Cyber Security (2015) - Updated
The motives behind cyber attacks can be many and the types of threats will vary in nature and scale as a function of an organisation’s vulnerabilities and “crown jewels”, such as confidential information, customer personal data, critical systems, and proprietary algorithms.
This memo provides:
- A brief overview of existing high-level cyber risk management tools that can be used to develop a tailored approach to cyber security,
- A framework to identify the firm’s “crown jewels”,
- A list of practical “quick-win” cyber security action items, and
- An overview of actionable cyber security projects such as the development of “Incident Response Plan”