SlideShare une entreprise Scribd logo
1  sur  17
Assuring Digital Strategic
Initiatives:
Implementation of an effective
Information Security Management
System
Information security program
management
Information security program
management is the discipline of
designing, implementing and maturing
security practices to protect critical
business processes and IT assets across
the enterprise.
The future of enterprises depends on
the quality of security and risk
management—information,
information systems and technologies
may bring about numerous benefits to
any organization; however, they can
also become its main source of
vulnerability if they are not managed
efficiently.
Information Security Management System
Its objectives, among others, are to:
• Protect the organization and its information assets by keeping security at a
desired level
• Manage risks by identifying assets, discovering threats and estimating the
risk
• Provide direction for security by documenting security policies, procedures,
etc.
• Plan and justify budgets and resources related to security
• Assess effectiveness of the implemented controls by using metrics and
indicators.
Ensure You have C-
Suite support
• Security culture and support
for security comes from the
top
• It is important to ensure a
common understanding of the
threats
• How do you find out whether
you have support? Ask!
Align to Business Strategy
• Determine aims to
achieve during a defined
period
• Influenced, to a great
deal, by the organization’s
business strategy. Align
with organization’s vision,
mission, goals, strategy.
Environmental
Trends
• Trends in the economic,
business, market, regulatory,
political and technology
environments can have a great
impact on the security risk
facing the enterprise.
• Widespread cyber threats to
businesses include:
Spam; phishing emails; viruses;
Trojans; spyware; malware;
ransomware; rootkits; drive-by
downloads; password decryption;
denial-of-service (DoS) attack;
out-of-date, unpatched software
Security Assessment
Assess the overall effectiveness
and efficiency of security in the
company by performing:
- Vulnerability assessments and
penetration tests to assess the
technical infrastructure
- Risk assessments to balance the
investment on controls
appropriate to the actual risks
- Internal and external audit
results to assess the effectiveness
of policy and controls compliance
and more
Organisation’s Risk Appetite
• The consequence and likelihood of the risk
occurring should determine the level of
acceptable risk
• management can prioritize resources for
taking action based on the appetite it has set
Consider risk appetite in these areas:
• Asset management.
• Access control.
• Cryptography.
• Physical and environmental security.
• Operations security.
• Communications security.
• System acquisition development and maintenance.
• Supplier relationships.
• Information security incident management.
• Business continuity management
Gap Analysis
• Consists of mapping the
current state against the
vision statement,
identifying the
• gaps between the two
states in order to derive
the actions and projects
required to close these
gaps.
Prioritization
Almost no organization will have the
resources required to execute on all of
the identified security projects and
activities. Prioritization criteria include
the following:
- The level of risk reduction potentially
achieved by a given project/activity
- The resources (skills, staff and systems)
required
- The financial cost
- The "time to value", the period
between the initial investment and the
point at which the project will start
accruing value to the organization.
Approval
• The final step is to obtain
executive approval and budget.
• The strategy should be
communicated using a written
report and an executive
presentation clearly
• describing the current state, the
desired state, and how the
projects with their respective
phases and milestones will help
to achieve the desired state.
Review & Reporting
• Use Metrics that Matter -
False Positive Reporting, incident
response volumes, Fully Revealed
Incidents Rate, Percentage Of
Security Incidents Detected By An
Automated Control
• Measure Performance, Not
Activity
• Measure to Objectives
• Progress should be
reported to the Upper
Management on a regular
basis.
Security Awareness
Security education is an important component
of any organization's information security
program.
If employees don't know their security
responsibilities they cannot be depended
upon to do their part
Security Programs Success
 Security programs will be successful when they are:
 Supported by executive
 Aligned with organisational goals
 Risk-based, aligned with business and risk appetite
 Standards-based, evolve over time
 Capture present and target state accurately
 Plans are realistic and actionable
 Resourced effectively
 Focused on building security in from the ground up
 Measured/monitored
 Continuous improvement
 Communicated appropriately
 Executed on
Digital strategic initiatives
• Business innovation means extending
beyond the enterprise. Organizations
leverage information technology to
power their innovation efforts, while
battling mounting regulation and
escalating threats to information.
Without the right security strategy,
business can be stifled or put the
organization at great risk.
• Enter new markets, launch new
products or services, create new
business models, establish new
channels or partnerships, or achieve
operational transformation.
• Need to work on business problems,
not compliance issues
Questions?

Contenu connexe

Tendances

BRG_CSP_Study-Summary-nofees
BRG_CSP_Study-Summary-nofeesBRG_CSP_Study-Summary-nofees
BRG_CSP_Study-Summary-nofees
Faisal Amin
 
Information Security Project
Information Security ProjectInformation Security Project
Information Security Project
novemberchild
 

Tendances (20)

Information Security Risk Management Overview
Information Security Risk Management OverviewInformation Security Risk Management Overview
Information Security Risk Management Overview
 
BRG_CSP_Study-Summary-nofees
BRG_CSP_Study-Summary-nofeesBRG_CSP_Study-Summary-nofees
BRG_CSP_Study-Summary-nofees
 
Risk Management & Information Security Management Systems
Risk Management & Information Security Management SystemsRisk Management & Information Security Management Systems
Risk Management & Information Security Management Systems
 
Information Security Project
Information Security ProjectInformation Security Project
Information Security Project
 
Connection can help keep your business secure!
Connection can help keep your business secure!Connection can help keep your business secure!
Connection can help keep your business secure!
 
