GRC, A holistic Road Map for Information Security Transformation

Slides:



Advertisements
Similar presentations
Enabling traceability and transparency with standards-based regulatory reporting Dr. Said Tabet Senior Technologist and Industry Standards Strategist Office.
Advertisements

Cloud Computing - clearing the fog Rob Gear 8 th December 2009.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential 14854_10_2008_c1 1 Holistic Approach to Information Security Greg Carter, Cisco Security.
Open Compliance & Ethics Group (
ICS 417: The ethics of ICT 4.2 The Ethics of Information and Communication Technologies (ICT) in Business by Simon Rogerson IMIS Journal May 1998.
Architecting the Cloud INCOSE SEDC Conference April 3, 2014 Terri Wolfrom - Chief IT Architect & PM Emerging Tech Ron Jacob -
A Covenant University Presentation By Favour Femi-Oyewole, BSc, MSc (Computer Science), MSc (Information Security) Certified COBIT 5 Assessor /Certified.
Department of Information System Faculty of Computing & Information Technology King Abdul Aziz University, Jeddah, KSA.
Oceg © 2011 Driving Principled Performance An Overview of the OCEG GRC Capability Model.
The Crown and Suppliers: A New Way of Working Ways of Working14:20 – 15:05 Data Standards Open Source ICT Asset & Service Knowledgebase Agile Q&A Session.
COBIT 5: Framework, BMIS, Implementation and future Information Security Guidance Presented by.
By: Dr. Mohammed Alojail College of Computer Sciences & Information Technology 1.
ISO Richard Welford CSR Asia © CSR Asia 2011.
ITGS Standard Level Mr Gavin Johnson. ITGS The Diploma Programme information technology in a global society (ITGS) course is the study and evaluation.
Campaign Readiness Project Overview Enabling a structured, scalable approach to customer-centric campaigns.
Preparing your Fabric & Apps for Windows Server 2003 End of Support Jeff Woolsey Principal Program Manager.
Challenges in Infosecurity Practices at IT Organizations
Presented By Tay Un Soo Senior VP, Bank of Commerce President of ISACA - Malaysia Chapter 1999 National Accountants Conference THRIVING IN THE DIGITAL.
PERFORMERS’ RIGHTS IN TODAY’S EUROPEAN ENVIRONMENT: HOW TO ADAPT EXISTING RIGHTS TO NEW USES OF PERFORMANCES? Panel Discussion 1 – Webcasting, streaming,
© Infosys Technologies Limited The Emerging Infosys Challenging Paradigms… Integrating Change.
PUTTING MANAGED FILE TRANSFER IN PERSPECTIVE May 2015 Derek E. Brink, CISSP, Vice President and Research Fellow IT Security and IT GRC.
Digital Preservation across the technologies, strategies, open standards & interoperability aspects including the legal issues Pratik Shrivastava Scientist.
12-CRS-0106 REVISED 8 FEB 2013 APO (Align, Plan and Organise)
Michael Saucier - OSIsoft Cliff Reeves - Microsoft Your Portal to Performance An Introduction to the RtPM Platform Copyright c 2004 OSIsoft Inc. All rights.
Driving Value from IT Services using ITIL and COBIT 5 July 24, 2013 Gary Hardy ITWinners.
“ I C T a d v i s o r y s e r v i c e s ” Transforming Enterprise IT Thomas Bbosa, CISSP BitWork Consult Ltd BitWork Consult Ltd.
COBIT. The Control Objectives for Information and related Technology (COBIT) A set of best practices (framework) for information technology (IT) management.
1© Copyright 2016 EMC Corporation. All rights reserved. VIEWTRUST SOFTWARE OVERVIEW RISK MANAGEMENT AND COMPLIANCE MONITORING.
STRATEGIC PLAN 2007/8 A Presentation to: THE PORTFOLIO COMMITTEE ON COMMUNICATIONS 30 MARCH 2007.
Overview We are living in a technological world and rapidly advancement in all the different fields of science. With the development in the technology.
Implementation and Use of a Contract Management Methodology
AID & RELIEF PERFORMANCE AND SAFEETY OF OPERATIONS
Open and Digital Innovation – Opportunities and Challenges
Information Security – Current Challenges
Attention CFOs How to tighten your belt and still survive May 18, 2017.
LEARNING REPORT 2016 Disasters and Emergencies Preparedness Programme
Trends in my profession, Information Technology
Speaker’s Name, SAP Month 00, 2017
Get Real Value and Insights from Your Data: Biin Solutions Provides Predictive Analytics, IoT, and Business Intelligence with Microsoft Azure Power MICROSOFT.
FinTech
Governance, Risk Management & Compliance (GRC) Market Share, Segmentation, Report 2024
Azure Allays Data Security and Privacy Concerns for Solution Provider’s Cloud-Wary Customers “With Microsoft Azure, Jedox can deliver advanced enterprise.
Vision Facilitation Template
Consulting Services for IoT
Artificial Intelligence Changes the Security Landscape
Alignment of COBIT to Botswana IT Audit Methodology
Information governance and compliance for leaders
‘The Governance Profession’
Strategy and Strategic Planning:
SAIs FIGHTING CORRUPTION – INTOSAINT STRATEGY
Cyber Risk & Cyber Insurance - Overview
Improve Patient Experience with Saama and Microsoft Azure
Why Innovate with Lagom & SAP?
Cloud adoption NECOOST Advisory | June 2017.
The People Ready Vision for Business in the Enterprise
The State of Cybersecurity in State Government NAST March 26, 2019
COBIT 5: Framework, BMIS, Implementation and future Information Security Guidance Presented by.
The CYBERWISER.eu project
Managing IT Risk in a digital Transformation AGE
Capacitate Internal Audit
Director, ICT Centre of Excellence andOpen Data
KEY INITIATIVE Shared Services Function Management
PUTTING PEOPLE AT THE CENTRE OF DIGITAL TRANSFORMATION
Session 8: Innovative Uses of Captives: Cyber and Beyond
Core Value Statement Workshops – February 2019
KEY INITIATIVE Financial Data and Analytics
EdgeData & Analytics “Big Data” and “Data Analytics” are broad industry terms, with specificity associated with a given area of study or application.
The Intelligent Enterprise and SAP Business One
Collaborative regulation in the digital economy
Presentation transcript:

