analysis and
play

Analysis and BINDU CHANNAVEERAPPA Cybersecurity AND PETER - PowerPoint PPT Presentation

Business BA MANAGER FORUM Analysis and BINDU CHANNAVEERAPPA Cybersecurity AND PETER THOMPSON i - Perceptions Objectives This workshop will provide the necessary insights into the role that can be played by BAs in protecting information


  1. Business BA MANAGER FORUM Analysis and BINDU CHANNAVEERAPPA Cybersecurity AND PETER THOMPSON i - Perceptions

  2. Objectives This workshop will provide the necessary insights into the role that can be played by BAs in protecting information assets. It will include: ▪ an overview of key considerations ▪ a framework that can be used to shape the BA approach ▪ case study examples ▪ an opportunity for group discussion i - Perceptions

  3. Agenda ▪ What is cybersecurity? ▪ How does cybersecurity affect your organisation? ▪ Relevance to Business Analysis ▪ What skills does a BA need with respect to cybersecurity? i - Perceptions

  4. i - Perceptions

  5. What is cybersecurity? i - Perceptions

  6. INFORMATION ANALYSIS RISK ANALYSIS FRAMEWORKS STANDARDS LEGAL & REGULATORY GATEWAYS CRYPTOLOGY FIREWALLS PROCESS TECHNICAL CONTROL CONTROL @Bindu Channaveerappa i - Perceptions

  7. Syndicate group exercise/discussion How does cybersecurity affect your organisation? Are there any specific vulnerabilities within your organisation? What is your organisation’s threshold for cybersecurity? i - Perceptions

  8. Considerations for the BA Information is a corporate resource and hence a business issue… Physical Financial Human Organisation Resource Information & Audit Technology Processes People Reputation Know-how i - Perceptions

  9. Considerations for the BA Importance of information within an organisation… Analyse patterns and trends Understand competitors (benchmarking, league tables) Strategic Make forecasts about the future Create new products and services Tactical Help make informed decisions Support day-to-day Operational business processes Production Finance Sales/ Human Marketing resources i - Perceptions

  10. Considerations for the BA Compliance with legislation (e.g. GDPR)… C Confidentiality I Integrity A Availability Intellectual IP Property i - Perceptions

  11. Considerations for the BA Security is holistic ▪ Tendency for too much focus Business on technology and the IT function ▪ Security is only as good as the Information weakest link Security Technology Policy ▪ Ownership should be within the business! Information Systems i - Perceptions

  12. Syndicate group exercise/discussion What do BAs currently do with regard to cybersecurity? What should/could they do? i - Perceptions

  13. Bringing it together Standards and Accreditations ▪ What is ISMS* framework? ▪ Benefits of the ISMS standards ▪ ISMS critical success factors *Information Security Management Systems i - Perceptions

  14. Strategies for successful implementation… ▪ Identifying the information assets and the understanding the life line ▪ Clearly stated business objective to protect information assets ▪ Senior management commitment is mandatory and should involve each and everybody in the organisation ▪ ISM has to manifest in every task in the organisation is undertaking ▪ Require skills and understanding of both security and business teams ▪ External consultants will need to involve people from all teams ▪ Requires constant monitoring, review, and continuous improvement i - Perceptions

  15. Syndicate group exercise/discussion How will you increase the awareness and knowledge on cybersecurity in your BA teams? What one thing will you aim to implement when you go back to your work? i - Perceptions

  16. Summary ? ? ? WHY? WHAT? HOW? ? ? ? WHO? WHEN? WHERE? i - Perceptions

  17. Next steps ▪ Thanks! ▪ Document of supporting material and feedback from exercises to follow within 2 weeks ▪ Further questions… bindu.channaveerappa@outlook.com peter.thompson@assistkd.com i - Perceptions

  18. Business BA MANAGER FORUM Analysis and BINDU CHANNAVEERAPPA Cybersecurity AND PETER THOMPSON i - Perceptions

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend