pract ctical cybersecu curity ri risk a and c control ma
play

Pract ctical Cybersecu curity Ri Risk a and C Control Ma - PowerPoint PPT Presentation

Pract ctical Cybersecu curity Ri Risk a and C Control Ma Maturi urity A y Asse ssessme ssments Brian Fricke, CISSP, CISM Chief Information Security Officer None of the data presented in this presentation represents the actual security


  1. Pract ctical Cybersecu curity Ri Risk a and C Control Ma Maturi urity A y Asse ssessme ssments Brian Fricke, CISSP, CISM Chief Information Security Officer None of the data presented in this presentation represents the actual security posture of the presenter’s organization.

  2. Like all Financial Institutions; we are required to perform appropriate Cyber Risk Assessments, Control Testing, and Status Reports to the Board. BUT HOW?! None of the data presented in this presentation represents the actual security posture of the presenter’s organization.

  3. Two Key Ingredients A Risk Assessment: the determination of quantitative and qualitative estimates of the impact of an event, related to a well-defined situation, and a recognized threat. A Control Maturity Assessment: the process designed to provide reasonable assurance of the achievement of control objectives (control effectiveness). None of the data presented in this presentation represents the actual security posture of the presenter’s organization.

  4. Risk Assessment Impact + Likelihood Inherent Risk Inherent Risk + Control Effectiveness Residual Risk None of the data presented in this presentation represents the actual security posture of the presenter’s organization.

  5. Select a Control Framework Other Control Frameworks None of the data presented in this presentation represents the actual security posture of the presenter’s organization.

  6. Control Maturity Dashboard Security https://www.linkedin.com/pulse/cybersecurity-risk-control-maturity-assessment-fricke-cissp-cism/ None of the data presented in this presentation represents the actual security posture of the presenter’s organization.

  7. Risk Dashboard None of the data presented in this presentation represents the actual security posture of the presenter’s organization.

  8. Risk Assessment Impact + Likelihood = Inherent Risk https://www.linkedin.com/pulse/cybersecurity-risk-control-maturity-assessment-fricke-cissp-cism/ None of the data presented in this presentation represents the actual security posture of the presenter’s organization.

  9. Control Assessment Each sub-control receives a scored Control Rating. The total Inherent Risk + Control Effectiveness = scoring equals the overall Control Effectiveness (Assurance Residual Risk Rating). https://www.linkedin.com/pulse/cybersecurity-risk-control-maturity-assessment-fricke-cissp-cism/ None of the data presented in this presentation represents the actual security posture of the presenter’s organization.

  10. Critical Security Control #1: Inventory of Authorized and Unauthorized Devices None of the data presented in this presentation represents the actual security posture of the presenter’s organization.

  11. Critical Security Control #1: Inventory of Authorized and Unauthorized Devices None of the data presented in this presentation represents the actual security posture of the presenter’s organization.

  12. Bottom Line Message: Your Organization’s overall level of Inherent Risk has been rated at High. The Company has implemented 130 of the 149 Critical Security Controls (87%). This is a 66% improvement from 2016. Of the 130 Controls implemented, 80% have a Maturity rating of equal to or greater than Generally Effective. This brings the Overall Cybersecurity Residual Risk to Moderate; which is within the Board's defined Risk Appetite. None of the data presented in this presentation represents the actual security posture of the presenter’s organization.

  13. • Establish a method of conducting Risk Assessments • Establish a method of conducting Control Maturity Assessments • (Link the two) • Empower control owners to make an impact to the organization • Report it to Management, Committees, Auditors, Regulators, and the Board • Never stop measuring, assessing, and improving. “You can’t manage what you can’t measure.” -Peter Drucker https://www.linkedin.com/in/brianrfricke The information presented will be made available. THANK YOU! https://www.linkedin.com/pulse/cybersecurity-risk-control-maturity-assessment-fricke-cissp-cism/ None of the data presented in this presentation represents the actual security posture of the presenter’s organization.

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend