• No results found

Audit approach to

N/A
N/A
Protected

Academic year: 2022

Share "Audit approach to "

Copied!
14
0
0

Bezig met laden.... (Bekijk nu de volledige tekst)

Hele tekst

(1)

Audit approach to

Cybercrime Resilience

Linda Post

ING Global Audit Division Head IT Audit

(2)

Introduction

# Digital interactions 1Q 2018

828 mln

+ 21,5% YoY

# Customers

37,8 mln

(3)
(4)
(5)
(6)

People are the biggest risks

Customers

• Share the PIN code

• Share their bank card

• Use old computers and software

• Open malicious e-mails

• Unsecure Wifi

• …

(7)

People are the biggest risks

Employees

• Sharing of passwords

• Passwords easy to guess

• Private email address

• Opening malicious e-mails

• Share sensitive information

• ….

(8)

Preventive Detective Response People

What can you do …. ?

Awareness training Pre-employment

screening

Capability to detect incidents

Response procedures Crisis Management

organisation

Processes

Vendor Management Policy &

Standards

Client behavior monitoring

Penetration testing

Partnership with law enforcement

Disaster Recovery

Technology

Patch Management Multi-factor

authentication

Security Event Monitoring

Intrusion

Detection IT Forensics

(9)

1. Mandate and responsibility 2. Staff awareness and

training

3. Critical business processes and IT infrastructure 4. Scenario analysis including

red / blue team exercises 5. Intelligence gathering,

analysis and communication

6. Forensic and prosecution processes

Examples of Cyber Security controls

Roles &

Responsibilities

1. Customer awareness 2. Contracts & general

conditions

3. Cybercrime Customer response procedure

Digital Banking Fraud

1. Responsibilities DOS attacks

2. Ransom ware

3. DOS emergency response procedure

Denial of Service (DOS)

1. APT Risk Assessment 2. Domain segmentation &

Network monitoring 3. Harding IT assets

4. Management of credentials 5. Credential stores

6. Certificate management 7. APT emergency response

procedure

Advanced Persistent Treat

1. Responsibilities related to DLP attacks

2. Workstation Security 3. Webmail

4. Public Cloud Storage 5. Mobile Devices

6. DLP emergency response procedure

Data Leakage

Prevention

(10)

IT Vulnerability Audit Approach

1. Penetration

from the web 2. Physical penetration

of premises

3. Non credentialed access to the network

4. Penetration via network as a valid user

5. Penetration via network as a privileged user

6. Access to data and business functionality Fraudulent

Activity ?

(11)

IT Audit Approach in 3 pillars

Core IT Audits Technical IT Audits

• IT Governance

• IT Outsourcing

• Applications

• IT Management & Development

• Information Risk Management

• IT Network

• IT Infrastructure

• Cloud Computing

• Data Centre

• Internet & Mobile Banking

• Cyber Security

• Block Chain

• Robotics

• ….

Emerging IT Audits

(12)

From a country approach to a specialist approach

Belgium

Germany

Turkey Poland

Netherlands

Digital Banking

Cyber Security Blockchain

Data Analytics

Robotics

(13)
(14)

Referenties

GERELATEERDE DOCUMENTEN

This adjusted concept of money exists quite comfortably with notions of the value of money in relation to time, of present value being higher than future value, and of

The scarcity of scholarly research on the service quality of (digital) financial advice, calls for the development of a model to explain the customer experience of digital

Citation: Sleegers WWA and Proulx T (2015) The comfort of approach: self-soothing effects of behavioral approach in response to meaning violations. Copyright © 2015 Sleegers

handelingsperspectief voor een waterbeheerder is, als hij wil voorkomen dat zonnebaarzen een probleem gaan vormen in zijn stroomgebied. Immers als blijkt dat zonnebaars zich goed in

Key initiatives and practices have also been developed by other multilateral organisations, most notably the Organisation for Economic Co- operation and Development (OECD),

The hypothesis is that an in-depth understanding of the difference be- tween research (as new knowledge generation), monitoring and evaluation (as quality assurance) will improve

Een tweede mogelijkheid om cybercriminaliteit mee te nemen is door de wetsarti- kelen uit de onderscheiden delicttypen te halen en vervolgens vormen van cyber- criminaliteit te

A panel dataset consisting of 7.742 households was used to test the effect of the exposure to three types of push advertising activities (i.e. television commercials,