ki “t”felikeeping on “top” of evolving threats · data center era 1970s •viruses •theft...

17

Upload: others

Post on 19-Aug-2020

3 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Ki “T”fEliKeeping on “Top” of Evolving Threats · Data Center Era 1970s •Viruses •Theft of portables •Hard disk thefts •Computer sabotage ... Center Natural Disasters
Page 2: Ki “T”fEliKeeping on “Top” of Evolving Threats · Data Center Era 1970s •Viruses •Theft of portables •Hard disk thefts •Computer sabotage ... Center Natural Disasters

K i “T ” f E l iKeeping on “Top” of Evolving Threats

Gary S. LynchGlobal Leader

International Trade & Supply Chain RiskInternational Trade & Supply Chain RiskMarsh

[email protected]

Page 3: Ki “T”fEliKeeping on “Top” of Evolving Threats · Data Center Era 1970s •Viruses •Theft of portables •Hard disk thefts •Computer sabotage ... Center Natural Disasters

A Confession!A Confession!

$12 illi f d• $12 million fraud• Organized crime and foreign nations• Escalating costs and “un-sellable” value

propositionproposition• Massive security design and interoperability flaws

in new technology platforms• Privacy ignored• Client server security unachievable• 2 year CISO life cycle• Cosmetic industry dwarfs security industry

“Lynch your problem is that you care too much”• “Lynch, your problem is that you care too much”

Page 4: Ki “T”fEliKeeping on “Top” of Evolving Threats · Data Center Era 1970s •Viruses •Theft of portables •Hard disk thefts •Computer sabotage ... Center Natural Disasters

• eDiscovery• Cloud security• Encryption hacks• Environmental and

energy regulation compliance

• DLL vulnerabilities• PCI compliance• Government access to

communications and confidentiality

E B i C ll b ti Issues mount….

requirements• More sophisticated

organized crime attacks, thefts and fraud

• Messaging attacks

E-Business Collaboration & Global Connectivity

(2000-)

• Cyber-terrorism• Cyber-extortion

• Malware• Botnets• Rootkits• Phishing Scams• Advanced social

network attacks

Client Server Computing & Web Era (90s)

Cybe e to t o• Personal Privacy

attacks including identify theft, profiling, e-mail monitoring

• Denial of service network attacks• Resurgence of

workplace violence• Unparalleled cost

constraints • Product

contamination

PC/LAN Era(1980s)

•Cyber-Vandalism•Theft of portables•Computer sabotage•EFT Fraud•Govt sponsored

attacks, spamming, network flooding

• Global probing (foreign nations seeking competitive advantage &

) contamination• Supplier failure• Technology

obsolensce• Nanoparticle toxicity• Conflict metals• Critical infrastructure

• Dial-up hacking• Theft of

equipment

Data Center Era 1970s

•Viruses•Theft of portables•Hard disk thefts•Computer sabotage

•Govt sponsored spying•Knowledge theft•Cyber-espionage•Credit card theft•Cyber-negligence•Cyber-

knowledge)• E-Intellectual Property

& information leakage• Intellectual property

theft, cyber-spying• Systemic technology

• Critical infrastructure breakdown

q p• Misuse of

computing resources

sabotage•EFT Fraud

Viruses 1986 = 4

defamation

Viruses 1990=2501999=45k

Viruses 2007 = Total unknown. Between 11-70 attacks every 5 minutes

failure/ interdependency risk

Source: “At Your Own Risk”, Gary Lynch,Wiley, 2008

Page 5: Ki “T”fEliKeeping on “Top” of Evolving Threats · Data Center Era 1970s •Viruses •Theft of portables •Hard disk thefts •Computer sabotage ... Center Natural Disasters

Back on Top?Back on Top?

90

100

60

70

80

90

30

40

50

60

0

10

20

30

0

1960

1965

1970

1975

1980

1985

1990

1995

2000

2001

2005

2010

2015

Page 6: Ki “T”fEliKeeping on “Top” of Evolving Threats · Data Center Era 1970s •Viruses •Theft of portables •Hard disk thefts •Computer sabotage ... Center Natural Disasters

How Do We Keep It On Top?Supplier Failures

(financial, production, design, etc.) Spoilage

Price, Currency, and Interest

R tImproper Handling

Delivery Delays

Poor PackagingRaw Materials

Filling & Packaging

Unanticipated

Rate FluctuationsUnanticipated

Supply Constraints,

Allocation, or Price Increases

Counterfeiting

p p gor Cargo Placement

Diversion/

Manufacturing

C

Wholesaler

DistributionCenter

Natural Disasters

f O

Unanticipated Demand Surge

or Drop-offPolitical Upheaval

Gray Market

ConsumerWork StoppagesLabor Disputes

Infrastructure Outages (fire in plant, power grid

down, etc.)Theft

PandemicPandemicSource: Marsh

Page 7: Ki “T”fEliKeeping on “Top” of Evolving Threats · Data Center Era 1970s •Viruses •Theft of portables •Hard disk thefts •Computer sabotage ... Center Natural Disasters

Key ConceptsKey Concepts

• Relevance

Effi i• Efficiency

• Value

Page 8: Ki “T”fEliKeeping on “Top” of Evolving Threats · Data Center Era 1970s •Viruses •Theft of portables •Hard disk thefts •Computer sabotage ... Center Natural Disasters

Staying on top…

RelevanceRelevance• Next wave of leaning (and risks)

Information flows• AIAG – MOSS work group study

3PLs OceanCarrier Fax

Suppliers

Carrier

ImportBuyerCustoms

Fax

E-mail Mail

CustomBroker

FreightForwarder

Courier

Page 9: Ki “T”fEliKeeping on “Top” of Evolving Threats · Data Center Era 1970s •Viruses •Theft of portables •Hard disk thefts •Computer sabotage ... Center Natural Disasters

Staying on top…

Fi diFindings• 15% of inbound ocean shipments experience p p

delays en-route due to inaccurate or incomplete dataM j it f id f i ili d• Majority of providers are faxing, emailing and even carrying paper documents for shipments

• 79% of all data used in re-keyed79% of all data used in re keyed• Potential savings of > $1 billion

Page 10: Ki “T”fEliKeeping on “Top” of Evolving Threats · Data Center Era 1970s •Viruses •Theft of portables •Hard disk thefts •Computer sabotage ... Center Natural Disasters

Staying on top…

R lRelevance

• Change = uncertainty• Leaning opportunity = exposure to uncertainty • Exposure to uncertainty = relevance• Integrated business, financial & operational

i iti ti ( d t it )initiative (and opportunity)• Observe business trends, position and build

the case!the case!

Page 11: Ki “T”fEliKeeping on “Top” of Evolving Threats · Data Center Era 1970s •Viruses •Theft of portables •Hard disk thefts •Computer sabotage ... Center Natural Disasters

Staying on top…

EfficiencyEfficiency

Enterprise Risk Management7 9

9Inherent Risk

9Mgmt. Effectiveness

Enterprise Risk Management

6.6

8.27.9

6.96 5

7.2

6 3

7

6

6.4

6

7

8

6

7

8

4.5 4.5 4.5

5.2

4.6

5.3 5.4

66.5 6.3

5.2

4

5

6

4

5

6

3.6

2

3

2

3

1 1

Mngt. Effect. 4.5 4.5 3.6 4.5 5.2 4.6 5.3 5.4 6 6.6

Inherent Risk 8.2 7.9 6.9 6.5 7.2 6.3 7 6 5.2 6.4

Product SupplyChain Technology Environ. InformationFinancial Physical

Security Market Labor Health

Source: Marsh

Page 12: Ki “T”fEliKeeping on “Top” of Evolving Threats · Data Center Era 1970s •Viruses •Theft of portables •Hard disk thefts •Computer sabotage ... Center Natural Disasters

Security, Government CrisisCFOEH&S,

FacilitiesRM

BCM,EM, RM,Facilities

Affairs & Legal

Management,Legal,

Marketing

CFO,Legal

Competing and C SuiteSecurity, Competing and Inefficient Risk Initiatives

C SuiteSales &

MarketingHuman

Resources, Operations

Operations,Procurement

EH&S,SecuritERM,

LegalIT SecuritySecurity,IT Security

Human Resources

Procurement,Logistics

LegalProduct

Risk

IT Security,Legal

Page 13: Ki “T”fEliKeeping on “Top” of Evolving Threats · Data Center Era 1970s •Viruses •Theft of portables •Hard disk thefts •Computer sabotage ... Center Natural Disasters

Staying on top…

Effi iEfficiency

• It’s about the macro risk priorities and the paradigm

• Lead by integrating and leveraging common processes rather than…integrating organizations

• A common set of metrics and ERM approach h l i iti i k ti itihelp prioritize risk activities

Page 14: Ki “T”fEliKeeping on “Top” of Evolving Threats · Data Center Era 1970s •Viruses •Theft of portables •Hard disk thefts •Computer sabotage ... Center Natural Disasters

Staying on top…

V lValue

• “You don't get paid for the hour. You get paid for the value you bring to the hour.” Jim Rohn

• “Value” according to the stakeholders• Top down or bottom up?p p

Page 15: Ki “T”fEliKeeping on “Top” of Evolving Threats · Data Center Era 1970s •Viruses •Theft of portables •Hard disk thefts •Computer sabotage ... Center Natural Disasters

Staying on top…

Value

Market

Client, Competitors, Regulators, Ecosystem

Value

Families, SKUs, Services, Products, Brand

ValueProduct or Service, Cash, Information

ProcessesSourcing, Distribution, Origination, Productions, Logistics…

Flows

Functions

HR, Security, Procurement, Sales, Compliance….

Processes

ResourcesLabor, Technology & Processing, Assets, Relationships

Source: “Single Point of Failure”, Gary Lynch, Wiley 2009

Page 16: Ki “T”fEliKeeping on “Top” of Evolving Threats · Data Center Era 1970s •Viruses •Theft of portables •Hard disk thefts •Computer sabotage ... Center Natural Disasters

SummarySummary

• Exciting time & many opportunities• More complex and competitive risk environment• Higher stakes role more critical than ever• Higher stakes, role more critical than ever• Market, business & behavioral risk consciousness

needed• Priorities: Relevance, Efficiency and Value

Page 17: Ki “T”fEliKeeping on “Top” of Evolving Threats · Data Center Era 1970s •Viruses •Theft of portables •Hard disk thefts •Computer sabotage ... Center Natural Disasters

Thank You!

[email protected] y y @