© Copyright 1989 – 2013, (ISC)2 All Rights Reserved

Slides:



Advertisements
Similar presentations
Strengthen Your Career by Effectively Marketing Your Credentials Cheyene Haase BC Management, Inc.
Advertisements

Elevate Your BC Career Presented by: Cheyene Haase of BC Management, Inc. The Skills, Experience and Credentials in Demand for Business Continuity Professionals.
1 The Iowa Experience: Human Resources as a Strategic Business Partner Mollie K. Anderson, Director Iowa Department of Administrative Services For the.
Introduction: Training for Competitive Advantage
7.
(ISC) Global Workforce Study U.S. Government Results May 7, 2013.
© 2014 IBM Corporation Smarter Workforce Services Business Process Innovation.
Cybersecurity nexus (CSX)
Eleventh Edition 1 Introduction to Information Systems Essentials for the Internetworked E-Business Enterprise Irwin/McGraw-Hill Copyright © 2002, The.
The Commercial Environment Meaning, Concept, Significance & Nature.
BRING YOUR OWN DEVICE. BYOD AND THE IMPACT ON IT SECURITY BYOD and pressure employees put on IT organization to supply or allow consumer mobility devices.
Data On Call: Strategic Plan Deanna Lynch. Introduction  Background  Long Term Objectives  Vision, Mission, and Values  Internal and External Analyses.
Introduction to Security
Class 8 The State of Cybercrime Today- Threads & Solutions.
© Copyright 2009 (ISC)², Inc. All Rights Reserved. Confidential Information Security: Still A Growth Career Lynn McNulty, CISSP Director of Government.
To find out more or to apply, please visit our career portal and post your CV. goodyear-dunlop.com/career The Opportunity The team identifies new business.
Water And Waste Water Asset Management The University of Texas Arlington Published by Benjamin Media Inc. MANUAL.
CHAPTER 2 Personal Selling Opportunities in the Age of Information.
INTERNATIONAL INSURANCE SOCIETY Promoting Global Growth and Innovation.
Latest Strategies for IT Security Margaret Myers Principal Director, Deputy CIO United States Department of Defense North American Day 2006.
Legal Jeopardy: Whose Risk Is It?. SPEAKERS Jason Straight Chief Privacy Officer and Senior Vice President Cyber Risk Solutions at UnitedLex Patrick Manzo.
Several Concerns and Possible Solutions for International Students in U.S Higher Education System Class 497A Yi Meng.
Opportunities and Threats to the Packaging Industry in 2021: A Global Executives Survey The report focuses on global major leading industry players with.
Strategic Planning for State Energy Workforce Consortia Day 2.
CSG Meeting, January 12, Top 10 Strategic Technologies.
Global Oil And Gas Security Market TELEPHONE: +1 (855)
SOA Strategic Plan Development Part II: Necessary Changes February 2015.
LINKAGES BETWEEN INSTITUTIONS OF HE, VET AND LABOUR MARKET MR NIKOS IOANNOU.
1 northerntrust.com | © Northern Trust 2016 Changing Data Needs in Asset Management CORPORATE & INSTITUTIONAL SERVICES Prepared for the CInvO Roundtable,
Figure 1. Current Threat Landscape Sentiment From: ESG Research Report: Cyber Supply Chain Security Revisited. Source: Enterprise Strategy Group, 2015.
McGraw-Hill/Irwin© 2007 The McGraw-Hill Companies, Inc. All rights reserved. 1-1.
1 - 1 CHAPTER 1 Introduction to Healthcare Finance Definition of healthcare finance Course goal The role of healthcare finance Finance department structure.
MANAGEMENT of INFORMATION SECURITY, Fifth Edition.
Munslowd Insights into the South African Communication Landscape A study by VMA Group Global, in association with PRISA and IABC Daniel Munslow Director,
Figure 1. Current Threat Landscape Sentiment
Cybersecurity as a Business Differentiator
Voice of the Enterprise Internet of Things: Understanding IoT Customer Adoption Trends & Issues This is what we’ve found by snooping through the competition’s.
Purchasing Decisions And Business Strategy
Understanding Health Care Policy
Information Security Program
MANAGEMENT RICHARD L. DAFT.
MGT601 SME MANAGEMENT.
SHRM Survey Findings: The Ongoing Impact of the Recession—State and Local Government September 25, 2013.
Chapter 2 A Strategic Management Approach to Human Resource Management.
The Internal Audit Role in assessing Cybersecurity
Cyber attacks are increasing in number and severity every day…
ISC2 Cleveland Chapter Meeting
9 Developing Employees For Future Success What Do I Need to Know?
Stretch Your Budget With Organizational Membership
LEGAL & ETHICAL ISSUES InsurTech & Health Insurance Providers
DETAILED Global CYBERSECURITY SURVEY Summary RESULTS
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024 Data Center Infrastructure.
CIS 500Competitive Success/tutorialrank.com
CIS 500 Education for Service-- tutorialrank.com.
HRM 324 Education for Service-- tutorialrank.com
Managing Human Resources
Audit Risk Assessment Model
Black Rock- A sense of Purpose
Where Payments Meet Life
© Copyright 2004 South-Western. All rights reserved.
Chapter 9 Compensation and Benefits
Managing Human Resources Today
McGraw-Hill/Irwin Copyright © 2008 by The McGraw-Hill Companies, Inc. All rights reserved.
MGT601 SME MANAGEMENT.
Stretch Your Budget With Organizational Membership
SUCCESSION PLANNING: WHO WILL LEAD?
Management, 7e Schermerhorn
Resulting in increased training revenue
2018 TRENDS REPORT Planning for Growth in an Evolving Business Climate
SECURITY IN THE DIGITAL AGE
Presentation transcript:

