Anda di halaman 1dari 24

Cyber

resilience in
the digital age
Implications for the GCC region
05 | Executive summary

07 | The role of government in cyber resilience strategy

09 | Digitization alters cyber threat landscape

12 | Traditional cyber defenses are obsolete

14 | Cyber resilience in the digital age

17 | Building a cyber-resilient ecosystem

21 | The value of cyber resilience

22 | Recommendations

23 | Conclusion

24 | References

Contents
2 Cyber resilience in the digital age
Cyber resilience in the digital age 3
Executive
Rapid digitization is leading to a dramatic increase in the number and information storage with a sense of security and comfort
of cybersecurity incidents in the GCC region and globally. In 2015, in retaining and exchanging information. Citizens and visitors
around the world, four out of five organizations employing over alike demand strong protection against all sorts of threats,
2,500 people were targets of cyber attacks and the estimated including threats to their digital world. Concurrently, governments
financial impact of all such events exceeded US$440b as seen in and the private sector in the GCC region are relying on digital
the infographic below. innovations to help serve stakeholders, contain costs and provide
a competitive edge in the global market. These trends point
As people grow more reliant on technology for their everyday
to a growing imperative for cyber threat “resilience” in the digital
activities, they are also looking to their governments
age. Governments, organizations and individuals must all play their
to work together with the private sector to provide for a robust
part in building an ecosystem that is resilient to cyber threats.
environment in which organizations can leverage technology

Cyber attacks and their impact


One million Four of five 5 of the 10
New malware threats Companies employing Largest ever data
per day more than 2,500 people breaches occured in
targets of cyber 2013 and 2014
attacks last year

In 2014, number of cyber Sixty percent of all targeted attacks


attacks against large companies on small- and
rose by 40% medium-sized organizations

Source: Internet Security Threat Report, Symantec

US$575 billion
Financial impact

Average cost US$15.4 billion


Response time

200 days

Source: The Ponemon Institute 2015 Cost of Data Breach Study: Global Analysis

4 Cyber resilience in the digital age


summary
What does resilience mean in the context the digital landscape If governments are successful in building a more resilient
of the GCC region? We define resilience to be the organizational environment, their residents will feel more secure about
capability to sense, resist and respond to disruptive cyber events, the inviolability of their data. Innovation and investment
and to recover from them within an acceptable timeframe. in technology will thrive within an environment nurtured by smart,
By definition, a digital economy is borderless and ever-changing. strong governments.
Therefore, rather than build a seemingly impregnable fortress
This reports looks to establish the following themes:
around a country’s digital presence, the objective, instead,
is to create the capability to anticipate threats, to absorb • Governments play a crucial role in creating a strategy for cyber
the impacts of such threat and to respond in a rapid and flexible resilience and then implementing it.
way to ensure that a nation’s key systems and processes continue
• Governments require a clear visibility over the threat landscape,
operating. With the use of smart technologies, such as artificial
both in its current form and in the changing dynamics. This will
intelligence and machine learning, organizations’ systems will be
serve to protect what is most vital, and most vulnerable to cyber
able to recover from the attack and build stronger defenses against
threats.
future such events.
• Traditional cyber defense strategies are no longer effective;
Governments in the GCC have a crucial role to play in helping
the emerging threat vectors and speed of change, amplified
build a national cyber-resilient culture, in which individuals
by the digital revolution, cannot be addressed by traditional
and organizations are educated to respond to cyber threats. Only
methods.
governments can create the required effective foundation that
organizations, citizens and visitors can rely on, leverage and trust.

Defending government institutions against cyber attacks, however,


We stand on the brink of a technological revolution that
is not enough to ensure there is a safe digital environment. The
will fundamentally alter the way we live, work, and relate
economy and critical infrastructure can be severely damaged
to one another. In its scale, scope, and complexity,
if the private sector is compromised by cyber attacks. But the
the transformation will be unlike anything humankind has
government can help protect both the private and public sectors
experienced before.
by establishing a framework in which organizations collaborate to
enhance their resilience against cyber attack. When an organization World Economic Forum, 2016
is attacked, the target may perceive it as an isolated event, but the
government can place the occurrence in a national context and
respond on a national or international scale, if need be.

Cyber resilience in the digital age 5


The role of government
in cyber resilience strategy
Governments play an important part in shaping the digital future of their countries. There must be a vision of the digital needs of society
and of the ecosystem that will achieve it. If the digital economy is to flourish, governments have to create a fertile environment in which
innovation and entrepreneurship thrive. Rapid advances in digital technology enable governments to provide services more efficiently and
improve users’ experience. Governments need to build a sustainable ecosystem that will withstand shocks, both natural and man-made.

Digital ecosystem considerations


Strategy, innovation Build the
Drive Engage Identify
and growth operating
agility the landscape threats and
model
and without opportunities.
for a digital
Customer innovation. boundaries. Deepen
world. Collect
Enhance customer Connect the
experience intelligence
customer relationships dots across
across touch
experiences. and insights. silos.
Supply chain Manage points.
Establish Create Respond
and operations a digital in-house a more agile quickly to
supply and third party supply market
network. providers. chain. Balance changes. Integrate
Fully
Technology Streamline digital front-office
enable
the digital innovation apps with
digital
ecosystem. with IT maint- back-end
Keep systems.
Risk and Manage Understand enance. systems.
cybersecurity risk as pace with broader Establish a
business increasing risks of new cybersecurity
transforms. cyber technologies. program. Address
Finance, legal Automate attacks. Digitalize Maximize tax
and tax processes invoices legal and
savings from regulatory
and and digital
Create controls. documents. requir-
People and a diverse Redesign Transform initiatives. Integrate ements.
organization culture of the organiza- knowledge digital
innovation tion to fit the across the technologies
and digital age. organization. to empower
ideation. people.

6 Cyber resilience in the digital age


Leveraging the opportunities of digital technology requires governments to develop an education policy on the basis of estimates of the
digital skills that will be needed by the nation. There needs to be a plan for how to meet those needs, by educating students who will be
entering the workforce and retraining those already working who need to adapt to a new culture of cyber awareness.

As more data is collected, stored and exchanged electronically, not only are there new commercial opportunities for the private sector,
but also new responsibilities placed on governments, such as ensuring data privacy and cyber security. Digital transformation requires
governments to create the most appropriate legal and regulatory framework within which companies and individuals can lawfully operate.

Four distinct digital themes reflecting the holistic set of challenges and opportunities
created by digitization

Smart industries Building a digital Customer Smart


and governments economy and society engagement cities

• How can digitization • How can governments • How does digitization • How can digitization
help industries and build an inclusive digital help sectors better relate address the issues related
governments redefine economy and society? to customers and become to urbanization?
service delivery and make a “trusted brand”?
• How can digitization help • How can digitization
citizens happier while
the education sector • How can digitization help governments
reducing cost to serve?
build the right skills & help industries and maximize the potential
• How can digitization capabilities required in governments improve of transportation
improve industries and an ever-evolving digital citizens’ participation in infrastructure to
government efficiencies? environment? building an always better increase both passenger
economy and society? satisfaction and
efficiency?

The rapidly evolving digital landscape opens up a significant new role for a government’s Chief Technology Officer (CTO) or equivalent.
Digital advances are reshaping the function of the CTO to take on a more strategic role than before, as an agent of change and a leader
of digital transformation, mindful of the far-reaching effects this will have on the economy. The CTO of the government needs to be an
important advocate for a cyber resilient ecosystem and to play a significant role in shaping a policy aimed at creating such an ecosystem.

Cyber resilience in the digital age 7


Digitization alters
cyber threat landscape
Digital transformation is opening new investment opportunities Assets
every day. It is also creating an array of new cyber threats. Digital
innovations expand the target area for a cyber attack, as hackers When cyber attacks occur, threat actors can target a nation’s
and other threat actors find new ways to penetrate information assets. These assets can take various forms, including data (such
networks to steal and disrupt. Governments in the GCC region have as credit card information, personal health records, privileged
to be aware of the emerging areas of vulnerability and to devise user credentials and intellectual property), money and systems
a strong strategy to manage cyber risk and to help create that control a country’s critical national infrastructure (such as
sustainable conditions for continued digitization. telecommunications networks, the power grid and transport
systems). Governments should compile a national asset database
that will evolve in step with the digitization of the economy
Attributes of a cyber attack and be flexible enough to align with the cyber resilience strategy.
Identifying a country’s critical digital assets is an important step
A successful strategy must be based on a clear understanding in understanding the risks that have to be managed.
of the three elements in a cyber attack (see illustration below).
Governments will need to assess and monitor all three elements
continuously in order to build cyber resilience. Vulnerability
Most governments and organizations approach the protection
Attributes of a cyber incident of vulnerable IT systems by focusing on the various patching cycles,
alerts and automated mechanisms to secure sensitive networks.
Governments and organizations also rely on policies, procedures,
and standards, which is key to successfully supporting information
security and resilience programs.
Threat actor Assets
Threat actors, however, are relying more on social engineering
tactics to search for weaknesses. This means they are using tools,
such as phishing, ransomware and identity theft to gain access
to the crown jewels of a company or a government department.
They are also targeting employees to help commit cyber crimes.
Vulnerability A national campaign sponsored by the government to raise
awareness of cyber vulnerabilities would educate people about
the risks. The sharing of technical information about cybersecurity
among security practitioners would increase confidence.

8 Cyber resilience in the digital age


“What information in your organization do you consider
is the most valuable to cyber criminals?”

