What’s New?

Can a business invest in stocks?GLEIF’s verifiable LEI issuer qualification programDo I need an LEI when selling shares?Business transparency: How to create an environment of trust?Anti Money Laundering (AML) in banking: Everything you need to knowKYC in banking: Why it’s important and how to comply?Corporate structures demystified: What you need to know?What is a parent company and how does it work?How long does it take to get an LEI?ISO 5009 – Identifying organizational rolesISO 17442 – Standard for LEI code structureESRB discusses the future of LEILegal Entity Identifier (LEI) vs Business Registration Number (BRN) in Hong KongWhat documents are required for LEI Registration in Hong Kong? Who is an LOU in the LEI dimension?GMEI Utility vs LEI RegisterLapsed LEI – Why should you keep your LEI active?Are LEIs public?Can an individual have an LEI?Who needs an LEI number?Why is an LEI code required?Do LEI numbers need to be renewed?How much does an LEI code cost?LEI Lookup – Fully dedicated LEI search websiteISIN to LEI mappingGLEIS | Global LEI SystemMiFID regulation | MiFID II LEIvLEIGLEIF | Global Legal Entity Identifier FoundationCompany autocomplete by LEI RegisterOpen LEIEuropean Market Infrastructure Regulation | EMIRWhat is an LEI database?Legal Entity Identifiers in cryptocurrencyLegal Entity Identifiers in KYCDigital identity predictions for 2020The future of cybersecurity – DeloitteLegal Entity Identifiers in digital certificatesBroad adoption of LEIs could save the global banking sector US $2-4 billionLegal Entity Identifiers for government entitiesThe European Market Infrastructure Regulation (EMIR) and Legal Entity Identifiers (LEIs)The FCA will take pragmatic approach to supervising reporting on Brexit DayAdoption of LEI in payment messages by the Payments Market Practice Group (PMPG)RegTech London – Event SummaryCybersecurity in a NutshellHow to get an LEI in Hong Kong?What is LEI-search?LEI Register and RapidLEI Announce Official Partnership

The future of cybersecurity – Deloitte

Deloitte publishes its “Future of Cyber Survey” after surveying over 500 C-suite executives with responsibility for cybersecurity in organizations that make at least $500 million in annual revenue. We will review and summarise some of the findings of the survey in this blog.

As organizations focus on digital transformation initiatives, they realize that cyber has entered every phase of a business, from product design to manufacturing to customer use. Cyber is a company-wide responsibility and includes areas like the Internet of Things (IoT) and the cloud. With finite budgets and resources, cyber c-suite execs feel like their biggest challenge is the integration of cyber transformation initiatives. The ability to apply a high level of cyber strategy and security as well as delivering day to day management will likely be taxing on even the most proficient cybersecurity teams.

CSOs and CIOs found cyber transformation to be the biggest challenge of cybersecurity management across enterprise infrastructure by 35% and 34% respectively.

Organizations are focused on two out of five of the core National Institute of Standards Technology’s (NIST) framework – detect, respond, and recovery— while cyber governance absorbs the third top spot. This leaves other areas, like Identity and Access Management, left behind.

Deloitte also found that cybersecurity budgets are evenly spread across all areas, presumably to mitigate risks. With 90% of respondents reporting that cyber transformation budgets are at less than 10%. This is a budget that would be realized on projects like cloud migration, Software-as-a-Service (SaaS) implementation, analytics, and Machine Learning (ML). This reveals a gap in the organizational ability to meet cyber demand.

Only 4% of C-Level cybersecurity executives say cybersecurity is on the agenda once a month at board meetings. 49% say it’s on the agenda at least quarterly.

Boards should consider better amalgamation of cybersecurity initiatives into the agenda with key performance indicators to measure success.

According to Deloitte:

“To drive effective execution of a cyber risk program, executive management needs to structure their cybersecurity leadership team to drive communication and implementation of security across the enterprise and have both the authority and expertise to do so. This is typically best achieved when the cyber function is represented in the C-suite so that the broader organization can better understand the priority and importance of adopting or creating a cyber-secure enterprise.”

It’s important to ensure the IT function has a senior enough role to confidently lead cyber initiatives with the line of sight into strategy and operations critical to cyber transformation within the organization. The CISO role has the power to be this within an organization but only 4% of respondents said that the CISO sits on the board.

32% of respondents say the CISO reports to the CEO. 19% say CISOs report to the CIO.

Cyber often gets stuck under IT and may also report to the CIO. IT Security is equated with cyber but they’re often not the same function. This means the cyber budget often rests within the IT budget. This could be why we are seeing the results that cyber isn’t often a priority. CISOs are left with a lack of ability to shape strategy and shift priority.

50% of CIOs say the most common outsourced function of cyber is security operations, and 48% of CISOs chose insider threat detection.

Partnerships are important for cyber initiatives to succeed but wrong decisions and failures from third parties can be costly. On the other hand, keeping some functions in-house can also be costly. Identity and Access Management, for example, is one where only 12% of respondents say they outsource but there is evidence to suggest that outsourcing can be a huge saver of time and development costs.

48% of respondents say that the biggest challenge to application security risk is “lack of appropriate organizational structure to enable the integration of security into application development life cycle”.

Deloitte says:

“As the DevSecOps trend gains momentum, more companies will likely make threat modeling, risk assessment, and security-task automation foundational components of product development initiatives, from ideation to iteration, to launch, to operations. DevSecOps fundamentally transforms cyber and risk management from being compliance-based activities—typically undertaken late in the development life cycle—into essential framing mindsets across the product journey.”

Privileged identity/ privileged access management (PAM) was ranked the top priority for identity security initiatives followed by Advanced authentication, including Multi-Factor Authentication (MFA) and Risk-Based Authentication (RBA).

The amount spent on Identity and Access Management is projected to increase faster than any other security measure. It is the foundation of the digital economy and is recognized as an important factor in security posture.

Deloitte says:

“This is also where organizational change must take place—in the consumer experience. The enterprise can no longer relegate consumer identities to be managed solely by the marketing and sales organizations; the security organization should also have input into consumer and third-party data, access, and compliance.”

35% of respondents ranked data integrity as the most concerning cyber threat.

Today’s environments involve troths of data and as such, organizations are having to prioritize their most sensitive data to secure. The more data, the more a cybercriminal will want to find a weak spot and exploit it. 90% of organizations even experienced disclosures of sensitive data within a production environment in the past year.

What can we learn from this?

Certainly, if you are thinking of starting a new organization, you have the opportunity to “grow a cyber-minded culture and secure by design approach with a strategic cyber risk framework from inception”. For pre-existing organizations, executive management will need to consider how to achieve business outcomes by re-engineering strategies for cyber risk.

Organizations are already working hard to meet the demands of a cyber-everywhere future but the report also shows that organizations are not yet ready for what’s coming and may need to rethink their strategy. Moving away from focusing on IT problems to focusing on cultural shifts may be the only way to keep pace and shift the responsibility of cyber from one organization to the whole organization.