CYBERSECURITY IS A Business Issue

Slides:



Advertisements
Similar presentations
Tenace FRAMEWORK and NIST Cybersecurity Framework Block IDENTIFY.
Advertisements

The Comprehensive Needs Assessment Report. Objectives Understand the partnership between DPI and leadership Give an overview of continuous quality improvement.
HR Manager – HR Business Partners Role Description
Overview of Priorities and Activities: Shared Services Canada Presentation to the Information Technology Infrastructure Roundtable June 17, 2013 Liseanne.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential 14854_10_2008_c1 1 Holistic Approach to Information Security Greg Carter, Cisco Security.
Determining CLIMASP Competencies Jerash University Development of Interdisciplinary Program on Climate Change and Sustainability Policy- CLIMASP Development.
Information Security Governance
Framework for Improving Critical Infrastructure Cybersecurity NIST Feb 2014.
NLRB: Information Security & FISMA Daniel Wood, Chief IT Security February 19, 2004.
Program Management Overview (An Introduction)
By Collin Smith COBIT Introduction By Collin Smith
Overarching Roles of Critical Partners In A Project 9:30 – 10:00 Rob Curlee, FMO Joseph Dominque, OCISO Mike Perry, EA.
Contractor Assurance Discussion Forrestal Building Washington, D.C. December 14, 2011.
ISS IT Assessment Framework
CHAPTER 4 THE EVOLVING/ STRATEGIC ROLE OF HUMAN RESOURCE MANAGEMENT PowerPoint Presentation by Charlie Cook Copyright © 2002 South-Western. All rights.
Framework for Improving Critical Infrastructure Cybersecurity Overview and Status Executive Order “Improving Critical Infrastructure Cybersecurity”
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
COBIT 5: Framework, BMIS, Implementation and future Information Security Guidance Presented by.
© Copyright 2007, Sequent Learning Networks, Inc. - Product Management & Marketing Training Perfecting the Product Launch Note – the intent of this presentation.
Information Technology Audit
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
IT Governance Steering Committee December 2, 2010.
CEO REPORT Thomas F. Schrader ERCOT Board of Directors December 14, 2004.
Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 DRAFT.
Engineering, Operations & Technology | Information TechnologyAPEX | 1 Copyright © 2009 Boeing. All rights reserved. Architecture Concept UG D- DOC UG D-
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
“ Heightened Expectations” for Corporate Governance AIBA 2 nd Annual Compliance Seminar June 14, 2012 Lester Miller, Senior International Advisor International.
NIST Special Publication Revision 1
The Challenge of IT-Business Alignment
Operational Excellence and Sustainable Performance Improvement Date: 9 June, 2009.
Building our Future: Programme Board TOR PURPOSE To be the governing forum for the design & effective delivery of the Building our Future Programme To.
Veronique Freeman (440)
1 Club Visioning A Club and Membership Development Tool.
Assessment & Planning for children In Hertfordshire Margaret Doe External Support Team.
Enterprise Risk Management Dr. Doug Webster, CGFM, PMP Financial Management in Challenging Times May 13, 2009.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Cambodia February th Annual South-East Asia Red Cross Red Crescent Leadership Meeting 2015 Post-2015 Sustainable Development Goals.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
© 2012 Pearson Education, Inc. publishing Prentice Hall. Note 16 What is a Marketing Strategy?
Principles of Information System Security: Text and Cases
Educational Achievement System EASy. Develop an integrated, user-friendly system that integrates data, assessment and curriculum to enhance organizational.
Homeland Security, First Edition © 2012 Pearson Education, Inc. All rights reserved. Overview of National Infrastructure Protection CHAPTER 3.
A Leader’s Guide to Resiliency Case Examples Roadmap Dashboard.
Protection of Transportation Infrastructure from Cyber Attacks EXECUTIVE BRIEFING.
Info-Tech Research Group1 1 Info-Tech Research Group, Inc. is a global leader in providing IT research and advice. Info-Tech’s products and services combine.
Agenda VA’s Transformation Continues
Figure 1. Critical Infrastructure Organizations Believe that the Cyber-threat Landscape Is Getting Worse From: ESG Brief: Critical Infrastructure Organizations.
Office of Global Health and HIV (OGHH) Office of Overseas Programming & Training Support (OPATS) Health The Global Response to Caring for Orphans and Vulnerable.
An Approach To Developing a PMO A Case Study
JMFIP Financial Management Conference
BruinTech Vendor Meet & Greet December 3, 2015
COBIT 5 Executive Summary
CHAPTER 4 THE EVOLVING/ STRATEGIC ROLE OF HUMAN RESOURCE MANAGEMENT
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
JU September Stakeholder Engagement Conference Webinar #1
Figure 1. Critical Infrastructure Organizations Believe that the Cyber-threat Landscape Is Getting Worse From: ESG Brief: Critical Infrastructure Organizations.
IT Professional Perspective IT Strategy, Policy and Governance
Cybersecurity Policies & Procedures ICA
HPI Leadership and Challenges
Reduce Security Risks to Protect Your Network
SAM GDPR Assessment <Insert partner logo here>
Alignment of COBIT to Botswana IT Audit Methodology
Cybersecurity ATD technical
Copyright © 2012, Elsevier Inc. All rights Reserved.
Consistent Data Strategy
COBIT 5 Executive Summary
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
COBIT 5: Framework, BMIS, Implementation and future Information Security Guidance Presented by.
KEY INITIATIVE Financial Data and Analytics
Presentation transcript:

CYBERSECURITY IS A Business Issue

Agenda Business Goals People, Processes, & Technology Cybersecurity Program

Source: BREACHLEVELINDEX.COM

Copyright © 2019 Risk Based Security, Inc. All rights reserved.

Business Goals Does your organization have defined business goals? Does your organization have defined goals for managing cyber risks? Does you organization have a strategic plan for achieving the defined cyber goals?

Cybersecurity Program Tell me about your organization’s Cybersecurity Program. Technology alone will not adequately protect your organization

It’s Not Rocket Science, but… A robust strategy includes addressing the basics 100% of the time. Covering the basics is not impossible, but does require a focused effort. The strategy will consist of an integration of people, processes, and technology.

Vulnerability Management

Stages of vulnerability management: Discover Prioritize Scan/Assess Report Remediate Verify

Cybersecurity Program A cybersecurity program provides a holistic view of the actions needed to achieve sound cybersecurity management across the enterprise.

Cybersecurity Program Framework A framework establishes a life cycle approach for developing and maintaining a comprehensive cybersecurity program. Cybersecurity is not a one-time task or project with a defined completion date.

Cybersecurity Program Success Factors

Critical factors to ensure that your program is positioned for success: Executive Management Support Business Goals and Objectives Alignment Strong Governance Structure Sound Security Standards & Frameworks Defined Roles and Responsibilities Shared Ownership

Cybersecurity Program Management

“I think that in any group activity – whether it be business, sports, or family – there has to be leadership or it won’t be successful.” – John Wooden

“There are risks and costs to action “There are risks and costs to action. But they are far less than the long range risks of comfortable inaction.” – John F. Kennedy