKS?

Embed Size (px)

Citation preview

Page 1: MORNING KEYNOTE PRESENTATION: CYBER AND THE CLOUD – WHAT ARE THE RISKS?

Cyber and the Cloud- What are the risks?

WorkSmart Morning KeynoteHeather Bearfield, Principal, MARCUM LLP

May 12, 2016

Page 2: MORNING KEYNOTE PRESENTATION: CYBER AND THE CLOUD – WHAT ARE THE RISKS?

Agenda Overview of Cloud Computing Potential Cloud Security Vulnerabilities Importance of Third Party Risk Management Summary and Conclusion Q&A

Page 3: MORNING KEYNOTE PRESENTATION: CYBER AND THE CLOUD – WHAT ARE THE RISKS?

What is Cloud Computing Cloud computing is a model for enabling convenient, on-demand

network access to a shared pool of configurable computing resources.

Networks, servers, storage, applications, and services that can be rapidly provisioned and released with minimal management effort or service provider interaction.

This cloud model promotes availability and is composed of five essential characteristics, three service models, and four deployment models.

Page 4: MORNING KEYNOTE PRESENTATION: CYBER AND THE CLOUD – WHAT ARE THE RISKS?

“What Confuses You About the Cloud?”

Page 5: MORNING KEYNOTE PRESENTATION: CYBER AND THE CLOUD – WHAT ARE THE RISKS?

Cloud Breakdown

Page 6: MORNING KEYNOTE PRESENTATION: CYBER AND THE CLOUD – WHAT ARE THE RISKS?

Types of Cloud Deployment Models

Page 7: MORNING KEYNOTE PRESENTATION: CYBER AND THE CLOUD – WHAT ARE THE RISKS?

Opportunities Cost savings

o Customers pay for only the computing resources used. There are no physical space requirements or utility costs. All dollars are expensed (that is, receive a U.S. tax benefit).

Speed of deploymento The time to fulfill requests for computing power and applications can

change from months to weeks, weeks to days, and days to hours. Scalability and better alignment of technology resources

o Companies can scale up or down their capacity without capital expenditures.

Decreased effort in managing technologyo Cloud computing provides the organization more time to focus on core

purpose and goals; more consistent technology upgrades; and expedited fulfillment of IT resource requests.

Environmental benefitso Significant adoption of cloud computing should yield less overall power

consumption, carbon emissions, and physical land use.

Page 8: MORNING KEYNOTE PRESENTATION: CYBER AND THE CLOUD – WHAT ARE THE RISKS?

Risks Some of the typical risks associated with cloud computing are:

o Disruptive forceo Residing in the same risk ecosystem as the cloud service

provider (CSP) and other tenants of the cloudo Lack of transparencyo Reliability and performance issueso Vendor lock-in and lack of application portability and

interoperabilityo Security and compliance concernso Creation of high-value cyber-attack targetso Risk of data leakageo IT organizational changeso Viability of the CSP

Page 9: MORNING KEYNOTE PRESENTATION: CYBER AND THE CLOUD – WHAT ARE THE RISKS?
Page 10: MORNING KEYNOTE PRESENTATION: CYBER AND THE CLOUD – WHAT ARE THE RISKS?

Service Delivery Methods

Page 11: MORNING KEYNOTE PRESENTATION: CYBER AND THE CLOUD – WHAT ARE THE RISKS?

Security Breakdown

Page 12: MORNING KEYNOTE PRESENTATION: CYBER AND THE CLOUD – WHAT ARE THE RISKS?

Risk Levels

Page 13: MORNING KEYNOTE PRESENTATION: CYBER AND THE CLOUD – WHAT ARE THE RISKS?

Cloud Governance

“Cloud governance” refers to the controls and processes in place for cloud planning and strategy, vendor selection, contract negotiation, implementation, operation, monitoring and possible termination and transition of cloud services.

Page 14: MORNING KEYNOTE PRESENTATION: CYBER AND THE CLOUD – WHAT ARE THE RISKS?

Top 5 Concerns

Data Access from Mobile Device Access Control and Identity Management Ongoing Compliance Concerns Co-Mingling of Customer Data Security Standards and Certifications

Page 15: MORNING KEYNOTE PRESENTATION: CYBER AND THE CLOUD – WHAT ARE THE RISKS?

