Cybersecurity and Information Assurance

Slides:



Advertisements
Similar presentations
MODULE 12 STRATEGIC MANAGEMENT “Insights and hard work deliver results” What types of strategies are used by organizations? How are strategies formulated.
Advertisements

IBM SPSS Solutions A SELECT INTERNATIONAL COMPANY.
Viewpoint Consulting – Committed to your success.
Chapter 1 Information Systems Overview. Chapter Objectives Understand the term “information system” (IS), Describe the evolution of computing, Explain.
HOW DO INFORMATION SYSTEM SUPPORT THE MAJOR BUSINESS FUNCTION?
IBE312: Ch18 – Business Strategy Business Strategy Fig feedback loop of business strategy and IA (M&R)  Competitive advantage – “Competitive.
Bruce Hallas Director Marmalade Box Ltd. UK Business Comparison of Information Security Incidents & Financial Impact Corporate UK SME UK 25% ↓ in number.
Chapter 11: Strategic Leadership Chapter 8 Production and operations management.
@ ?!.
Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc Introduction to Information Technology.
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved Business Driven Information Systems 2e CHAPTER 1 INFORMATION SYSTEMS IN BUSINESS.
BUSINESS DRIVEN TECHNOLOGY
McGraw-Hill/Irwin © 2006 The McGraw-Hill Companies, Inc. All rights reserved. 1-1 BUSINESS DRIVEN TECHNOLOGY UNIT 1: Achieving Business Success Through.
INTRODUCTION TO RETAIL BUYING. Definition “that function responsible for obtaining by purchase, lease or other legal means, equipment, materials, supplies.
Keunggulan Kompetitif TI dan SI Strategis PTI Pertemuan 8.
BUS1MIS Management Information Systems Semester 1, 2012 Week 3 Lecture 1.
1 UNIT 3: THE STRATEGIC MANAGEMENT PROCESS. The formulation and implementation of strategies to achieve corporate success. –The Strategy Position The.
Impact Research 1 Enabling Decision Making Through Business Intelligence: Preview of Report.
Human Resource Management Gaining a Competitive Advantage
Welcome to the Strategic Class of HRM. Strategic Human Resource Management: A Framework Prof. Hiteshwari Jadeja.
1 HSRC EPWP SEMINAR 07 JUNE 2016 Presentation by Lulu Mdletshe EPWP Co-ordinator: Department of Transport.
Local buffer support Program
Strategic Information Systems Planning
CIS 500 Slingshot Academy / cis500.com
Impact and the Physical Sciences
Strategic Management The process of ensuring a competitively superior fit between an organization and its changing environment. Management of the “Big.
INFORMATION SYSTEM CATEGORIES
Challenges and opportunities for the CFO
Information Systems Sarika Agarwal.
E-Commerce and its impact on logistics management
SNOMED CT Education SIG: Strategic Plan Review
ADVANCED STRATEGIC THINKING AND PLANNING
Chapter 4 Enterprise Systems
Attention CFOs How to tighten your belt and still survive May 18, 2017.
Integrated Management System and Certification
Session 9.
ServiceNow Implementation Knowledge Management
Unit 40 International Marketing Unit 40 International Marketing Aim The aim of this unit is to introduce students to a variety of methods organizations.
Trends in my profession, Information Technology
Chapter 16 Implementing HR Strategy: High-Performance Work Systems
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024Low Power Wide Area Network.
Standards for success in city IT and construction projects
CHAPTER 7: The Manager as a Planner and Strategist
{ BLOCKCHAIN Technology. BSEtecBSEtec is a digital solution provider company which offers the best service with the implement of the latest technologies.
HSA 520Competitive Success/snaptutorial.com
Information Technology
Professional Certificate in Strategic Change Management
Digital Transformation Asia 2018 – CALL FOR SPEAKERS
Local buffer support Program
PLANNING.
[CUSTOMER NAME] OPPORTUNITY REVIEW [OPPORTUNITY DESCRIPTION]
Copyright © JanBask Training. All rights reserved Become AWS Certified & Get Amazing Job Opportunities.
Managed Content Services
Community of Users.
RETURN ON INVESTMENT IS THE MEASUREMENT OF “HARD & TANGABLE” FACTORS
The Accountant’s Role in the Organization
Chapter 9: Setting the list or quoted price
AQA GCE Business Studies
The Accountant’s Role in the Organization
BBA 200 – Chapter 6 Dr. Salma Chad
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
Porter’s Generic Strategies
KEY INITIATIVE Financial Data and Analytics
Information Systems.
Accounting Discipline Overview
Implementation Business Case
CEng progression through the IOM3
Building Competitive Advantage Through Functional-Level Strategies
Lesson 3.2 Product Planning
Contact center INNOVATION
Presentation transcript:

