Cybersecurity & Data Privacy
Cybersecurity & Data Privacy
be transformed
3/15/2023
Agenda
1. The cost of cybercrime & data breach
2. Cyber security maturity framework
3. Data security objectives
4. Building effective cyber defense
be transformed
3/15/2023 2
Top 4 broad risk areas of concern
be transformed
How safe are you?
How much do you estimate your
organisation loses annually to
(i) data breaches?
(ii) cybercrime?
be transformed
3/15/2023 4
The global cost of cybercrime…
be transformed
3/15/2023 5
Cost of cybercrime (Uganda Police Report)
Ugx.11.4 Bn Ugx. 51 Mn
248 of the reported A lot of money is invested in
cybercrime cases led to a trying to recover the big sums of
loss of 11.4B lost money which is not on record
99.6%
be transformed
3/15/2023 7
How long does it
take to identify and
contain
cyberbreach?
be transformed
3/15/2023 8
High value data for hackers
1. Protected Health Information (PHI)
• First responders, Ambulatory Services, Intensive Care Records, Personal Medical records
46%
B Misconfiguration
be transformed
3/15/2023 12
Cyber assurance: A comprehensive framework* - key controls to watch
Cybersecurity Governance
• Program governance • Organizational model • Steering committee structure • Tone at the top • Regulatory and legal landscape • Cybersecurity strategy
Secure
Program management Data protection Identity and access management Infrastructure security
a) Policies, standards, baselines, guidelines, a) Data classification a) Account provisioning a) Hardening standards
and procedures b) Data security strategy b) Privileged user management b) Security design/architecture
b) Talent and Budget management c) Information records management c) Access certification c) Configuration management
c) Asset management d) Enterprise content management d) Access management and d) Network defense
d) Change management e) Data quality management governance e) Security operations management
e) Program reporting f) Data loss prevention e) Generic account management
f) Risk and compliance management
Vigilant Resilient
Threat and vulnerability management Monitoring Crisis management Enterprise resiliency
a) Threat modeling and intelligence a) Security Log Management (SLM) a) Response planning a) Business Impact Analysis (BIA)
b) Penetration testing b) Security Information and Event b) Tabletop exercises b) Business Continuity Planning
c) Vulnerability management Management (SIEM) c) War game exercises (BCP)
d) Emerging threats (e.g., mobile c) Cyber risk analytics d) Incident response and forensics c) Disaster Recovery Planning (DRP)
devices) d) Metrics and reporting e) Crisis communication plan
f) Third-party responsibilities be transformed
*The summitSECURITY cyber assurance framework is aligned with industry standards and maps to NIST, ISO, COSO, ITIL, and CIS CSC. Alternative adequate frameworks may be used.
Cyber assurance risk assessment for improved governance Risk Assessment
Client Industry
Program Management
Data Protection
Monitoring
Current Maturity
Availability
be transformed
Payment Card Industry (PCI)
1. Anyone who stores, process, or transmits credit card
data must be PCI compliant
2. Common PCI validation requirements
▪ Report on Compliance (ROC)
▪ Self-Assessment Questionnaire (SAQ)
▪ Letter of Attestation
▪ Quarterly PCI scans
3. Sample PCI Data Security Standards Requirements
▪ Annual Penetration Testing (DSS 11.3)
▪ Security Awareness Training (DSS 12.6)
▪ Quarterly PCI scans (DSS 11.2)
be transformed
3/15/2023 18
People are not the
weakest link - they are
the primary attack vector.
be transformed
be transformed
Questions & Answers
Q&A
Mustapha B Mugisa, Mr Strategy
[email protected]
be transformed
Cybersecurity & data
privacy – risks and
opportunities
be transformed
3/15/2023