Intro CISO Alliance - Internal use only 9/2/2019.

Slides:



Advertisements
Similar presentations
Informal Peer-to-Peer Feedback Guide
Advertisements

A Covenant University Presentation By Favour Femi-Oyewole, BSc, MSc (Computer Science), MSc (Information Security) Certified COBIT 5 Assessor /Certified.
1 Prepare Yourself for the ICT Industry – A Career in ICT in Hong Kong Police Force Hong Kong Police Force.
Management and Leadership
CIO Academy Journey to Influential IT Leadership Journey to CIO Academy Strategic Competencies for 21st Century CIO Success Influential IT Leadership:
Copyright Scott Wright. All rights reserved. 1 SC Selling the Streetwise Security Awareness Program.
New A.M. Best Cyber Questionnaire
Legal Jeopardy: Whose Risk Is It?. SPEAKERS Jason Straight Chief Privacy Officer and Senior Vice President Cyber Risk Solutions at UnitedLex Patrick Manzo.
Creating a Vision for Fire Fighters to Embrace Leadership and Best Practices.
Welcome and Introduction January 11, 2017
Board Roles & Responsibilities
ACADEMY CONVERSION AND MEMBERSHIP OF THE CHILTERN LEARNING TRUST
National Employee Mental Wellbeing Survey Results 2016
Enterprise Mobility Suite Technical and Business Briefing
February 2017 Demystifying Georgia Tech
National Cyber Security Alliance and Raytheon Survey Findings 2015
Yes, You can be nice and respected
Chapter 9: Project Communications Management
Visionary Leadership Think! Execute! Dominate!
Partnership Delivery Team
Originating the role of Information Governance Officer
Board Concerns About Cyber Security
Spreading story use.
A CIO’s view of SDN Who are REANNZ Current Maturity of SDN (top-down)
A Guide to Using “Beyond the Bake Sale” in Schools
KEY CHANGES TO THE DATA PROTECTION LANDSCAPE
HR Business Partner Individual Development Plans
Informal Peer-to-Peer Feedback Guide
Oracle Cloud: The Who, What, Where, When and Why
Superintendents.
The Sitecore® Experience Platform™ on Microsoft Azure
Stratis Health Leadership Strategy
Industry Placements Workshops
Research for all Sharing good practice in research management
Joining Records Management and Cyber Security
Read the quote and with the person next to you, discuss what you think it means. Do you agree? Why / why not? Be prepared to share your thoughts with the.
“Together Everyone Accomplishes More”
SMB practice development: Security play
collaborative leadership workshop
Objectives To recognize the fear is a natural response to the unknown.
Essential Components.
School Boards.
SMB practice development: Security play
SMART CITIES: No Brainer
1/12/2019 4:38 AM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Emotional intelligence
Bullying Prevention Lampasas Independent School District
Enhancing Leadership in the Classroom
FINDERS, KEEPERS: Getting your stars to stay
The State of Cybersecurity in State Government NAST March 26, 2019
Technical Resources & Training
Leveraging partnership for the DRR knowledge hub
Chapter 9: Project Communications Management
Managing IT Risk in a digital Transformation AGE
Managing Housing for Sustainability and Viability
KEY INITIATIVE Financial Data and Analytics
KEY INITIATIVE Finance Function Management
KEY INITIATIVE Financial Data and Analytics
KEY INITIATIVE Finance Function Management
Social Media and Corporate Social Responsibility
UNIVERSITY SUPPORT AND Work Force Leadership Development Workshop
Resources are available at sim.abel.yorku.ca
National data opt-out - Preparing for implementation
Fire Starter Festival 27 January – 14 February 2020 #fsf2019
Great Managers —What They Know and Do
October is National Cybersecurity Awareness Month
PROF-W10 Up for a Challenge? Learn How to Become a Successful Higher Education CISO Joanna Grama EDUCAUSE Neal Fisch Randy Marchany Tina Thorstenson California.
Policy guide example Guidance and template for creating a travel policy that’s fit for a video enabled world.
Streamline your move to the cloud
Presentation transcript:

Intro CISO Alliance - Internal use only 9/2/2019

Disclaimer Session prepared and presented in private capacity My opinions don`t reflect on Truworths Shared cases and experience depict solely my international background No recording devices allowed Disclaimer CISO Alliance - Internal use only 9/2/2019

How to gain influence & Buy-in for Security investment from the Board?

Challenges for CISO`s Disconnected communication channels Conflicting agendas Management “doesn`t seem to get it” Putting out fires vs. strategic proposition Challenges for CISO`s CISO Alliance - Internal use only 9/2/2019

Ugly Truth Only 22% of CISO`s report directly to the CEO1 80% of Business leaders: Cyber Security = technical/compliance routine2 74% of C-Suite executives agree CISO`s ≠ Board3 Ugly Truth CISO Alliance - Internal use only 9/2/2019

Usual remedy FUD (Fear, Uncertainty & Doubt) Compliance (GDPR,POPIA,PCI DSS, King IV) ….all too often it takes a breach…. Usual remedy CISO Alliance - Internal use only 9/2/2019

Usual Perception FUD = You always bring bad news = Bad News GDPR/POPIA = You`re the compliance guy = Policeman Breach = You weren`t able to protect us = Doubt Usual Perception Showing value rather than argument with fear when it comes to budget or policy decisions CISO Alliance - Internal use only 9/2/2019

Practical Resolutions CISO Alliance - Internal use only 9/2/2019

1. Putting out fires vs. strategic proposition Find your cause. Define your core principles. 3. Let your actions reflect your cause. Source: «Start with Why» S. Sinek, 2009 1. Putting out fires vs. strategic proposition CISO Alliance - Internal use only 9/2/2019

1. Putting out fires vs. strategic proposition Treat your Department as your own company. Improve your business model Source: Strategyzer (https://www.strategyzer.com/training/courses/mastering-business-models) 1. Putting out fires vs. strategic proposition CISO Alliance - Internal use only 9/2/2019

1. Putting out fires vs. strategic proposition Understand your customer Map your Value proposition Source: Strategyzer (https://www.strategyzer.com/training/courses/mastering-value-propositions) 1. Putting out fires vs. strategic proposition CISO Alliance - Internal use only 9/2/2019

2. Management “doesn`t seem to get it” Talk risk not Cyber Security How well are you managing your risk posture? Technical debt – ongoing analysis of legacy systems Why certain risks where acceptable = business benefit What is the governance structure? How did you set up and manage security controls/tools How are your preparing for the future? How are your avoiding additional debts and deficits? How are you enabling business? 2. Management “doesn`t seem to get it” CISO Alliance - Internal use only 9/2/2019

2. Management “doesn`t seem to get it” Make it «personal» Phish your C-Suite (theoretically) Social Media Do`s and Dont`s (privacy settings, etc.) Develop security guides for home environment parental control, ACL`s, MAC Address Filtering, etc. Offer guidance on cloud services (e.g. Evernote) Crash course in mobile security 2. Management “doesn`t seem to get it” CISO Alliance - Internal use only 9/2/2019

3. Disconnected communication channels Ignite the conversation Create «CISO Lunch» Quarterly Security Updates Have your own Intra – Social – Media Channel Coffee – Breaks with Marketing/Data-Analysts 3. Disconnected communication channels CISO Alliance - Internal use only 9/2/2019

3. Disconnected communication channels TRUST create long lasting positive business relationships Control Influence Information Elements of Trust5 3. Disconnected communication channels CISO Alliance - Internal use only 9/2/2019

4. Conflicting agendas «If you can`t beat them – join them.» Big Data Cloud Security Future Workplace (aka Digital Transformation) AI/Machine Learning Key Projects 4. Conflicting agendas CISO Alliance - Internal use only 9/2/2019

Key Take Aways Know what you are standing for (Value Proposition) Research your customers‘ jobs, pains & gains match it with VP Speak the language of your customer Be your own twitter Join the Team  Key Take Aways CISO Alliance - Internal use only 9/2/2019

Christine Fahlberg IT Security Manager Thank You Christine Fahlberg IT Security Manager CISO Alliance - Internal use only 9/2/2019

What are the most common main objections you’re facing when trying to obtain buy-in? CISO Alliance - Internal use only 9/2/2019

Jody R. Westby (2015), Governance of cybersecurity: 2015 report, Georgia Tech Information Security Center Deloitte CISO Labs data, 2015 ThreatTrack Security Inc., No respect: Chief information security officers misunderstood and underappreciated by their C-level peers, June–July 2014 World Economic Forum in collaboration with Deloitte, Partnering for cyber resilience: Towards the quantification of cyber threats, January 2015 ZAND, D. (1997). The Leadership Triad. Oxford University Press Annex CISO Alliance - Internal use only 9/2/2019