We help small and mid-sized businesses complete their critical - - PowerPoint PPT Presentation

we help small and mid sized businesses complete their
SMART_READER_LITE
LIVE PREVIEW

We help small and mid-sized businesses complete their critical - - PowerPoint PPT Presentation

We help small and mid-sized businesses complete their critical projects in the Technology, Cybersecurity and Accounting space. Support Architecture TECHNOLOGY Cloud Virtualization ERP|CRM Infrastructure Systems + Network Engineering


slide-1
SLIDE 1

We help small and mid-sized businesses complete their critical projects in the Technology, Cybersecurity and Accounting space.

slide-2
SLIDE 2

TECHNOLOGY ACCOUNTING & FINANCE

Support Cloud ERP|CRM Architecture Virtualization Infrastructure Systems + Network Engineering Systems Accounting Treasury Finance Audit Tax

CYBERSECURITY

Compliance & Risk Assessments Remediation Project Management Security Program Roadmap & Oversight Ongoing CISO Advisory Services

slide-3
SLIDE 3

Security Program? CISO? What Are They and Why Do I Need Them?

Mike Rock CISO CYBERSECURITY

CISO INSIGHT AND PRACTICAL ADVICE FOR YOUR BUSINESS.

slide-4
SLIDE 4

Agenda

Security Program Definition Business Drivers Components CISO Definition Key Responsibilities

slide-5
SLIDE 5

A cybersecurity program is a business plan for cybersecurity, including protection of digital assets, business operations and reputation.

“ “

slide-6
SLIDE 6

Business Plan Cybersecurity Program

Executive Summary Business Description Market Analysis Organization Management Sales Strategies Funding Requirements Growth Projections Program Summary Scope and Objective Risk/Threat Assessment Roles and Responsibilities Road Map Funding Requirements Maturity and Capability Projections

=

v v

slide-7
SLIDE 7

Business Components That Drive Your Cybersecurity Program

  • Business Process Uptime
  • Protection of Intellectual Property
  • Protection of Customer Data
  • Customer Revenue Loss
  • Business Reputation
  • Fines, Penalties
  • Regulatory / Legal Requirements
slide-8
SLIDE 8

What is your strategy for protecting what the company cares about the most? Where is your data? Who has access to your data? Do your employees know how to help prevent losses? Are your information systems protected? When are users accessing more than usual? Do your third parties practice good security practices? Is someone is loitering in your information systems? How do you respond if you find someone loitering?

Questions your security program should answer:

slide-9
SLIDE 9

Chief Information Security Officer (CISO)

The diagram on the next slide outlines the skillset a CISO must have to meet your business needs.

slide-10
SLIDE 10
slide-11
SLIDE 11

Key Responsibilities of a CISO:

  • Accountable to deliver the security program
  • Engage and lead business leaders
  • Respond to regulatory or other third party

inquiries, surveys or examinations

  • Satisfy industry-specific requirements
slide-12
SLIDE 12

June 13 | 8:00a-9:30a Cincinnati Regional Chamber