Using COBIT 5 Framework for Cybersecurity Assessment Hugh Burley, - - PowerPoint PPT Presentation

using cobit 5 framework for cybersecurity assessment
SMART_READER_LITE
LIVE PREVIEW

Using COBIT 5 Framework for Cybersecurity Assessment Hugh Burley, - - PowerPoint PPT Presentation

Conference 2018 Conference 2018 Using COBIT 5 Framework for Cybersecurity Assessment Hugh Burley, Trevor Hurst, and Ivor MacKay Speakers Trevor Hurst, Chief Information Officer Ministry of Advanced Education, Skills & Training Hugh


slide-1
SLIDE 1

Conference 2018

Conference 2018

Using COBIT 5 Framework for Cybersecurity Assessment

Hugh Burley, Trevor Hurst, and Ivor MacKay

slide-2
SLIDE 2

Conference 2018

Speakers

Trevor Hurst, Chief Information Officer Ministry of Advanced Education, Skills & Training Hugh Burley, Manager of Information Security/Information Security Officer Thompson Rivers University/BCNET Ivor MacKay, Manager, Information Technology BCNET

slide-3
SLIDE 3

Conference 2018

Agenda

  • 1. COBIT 5 Refresher
  • 2. Why COBIT 5
  • 3. Assessments
  • 4. Q & A
slide-4
SLIDE 4

Conference 2018

COBIT 5 Refresher

slide-5
SLIDE 5

Conference 2018

COBIT PRINCIPLES

slide-6
SLIDE 6

Conference 2018

Meeting Stakeholder Needs

slide-7
SLIDE 7

Conference 2018

COBIT 5 ENABLERS

slide-8
SLIDE 8

Conference 2018

GOVERNANCE VS MANAGEMENT

slide-9
SLIDE 9

Conference 2018

slide-10
SLIDE 10

Conference 2018

Why COBIT 5?

slide-11
SLIDE 11

Conference 2018

Alignment

“How do I ensure all of our Digital investments contribute to Stakeholder Value and enable the strategy of my Institution?

Audit preparation (Risk Management)

Tell a better story (funding)

“How do I ensure benefits are realized and IT risks are mitigated? How can I prepare for upcoming Audit and/or review activity? “How do I better communicate the gaps in our environment and achieve better funding?

slide-12
SLIDE 12

Conference 2018

OAGBC General Computing Controls Report

http://www.bcauditor.com/sites/default/files/publications/reports/OAGBC %20General%20Computing%20Controls%20Report_FINAL.pdf

slide-13
SLIDE 13

Conference 2018

COBIT Maturity

slide-14
SLIDE 14

Conference 2018

COBIT Maturity

slide-15
SLIDE 15

Conference 2018

Assessments

slide-16
SLIDE 16

Conference 2018

Assessment vs Audit Or is it really Gap Analysis vs. Internal Audit vs. Pre-Assessment

slide-17
SLIDE 17

Conference 2018

Differences Between the COBIT 4.1 and the COBIT 5

slide-18
SLIDE 18

APO12 Manage Risk APO13 Manage Security BAI06 Manage Changes DSS02 Manage Service Requests and Incidents

slide-19
SLIDE 19

Conference 2018

Assessment Methodology

slide-20
SLIDE 20

Conference 2018

KEY AREA: RISK a) Level of risk acceptance b) Risk review c) Risk approval KEY AREA: MANAGING SECURITY

slide-21
SLIDE 21

Conference 2018

Risk Assessment Consequence Table

slide-22
SLIDE 22

Conference 2018

KEY AREA: MANAGING CHANGE a) Methods of assessing change and its risks b) Approval process KEY AREA: MANAGE SERVICE REQUESTS AND INCIDENTS a) Problem tracking b) Evidence of reviewing Incidents and Requests

slide-23
SLIDE 23

Conference 2018

Self-Assessment

slide-24
SLIDE 24

Conference 2018

Self-Assessment

http://www.isaca.org/COBIT/Pages/Self-Assessment-Guide.aspx

slide-25
SLIDE 25

Conference 2018

Self-Assessment

http://www.isaca.org/COBIT/Pages/COBIT-5-PAM.aspx

slide-26
SLIDE 26

Conference 2018

Info~Tech