© Copyright 1989 – 2013, (ISC)2 All Rights Reserved SECURE ABU DHABI CONFERENCE 2013

INTRODUCTION five primary factors contributing to this combination of turbulence and paradox for CISO’s First, there is no slowing in the amount of data that must be secured, and the places where that data resides—statically and on a transient basis (e.g., on consumer-owned devices, in the cloud, on portable media, and in company-owned data centers). In other words, the perimeter is fluid, and the footprint to secure is expanding boundlessly. Paradoxically, clamping down on data security is counter to the data fluidity that end users and their organizations demand and expect. © Copyright 1989 – 2013, (ISC)2 All Rights Reserved SECURE ABU DHABI CONFERENCE 2013

Second, electronic operations are mission-critical for many public and private organizations. Disruptions in external- and internal-facing systems and applications can produce a tsunami effect. Adding to the potential for disruptions is the on-going feature and functionality race, frequently accomplished without a full understanding of the security risks. Security, consequently, is an after-the-fact consideration in application development. Yet, bringing security into the forefront of application development is a costly anchor in this feature and functionality race.

Third, the threat actors continue to evolve in stealth, organization, and sophistication. They are, simply, foes that are constantly re-arming themselves with new weapons. Increasingly, the most significant threat to an organization is what it does not know or cannot detect.

Fourth, regulatory obligations are increasing Fourth, regulatory obligations are increasing. The previously stated factors of an expanding risk footprint, susceptible electronic operations, and an untiring foe drive the call for more, not less, regulation. But exclusively focusing on the chapter and verse of regulations is akin to providing cyber criminals with the “how to” security playbook.

Fifth, locating and hiring skilled and experienced information security personnel is a perennial challenge. While the education system has contributed to students’ ability to leverage new information technologies—systems, devices, and applications—the focus on security has been limited. Consequently, the development cost to build a security-conscious and -knowledgeable workforce falls on their future employers workforce falls on their future employers.

Through it all, CSOs and other security executives gravitate to this turbulent and paradox-lessening role. In a late 2012 global survey of 12,396 information security professionals, which included 1,634with security executive titles, 82 percent of the security executives stated they are somewhat or very satisfied with their current roles. Most have made it a career; the average security executive duration in the security discipline is over 14 years. Plus, annual base compensation is over $150,000 for nearly one-third of security executives in private industry, with approximately two-thirds stating they received a pay increase over the last 12 months.

Report Objectives Considering the volume, diversity, and uncertainty of security challenges facing executive security professionals, defining priorities is essential. In this paper, we examine the priorities of security executives, the constraints they are encountering, and offer our opinion on how the role of security executives is changing.

THREATS, PRIORITIES, AND TIME Security Threats-Top or High Concern

Dr. Meng Chow Kang, CISSP, CISA Director for Information Security for China and AP Cisco Systems

Introduced by Mahmoud Yassin