Key steps to managing euc defining eucs establishing

This preview shows page 22 - 31 out of 83 pages.

Key steps to managing EUCDefining EUCsEstablishing policies and proceduresDefine EUC ownershipMonitoring and reportingDefining EUC risk ranking metricsPerform initial inventory of EUCDesign EUC specific controlsUser Access and RestrictionData Integrity ControlChange ControlVersion ControlAvailability ControlPerform on-going monitoring and governance
Background image
Cybersecurity risk management
Background image
29© 2019 KPMG Advisory (Hong Kong) Limited, a Hong Kong limited liability company and a member firm of the KPMG network of independent member firms affiliated with KPMG International Cooperative ("KPMG International"), a Swiss entity. All rights reserved. Printed in Hong Kong.AgendaCybersecurity in the digital worldThreats, consequence and trendsCybersecurity risk management approachGroup exercise
Background image
What is cybersecurityAccording to ISO/IEC 27032, Cybersecurity refers to the preservation ofconfidentiality, integrity and availabilityofinformationin theCyberspace.Cyberspace refers to thecomplex environmentresulting from theinteraction of people,software and services on the Internetby means of technology devices and networksconnected to it, which does not exist in any physical form.
Background image
31© 2019 KPMG Advisory (Hong Kong) Limited, a Hong Kong limited liability company and a member firm of the KPMG network of independent member firms affiliated with KPMG International Cooperative ("KPMG International"), a Swiss entity. All rights reserved. Printed in Hong Kong.AgendaCybersecurity in the digital worldThreats, consequence and trendsCybersecurity risk management approachGroup exercise
Background image
32© 2019 KPMG Advisory (Hong Kong) Limited, a Hong Kong limited liability company and a member firm of the KPMG network of independent member firms affiliated with KPMG International Cooperative ("KPMG International"), a Swiss entity. All rights reserved. Printed in Hong Kong.A glimpse of the future
Background image
33© 2019 KPMG Advisory (Hong Kong) Limited, a Hong Kong limited liability company and a member firm of the KPMG network of independent member firms affiliated with KPMG International Cooperative ("KPMG International"), a Swiss entity. All rights reserved. Printed in Hong Kong.Recent cyber incidents in the news
Background image
34© 2019 KPMG Advisory (Hong Kong) Limited, a Hong Kong limited liability company and a member firm of the KPMG network of independent member firms affiliated with KPMG International Cooperative ("KPMG International"), a Swiss entity. All rights reserved. Printed in Hong Kong.VTech hack in numbers6,368,509 children’s accounts affected4,854,209 parent accounts accessedUSA, France, UK and 13 other countries are affectedIncident reported by BBC,CNN, The New York Times, South China Morning Post, The Guardian and moreChildren’s learning product makerHong Kong-based companyThe VTech Incident
Background image
36© 2019 KPMG Advisory (Hong Kong) Limited, a Hong Kong limited liability company and a member firm of the KPMG network of independent member firms affiliated with KPMG International
Background image
Image of page 31

You've reached the end of your free preview.

Want to read all 83 pages?

  • Fall '19
  • KPMG International

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture