{{item.title}}
{{item.text}}
{{item.title}}
{{item.text}}
Urs Küderli
Partner and Leader Cybersecurity and Privacy, PwC Switzerland
Yan Borboën
Partner Digital Assurance & Cybersecurity and Privacy, PwC Switzerland
Johannes Dohren
Director, Cybersecurity and Privacy, PwC Switzerland
As the conflict in Ukraine continues, fears are mounting that criminals could attack Europe in cyberspace. So far, there has been relatively little visible action against European systems via cyberattacks. However, this might change or a collateral damage from this activity, similar to the 2017 NotPetya attack, is possible. The region also hosts many of the most prolific cyber criminal groups and patriotic hackers. These make up the bulk of the most significant ransomware groups operating today and could be used as proxies — or they could take advantage of the chaos to conduct operations themselves. Boards should be aware of these cyberattacks even if they’re not targeted at Swiss companies directly, as future spillovers are possible as the crisis continues to unfold. If cybersecurity has not been a priority of the C-suite and board, this is the time to review and reinforce it.
Cybersecurity and geopolitical conflicts: separately, they're among the top worries of CEOs, according to PwC’s CEO Survey. Together, the combined risks pose an even bigger challenge that demands immediate action. CEOs and boards should be asking: Are we ready to mitigate escalating cyber risks related to geopolitical tensions that might flare up in 2022?
At PwC, we help clients evaluate their ability to deal with the main cyber risks and threats of the digital world in an easy and understandable way.
The 25th Annual Global CEO Survey was notable for the optimism among business leaders in Switzerland. However, they were also very clear about the threats to revenue growth in the year ahead.
Cyber risk was the threat that Swiss CEOs were most worried about – all of them named it – followed by health risks and geopolitical conflicts. Of course, much has changed since the survey was conducted late last year. The crisis in Ukraine has thrust geopolitical issues into the spotlight and inflation has emerged as a fundamental challenge for all businesses.
But not all risks are independent. Unfortunately, when combined, cybersecurity and geopolitical conflict can pose a significant and immediate threat.
Lessons from prior geopolitical events | Implications for today |
Multinational and global organisations can be affected even if they’re not directly targeted. |
Organisations with ties to the targeted nation or enterprise must monitor their computer network connections into and out of the country. They should review the risk of maintaining connectivity against their risk appetite. Some organisations might even consider a temporary shutdown as a pre-emptive measure, ahead of a geopolitical event. |
Cybersecurity has become part of the arsenal in geopolitical conflicts, and threat actors can be sophisticated and persistent. |
In times of crisis, organisations need to lower the thresholds for detecting intrusions. Ignoring what would be considered a false positive during a period of relaxed tensions might be particularly risky now. |
Attackers often gain a foothold by stealing credentials like account names and passwords and then move unimpeded between systems (i.e. lateral access). | Organisations should be on the lookout for an uptick in spear phishing and social engineering to gain credentials. |
The NotPetya attack spread around the globe, shutting down systems with such speed (hours, not days) thanks to automation. | Organisations should review their risks continuously, relying on near-real time network traffic analysis for swift threat identification and ramping up capabilities for quick reaction to threats. |
While prevention is preferable when it comes to cyber risk, the ability to respond and recover is equally important. We therefore recommend that boards urgently review their organisation’s cyber resilience, so that any weaknesses are identified and remedied.
A key collaborator in this process is your organisation’s Chief Information Security Officer (CISO). A simple table-top exercise with the CISO will help the board better understand the challenges, and how the organisation’s cybersecurity team is protecting against them. It will also give the board the confidence to act where weaknesses or deficiencies are identified.
During this table-top exercise, the leadership team and board members should explore the following:
Boards and CEOs must plan for a stepped-up response commensurate to the much riskier cyber environment associated with a geopolitical event.
The situation is much riskier because there are no norms that govern cybersecurity globally — and this new environment would challenge what few self-imposed guardrails exist because it changes incentives for defenders and attackers.
CEOs and boards will have to consider more consequential questions. Should we disconnect and isolate the systems that are in the conflict zone? Can we continue to tolerate the risks or accept a reduction in functionality or capability in certain territories? Should we accelerate key mitigating measures that will require a reprioritisation of resources?
While an organisation’s CISO will play a critical role in mitigating cyber threats, the entire business has a role to play. To provide the best protection, PwC recommends that organisations do the following:
Understand which processes and information assets, if impacted by a cyber attack, will have the biggest impact on your business from a customer, operational, regulatory and financial perspective.
Don’t just focus on the resilience of your organisation. Consider the network of third parties that enable you to operate effectively. How do you work together to adapt and change in line with rapidly evolving cyber risks?
Understand risk by creating realistic threat scenarios that leverage past events, near misses and industry views. Assess the impact of each scenario on your ecosystem and capture mitigating activities, while also defining the risk appetite of the organisation.
Protect your organisation from cyber attacks by building security into the design of technological changes. This could include using multiple layers of protection (defence in-depth), zero trust assumptions and fail-safe modes. The adoption of cloud-based solutions may also be considered to help bolster cyber resilience.
Look for, find and address abnormal activity across your IT estate using an advanced defence and detection capability.
While organisations have tested and improved their materials to respond to and recover from a pandemic, it's very important to also revisit and rehearse these for cyber security scenarios so that an organisation can return to business as usual as quickly as possible.
Proactively build relationships with similar organisations through government and industry bodies to build cyber resilience at a sector level, as well as within your organisation.
Use a range of communication channels to improve cyber security awareness among employees and third-parties. This should explain their role in keeping themselves and the organisation secure.
For boards and CEOs, events like this geopolitical conflict can be an occasion for meaningful reflection on cyber strategy and investments. CEOs can and want to make a difference to the cybersecurity of their organisation. And boards want to exercise better governance over cybersecurity.
Speaking the language of business, CISOs can secure the cooperation and collaboration of senior executives who need to be part of any response and recovery for every aspect of their organisation, including supply chain, general counsel, business continuity, investor relations and customer relations.
#social#
Partner and Leader Cybersecurity and Privacy, PwC Switzerland
Tel: +41 58 792 42 21
Partner, Leader Digital Assurance and Cybersecurity & Privacy, PwC Switzerland
Tel: +41 58 792 84 59