We help small and mid-sized businesses complete their critical projects in the Technology, Cybersecurity and Accounting space.
We help small and mid-sized businesses complete their critical - - PowerPoint PPT Presentation
We help small and mid-sized businesses complete their critical - - PowerPoint PPT Presentation
We help small and mid-sized businesses complete their critical projects in the Technology, Cybersecurity and Accounting space. Support Architecture TECHNOLOGY Cloud Virtualization ERP|CRM Infrastructure Systems + Network Engineering
TECHNOLOGY ACCOUNTING & FINANCE
Support Cloud ERP|CRM Architecture Virtualization Infrastructure Systems + Network Engineering Systems Accounting Treasury Finance Audit Tax
CYBERSECURITY
Compliance & Risk Assessments Remediation Project Management Security Program Roadmap & Oversight Ongoing CISO Advisory Services
Security Program? CISO? What Are They and Why Do I Need Them?
Mike Rock CISO CYBERSECURITY
CISO INSIGHT AND PRACTICAL ADVICE FOR YOUR BUSINESS.
Agenda
Security Program Definition Business Drivers Components CISO Definition Key Responsibilities
A cybersecurity program is a business plan for cybersecurity, including protection of digital assets, business operations and reputation.
“ “
Business Plan Cybersecurity Program
Executive Summary Business Description Market Analysis Organization Management Sales Strategies Funding Requirements Growth Projections Program Summary Scope and Objective Risk/Threat Assessment Roles and Responsibilities Road Map Funding Requirements Maturity and Capability Projections
=
v v
Business Components That Drive Your Cybersecurity Program
- Business Process Uptime
- Protection of Intellectual Property
- Protection of Customer Data
- Customer Revenue Loss
- Business Reputation
- Fines, Penalties
- Regulatory / Legal Requirements
What is your strategy for protecting what the company cares about the most? Where is your data? Who has access to your data? Do your employees know how to help prevent losses? Are your information systems protected? When are users accessing more than usual? Do your third parties practice good security practices? Is someone is loitering in your information systems? How do you respond if you find someone loitering?
Questions your security program should answer:
Chief Information Security Officer (CISO)
The diagram on the next slide outlines the skillset a CISO must have to meet your business needs.
Key Responsibilities of a CISO:
- Accountable to deliver the security program
- Engage and lead business leaders
- Respond to regulatory or other third party
inquiries, surveys or examinations
- Satisfy industry-specific requirements
June 13 | 8:00a-9:30a Cincinnati Regional Chamber