Security: Yes. Risk: Getting There. Breaches: Uh Oh. People: Aha! P RESENTATION Top 7 Issues for CISOs.

Slides:



Advertisements
Similar presentations
Managing Outsourced Service Providers By: Philip Romero, CISSP, CISA.
Advertisements

Why conduct supplier accreditation assessments? Executive Accreditation Specialists (Pty) Ltd November 2010.
IT Governance and Enterprise Architecture CAUDIT Enterprise Architecture Symposium – Nov 2006 Leo de Sousa, Enterprise Architect British Columbia Institute.
ENGAGE IN A CAREER IN BUSINESS 8/2/2011. ENGAGE IN A CAREER IN BUSINESS Some Job Descriptions Include: Operations Technology Finance Investment Management.
I MPLEMENTATION OF AN E NTERPRISE -W IDE R ISK M ANAGEMENT F RAMEWORK Stuart Lovell Manager HR and Risk Glenorchy City Council.
The Future of the IT Department Exploring the impact of Cloud on IT Roles and Responsibilities.
Diamond Consultants Growth Advisory Group Because organic growth alone won’t get you where you want to go. ©2015 Diamond Consultants.
The FISMA Secret October 29, Of the $6.2* billion that the Federal government spent on cyber defense in 2008, it spent some $1.31 billion on FISMA.
W OMEN E NTREPRENEURS IN E UROPE AND C ENTRAL A SIA Sarosh Sattar Europe and Central Asia Region April 28, 2010.
Information Security Governance
ISS IT Assessment Framework
Copyright © 2001 by Harcourt, Inc. All rights reserved.
Operational Auditing--Fall Operational Auditing Fall 2009 Professor Bill O’Brien.
Overview and Introduction
Implementing and Auditing Ethics Programs
© 2012 McGladrey LLP. All Rights Reserved.© 2014 McGladrey LLP. All Rights Reserved. © 2012 McGladrey LLP. All Rights Reserved. © 2013 McGladrey LLP. All.
Relevant Impact Building an Enterprise Security Program Tech Security ConferenceMinneapolis April 10, 2014.
Part 3 Managing for Quality and Competitiveness © 2015 McGraw-Hill Education.
Deloitte Consulting SCOOPS Session September 2003.
Presenting The Broker-Dealer Certification Tool The Compliance Department Inc. Broker Dealer Compliance Consultants Compliance SCORE Powered by Keane BRMS.
Internal Audit within the Financial Services Authority
Engineering Management From The Top Power Behind the Storage.
Section Topics Establish a framework for assessing risk
M&A T ODAY: T ECHNOLOGY, I NFORMATION & B USINESS S ERVICES I NVESTING I N B USINESS S ERVICES Amy LaBan Lake Capital February 12, 2004.
The Institute and the Profession: 1 Personalize your title and presenter here. The Institute and the Profession The Institute and the Profession: 1.
Private & Confidential1 (SIA) 13 Enterprise Risk Management The Standard should be read in the conjunction with the "Preface to the Standards on Internal.
Enterprise Risk Management Chapter One Prepared by: Raval, Fichadia Raval Fichadia John Wiley & Sons, Inc
The Future-State CIO: The Rise of the Business Strategist Steve Rovniak Director, EMEA.
BUILDING STRATEGIES FOR SUCCESS, LLC “When Coaching Counts”
Adaptive Processes Consulting Pvt. Ltd. An ISO 9001:2000 Certified Company This document is the property of and proprietary to.
Scoping GIS projects Geog 469 GIS Workshop. Outline 1.What is a possible scope for a GIS project? 2.What is a methodology for a GIS (project) implementation.
Security Trends & Industry Insights
Social Roles and Relationships.
Rootberg Business Services, Inc.. Local Firms vs. National Firms  Diversity of experience (not pigeon-holed).  Direct contact with partners and upper.
IBM Security Pelin Konakçı IBM Security Software Sales Leader
Why Strategic Energy Management Is Important To Businesses Peter Charville-Mort, Analyst
[] FHF Management Is... A process designed to achieve an organization’s objectives by using its resources effectively & efficiently in a changing environment.
Legal Jeopardy: Whose Risk Is It?. SPEAKERS Jason Straight Chief Privacy Officer and Senior Vice President Cyber Risk Solutions at UnitedLex Patrick Manzo.
Michael A. Hitt C. Chet Miller Adrienne Colella a strategic approach to organizational behavior.
111 © 2001, Cisco Systems, Inc. All rights reserved. Presentation_ID Cisco Services & Support World Class Partners Technical Support Services Advanced.
© 2013 Deloitte Belgium DEF-Debate “Cyber Security – Risks and Opportunities for Europe’s Economy ” May 21 st 2014 Erik R. van Zuuren Director Deloitte.
Part 3 Managing the Marketing Channel. Chapter 9 Motivating the Channel Members.
Organization  As a member of the Strategy & Business Development team, this position will support the development and execution of Corporate, Sector,
Cyber Security ⃝ Managing risk is at the forefront of every financial professional’s mind. CFMA Southern Ontario invites you to join in the discussion.
Developing an Audit Program By Rodney Kocot President Systems Control and Security Incorporated Copyright © 2005 Rodney Kocot.
Unifying Talent Management. Harnessing the Power of Workforce Intelligence in Talent Planning to Drive Business Performance.
Cyber Risks: Protecting confidential data against unauthorized access Vik Bansal Deloitte & Touche LLP John Reidhead State of Utah March 17, 2016.
Presented by Jennifer Alpert, Vice President Lester Consulting Group, Inc. Connecting People with Possibilities TM F EASIBILITY S TUDY B OARD O RIENTATION.
HR Anexi A brief Profile. ƒ ƒ ƒ ƒƒƒƒ Genesis  Established in 2007 by industry professionals, HR Anexi is a strategic human capital consulting organization.
MPF Knowledge Panel Positioning your Knowledge Management capability Results of the April 2010 survey Steve Perry 19 May 2010.
Earth’s Mightiest Heroes: Combating the Evils Lurking in Cyberspace
Information Security Program
The Practice of Strategy
University of Stellenbosch Business School
THE DENTAL PLAN.
USING TECHNOLOGY FOR IMPROVEMENT
به نام خداوند بخشنده و مهربان.
Information Technology Policy Institutional Data Policy
DEF-Debate “Cyber Security – Risks and Opportunities for Europe’s Economy ” May 21st 2014 Erik R. van Zuuren Director Deloitte ERS BE Board Member EEMA.
Mitch Morris, MD Vice Chairman Deloitte LLP
Deloitte Consulting LLP SCOOPS Session
Cyber Security professions Overview
League for Innovations Conference March 2018
AllClear ID Executive Speakers
Risk Mitigation & Incident Response Week 12
Guy Blissett - bio Client Relationship Executive
Session 8: Innovative Uses of Captives: Cyber and Beyond
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
Jobs You Can Get After Completing Masters in International Business
Yvette Connor Strategic Risk Management Engagement Leader
Presentation transcript:

