Cyber Threat Vigilance An Organizational Imperative

Slides:



Advertisements
Similar presentations
IBM Corporate Environmental Affairs and Product Safety
Advertisements

Management, Leadership, & Internal Organization………..
Executive Insight through Enhanced Enterprise Risk Management Leverage Value From Your Risk Management Investment.
Improving Your Business Results Six Sigma Qualtec Six Sigma Qualtec Six Sigma Qualtec – All Rights Reserved June 26, 2002 BEYOND SIX SIGMA: A HOLISTIC.
Certified Business Process Professional (CBPP®)
Copyright © 2014 Prosci. All rights reserved. Prosci ® Change Management Overview Please read Right to use this content is governed by the licensing terms.
Charting a course PROCESS.
© 2011 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
© 2003 IBM Corporation July 2004 Technology planning for not-for-profit organizations IBM volunteer name Title, organization.
Enterprise Risk Management (ERM) Minnesota Department of Transportation Enterprise Risk Management (ERM) Minnesota Department of Transportation TRB International.
AGENDA 09/09 & 09/10 F Nature of Strategic Challenge & F Strategic Management F The Strategy Concept and Process F Strategic Plan - Team Meetings.
McGraw-Hill/Irwin Copyright © 2008 by The McGraw-Hill Companies, Inc. All rights reserved. Reaching Goals: Plans and Controls Today’s smart supervisor.
The Challenge of IT-Business Alignment
PROJECT MANAGEMENT. A project is one – having a specific objective to be completed within certain specifications – having defined start and end dates.
Holistic Approach to Security
Getting There from Here: Creating an Evidence- Based Culture Within Special Education Ronnie Detrich Randy Keyworth Jack States.
Nuclear Security Culture William Tobey Workshop on Strengthening the Culture of Nuclear Safety and Security, Sao Paulo, Brazil August 25-26, 2014.
Change Management 1 Intro To Business. Intro to Business Defining change management Individual change management Organizational change management Who.
Strategic and Business Planning for Ensuring of Cooperatives Sustainability Dr. Hakkı Çetin TARIS Union of Olive and Olive Oil Agricultural Sale Cooperatives.
Leadership Guide for Strategic Information Management Leadership Guide for Strategic Information Management for State DOTs NCHRP Project Information.
Phase-1: Prepare for the Change Why stepping back and preparing for the change is so important to successful adoption: Uniform and effective change adoption.
IAEA International Atomic Energy Agency Computer Security Culture and Capacity Building Overview Presented by: May 2016.
1 Chapter 9 Implementing Six Sigma. Top 8 Reasons for Six Sigma Project Failure 8. The training was not practical. 7. The project was too small for DMAIC.
JMFIP Financial Management Conference
Logic Models How to Integrate Data Collection into your Everyday Work.
Job Titles Examples Used for HISD Nonexempt Jobs
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
BUSINESS PLUG-IN B15 Project Management.
Alexander Graham Bell Elementary School
Systems Analysis and Design in a Changing World, 4th Edition
Building Better IT Leaders from the Bottom Up
Reaching Goals and Objectives
Hyper-V Cloud Proof of Concept Kickoff Meeting <Customer Name>
Overview – Guide to Developing Safety Improvement Plan
9/16/2018 The ACT Government’s commitment to Performance and Accountability – the role of Evaluation Presentation to the Canberra Evaluation Forum Thursday,
Chapter 3 Performance Management and Strategic Planning
TSMO Program Plan Development
Change Agents Why your Transformational IT Initiative Will Fail Without Them Terri Campbell Sr. Director of Change Leadership.
NASSCOM India Leadership Forum 2008
Chapter 6 Project Management and Project Cycle Management.
Research Program Strategic Plan
Vision Facilitation Template
Overview – Guide to Developing Safety Improvement Plan
Managing Change and Other Keys to Successful Implementation
Establish Process Governance
Guidance notes for Project Manager
Quality Department
Lockheed Martin Canada’s SMB Mentoring Program
By Jeff Burklo, Director
Professional Certificate in Strategic Change Management
Implementation Guide for Linking Adults to Opportunity
Management, Leadership, and the Internal Organization
Presentation to the INTOSAI Working Group on IT Audit Systems assurance and data analytics for continued audit quality and improved efficiency of audits.
NASSCOM India Leadership Forum 2008
Chapter 8 Developing an Effective Ethics Program
Strategic Plan Implementation July 18, 2018
Cyber security Policy development and implementation
Management, Leadership, and the Internal Organization
Management, Leadership, and Internal Organization
How to conduct Effective Stage-1 Audit
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
Define Your IT Strategy
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
Leadership and Strategic Planning
KEY INITIATIVE Shared Services Function Management
Module 3 Part 2 Developing and Implementing a QI Plan: Planning and Execution Adapted from: The Health Resources and Services Administration (HRSA) Quality.
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
KEY INITIATIVE Finance Function Management
Developing SMART Professional Development Plans
Presentation transcript:

Cyber Threat Vigilance An Organizational Imperative Opening statements and introductions here

Agenda Introductions Cyber Security: A permanent threat, the need for cultural vigilance The invisible workforce gap; workforce attention Transformation: Definitions, keys to success, staying on course in becoming a culture

Agenda The Valentine’s Day Cyber Exercise Status of the current situation Support team Phase zero (handout) Summary/next step

“Culture” The fundamental attentions that determine the daily attentions of a workforce Cyber culture: A necessary element of vigilance against the permanent threat of cyber intrusion Cyber culture: Technical attentions, technology solutions and much more

Cyber Security Threat Status

Attacks and Consequences By 2021, estimated 3.1 million attacks Average cost of data breach: millions Cyber costs annually: trillions Directors on Boards who feel the company they serve are properly secured against a cyber attack….

Cyber Breach Examples Power plants Verizon Uber Equifax Yahoo Merck Target

Business Continuity Impacts Damage to equipment, systems Data intrusions Safety of employees and/or the public Economics Corporate reputation

The Problem is Not Under Control Directors on boards who feel the company they serve are properly secured against a cyber attack … 2016 – 42% 2017 – 37%

Present Situation Future Expectations Broad range of sophistication of attacks Numbers are growing Will not be “going away”/no zero end state/always adapting Risk minimization/incident response planning …both needed

Additional Infiltration Observations The “newest technological mayhem” “The perfect weapon” “The professionalism of cyber crime” “Fully converged processes are rarely in place today” Fifty three percent of operating personnel have never received cyber security training Shortfall of cyber security experienced personnel

Necessary Response Types

Workforce Attentions A Focus: Analytical cyber risk assessment by specialists Resultant Gap: Total workforce commitment and involvement Gap closing: Cyber attention as a culture element End State : Result of attentions, evaluations, and capabilities Precedent: Nuclear billboards and metrics

Cyber Security Transformations The next element of an organization’s culture Much more than “continuous improvement” A quantum leap of change More than a big project A “persuasive” activity

Culture Change “A sustainable shift in mind set and daily attention by each employee” Change is tough Transformation is tougher Communicate, communicate, communicate Implement, implement, implement

Change is Tough Uncertainty “Why” “What’s it mean for me” New responsibilities and interfaces Shift in resource allocations New skill sets/training Capability, willingness, confidence in the organization to execute the change properly

Keys to Success Communicate, plan, implement, monitor, recognize success Senior level vision setting, visible involvement Program management rigor Formalized resource shifts Proper timing of workforce involvements and end states (planning , daily behaviors outcomes), ambassadors, champions

Staying on Course/Threats Lack of persistence (Executives, implementers, budgets) Organizational drift Not learning from past attempts to change Roles and responsibilities not clearly defined Priority constraints Insufficient skill and infrastructure gaps not understood or corrected Lack or disappearance of leaders’ vigilance

Cyber Culture Testing Valentine’s Day Exercise Holiday Greetings sent to workforce by an unfamiliar sender Guidance provided to an interesting attachment Results: alarming number of employees accessed the attachment

Where are you?

Where are you? “Where you are” determines what to do to get the future … are you OK? Current attention to cyber related matters Current relevant infrastructure attentions relevant to a cyber culture Is there a recent history of a major change being addressed by the organization? Feedback differences, locations, departments, managers, workforce

Relevant Infrastructure(examples) Training Communications Program management, change management Work processes and procedures Security Practices Organization structure Information collection and sharing Policy, policy development attentions

What to Do Assess relevant current conditions; First Step Involve a collaboration of experienced change practitioners and client employees Integrated ,interdependent ,and comprehensive attention to culture “infrastructure” Use first step results to define transformation

Advisory/Implementation Support… Our Team Credentials Communications Training Policy, work processes , procedures Organizational structure and development Transition planning ,implementation, and management Cyber Security Program management, change management Readiness reviews

Our Approach: Effective and Unique Resource base of dozens of senior consultants Experienced in advising and implementing transition programs Cyber specialists on board Culture as a key element of long term vigilance Our commitment to be with you long term Ownership in place: Interested and already involved Formal Program Management attention and rigor

Phase Zero Approach OBJECTIVE Collaborative, integrated ,objective evaluation of current condition of cyber security at a client’s organizations and specific needs/readiness to advance

Phase Zero Approach OUTCOMES Assessment: Current state of cyber security defenses Current level of maturity of a cyber security vigilant culture Existence and effectiveness of transformation relevant infrastructure Organization’s histories of large change ,related leadership Feedback: Provide client with a discussion document of assessment findings Interact with client to establish the basis for and then propose a client-specific proposal of scope, schedule, and budget for an implementation which is designed to establish cyber security vigilance as a defining characteristic of each client organization and its workforce.

Phase Zero Approach ACTIVITIES Information collection from a client’s organizations and locations, focused on the areas. “Transformation relevant infrastructure” topics will include: Training  Information sharing  Communications  Self assessment  Work processes and procedures  Supply Chain procurement, involvement  Change management programs  Risk policies, policy development, related analysis  Project management rigor  Technology tool leveraging  Personal accountability  Resource allocation  Information and data security  cyber organizations Cyber Exercise development and execution. Aimed to assess workforce wide responses to situations that if real would constitute cyber threats. The testing would be low time investment of each employee and serve as one indicator of the current level of understanding and vigilance.

Long-Term Collaboration Establishment and Continuation of Cyber Security Culture Daily Execution Assess Expected Benefits Being Accomplished Documentation of Accomplishments Monitoring of External Cyber Environment Monitoring of Internal Cyber Culture Agreements/ Implementations Recommended Attentions and Enhancements Enhancements Identified and Implemented Confirmation of Organized Vigilance/Culture Maintained Readiness and Capabilities Assessment

Summary/Next Steps Cyber Security Fundamental: Embed a culture Transformation, Success Factors, Challenges Transformation Support Team, Experienced Practitioners, All interested members and Involved Already Phase Zero Collaboration/Current Condition Assessment : Our Suggested Approach Readiness for a Phase Zero proposal