SlideShare une entreprise Scribd logo
1  sur  15
Building Security Models To Help Make Business Decisions  Dave Cullinane Gordon Shevlin Preston Wood William Tang  04/29/09 | Session ID: PROF-403
Common Questions from Exec Mgmt ,[object Object],[object Object],[object Object],Provide insight to solve these challenges and real world examples Understand methodology and approach to leverage security and business metrics effectively Make more informed business decisions and prove security return on investment (ROI) Educate + Learn = Apply
Agenda  Obtain Security & Business Metrics Establish a Security Framework Prove Security Return on Investment (ROI) Develop Forward Looking Strategy & Models
Security Framework
Security Controls Mapping
Security Controls Mapping
Security Gap Analysis
Agenda  Obtain Security & Business Metrics Establish a Security Framework Prove Security Return on Investment (ROI) Develop Forward Looking Strategy & Models
Obtain Business & Security Metrics
Obtain Business & Security Metrics
Agenda  Obtain Security & Business Metrics Establish a Security Framework Prove Security Return on Investment (ROI) Develop Forward Looking Strategy & Models
Prove Security ROI ,[object Object],[object Object],[object Object],[object Object],[object Object]
Agenda  Obtain Security & Business Metrics Establish a Security Framework Prove Security Return on Investment (ROI) Develop Forward Looking Strategy & Models
Develop Security Strategy & Models
Q&A

Contenu connexe

En vedette

En vedette (12)

Psicología de las masas y análisis del yo
Psicología de las masas y análisis del yoPsicología de las masas y análisis del yo
Psicología de las masas y análisis del yo
 
Safe inlet The Device For Road security
Safe inlet The Device For Road securitySafe inlet The Device For Road security
Safe inlet The Device For Road security
 
從104會考看閱讀教學 02尋讀與精讀
從104會考看閱讀教學   02尋讀與精讀從104會考看閱讀教學   02尋讀與精讀
從104會考看閱讀教學 02尋讀與精讀
 
The excretory system Morad
The excretory system MoradThe excretory system Morad
The excretory system Morad
 
Những câunóihayvềtìnhyêu&cuộcsống2
Những câunóihayvềtìnhyêu&cuộcsống2Những câunóihayvềtìnhyêu&cuộcsống2
Những câunóihayvềtìnhyêu&cuộcsống2
 
animal facts
animal factsanimal facts
animal facts
 
Indian marriage
Indian marriageIndian marriage
Indian marriage
 
活動四北極熊論證
活動四北極熊論證活動四北極熊論證
活動四北極熊論證
 
Ionic y angular.js
Ionic y angular.jsIonic y angular.js
Ionic y angular.js
 
Business analysis1.9 - business side
Business analysis1.9 - business sideBusiness analysis1.9 - business side
Business analysis1.9 - business side
 
Indian Stock Market
Indian Stock MarketIndian Stock Market
Indian Stock Market
 
Planeacion ultimate bachillerato
Planeacion ultimate bachilleratoPlaneacion ultimate bachillerato
Planeacion ultimate bachillerato
 

Similaire à RSA Conference 09 - Building Security Models to Support Business Decisions 090429

Gs Us Roadmap For A World Class Information Security Management System– Isoie...
Gs Us Roadmap For A World Class Information Security Management System– Isoie...Gs Us Roadmap For A World Class Information Security Management System– Isoie...
Gs Us Roadmap For A World Class Information Security Management System– Isoie...
Tammy Clark
 
CIS333 – Assignments and Rubrics © 2017 Strayer Unive.docx
CIS333 – Assignments and Rubrics   © 2017 Strayer Unive.docxCIS333 – Assignments and Rubrics   © 2017 Strayer Unive.docx
CIS333 – Assignments and Rubrics © 2017 Strayer Unive.docx
AASTHA76
 
Security Policies and Implementation IssuesLecture 5How to D.docx
Security Policies and Implementation IssuesLecture 5How to D.docxSecurity Policies and Implementation IssuesLecture 5How to D.docx
Security Policies and Implementation IssuesLecture 5How to D.docx
jeffreye3
 
2023-it-roadmap-for-cybersecurity-techcnical
2023-it-roadmap-for-cybersecurity-techcnical2023-it-roadmap-for-cybersecurity-techcnical
2023-it-roadmap-for-cybersecurity-techcnical
Jack585826
 
Business case for information security program
Business case for information security programBusiness case for information security program
Business case for information security program
William Godwin
 
7-lessons-learned-from-bsimm
7-lessons-learned-from-bsimm7-lessons-learned-from-bsimm
7-lessons-learned-from-bsimm
Marie Peters
 
CIS333 – Assignments and Rubrics Assignment 1 Creatin.docx
CIS333 – Assignments and Rubrics  Assignment 1 Creatin.docxCIS333 – Assignments and Rubrics  Assignment 1 Creatin.docx
CIS333 – Assignments and Rubrics Assignment 1 Creatin.docx
AASTHA76
 
CIS333 – Networking Security Fundamentals © 2017 Stray.docx
 CIS333 – Networking Security Fundamentals  © 2017 Stray.docx CIS333 – Networking Security Fundamentals  © 2017 Stray.docx
CIS333 – Networking Security Fundamentals © 2017 Stray.docx
aryan532920
 
CIS333 – Networking Security Fundamentals © 2017 Stray.docx
CIS333 – Networking Security Fundamentals  © 2017 Stray.docxCIS333 – Networking Security Fundamentals  © 2017 Stray.docx
CIS333 – Networking Security Fundamentals © 2017 Stray.docx
AASTHA76
 
CIS333 – Assignments and Rubrics Assignment 1 Creating an.docx
CIS333 – Assignments and Rubrics Assignment 1 Creating an.docxCIS333 – Assignments and Rubrics Assignment 1 Creating an.docx
CIS333 – Assignments and Rubrics Assignment 1 Creating an.docx
sleeperharwell
 

Similaire à RSA Conference 09 - Building Security Models to Support Business Decisions 090429 (20)

Old Presentation on Security Metrics 2005
Old Presentation on Security Metrics 2005Old Presentation on Security Metrics 2005
Old Presentation on Security Metrics 2005
 
ESA for Business
ESA for BusinessESA for Business
ESA for Business
 
ASMC 2017 - Rudy Neefs - Van bedrijfspolitieman naar kritieke businesspartner
ASMC 2017 - Rudy Neefs - Van bedrijfspolitieman naar kritieke businesspartnerASMC 2017 - Rudy Neefs - Van bedrijfspolitieman naar kritieke businesspartner
ASMC 2017 - Rudy Neefs - Van bedrijfspolitieman naar kritieke businesspartner
 
Gs Us Roadmap For A World Class Information Security Management System– Isoie...
Gs Us Roadmap For A World Class Information Security Management System– Isoie...Gs Us Roadmap For A World Class Information Security Management System– Isoie...
Gs Us Roadmap For A World Class Information Security Management System– Isoie...
 
CIS333 – Assignments and Rubrics © 2017 Strayer Unive.docx
CIS333 – Assignments and Rubrics   © 2017 Strayer Unive.docxCIS333 – Assignments and Rubrics   © 2017 Strayer Unive.docx
CIS333 – Assignments and Rubrics © 2017 Strayer Unive.docx
 
NIST Critical Security Framework (CSF)
NIST Critical Security Framework (CSF) NIST Critical Security Framework (CSF)
NIST Critical Security Framework (CSF)
 
Security Policies and Implementation IssuesLecture 5How to D.docx
Security Policies and Implementation IssuesLecture 5How to D.docxSecurity Policies and Implementation IssuesLecture 5How to D.docx
Security Policies and Implementation IssuesLecture 5How to D.docx
 
2023-it-roadmap-for-cybersecurity-techcnical
2023-it-roadmap-for-cybersecurity-techcnical2023-it-roadmap-for-cybersecurity-techcnical
2023-it-roadmap-for-cybersecurity-techcnical
 
Managing Products Portfolios
Managing Products PortfoliosManaging Products Portfolios
Managing Products Portfolios
 
Business case for information security program
Business case for information security programBusiness case for information security program
Business case for information security program
 
Business case for Information Security program
Business case for Information Security programBusiness case for Information Security program
Business case for Information Security program
 
Simplifying Security for Cloud Adoption - Defining your game plan
Simplifying Security for Cloud Adoption - Defining your game planSimplifying Security for Cloud Adoption - Defining your game plan
Simplifying Security for Cloud Adoption - Defining your game plan
 
7-lessons-learned-from-bsimm
7-lessons-learned-from-bsimm7-lessons-learned-from-bsimm
7-lessons-learned-from-bsimm
 
CIS333 – Assignments and Rubrics Assignment 1 Creatin.docx
CIS333 – Assignments and Rubrics  Assignment 1 Creatin.docxCIS333 – Assignments and Rubrics  Assignment 1 Creatin.docx
CIS333 – Assignments and Rubrics Assignment 1 Creatin.docx
 
CIS333 – Networking Security Fundamentals © 2017 Stray.docx
 CIS333 – Networking Security Fundamentals  © 2017 Stray.docx CIS333 – Networking Security Fundamentals  © 2017 Stray.docx
CIS333 – Networking Security Fundamentals © 2017 Stray.docx
 
CIS333 – Networking Security Fundamentals © 2017 Stray.docx
CIS333 – Networking Security Fundamentals  © 2017 Stray.docxCIS333 – Networking Security Fundamentals  © 2017 Stray.docx
CIS333 – Networking Security Fundamentals © 2017 Stray.docx
 
Battle Tested Application Security
Battle Tested Application SecurityBattle Tested Application Security
Battle Tested Application Security
 
CIS333 – Assignments and Rubrics Assignment 1 Creating an.docx
CIS333 – Assignments and Rubrics Assignment 1 Creating an.docxCIS333 – Assignments and Rubrics Assignment 1 Creating an.docx
CIS333 – Assignments and Rubrics Assignment 1 Creating an.docx
 
Leverage Data Strategy as a Catalyst for Innovation
Leverage Data Strategy as a Catalyst for InnovationLeverage Data Strategy as a Catalyst for Innovation
Leverage Data Strategy as a Catalyst for Innovation
 
Secure Software Development Models and Methods integrated with CMMI.ppt
Secure Software Development Models and Methods integrated with CMMI.pptSecure Software Development Models and Methods integrated with CMMI.ppt
Secure Software Development Models and Methods integrated with CMMI.ppt
 

Dernier

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Dernier (20)

ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 

RSA Conference 09 - Building Security Models to Support Business Decisions 090429

Notes de l'éditeur

  1. Security funding and support can’t rely on regulatory drivers. Its time CISOs, Risk Mgmt officers, and other groups demonstrate security ROI and communicate security strategy in terms that executive management understands.
  2. Understand the ‘forces’ that result in a change to the effectiveness of the security framework.