Security: Yes. Risk: Getting There. Breaches: Uh Oh. People: Aha! P RESENTATION Top 7 Issues for CISOs

Data Classification: SecureState Public S POTLIGHT ON THE P RESENTERS 2 Stephen Marchewitz President Steve has more than 15 years of experience in multiple aspects of information systems, security, management, and risk advisory services. Don Miller Manager of Cyber Security & IT Compliance at FirstEnergy Fulfilling the CISO role and building the security function from its infancy for over 10 years, Don has developed and implemented the enterprise cyber security, risk and compliance programs for First Energy. Don started his career at Bell Labs and was a Sr. Manager at both E&Y and Deloitte & Touche.

Data Classification: SecureState Public A UDIENCE D EMOGRAPHICS 3

Data Classification: SecureState Public S ECURE S TATE O VERVIEW 4 Management Consulting Firm Specializing in Information Security Established in 2001 By identifying the problem in a causal relationship we can provide tactical and strategic recommendations to position our clients in achieving their SecureState.

Data Classification: SecureState Public S ECURE S TATE P HILOSOPHY 5

Data Classification: SecureState Public What are CISOs Saying? 6

Data Classification: SecureState Public B ACKGROUND SecureState Research and Innovation Study Discussions with 20 CISOs Interviews ended Q Questions such as: – What are your top issues? – What things have the greatest impact to your success? – What trends are you seeing or dealing with? Some responses were formal interviews, others were anecdotal or compiled from our assessments 7

Data Classification: SecureState Public CISO I SSUE #1: M ARKETING AND S ELLING OF S ECURITY 8

Data Classification: SecureState Public CISO I SSUE #2: P RESENTING TO O THER E XECUTIVES AND THE B OARD 9

Data Classification: SecureState Public CISO I SSUE #3: U NDERSTANDING ( AND C ONVEYING ) HOW THE B USINESS M AKES M ONEY 10

Data Classification: SecureState Public CISO I SSUE #4: S PEAKING IN B USINESS L ANGUAGE, NOT T ECHNICAL 11

Data Classification: SecureState Public CISO I SSUE #5: H ELPING THE CEO ‘W IN ’ 12

Data Classification: SecureState Public CISO I SSUE #6: S ECURING N EW T ECHNOLOGY 13

Data Classification: SecureState Public CISO I SSUE #7: S TRATEGIC (R ISK ) M ANAGEMENT 14

Data Classification: SecureState Public “B ONUS ” CISO I SSUE #8: L OSING Y OUR J OB A FTER A B REACH 15

Data Classification: SecureState Public T HANK YOU FOR YOUR TIME ! A Q & Q U E S T I O N S A N S W E R S Stephen Marchewitz President