ciso 90 day plan
play

CISO 90 Day Plan Nelson Chen, M.SC. IT CISSP, CISA, CISM Agenda - PowerPoint PPT Presentation

CISO 90 Day Plan Nelson Chen, M.SC. IT CISSP, CISA, CISM Agenda Why are we here? Days 0 30 Days 31 60 Days 61 90 Days 90+ Infinity & Beyond Avoiding Really Bad News! <Your Company Name Here> Data


  1. CISO 90 Day Plan Nelson Chen, M.SC. IT CISSP, CISA, CISM

  2. Agenda • Why are we here? • Days 0 – 30 • Days 31 – 60 • Days 61 – 90 • Days 90+ • Infinity & Beyond

  3. Avoiding Really Bad News! <Your Company Name Here> Data Breach!

  4. Don’t be the Blocker! E B Y A M

  5. Don’t be the Prophet of Doom

  6. Toughest Part of the Job

  7. CISO Post-Breach

  8. Establishing Relationships & Trust 0 - 30

  9. Selling CISO as a Service • Business enablement • FUD is not the only pitch • Education • Shared responsibility • Get support and buy-in • Add Value!

  10. Taking Initial Inventory • Organizational Structure - Who’s who – Execs, BU Leaders, IT Ops, Internal Audit • Existing Policies, Processes, etc. • Existing Technologies • Where’s the Data? • Historical Security Incidents • Shadow IT

  11. Leading Towards Better Security

  12. Servant Leadership

  13. Security Surrounds us, Penetrates us and Binds us Together

  14. Prioritizing & Project Kickoff 31 - 60

  15. Back to Basics - CIA Triad Keeping it secret Keeping it together Keeping it up Central Oregon Community College

  16. Fox-in or Fox-out?

  17. Team or Committee?

  18. Security Team Building • BU InfoSec Officers – Legal, Finance, Sales, Marketing, HR, Development, IT, etc • Committee driven • Executive sponsor • Internal audit is your friend • Where are all the resources? KissPNG

  19. Security Committee Goals • Business Security Mission Statement • Aligning security with each BU - what are we protecting? • Taking detailed inventory – Processes, Systems, Data, People • Budgetize, Prioritize, Projectize • Reporting directly to C-levels KissPNG

  20. Security Assessment & Gap Analysis • Capability Maturity Model (CMMI) • Cybermaturity Platform

  21. CMMI – 5 Levels Process performance continually Level 5 improved through incremental and innovative technological Optimizing improvements. Level 4 Processes are controlled using statistical Quantitatively and other quantitative techniques. Managed Level 3 Processes are well characterized and understood. Processes, standards, procedures, tools, etc. are Defined defined at the organizational (Organization X ) level. Proactive. Level 2 Processes are planned, documented, performed, monitored, Managed and controlled at the project level. Often reactive. Level 1 Initial Processes are unpredictable, poorly controlled, reactive. CMMI Institute

  22. WTF-OMG Compliance

  23. How and Where to Focus? The Cybersecurity Hub on Twitter

  24. Critical Business Processes Apttus

  25. Patch Management is Paramount! National Library of Austrailia

  26. Data Inventory • What, where, why, when & how • Follow the data trail • Backups • End-user computers • Storage media • Archived applications • What’s in the Cloud?

  27. Data Classification • Public, Internal, Confidential, Secret • PII: Customer & Employee • Defined Repositories • Commensurate Security Levels • Managed Data Life Cycle

  28. Security Policy • Compliance Driven • Business Driven • Ownership • 3 rd party • Customer Input • Training • Controls Design & Mapping – Cloud Controls Matrix (CCM) - Cloud Security Alliance

  29. Building Secure Foundations 61 - 90

  30. Security vs Security Operations SecOps Wordpress

  31. Security Awareness Training • Business Unit Relevance • Joint delivery with BU-ISO • Compliance driven • Sec-Dev-Ops Training • Relevant 3 rd Party training

  32. Application Security Verizon 2018 DBIR • Every company is a technology company • In-house vs 3 rd Party • Secure SDLC • Training • your Webapp!

  33. Business Continuity • Business Process Driven • Disaster Recovery – Defined RTOs & RPOs • Backup Strategy • Denial of Service • Testing Stepup IT

  34. Prepare for the Worst

  35. Data Breach Preparedness • Breach Scenario Planning • Table-top Exercises IN CASE OF • Decision Tree EMERGENCY BREAK GLASS Data Breach • Detection & Logging Response Plan • Contact Lists • Time-to-Notify • Bitcoins?!

  36. Customer-Facing Security • Securing Client Services • Supporting Sales • Customer Security Compliance • Vendor Security Questionnaires • Legal Agreements – Security Language

  37. 90+

  38. Security is a Board-level Problem

  39. And a message from the • On November 1, 2018, Data Breach Notification Laws will be enforced in Canada

  40. KEEP CALM DO THE RIGHT THING AND CYA

  41. The Tribe Has Spoken … NOT ME NOT ME

  42. Chief I’m the Scapegoat Officer Questions?

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend