Cyber Security Australian Financial Review special report

Produced in association with the
Australian Financial Review
Cyber Security
Australian Financial Review
special report
November 2014
kpmg.com.au
Cyber Security
KPMG in association with The Australian
Financial Review hosted a roundtable event on cyber security. Content originally produced
by the Australian Financial Review online
edition on 24 November 2014.
PANELLISTS INCLUDED:
Troy Braban,
CISO,
Australia Post
Tara Cahill,
GM Risk Group Services,
Westpac
Diona Rae,
CRO,
GPT
Tim Thurman,
CIO,
ASX Group
Simon Smith,
CIO,
Lumo Energy
Mark Tims,
Partner,
Technology Risk & Assurance,
KPMG
Gary Gill,
Partner,
Forensic,
KPMG
Adaptability key to
cyber security
ANDREW BIRMINGHAM
Businesses find themselves needing
to innovate quickly in a market place
increasingly disrupted by digital
technologies but where consumers
are increasingly aware of the
importance and value of their own
data. That puts a premium on securing
both the data and the intellectual
property spawned by innovation.
Traditionally companies applied
perimeter defences to keep the bad
guys out, and policy and forensics
to keep the bad guys inside the
organisation from getting out. But
the threat profile is evolving. With
tens of thousands of new malware
variants entering the IT ecosystem
every day the technical responses
have evolved to include continuous
detection and investigation. External
threats meanwhile have become more
sophisticated and sinister with attacks
by organised crime and state backed
agencies increasing.
For security professional like Australia
Post’s chief information security
officer Troy Braban that means that the
complexities of his role have kicked up
significantly. “On a day-to-day basis it’s
different every single day.”
“The pace has changed and so
have the adversaries, and what they
are trying to do. “The situation is
constantly in flux ,” he says.
1 | Cyber Security | Australian Financial Review special report
Cyber security has emerged as a key
risk for companies, which is why Mr
Braban is in regular contact with both
the CIO and the chief risk officer.
Indeed leadership engagement extends
all the way to the board. “We talk to
our executives and our board about
different types of people or organised
entities that want to attack us.”
While amateurs looking to test the
membrane have always been a
nuisance, in recent years hacktavism
has also emerged, most notably in
recent times through organisations like
Anonymous.
At the other end of the spectrum there
is are organised crime and [nation]
states. “So in the last two years we
have invested a lot of time in both of
those two areas.”
And in the middle – inside operators –
employees who through malfeasance
or ignorance pose a threat. “The
inside threat is one that we’ve talked
about where the risk profile stays the
same but what actually changes is
the value of the information and the
value of the interaction you’ve got with
your customer. That threat trend has
effectively stayed the same but the
impact has changed.“
FRONT LINE
For the staff on the front line of cyber
security, the threat is ever present.
“We’re constantly patching. I’ve got a
team and all they do is look after those
firewalls,” says ASX chief information
officer Tim Thurman.
He characterises the ASX as being
on the front foot but he says he also
saw the alternative during his time
in investment banking in Canada
where there were often gaping holes,
especially in legacy systems, to
which security staff were constantly
responding.
One specific area of technology that
features increasingly highly in the
conversation is cloud computing and
opinions are mixed about its impact
and security – depending on the types
of applications involved.
GPT’s chief risk officer Diona Rae
says, “We have gone to the Cloud for
our systems and infrastructure and
it’s been a very positive move for us.
We are a small IT user compared to a
bank for instance. We’re never going
to be able to spend the kind of money
that is needed to have a very robust
environment but we can get that with a
cloud provider because that’s their job.”
Ms Rae says it takes time for
executives to be comfortable. “The
Cloud is seen as something that’s
quite scary and it has potential to be
dangerous for us. However it probably
was a great solution for us from a
cyber-security perspective.”
Regulation is often seen as a barrier
to cloud adoption, although less so
these days.
“We’ve had a few conversations
with APRA around the cloud over
the last 12 months and they are very
supportive of us,” says Tara Cahill, GM
risk, group services, Westpac.
The regulator is treating issues around
the engagement, communication
and transparency much as they did
with previous discussions around
outsourcing and off shoring says Ms
Cahill. “They want to make sure that
it’s done properly, in a risk based way
with the right controls in place.”
But not for everyone is on board yet,
as Mr Thurman makes clear. “It is it’s
hard for us to utilise that service. There
are latency issues in terms of how fast
we need to be.”
That said the ASX does use some
cloud based apps such as Salesforce.
But for its core business, Mr Thurman
isn’t quite ready to buy story the
industry wants to sell, “So I build my
own internal private clouds and I offer
that service to my clients within my
data centres”
Cyber Security | Australian Financial Review special report | 2
he pace has changed and
T
so have the adversaries, and
what they are trying to do.
The situation is constantly
in flux.
TROY BRABAN
CISO,
AUSTRALIA POST
3 | Cyber Security | Australian Financial Review special report
UPSTAIRS DOWNSTAIRS
DR NO
Given the risks involved and the
business impact, many companies
have evolved beyond treating cyber
security as a technical issue. Instead
boards and executives view it is a key
business risk.
Operationalising cyber security
is important for another reason –
companies need to be able to innovate
quickly to respond to changed
circumstances as new insurgents
enter their markets and disrupt old
ways of doing business.
CIO’s are clear that technology can’t
solve 100 per cent of the problems,
instead organisations need to develop
a security-aware culture and build
upon this culture. Education is a critical
tool in this regard.
According to Ms Rae, while
employees have a high awareness
when it comes to their pin numbers
on their bank accounts or other
personal information they don’t always
bring that level of awareness to the
workplace. “Staff will want to do
things like email secure documents
to their Hotmail accounts, or use
common passwords and even share
them at work, which they would never
do with their own information. “
“Our challenge at the moment is to
get them to understand that they
need to apply the same sort of rigor
to what they do at home. Our IT guys
have a good infrastructure and they
are knowledgeable about security but
these vulnerabilities probably come
from mistakes or things that our staff
can do.”
The old paradigm where security
concerns are an excise to do nothing
no longer wash.
“We’ve got a mantra, we never say
no, it’s always no but,” according to
Simon Smith CIO, Luma Energy who
says it is important to work closely
with business managers to help them
build security into the product
offering early.
“We work across industries, with
the government, with education and
academics. When I asked our chief
information security officer for a list
of the organisations with whom we
interact globally on this the list ran to
three pages of organisations”
The bank works closely with other
financial services companies and it
makes sense to do so she says as the
our attacks are going to be very similar.
“You want to know where those weak
links are and how that all interacts. “
Collaboration is another key weapon in
the cyber security arsenal. Companies
may compete fiercely in the market
but when it comes to repelling new
and dangerous threats cooperation is
the order of the day.
According to Westpac’s Ms Cahill
collaboration necessarily casts a wide
net given the systemic risk of threats
from aggressive and sophisticated
adversaries.
Cyber Security | Australian Financial Review special report | 4
How much does
business know?
ANDREW BIRMINGHAM
As business becomes increasingly
connected to its customers, partners
and even devices, and as operations
become more digitised company
boards and leadership teams have
moved cyber security onto the top tier
of business risk considerations.
Regulatory compliance on the one
hand, and consumer expectations
for security and privacy on the other
mean that the days when cyber
security could be ignored as an arcane
consideration for technical specialists
have past.
Small wonder. A recent World
Economic Forum report highlighted
the growing systematic threat to
business and government from
highly sophisticated networks run by
organised crimes and even
nation states.
The WEF’s somewhat alarming
conclusion – the world is one
disruptive technology development
away from losing the cyber war.
In its ninth Global Risks report the
WEF flagged the risk of what it
called ‘cybergeddon’ as a result of
sophisticated cyber attacks. Just as
importantly the research identified
an erosion of public confidence as
government’s themselves start
penetrating networks and trawling
data as part of law enforcement or
any counter-terrorism initiatives.
Facebook’s recent Transparency
Report for instance revealed that
government calls of its data
are increasing.
It is little wonder then that the
country’s biggest companies are
taking such systemic challenges
very seriously.
5 | Cyber Security | Australian Financial Review special report
According to Tara Cahill, GM risk,
group services Westpac, cyber
security is hugely significant for the
bank.
“Trust is obviously core to the banking
proposition. With the amount of data
we hold and the type of data we hold
we take it extremely seriously. “
Mark Tims Partner, Technology Risk
& Assurance , KPMG, said Westpac is
not alone in this regard.