GRC, A holistic Road Map for Information Security Transformation Eng. Mohamed Saad Mousa Head of information Security IKEA Saudi and Bahrain 00966562539903

Digital Transformation Era Future Driven Technologies Robotics Very Cheap Labour Block chain create internet of money Virtual Reality Reality As you imagine Clouded computing ICT department in no where Big Data Analysis Determine business mean stream Artificial Intelligence take a decision instead of human Internet of things IOT will be Sensing every thing Agile Software development development of software is not a big deal Cyber Security Program

Cyber resilience statistics (EY 20th Global Information Security Survey 2017-18 )

2019 Will Be The Year Of Cyber War ? https://www.cybersecurityintelligence.com/blog/2018-predictions-full-scale-cyber-war-3051.html 2018 will see the arms race between organisations and hackers continue to intensify. As well as this, 2018 could see a full-scale cyber war break out between countries.  Growth in number of attacks 2017 saw a significant escalation in the number of cyber-attacks levied against nation states, and Ward Solutions believes that 2018 will see similar growth in the number of attacks. 

CISO Challenges business reliability on ICT Culture change resistance business relay more on ICT day after day. We live in digital business era with increasing expectation of Confidentiality, Integrity , availability and privacy Changing culture for more security environment is always a challnge New emerging technology Resources And all of these new technologies introduce new risks to business environment Still we have a very limited number of resources in information security field Budget constrains Most of business environments is struggling to reduce their expenses

Governance , Risk and Compliance GRC is a system of people, processes and technology that enables an organization to understand and prioritize stakeholder expectations; set business objectives congruent with values and risks; achieve objectives while optimizing risk profile and protecting value; operate within legal, contractual, internal, social and ethical boundaries; provide relevant, reliable and timely information to appropriate stakeholders; and enable the measurement of the performance and effectiveness of the system. The sheer quantity of GRC definitions makes it hard to realize an agreement on a definition, as many definitions do overlap .The ‘Open Compliance and Ethics Group’ (OCEG) has published a more comprehensive definition, which was revised by experts from a diversity of organizations. Integrated GRC is about principal and harmony performance when perusing goals and objectives while facing uncertainty

GRC is a vision of Principled Performance To address this growing web of issues, threats and challenges forward-thinking CISOs have adopted a vision of Principled Performance — a point of view and approach to business that helps organizations reliably achieve objectives while addressing uncertainty and acting with integrity. This enables. performance while considering both threats and opportunities, while honoring mandatory commitments including legal compliance and voluntary promises found in statements of mission, vision and values, contracts, and employee agreements. Principled Performance is reliable achievement of objectives while addressing uncertainty(RISK) and acting with integrity.

Learn Your Business Context for Principled Performance

GRC Road Map (Strategic insight)

GRC 5 integration points, IT and Information Security

01 03 05 5 Success Driving Gears 02 04 Standards and frameworks Never relay on the standard or framework reputation. There is no best standard and every business has its own character. Chose suitable Framework that present your business objective Risk Management 02 Chose the right risk management methodology. After that Link the risk management with other Information security department activity such incident handling , vulnerability management , compliance …etc control library 03 Chose the control library that achieve your business objective not that has much more controls again there is no best standard 04 Culture change Culture resistance is most Show stopper of GRC programme. Awareness programme is most effective tool to culture change Measuring principle performance 05 The program can not be measured can not managed. : e-GRC platform will help you to have a complete vision of GRC program with holistic program KPIs.

GRC : Measure people security to manage information security The GRC program is about business enablement for principal performance. The program can not be measured can not managed. People performance Processes maturity Technology benchmarking CISO should design clear KPIs that related to Program Effectiveness, Responsive , compliance ,…etc. Use standards to design your own measuring tool such as COBIT 5 PAM tool, OCEG (Burgundy Book), ISF benchmarking tool , …..

Questions

Presentation title Thank you Copyright Insight Consulting Ltd