Top 9 Security Threats

Data Breaches Data Loss Account or Service Traffic Hijacking Insecure APIs Denial of Service Malicious Insiders Abuse of Cloud Services Insufficient Due Diligence Shared Technology

Page 16: MORNING KEYNOTE PRESENTATION: CYBER AND THE CLOUD – WHAT ARE THE RISKS?

Social Media Landscape

Page 17: MORNING KEYNOTE PRESENTATION: CYBER AND THE CLOUD – WHAT ARE THE RISKS?

Investing in Third Party Risk- Management Data Breach

“On average, third party errors increased the cost of data breach by as much as $43 per record in the US”

41%

33%

26%

Cause of Data Breaches

Malicious or criminal attack Human errorSystem error

Page 18: MORNING KEYNOTE PRESENTATION: CYBER AND THE CLOUD – WHAT ARE THE RISKS?

Third-Party Risk Management Concerns

Evaluating quality of products

Monitoring financial viability

Collecting financial performance or other information

Obtaining internal audit coverage of key risk areas

Identifying or aggregating risks

Monitoring third party risk management practices

Gaining assurance on compliance with laws and regulations

Determining protection of intellectual property

Evaluating technology controls to protect data

-20.0% 0.0% 20.0% 40.0% 60.0% 80.0% 100.0% 120.0%

None

Minimal

Some

High

Source: "Closing the Gaps in Third-Party Risk Management, Defining a Larger Role for Internal Audit,” December 2013, Sponsored by Crowe Horwath LLP

Page 19: MORNING KEYNOTE PRESENTATION: CYBER AND THE CLOUD – WHAT ARE THE RISKS?

Third Party Risk Management Activities

Vendor management activities performed should be based on risk associated with the vendor

In order to ensure the risks with outsourcing cloud services are properly addressed organizations should consider performing the following activities: Review cloud provider’s policies and procedures Request cloud provider respond to internal control questionnaires Perform an onsite review of cloud provider operations Review a Service Organization Control (SOC) Report

Organizations can use SOC reports to obtain a level of comfort over a cloud provider’s controls related to security, availability, processing integrity, confidentiality and privacy controls.

Page 20: MORNING KEYNOTE PRESENTATION: CYBER AND THE CLOUD – WHAT ARE THE RISKS?

What are the Trust Issues?

Will my cloud provider be transparent about governance and operational issues?

Will I be considered compliant?

Do I know where my data is?

Will a lack of standards drive unexpected obsolescence?

Is my provider really better at security than me?

Are the hackers waiting for me in the cloud?

Will I get fired?

Page 21: MORNING KEYNOTE PRESENTATION: CYBER AND THE CLOUD – WHAT ARE THE RISKS?

Cloud Forcing Key Issues Critical mass of separation between data owners and

data processors Anonymity of geography of data centers & devices Anonymity of provider Transient provider relationships Physical controls must be replaced by virtual controls Identity management has a key role to play Cloud WILL drive change in the security status quo Reset button for security ecosystem

Page 22: MORNING KEYNOTE PRESENTATION: CYBER AND THE CLOUD – WHAT ARE THE RISKS?

Key Problems of Tomorrow

Keeping pace with cloud changes

Globally incompatible legislation and policy

Non-standard Private & Public clouds

Lack of continuous Risk Management & Compliance monitoring

Incomplete Identity Management implementations

Haphazard response to security incidents

Page 23: MORNING KEYNOTE PRESENTATION: CYBER AND THE CLOUD – WHAT ARE THE RISKS?

QUESTIONS?

Page 24: MORNING KEYNOTE PRESENTATION: CYBER AND THE CLOUD – WHAT ARE THE RISKS?

Our PartnersADNET proudly partners with leading technology and business solution providers to help our clients find the best possible fit for their needs. We encourage you to visit our partners' websites to learn more about their services.

Page 25: MORNING KEYNOTE PRESENTATION: CYBER AND THE CLOUD – WHAT ARE THE RISKS?

@ADNETTech

@ADNETTechnologiesLLC

@ADNETTechnologiesLLC

www.thinkADNET.com

@MarcumLLP

@Marcum-LLP

@MarcumLLP

www.marcumllp.com