Threat Landscape Report

Wiki > Threat Landscape Report

1.1              Introduction

This report maps internal KPMG security posture against the industry based on the threat intelligence research including both internal and external sources of information.

Report Classification
Distribution Scope GSOC / Member Firm
Audience Global CISO / Member Firm CISOs / GSOC Manager / NITSO
Mode of Generation Manual
Distribution Channel SharePoint / Email
Production Format Document-based (PDF)
Data Schedule Periodic
Data Source Threat Intelligence Portal (Sources) / RSA Archer SecOps / RSA Security Analytics

 

1.2              Template

1.2.1          Title Page

The title page defines the name of the Threat or the Attack.

1.2.2          Table of Contents

Standard Table of Contents to allow for easy navigation of the report.

1.2.3          Executive Summary

One page overview of the key findings and recommendations presented within the report.

1.2.4          Sources of Intelligence

Identifies and list all sources of intelligence that the report utilizes, including both internal and external sources.

1.2.5          Exposure

Explains likelihood of being a target of similar attack(s) and/or evidence of similar attacks already in motion.

1.2.6          Vulnerability Profile

Vulnerabilities in the field and how entities monitored by KPMG fare against those.

1.2.7          Zero-day Attacks

Relevant zero-days and how they affect the KPMG GSOC monitored space.

1.2.8          News Topics

Topics of interest in the Press related to key security areas followed by a brief assessment of how KPMG monitored space fare against those.

1.2.9          Suspected Data Breaches

Updates on any suspected data breach pending confirmation from the corresponding Member Firms in line with the KPMG Data Breach policy.

1.2.10       Open Data Breaches

Updates on any open data breaches which have been confirmed by the corresponding Member Firms in line with the KPMG Data Breach policy.

1.2.11       Geolocation-based Incident Profile

Specific Business Units impacted (if any), service impact and what severity specific to corresponding Member Firm.

1.2.12       Emerging Friendly Tools, Technologies and Techniques

Brief account of emerging technologies and techniques that support KPMG efforts to maintain and improve its security posture, e.g. an improvement in the detection capabilities due to a new to market technology start-up.

1.2.13       Emerging Adversary Tools, Technologies and Techniques

Brief account of emerging technologies and techniques that pose a threat to KPMG efforts to maintain and improve its security posture, e.g. an improvement in the attack capabilities of a known adversary due to their access to certain tools, technologies or enhanced skills capability.