1. Business continuity/disaster recovery resilience 57% 33% 10%

2. Data leakage/data loss prevention 57% 34% 10%

3. Security awareness and training 55% 38% 7%

4. Security operations (e.g., antivirus, patching, encryption) 52% 39% 9%

5. Identity and access management 50% 40% 10%


6. Security incident and event management (SIEM) and SOC 48% 38% 14%

7. Incident response capabilities 48% 42% 11%

8. Security testing (e.g., attack and penetration) 46% 44% 10%

9. Privileged access management 43% 41% 15%


10. Threat and vulnerability management (e.g., security 42% 45% 13%
analytics, threat intelligence)
11. Cloud computing 39% 35% 27%
12. IT security and operational technology integration 33% 49% 18%
13. Mobile devices 29% 49% 22%
14. Privacy measures 29% 46% 25%
15. Third-party risk management 27% 48% 25%
16. Information security transformation (fundamental redesign) 26% 41% 33%

17. Security architecture redesign 25% 46% 29%

18. Insider risk/threats 24% 50% 26%


19. Fraud support 23% 41% 36%
20. Offshoring/outsourcing security activities, including 21% 42% 37%
third-party supplier risk
21. IP 16% 37% 47%

22. Forensics support 15% 39% 46%

23. Social media 14% 43% 44%

24. Securing connected devices on the IoT 13% 33% 54%

25. Robotic process automation 8% 23% 69%


26. Securing emerging technologies (e.g., advanced 8% 25% 67%
machine learning)
27. Securing cryptocurrencies (e.g., Bitcoin) 6% 18% 76%

Key: High Medium Low

Source: EY Global Information Security Survey (GISS) Report 2016

Cyber resilience in the digital age 9


Critical national infrastructure, such as the power grid, deserves
particularly close attention, due to the fact that Operational Emerging standards and approaches to cyber resilience
Technology (OT) and Information Technology (IT) are not Outside the GCC, the cyber industry has responded globally
linked physically or virtually. Since this infrastructure needs in a number of ways to address the issue of resilience. The
to be operating continuously, updates of OT systems are highly International Standards Organization has issued a Draft
problematic. Exhaustive testing of updates can take up to 18 on ISO 23316 covering the principles and guidelines for
months, leaving systems vulnerable to cyber attack. Governments organizational resilience. The U.S. National Institute of
need to work closely with specialized OT vendors to optimize Standards and Technology has published a report, 800-
the update process. 53, which addresses the resilience of critical national
The Internet of Things (IoT) deserves special mention, because infrastructure. Carnegie Mellon University has worked
most connected devices are mass-produced, with little regard with the Software Engineering Institute to develop the
for cybersecurity. A lot of devices are being installed in buildings Resilience Management Model, which was updated in 2016
that are connected to the internet, creating a wide-ranging (v1.2). Similarly, a number of national and regional entities
exposure to attack. To ensure that future devices are more have developed, and are promoting, various standards and
secure, some governments have recently published standards guidance documents on cyber resilience, including the U.S.
for the manufacture of IoT devices in the wake of denial-of-service Department of Homeland Security and the European Union
attacks channeled through such gadgets. Agency for Network and Information Security.

Threat actors
Nation
Governments and the private sector have tended to focus on assets states
and vulnerability, but it is also vital to make an assessment of threat
actors, both actual and potential. After all, an army would not go
into battle without an understanding of its opponent. Governments
need to understand the threat actor’s motives, intentions,
affiliations, tactics, techniques and procedures. These will change Hacktivists
over time and in response to alterations in cyber defenses.
Diversity of
Unlike private organizations, governments have the ability threat actors,
to monitor the ecosystem, if need be, by enacting enabling motivations
legislation. They have to be mindful of privacy concerns and the risk and tactics
that too intrusive an approach might erode trust and deter Organized
innovation and investment. They can also monitor the activities crime
of the threat actors themselves, looking for pre-cursors to an attack
and changes in a threat actors’ tactics, techniques or procedures.
The challenge, then, is to disseminate the information about threat
actors without alerting the hackers or disclosing their sources. Trusted
Organizations have to play their part as well. A vigilant government insiders
does not obviate the need for organizations to monitor their own
environment continuously.

10 Cyber resilience in the digital age


“Who or what do you consider the most likely source of a
cyber attack?”

Careless employee 1,256 (20%)

Criminal syndicates 947 (15%)

Malicious employee 892 (14%)

Hacktivists 785 (12%)

External contractor 616 (10%)


working on our site

Lone wolf hacker 617 (10%)

State sponsored attacker 509 (8%)

Supplier 290 (5%)

Other business partner 236 (4%)

Customer 201 (3%)


Source: EY GISS Report 2016

Governments have the means to take counter measures against threat actors, but if these are contemplated, stakeholders should
consider setting up communication channels and drafting a memorandum of understanding among governments and organizations
to share information before taking counter measures. Governments will also have to update the legal framework with which they would
prosecute threat actors. This will include extradition procedures, with the actual punishment in conformity with international legal
standards. Government policy will also have to take into account the actions of private organizations, such as companies, and whether
they may have failed to comply with relevant regulations. If the policy is too draconian, this may inhibit the commercial development
of digital technology.

