we help small and mid sized businesses complete their
play

We help small and mid-sized businesses complete their critical - PowerPoint PPT Presentation

We help small and mid-sized businesses complete their critical projects in the Technology, Cybersecurity and Accounting space. Support Architecture TECHNOLOGY Cloud Virtualization ERP|CRM Infrastructure Systems + Network Engineering


  1. We help small and mid-sized businesses complete their critical projects in the Technology, Cybersecurity and Accounting space.

  2. Support Architecture TECHNOLOGY Cloud Virtualization ERP|CRM Infrastructure Systems + Network Engineering Finance Systems ACCOUNTING Audit Accounting & FINANCE Tax Treasury Compliance & Risk Assessments Remediation Project Management CYBERSECURITY Security Program Roadmap & Oversight Ongoing CISO Advisory Services

  3. Security Program? CISO? What Are They and Why Do I Need Them? CYBERSECURITY Mike Rock CISO CISO INSIGHT AND PRACTICAL ADVICE FOR YOUR BUSINESS.

  4. Agenda Security Program Definition Business Drivers Components CISO Definition Key Responsibilities

  5. “ A cybersecurity program is a business plan for cybersecurity, including protection of digital assets, “ business operations and reputation.

  6. = Cybersecurity Program Business Plan Executive Summary Program Summary Business Description Scope and Objective Market Analysis Risk/Threat Assessment Organization Management Roles and Responsibilities Sales Strategies Road Map Funding Requirements Funding Requirements v Growth Projections Maturity and Capability v Projections

  7. Business Components That Drive Your Cybersecurity Program • Business Process Uptime • Protection of Intellectual Property • Protection of Customer Data • Customer Revenue Loss • Business Reputation • Fines, Penalties • Regulatory / Legal Requirements

  8. Questions your security program should answer: What is your strategy for When are users accessing protecting what the more than usual? company cares about the Where is your data? most? Do your third parties Who has access to your practice good security data? practices? Do your employees know Is someone is loitering in how to help prevent your information systems? losses? How do you respond if you Are your information find someone loitering? systems protected?

  9. Chief Information Security Officer (CISO) The diagram on the next slide outlines the skillset a CISO must have to meet your business needs.

  10. Key Responsibilities of a CISO: • Accountable to deliver the security program • Engage and lead business leaders • Respond to regulatory or other third party inquiries, surveys or examinations • Satisfy industry-specific requirements

  11. June 13 | 8:00a-9:30a Cincinnati Regional Chamber

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend