Is our Expertise Adding Value? Business Continuity & Security – A Good Fit? Oscar O’ConnorBSc FBCS CEng CITP MBCS FRSA
Overview But first, a little bit of fun…
But before I begin… TO REDUCE FILE SIZE I HAVE REMOVED THE VIDEO FROM THIS VERSION OF THE PRESENTATION BUT IT IS AVAILABLE FROM THE SAME PAGE OF MY WEBSITE.
Al Arabiya News19 May 2013 The Interior Ministry’s website crashed on Wednesday after receiving a huge amount of service requests, an unnamed official source at the National Centre of the Electronic Security at the Ministry of Interior told SPA. The cyber-attacks targeted four ministries: the Ministry of Interior, Ministry of Foreign Affairs, Ministry of Finance, and the Ministry of Labor, Mansour al-Turki, spokesman of the Ministry of Interior in Saudi Arabia told al-Watan newspaper.
Bloomberg22 July 20133 The United Arab Emirates, the second-largest economy in the Middle East, fought off a series of cyber-attacks later traced to Egypt. The July 19 attacks targeted governmental websites, the Telecommunications Regulatory Authority said today in a statement on it website. The country’s computer emergency response team managed to neutralize the danger and fix the problem with “minimal damage caused,” it said. The targeted sites were not identified in the statement. The U.A.E. and other Gulf countries, including Saudi Arabia, are increasing efforts to defend against cyber attacks after a series of network infiltrations. Saudi Arabia in December blamed unidentified people based outside the kingdom for a cyber-attack against state-owned Saudi Arabian Oil Co. aimed at disrupting production from the world’s largest exporter of crude oil.
Strategic Planning • Language • “Theirs” not “ours” • People • Success must be FELT • WITH not TO • Impact • Focus on outcome not output • Practice • Every security incident is a continuity event
Al Arabiya News, 19 May 2013 The Interior Ministry’s website crashed on Wednesday after receiving a huge amount of service requests, an unnamed official source at the National Centre of the Electronic Security at the Ministry of Interior told SPA. The cyber-attacks targeted four ministries: the Ministry of Interior, Ministry of Foreign Affairs, Ministry of Finance, and the Ministry of Labor, Mansour al-Turki, spokesman of the Ministry of Interior in Saudi Arabia told al-Watan newspaper.
Measuring Performance • Business Metrics • Customer Satisfaction • Reputation • Bottom Line Profit • Staff Satisfaction • Efficiency • Return on Investment • Appropriate to the organisation • Is “best practice” good enough? • Or is it not quite right for everyone?
Reuters3 Sept 2013 Cyber attacks are mostly focused on Saudi Arabia, the world's largest oil exporter, Qatar, the top liquefied natural gas supplier, and Dubai, which is the region's financial, commercial and aviation hub, said Gert-Jan Schenk, McAfee president for EMEA. "It's where the wealth and critical infrastructure is concentrated," he said. The "Shamoon" virus last year targeted Saudi Aramco, the world's largest oil company, damaging about 30,000 computers in what may have been the most destructive attack against the private sector.
Programme Design • Make a positive difference to the organisation • Address security and continuity as core requirements • Use business metrics to measure impact
The National (UAE)3 March 2014 Businesses in the Middle East are facing a growing risk of cyber-attacks, says an annual security report released on Monday. Total global threats have reached their highest recorded level, increasing 14 per cent from 2012 to last year, according to the Cisco 2014 Annual Security Report. A sample of 30 of the world’s largest Fortune 500 companies generated visitor traffic to websites that host malware, with a sharp rise in malware attacks on the Middle East’s oil and gas sector. “Organisations across the Middle East and Africa must realise that it is no longer if they will be targeted by cyber-attacks, but when,” said RabihDabboussi, managing director at Cisco UAE. “Chief information security officers face growing pressure to protect terabytes of data on an increasingly porous network… all in the wake of shrinking budgets and leaner IT teams.”
Conclusions • Business Value • Outputs have no intrinsic value • Outcomes DO • Respect • WITH not TO • Who makes the changes? • Navigate • Don’t dictate
Thank You firstname.lastname@example.org http://www.linkedin.com/in/oscaroconnor @oscarpjoconnor http://www.oscaroconnor.eu