Cyber resilience in the digital age 11


Traditional cyber
defenses alone
are inadequate
In the recent past, critically important information was stored In EY’s annual Global Information Security Survey for 2017,
in-house in stand-alone internal databases and networks, far from of 1,735 C-suite leaders and Information Security and IT executives,
prying eyes. Organizations protected the data within the perimeter we found that the majority of cybersecurity professionals have
behind a firewall. As systems became linked with external networks, not yet adopted more sophisticated breach-detection programs.
organizations adopted a “defense-in-depth” security mode so that if Similarly, advanced technologies, such as malware detection
the perimeter was breached, there were additional layers of security solutions, have still not been adopted widely.
to protect critical information from falling into the wrong hands.

Firewalls continued to be used, along with new methods, such as


data loss protection, to track and protect information as it moves
across networks. But these measures are no longer sufficient
protection against cyber attack. Organizations are beginning
to understand that traditional device- and technology-centric
security measures, such as firewalls, fail to provide security
in the cyber ecosystem. New, integrated breach-detection programs
need to be constituted.

12 Cyber resilience in the digital age


Traditional resilience Cyber resilience
Focuses on technical aspects for recovering Holistic approach to resist and react to
from disasters disruptive threats

Driven by consumer expectations and


Driven by external regulations
value generation

Supported by legacy systems Empowered by SMART technologies

Knowledge exchange limited Seamless knowledge exchange among


within a company companies and government entities

Organization — the boundary while Wider coverage with focus extending outside the
preparing recovery plan organization to the public and the community

Reactive approach Proactive approach

Disasters mostly triggered by technical failures Complex causes of disruption identified


and addressed

Processes are mostly manual Automated and integrated processes

Continuous improvement Continuous innovation and re-engineering

“In your opinion, what is the likelihood of your organization being able to detect a sophisticated cyber attack?”

We have not had a significant 270 (16%)


incident
Very likely (80%–100% likelihood) 273 (16%)

Likely (50%–80% likelihood) 563 (34%)

Unlikely (20%–50% likelihood) 388 (23%)

Highly unlikely (0%–20% likelihood) 173 (10%)

Source: EY GISS Report 2016

Traditional models of operational continuity are unable to adequately protect digitally transformed governments for a variety of reasons:

• They are not suited to recover information that originates from, and is linked across, multiple sources and reaches multiple users.
They may fail to identify the critical data assets or be able to locate them or track how they flow across the digital systems.

• They lack the ability to anticipate a cybersecurity breach.

• They are not able to adapt to complex regulations which vary by location.

• They are unable to cope with the integration of multiple stakeholders and complex supply chains.

Rapidly evolving cyber threats require a mechanism to sense emerging risks and resist them, and this can only be achieved through a cyber
resilience strategy.

Cyber resilience in the digital age 13


Cyber resilience
in the digital age
We define resilience as the organizational capability to sense, Assuming cyber initiatives are adequately funded, governments
resist and respond to disruptive events, adapting and reshaping can focus on developing a robust cyber resilience strategy. This
operations in environments where there are both foreseeable and means the development of the ability to sense and resist as
unforeseeable risks. These risks emerge at a time when the pace of part of pre-disruption mechanisms that enable organizations to
technological change is so rapid that it becomes more challenging detect emerging risks. To address cyber attacks and contribute
to predict many of the risks arising in the digital space. Cyber to cyber resilience, governments need to provide the framework
resilience encompasses both cybersecurity and organizational and to facilitate a secure cyber ecosystem to include both core
resilience, and aims to defend against potential cyber attacks and infrastructure and support for industries’ resilience. This may
ensure survival following an attack. include a national framework for cyber risk management, national
vulnerability programs, industry collaboration groups and threat
The key question is how organizations can achieve sustainable,
intelligence sharing mechanisms.
resilient operations in the cyber ecosystem. An effective cyber
resilience strategy will have significant cost implications for the
government and the private sector. Organizations may be reluctant
to comply with more regulations, but there is agreement among
many organizations that more government oversight is needed,
especially if a more secure cyber ecosystem lowers costs in the
long run. The government can help by ensuring there is a strongly
competitive environment for providers of cybersecurity and by
designing education policies to promote the supply of cyber
specialists.

14 Cyber resilience in the digital age


Evolution of resilience models

1 Data and information backup


As awareness of the potential business disruption follow a related disaster, National resilience
the development of backups took place to come back to best possible state when any and sector resilience
disruptive event takes place. Promotion of personal and
enterprise resilience
2 Disaster recovery (DR)
The goal of DR was to protect technical systems rather than providing any
together contributes
toward the national
organizational or business side protection. resilience.

3 Crisis Management (CM) Cyber resilience is a critical


Moving further into the late 1980s and into 1990s the area expanded to take into account component in the digital
external factors by taking its cues more from crisis management. The CM approach differs evolution of governments
from the initial-, internal- and preventative focused and deals with both prevention into the national and sector
and recovery. resilience model.