“We have certainly noticed over time
there has been a lot more education
occurring within organisations and
in the general market in terms of the
awareness about cyber security.
Boards, he says, tend to be worried
about what they don’t know. That can
be a problem with a topic like cyber
security which can naturally be very
technical
“So education and awareness are
actually quite important. “
Companies are increasingly investing
in programs to continuously monitor
and protect themselves . There are a
lot of organisations that are spending
large amounts of capital to ensure that
protection, said Mr Tims.
Even those businesses that might
not have previously considered
themselves at significant risk are
having to adjust.
According to Diona Rae, CRO of
property group GPT the organisation’s
leadership now recognises that while
they may not be as heavily system
dependent as other companies there
are vulnerabilities.
Furthermore GPT’s clients in the
retail space increasingly want to use
There are always conversations
about personal data and
increasingly about IP where
either insiders are targeting the
information or outsiders are
targeting people inside to get to
the trade secrets of the business.
GARY GILL,
PARTNER, FORENSIC,
KPMG
customer data to personalise the
consumer experience and GPT needs
to understand the issues around that.
“Up until about a year ago I don’t think
GPT really thought of itself as having
cyber risks. We’re not a high profile
public brand, we don’t carry our cash
in transactions so I don’t think people
generally thought we were really a
target. But now we’ve realised we
are,” she said.
“The challenge for us it that probably
one of our biggest vulnerabilities is
what our staff members do.”
This growing realisation of the risk
was a common theme to emerge at
a recent KPMG AFR cyber security
roundtable.
Simon Smith, CIO Luma Energy said
that when he first joined the company
awareness of the issues was very
limited. “One of the first things I did
was to get the executives to sponsor
a program. Then we brought in a third
party to help implement it. Having
the CEO and the board engaged was
important and that generated a lot of
buy-in through the organisation.”
The change at Luma is significant and
indicative of the growing importance
companies attach to the issue.
The majority of the leadership team
is now part of the security council
ensuring the issue gets visibility from
the top level, said Mr Smith. “The
board is now pushing for a hardening
of the network and systems which is
a different experience to hearing “no”
because of the implication on cost and
complexity.”
REGULATORY INCENTIVE
Like the energy sector, the banking
sector is subject to significant
regulation around data which provides
further impetus for leadership team
engagement around security.
However, according to Westpac’s
Cahill while regulation is a key
consideration and a driver, decisions
can’t begin and end with the
regulation.
“Generally we look at what’s the
minimum requirement we’d want
as an organisation anyway. Because
at the end of the day it is about the
customer, and it’s about the customer
data.”
issue that is brought into sharp relief
when stories about data breaches
make it into the public domain.
“You always get two questions. One is
what happened, and then the second
is ‘can it happen to us? ‘ Having the
answer to both of those is incredibly
important.”
While many discussions often
centre of the risk of a breach that
exposes customer data, increasingly
companies are starting to appreciate a
wider danger - the theft of intellectual
property.
Gary Gill, partner, forensics, KPMG,
“There are always conversations
about personal data and increasingly
about IP where either insiders are
targeting the information or outsiders
are targeting people inside to get to
the trade secrets of the business.”
Andrew Birmingham is the editor of
Which-50.com
Australia Post’s chief information
security officer Troy Braban, says it
is a matter of understanding what
customers want and care about. It’s an
Mergers & Acquistions Outlook | Australian Financial Review special report | 6
Juggling customer privacy
and service
ANDREW BIRMINGHAM
Great customer experience
drives loyalty, and according to
multiple studies, stronger profits
and revenues.
But great customer experience
comes at a price. In order to execute,
companies need access to customer
data such as personal preferences
and web behaviour in order to better
personalise the outcome for the
individual.
The natural tension between the
consumer’s right to privacy and
their quest for the best deal creates
a strong sub-current in the debate
around data privacy and security. And
importantly it is a key consideration
for companies as they build out their
cyber security infrastructure.
In the retail industry for instance,
data on customer behaviour is a key
competitive advantage says Diona
Rae, chief risk officer at GPT. “If you
want a good relationship with your
customers and consumers, part of
that is building trust with them.”