Cybersecurity and Information Assurance Mr Joseph Pindar and Dr Jonathan Rigelsford The University of Sheffield By: Arwa Ashoor 200700427

Outline: Introduction The Enterprise and Cybersecurity Improving the Operational Effectiveness Strategic Advantage Implementing a Cybersecurity Programme

five key subjects: Strategic Alignment: How Cybersecurity and Information Assurance interface with other areas of the enterprise is critical to success. Communication: The importance of effectively communicating the value of Cybersecurity value throughout the enterprise. Cloud Computing: What is it and how does it impact Cybersecurity and Information Assurance. Risk Management: Specifically the lack of objective data and the difference in approach compared to other risk management organizations. Certification: The increased requirement of certification. See Cybersecurity and Information Assurance for what they are: mainly a cost of doing business with the unique opportunity to create significant value by enabling the enterprise to enter markets and use technology that competitors fear.

What is Information Assurance and Cybersecurity? Information Assurance is considers to be a subset of Cybersecurity Information Assurance: Is the confidence that information systems will protect the information they handle and will function as they need to, when they need to, under the control of legitimate users. For example: hard-copy document storage and transportation. Cybersecurity: Defending against attacks on computer systems; including control systems. For example: those in electricity generation and distribution networks

The Enterprise and Cybersecurity In this section they discuss Porter and Carr’s contributions to understanding the role of operational effectiveness and strategy in the enterprise. 1- Operational Effectiveness and Strategy 2- Carr’s view 3- Competitive Advantage In this section we discuss Porter and Carr’s contributions to understanding the role of operational effectiveness and strategy in the enterprise The main strategic benefit of Information Assurance and Cybersecurity is to ensure continued safe and compliant operation of the enterprise whilst adopting new technologies and techniques.

Operational Effectiveness and Strategy: Porter defines operational effectiveness as “performing similar activities better than rivals perform them” and that’s mean : Offering lower cost and superior quality at the same time. Improvements in methods raise the level of competition

Carr’s view of IT and Risk Frontier IA and Cybersecurity mainly contribute to the OE of the enterprise in a similar way to Carr’s view of IT predicted

Competitive Advantage: Information Assurance and Cybersecurity can boost profitability by aligning to enterprise strategy. If implemented badly can damage profits Deliver outcomes to the enterprise’s customer. A good example of Information Assurance and Cybersecurity delivering outcomes to enterprise customers is Amazon Web Services (AWS).

Improving the Operational Effectiveness : How improving operation effectiveness lead to reduce the enterprise costs and increase profitability. Antivirus Cost Metrics A final challenge when seeking to gain security certification is that occasionally mandated controls cannot be applied. Health and Safety is more important than either Information Assurance or Cybersecurity thus can prevent the implementation of security controls as prescribed by securitystandards

Strategic Advantage: Risk Management Communicating Cybersecurity Analytics In this section the Understanding the different type of risk will create operation value for the enterprise. They two definitions of risk are : _______________ Information Assurance and Cybersecurity professionals should engaging with other areas of the enterprise in order to make correct decision and collect budget and educated on the dangers of the Internet .For this reason the communication point was is covered in this part __________________ Chinese symbol of risk

Implementing a Cybersecurity Programme : The Cisco security programme enhances the business by offering both cost efficient processes to gain operational effectiveness and strategic opportunities to create value. The(CEO) chooses the enterprise strategy and makes business decisions in line with that strategy. The(CSO) reports to the CEO and has the role of explaining the security risks of specific business decisions.

Thank you