4 Business Continuity Management (BCM)


Values-based mindset was developed and moved toward BCM where the scope is
broadened to include the whole organization, including the employees.

5 Enterprise resilience
Taking a holistic view of the elements, governance, leadership and capabilities
necessary to support high impact, low probability risks with an optimal cost-benefit
outcome having four stages as:
• Sense and anticipate
• Prepare and plan
• Respond and recover
• Learn and adapt, thereby addressing shortcomings of traditional resilience model

Some organizations have improved their “sense” capabilities According to EY’s GISS survey for 2016, organizations appear
significantly in recent years. They are using cyber threat intelligence to have become more confident they can predict and detect a
to predict emerging threats, installing continuous monitoring sophisticated cyber attack: 50% of survey respondents thought
mechanisms (such as security operating centers), identifying and it was likely they would be able to do so, the highest level of
managing vulnerabilities, and installing active defenses. confidence we have seen since 2013. Despite this, it seems clear
that many organizations have not established basic structures and
procedures to sense and resist a cyber attack. Forty-four percent
Cyber
say they do not have a security operating center, while 64% say
Security they do not have a formal threat-intelligence program. In addition,
55% do not have the ability to identify their vulnerabilities.

There is further evidence of a lack of preparation for cyber


resilience. In the same survey, 62% of organizations say they would
not increase their cybersecurity spending after experiencing a
Cyber breach which did not appear to do any harm. The underlying issue
resilience is the failure of organizations to understand that cyber criminals
often make “test attacks” or lie dormant after a breach, or they use
a breach as a diversionary tactic. Organizations must assume that
harm has been done every time there is an attack, and if no impact
was detected, it would be unwise to assume there was no damage
and close the matter.
Business
Resilience

Cyber resilience in the digital age 15


“How likely is it that any of the following events would
Securing the cyber ecosystem
encourage your organization to increase your information In today’s environment, cyber events that occur in an organization’s
security budget in the coming 12 months?” ecosystem of suppliers, customers and government agencies, can
affect the organization itself. This is a major area of risk that is
often overlooked, as EY’s GISS survey shows. Sixty-eight percent of
A cyber attack on respondents say they would not increase their information
9% 31% 34% 21% 5%
a major security spending even if a supplier was attacked. Yet such a
competitor
breach may provide the attacker with a route to penetrate the
A cyber attack on organization itself. Similarly, 58% would not increase their spending
a supplier 5% 26% 39% 24% 6%
on cybersecurity if a major competitor was attacked. Yet cyber
criminals like to attack organizations that are similar to one another,
ADDos attack
13% 31% 31% 21% 4%
using techniques they have learned from previous events.
A physical loss of
confidential
corporate
information on a 10% 34% 31% 19% 6% The impact of IoT
mobile device
A physical loss of The emergence of the IoT and the rapid growth in the number of
customer connected devices are going to challenge the sensing capabilities of
information on a 14% 32% 29% 20% 6%
mobile device organizations. It will be difficult to identify and track suspicious data
Discovery of a traffic in the network and identify who has access to data.
breach that resulted
in the attackers
impacting the 37% 31% 17% 9% 5% Security capabilities will have to be built into cyber devices to
organization enable preventive and defensive courses of action to be coordinated
Highly likely: (80%–100% likelihood) Likely: (50%–80% likelihood) within and among a range of devices. In the future, devices will be
Unlikely: (20%–50% likelihood) Highly unlikely: (0%–20% likelihood) able to work together in near real time to anticipate and prevent
N/A cyber attacks, limit the spread of attacks across participating
devices, minimize the consequences of attacks and recover to a
Source: EY GISS Report 2016
trusted state.

In such a cyber ecosystem, system managers will rely on computer


applications that automatically detect and report known security
The role of leadership vulnerabilities in network nodes. In some cases, system managers
will configure their systems to automatically remediate detected
Executive leadership and support is critical for effective cyber
security deficiencies.
resilience. Unlike the “sense” and traditional “resist” activities which
can be seen as the domain of the Chief Information Security Officer
or the equivalent, in the “react” phase, cyber resilience requires
other senior executives to actively take part and lead. Since 2013,
EY’s annual GISS survey, have consistently shown that almost a
third of responders says there is a lack of executive awareness
and support for cybersecurity strategy. This statistic suggests
that organizations are not doing enough to ensure that senior
executives are taking the lead in building cyber resilience.

16 Cyber resilience in the digital age


Building a cyber-resilient
ecosystem
As cyber threats evolve, governments will find that traditional Key characteristics of cyber-resilient
information security approaches will prove increasingly inadequate
for the task of protecting organizations. Organizations need organizations
to establish a base-level of data security, but they also need Understand the entire organization: Cyber resilience demands
to recognize that they cannot achieve complete security by a response that addresses the organization from one end to
themselves. They need to work together with trusted partners to the other; half measures will not work. It begins with a deep
protect their ecosystem. A resilient cyber ecosystem is one in which understanding of the operational landscape, to know which
the organizations operating in it have confidence in the security of workflows must be preserved so the organization can continue to
their systems and data. operate in the event of a cyber attack, while safeguarding people
To create such an ecosystem, organizations must look outside and key assets.
their own perimeter to assess the impact of a cyber attack on their Understand the cyber ecosystem: Map and assess the organization’s
business partners, suppliers, vendors and other stakeholders. external relationships throughout the cyber ecosystem, identifying
Good cyber citizens are those that collaborate with third parties the risks and where they exist. Perform a risk assessment of the
to develop healthy, resilient cyber ecosystems, by interacting organization’s role in the cyber ecosystem, and identify factors that
and sharing data with them. This collaboration requires a strong affect the extent of the organization’s control over its ecosystem.
commitment to cyber resilience and to reinforcing good behavior
in the areas of resilience leadership, partnership and change- Determine which assets are critical: Most organizations over-protect
readiness. Most of all, it requires the unwavering commitment of some assets and under-protect others. EY’s survey found that more
individuals and leaders to achieve these goals. than half the respondents ranked customer personal identifiable
information as the information in their organization most valuable
Governments and major organizations are leading the way in to cyber criminals. Only 11% rated patented intellectual property as
establishing the policy and practice frameworks to develop the most valuable.
resilient cyber ecosystems. But these are early days. The idea of
collaborating with stakeholders is gaining momentum slowly, due to
the complexity of the undertaking. In the meantime, organizations
should ensure they develop their information security capabilities
so as to address their own risk environment.

Cyber resilience in the digital age 17


Energy Telecom infrastructure Automotive and
If disrupted, the government It is the communication backbone transportation
has the capability to blackout of the nation solely responsible Lack of resilience will lockdown
the entire nation with huge for emergency planning citizens, businesses and
repercussions. arrangements, and if disrupted, employees travel and movement
may bring the digitized nation of goods, which would be
to a standstill. disastrous for the economy.

Banking Military and defense


Financial stability will be Loss of defense-related data
impacted if banks are not could compromise national
resilient enough, creating security and sabotage
civic distress as well as the security of the nation.
economic chaos. Government

Health care Stock exchange Others


Loss of stolen digitized health Lack of resilience in stock Loss of stolen IP affect future
records and breach in exchanges may result in severe earnings and competitive ability.
connected health care service damage to the overall economy
delivery will have a complex, of the nation.
long-term lethal impact.

Digital workplace Digital supply chain


Digitized and SMART education ecosystem
Smart surveillance systems Transaction and payment processing

Smart transportation Digital government platforms Smart city

Smart manufacturing Digital health care infrastructure


And many others …
Digital oilfields Smart grid

Digitized

Servers Databases Network equipment Smart sensors Storage Applications

Robotics Autonomous vehicles Wearables

Wireless and Blockchain and Intelligent


wireline technologies distributed ledgers Middleware platforms location tracking 3D printing

18 Cyber resilience in the digital age


Determine the risk factors organizations can test the existing crisis management, current
practices and the risk profile to ensure they are fully aligned with
Cybersecurity activities can only achieve limited success if they the organization’s strategy and risk appetite.
do not have a complete view of the risk and threat landscape. This
requires collaboration with other organizations in the ecosystem.
Roadmap to build a cyber-resilient
Manage the human element ecosystem
In the event of a cyber attack, individuals need to be prepared While governments prepare for a digital future, they must keep
and educated on how to respond and recover. This requires clear pace with rapidly changing technology. This will help them to
communications inside and outside the organization, while leaders adopt and secure architecture that is resilient to system failure,
set a strong example of how to respond in a crisis. enabling interoperability and openness from beginning to end. Early
adopters of advanced design and solutions should be encouraged to
share lessons learned and adopt common standards. A harmonized
Create a culture of change readiness approach needs to be adopted for better content and data to be
presented through various channels. This would also help to ensure
A rapid response to a cyber attack will minimize the possibility privacy and security in a vulnerable digital age. A defined service
of long-term material impacts. Organizations that react quickly model has to be deployed across departments, ministries and
have a well-rehearsed crisis-management plan and the ability to associated members.
marshal resources from every department. In simulation exercises,

Key resilience attributes of digital government

Resilient leadership Resilient culture

• The visionary, executive-led commitment to establishing • Supports a “one-in, all-in” approach embraced across
resilient government. the government and encourages resilient behaviors of
collaboration, vigilance, proactivity, and the preparedness to
• Non-routine governance styles are consultative but enable
learn from failure and disruption
rapid, decisive and compassionate decision-making during
disruptive circumstances.