The paper also noted research
suggesting most consumers are
happy for companies to use their data
so long as they do responsibly and for
their benefit.
However, says Tara Cahill GM Risk,
group services, Westpac, “But it still
comes back down to the fact that the
organisation has an obligation to the
customer. It doesn’t really matter
whether we’ve got a demographic
that are quite happy for us to use
their data or a different demographic
that is very concerned about the use
of data. Our obligation is to maintain
the security of all customer data, to
use it appropriately and to take into
consideration the regulation and the
laws around the use of data. If we
maintain that then we maintain the
trust of the customer that we’re doing
the right thing with their data.”
Companies also need to understand
the consumer’s reaction to too much
personalisation.
A discussion document by David
Jones and Brad Paton published in a
Reactive whitepaper earlier this year
called Perspectives 2014 argues that
consumers are willing to concede
some privacy rights, where the pay off
is better levels of service or
lower pricing.
Luma energy CIO Simon Smith
recalls his experience working
in the retail sector. “We had the
best personalisation engine on the
website, to the point where we could
actually know when you’re about to
buy just by analysing your historical
trends. But the thing is we tipped it.
We did a lot of multi-variant tests and
found if we got too personal people
backed off because it was to spooky.”
The authors wrote “We are in an
era of convenience. There is a level
of expectation in the amount of
value that a product will immediately
provide users, catering to
their needs.”
While consumers also want and
expect that their data will be kept
securely and used transparently,
they may not have the same
concerns about where the data
physically resides.
7 | Cyber Security | Australian Financial Review special report
According to Australia Post chief
information security officer Troy
Braban, “We’ve done some research
and there’s been some other papers
around this. If you give customers
two choices, do you want a secure
offshore location or an insecure
onshore location then of course
they’re going to pick the secure
offshore. Then if you ask the question
do you want a secure offshore or
secure onshore, the answer is almost
certainly always ‘ I don’t care as long
as it’s secure.’ It is less about storage
location, and sovereignty, customers
just want to know their data is secure.”
BREACH HEAD
Companies also have to consider the
implication of data breaches, sadly a
fact of life in online commerce.
While Australia lacks the mandatory
disclosure laws found in jurisdictions
like California, many IT security and
risk management professionals still
hold to the view that it’s better to tell
the customer sooner rather than later.
out you had a breach six months
month later I think that damages the
reputation quite badly. But obviously
you’ve got to be careful about what
you say and when you say it.”
Gary Gill, Partner, forensics, KPMG
asks “If you think about it from a
reputational risk, how does it impact
your reputation? If you wait too long
and don’t disclose and then it comes
Our obligation is to maintain the
security of all customer data, to
use it appropriately and to take into
consideration the regulation and the
laws around the use of data.
TARA CAHILL,
GM RISK GROUP SERVICES,
WESTPAC
Cyber Security | Australian Financial Review special report | 8
The views and opinions expressed herein are those of the author and do not necessarily represent the views and opinions of KPMG,
an Australian partnership and a member firm of the KPMG network of independent member firms affiliated with KPMG International.
The information contained in this document is of a general nature and is not intended to address the objectives, financial situation
or needs of any particular individual or entity. It is provided for information purposes only and does not constitute, nor should it be
regarded in any manner whatsoever, as advice and is not intended to influence a person in making a decision, including, if applicable,
in relation to any financial product or an interest in a financial product. Although we endeavour to provide accurate and timely
information, there can be no guarantee that such information is accurate as of the date it is received or that it will continue to be
accurate in the future. No one should act on such information without appropriate professional advice after a thorough examination
of the particular situation.
To the extent permissible by law, KPMG and its associated entities shall not be liable for any errors, omissions, defects or
misrepresentations in the information or for any loss or damage suffered by persons who use or rely on such information (including
for reasons of negligence, negligent misstatement or otherwise).
© 2014 KPMG, an Australian partnership and a member firm of the KPMG network of independent member firms affiliated with
KPMG International Cooperative (“KPMG International”), a Swiss entity. All rights reserved.
The KPMG name, logo and “cutting through complexity” are registered trademarks or trademarks of KPMG International
Cooperative (“KPMG International”).
Liability limited by a scheme approved under Professional Standards Legislation.
November 2014. VICN1248MKT.