Resilient networks Resilient change-readiness

• Establishes and strengthens trust-based relationships with • The readiness of departments enabled with training, tools
third parties (including business partners, citizens and and techniques to rapidly detect, respond to and adapt
other stakeholders) to maximize the ability to withstand and security responses in an ever-changing security context
recover rapidly from disruptive threats

Governments need to track and assess resilience attributes at the The construction of a cyber-resilient ecosystem comprises the
highest levels. These attributes will show how flexible organizations following five elements:
are in their ability to predict security threats. Governments and
1. Take a holistic approach
businesses need to manage high-impact, low-probability risks with
Government decision makers at all levels must strive to educate
an optimal outcome in the digital environment. This can only be
themselves on the topic of cyber threats. Decision makers can no
achieved by taking a holistic view of the elements, governance,
longer assume that the procurement of a particular cybersecurity
leadership and capabilities required to manage these types of risks.
technology or program will solve the challenge. The rising threat
Resilience ensures there is a sustainable capability to adapt to
of cyber attacks couple with the complexity and viciousness of
changes within the business and external environment.
such threats require a more holistic approach to protection. A
cyber resilience strategy must focus on the behavior of all internal
stakeholders, and not just security teams.

Cyber resilience in the digital age 19


Government agencies are beginning to develop national frameworks 3. Leverage change-readiness
that aim to provide a legal and policy foundation on which to Governments need techniques and tools that help them respond
implement a resilient cyber ecosystem. At the organizational level, with speed and agility to emerging threats and cyber attacks.
a key step forward is to commit government agencies to resilient These include the following:
operations within the cyber ecosystem and to transparency.
• Decentralized data protection built into, and as close as possible
Governance, risk and compliance tools will help to show where
to, the information itself — for example, is information rights
there are security vulnerabilities.
management solutions, where security controls are built into
2. Leverage resilient networks data files
By consolidating, correlating and cross-referencing information
• Adaptive and decentralized intrusion detection and response
across systems, governments can establish a baseline of normal
tools incorporated in devices and networks
behavior in systems and networks. They can integrate this
information with intrusion detection and response technology • Whole-of-system resilience built into devices and networks,
to identify abnormal or malicious activity. They can leverage enabling them to revert to a “trusted state” when they are the
automation for real-time detection of attacks, enabling them target of an advanced attack
to respond proactively to security threats. Tightly integrated
• Automated communications between devices and networks,
cloud-based cyber intelligence services can detect advanced
enabling a programed and collective response to abnormal or
persistent threats, while employing trained personnel to act as
malicious behavior
human sensors.
• System-wide cyber attack sensors providing automated alerts
that security operations centers can share with government
computer emergency response teams, intelligence organizations
and law enforcement

20 Cyber resilience in the digital age


The value of
cyber resilience
The chief benefit of a cyber-resilient ecosystem is that, when attacked and compromised, it can recover to an operational state, because
there is visibility across the network and the system can respond quickly. In the event of a cyber attack, a government’s cyber resilient
system can continue to conduct mission-critical processing, while safeguarding the confidentiality, integrity and availability of data. Even if
the system were compromised, data processing would continue.

1 Embeds sense of capabilities


to cope up in a crisis

Helps to develop holistic solutions for nationwide

2
efforts to build, test and improve capabilities to cope
Provides opportunity to enhance
up with known disruptions
and optimize

Helps to follow on engaging approach for nationwide

3
efforts to continuously test, enhance and optimize
Helps identify areas of inefficiency the resilience mechanism
or risk in place

Develops a “one-in, all-in” adaptive, change-ready

4
culture across government entities that enables them
to identify inefficiencies in their resilience program Provides seamless
continuity capabilities

Leverages people, process and technology


opportunities to reshape the cyber environment for

5
sustainable future growth after the occurrence of a
Wider resilience coverage disruptive

Unifies multiple disciplines, including risk assessment,


technology best practices, knowledge management,
risk management and the coordination of the roles of
all departments

Cyber resilience in the digital age 21


Governments must
partner with the private
sector to build resilience
Through strategic policy initiatives and action, governments Comprehensive enterprise cybersecurity metrics,
should be able to create the foundation for a national analytics capabilities, enterprise encryption, cloud security
digital transformation in a safe and resilient manner. The and privilege-access compliance are necessary. Government
recommendations below are intended to provide guidance on organizations should take the lead in evangelizing and adopting
the overall policy direction. The actions to be taken by each these measures to enhance cyber resilience.
government will depend on the specific circumstances. Government should also place a greater emphasis on ensuring
A key aspect is the foundation of a digital-capable workforce that organizations develop suitable risk strategies, including definition
not only improves the nation’s employment prospects, but also of risk appetite and tolerances, particularly in response to cyber
creates a resilient culture in the digital field. threats. Operational processes need to be secured as much as
Cyber resilience must take account of key legal and privacy issues possible via internal and external control processes, platforms and
at the national and international level. Each government must aim services in order to ensure the protection of client and company
to strike a balance between too much and too little regulation, by assets and the continuity of high-value services.
considering both national and global impacts. Due consideration Governments face an almost insurmountable challenge to provide a
should be given to international frameworks to enable the secure and resilient ecosystem for their nation. But the difficulties
country to participate in global organizations that are involved in must not deter them. Action needs to be taken as soon as possible,
cybersecurity. as the risk of cyber attacks grows, alongside the rapid expansion of
Governments should establish a framework that supports each nation’s digital footprint.
identification of key assets and asset protection measures The foundation for cyber resilience requires governments to
(similar to how critical national infrastructure assets are identified). reach beyond their traditional boundaries and establish a strong
This will help the identification and proper allocation of resources in partnership with the private sector, even as they promote a resilient
a prioritized fashion where they are most needed. digital culture among the people within their borders. For each
The government will have to decide what level of cyber monitoring nation, the building of cyber resilience is a complex and multi-
it will provide and to what entities, and then set standards for disciplinary process with requirements that vary, depending on
the monitoring of those assets not covered. Cyber monitoring social, legal and economic conditions in each country.
will provide an ecosystem that makes cyber attacks visible, thus This paper has outlined some of the issues governments will face
accelerating the response and recovery as well as modifying and recommendations for how to build a cyber-resilient nation.
resilience plans where needed. The aim is to offer a range of tools that can be adapted to the rapid
A framework should be established in the GCC region for changes in the digital world. It will hopefully arm governments with
organizations to collaborate over threat intelligence and there a strong framework in which to deal with the unforeseen challenges
should be platforms to enable information about threat actors to be that lay ahead.
shared quickly. This will allow for a more proactive response than
merely cyber monitoring and will raise awareness of the need to
activate any resilience plans.
22 Cyber resilience in the digital age
References
“Mathias Humbert, Technology and Workforce: Comparison
1
• “Is Digital creating a workforce capability crisis?” Emerging new
between the Information Revolution and the Industrial Revolution challenges in the workforce, EYGM Limited, 2015
(University of California, Berkeley, December 2007)
• The Power of Three for Smarter, ore Resilient cities,
EY Thought Leadership papers referenced: EYGM Limited, 2016

• Path to Cyber resilience: Sense, resist, react — EY’s 19th Global • Achieving Resilience in the Cyber Ecosystem,
Information Security Survey 2016–17, EYGM Limited, 2016. EYGM Limited, 2014

• Agents of change: How government CTOs can drive digital • “Supply Chain Resilience”
transformation — Government & Public Sector Insights,
• “EY Protects® Operations Resilience”
EYGM Limited, 2015
• Citizen Today — Strengthening public services through technology,
• Avoiding a lost generation: Young entrepreneurs identify
EYGN Limited, 2013
five imperatives for action - Produced for the G20 Young
Entrepreneurs Alliance Summit, EYGM Limited, 2013 • “Robotics process automations in the Finance function of
the future”
• “How will the GCC close the skills gap?” An examination of the
challenges and opportunities for governments to address the • “In a future where data is everywhere, who’ll keep it out of the
growing skills gap, EYGM Limited, 2015 wrong hands?”
• “Citizen today: delivering a digital future” How policymakers
worldwide are using technology to strengthen their public
services, EYGM Limited, 2013

• “Imagining the Digital future” How digital themes are


transforming companies across industries, EYGM Limited, 2015

Cyber resilience in the digital age 23


Contacts
Clinton M Firth
EY MENA Cybersecurity Leader
clinton.firth@ae.ey.com

Raddad Ayoub
EY EMEIA Resilience Leader
raddad.ayoub@ae.ey.com

Mohamed Nayaz
EY MENA IT Risk and Business Resilience Leader
mohamed.nayaz@om.ey.com

EY | Assurance | Tax | Transactions | Advisory


About EY
EY is a global leader in assurance, tax, transaction and advisory services. The insights and quality services we deliver help build
trust and confidence in the capital markets and in economies the world over. We develop outstanding leaders who team to
deliver on our promises to all of our stakeholders. In so doing, we play a critical role in building a better working world for our
people, for our clients and for our communities.
EY refers to the global organization, and may refer to one or more, of the member firms of Ernst & Young Global Limited, each
of which is a separate legal entity. Ernst & Young Global Limited, a UK company limited by guarantee, does not provide services
to clients. For more information about our organization, please visit ey.com.
The MENA practice of EY has been operating in the region since 1923. For over 90 years, we have grown to over 6,000 people
united across 20 offices and 15 countries, sharing the same values and an unwavering commitment to quality. As an
organization, we continue to develop outstanding leaders who deliver exceptional services to our clients and who contribute
to our communities. We are proud of our accomplishments over the years, reaffirming our position as the largest and most
established professional services organization in the region.

© 2017 EYGM Limited.


All Rights Reserved.

EYG no: 03211-172GBL


ED 0717
This material has been prepared for general informational purposes only and is not intended to be relied upon as accounting, tax or other professional advice.
Please refer to your advisors for specific advice.

ey.com/mena

Anda mungkin juga menyukai