Understanding the security_organization
Understanding the security_organizationUnderstanding the security_organization
Understanding the security_organization
 
Microsoft InfoSec for cloud and mobile
Microsoft InfoSec for cloud and mobileMicrosoft InfoSec for cloud and mobile
Microsoft InfoSec for cloud and mobile
 
Risk Assessment Process NIST 800-30
Risk Assessment Process NIST 800-30Risk Assessment Process NIST 800-30
Risk Assessment Process NIST 800-30
 
Practical approach to security risk management
Practical approach to security risk managementPractical approach to security risk management
Practical approach to security risk management
 
Security risk management
Security risk managementSecurity risk management
Security risk management
 
Developing an Information Security Roadmap
Developing an Information Security RoadmapDeveloping an Information Security Roadmap
Developing an Information Security Roadmap
 
Introduction to Ethical Hacking
Introduction to Ethical HackingIntroduction to Ethical Hacking
Introduction to Ethical Hacking
 
Selling security to the C-level
Selling security to the C-levelSelling security to the C-level
Selling security to the C-level
 
Security Policies and Standards
Security Policies and StandardsSecurity Policies and Standards
Security Policies and Standards
 
Information Security Risk Management
Information Security Risk Management Information Security Risk Management
Information Security Risk Management
 
Information Security Strategic Management
Information Security Strategic ManagementInformation Security Strategic Management
Information Security Strategic Management
 
Hands on IT risk assessment
Hands on IT risk assessmentHands on IT risk assessment
Hands on IT risk assessment
 
Planning for security and security audit process
Planning for security and security audit processPlanning for security and security audit process
Planning for security and security audit process
 
Security-Brochure
Security-BrochureSecurity-Brochure
Security-Brochure
 
Security-Brochure
Security-BrochureSecurity-Brochure
Security-Brochure
 

Similaire à Assuring Digital Strategic Initiatives by

2023-it-roadmap-for-cybersecurity-techcnical
2023-it-roadmap-for-cybersecurity-techcnical2023-it-roadmap-for-cybersecurity-techcnical
2023-it-roadmap-for-cybersecurity-techcnical
Jack585826
 
Step by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohaniStep by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohani
yaseraljohani
 
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAEIT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
360 BSI
 
Introduction to IT compliance program and Discuss the challenges IT .pdf
Introduction to IT compliance program and Discuss the challenges IT .pdfIntroduction to IT compliance program and Discuss the challenges IT .pdf
Introduction to IT compliance program and Discuss the challenges IT .pdf
SALES97
 

Similaire à Assuring Digital Strategic Initiatives by (20)

crisc_wk_2a.pptx
crisc_wk_2a.pptxcrisc_wk_2a.pptx
crisc_wk_2a.pptx
 
Risk Management Approach to Cyber Security
Risk Management  Approach to Cyber Security Risk Management  Approach to Cyber Security
Risk Management Approach to Cyber Security
 
MCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationMCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service Presentation
 
Cyber risk management-white-paper-v8 (2) 2015
Cyber risk management-white-paper-v8 (2) 2015Cyber risk management-white-paper-v8 (2) 2015
Cyber risk management-white-paper-v8 (2) 2015
 
2023-it-roadmap-for-cybersecurity-techcnical
2023-it-roadmap-for-cybersecurity-techcnical2023-it-roadmap-for-cybersecurity-techcnical
2023-it-roadmap-for-cybersecurity-techcnical
 
IIA GAM CS 8-5: Audit and Control of Continuous Monitoring Programs and Artif...
IIA GAM CS 8-5: Audit and Control of Continuous Monitoring Programs and Artif...IIA GAM CS 8-5: Audit and Control of Continuous Monitoring Programs and Artif...
IIA GAM CS 8-5: Audit and Control of Continuous Monitoring Programs and Artif...
 
CS 8-5_Audit and Control of Continuous Monitoring Programs and Artificial Int...
CS 8-5_Audit and Control of Continuous Monitoring Programs and Artificial Int...CS 8-5_Audit and Control of Continuous Monitoring Programs and Artificial Int...
CS 8-5_Audit and Control of Continuous Monitoring Programs and Artificial Int...
 
MCGlobalTech Service Presentation
MCGlobalTech Service PresentationMCGlobalTech Service Presentation
MCGlobalTech Service Presentation
 
CISM_WK_1.pptx
CISM_WK_1.pptxCISM_WK_1.pptx
CISM_WK_1.pptx
 
Mastering Cybersecurity Risk Management: Strategies to Safeguard Your Digital...
Mastering Cybersecurity Risk Management: Strategies to Safeguard Your Digital...Mastering Cybersecurity Risk Management: Strategies to Safeguard Your Digital...
Mastering Cybersecurity Risk Management: Strategies to Safeguard Your Digital...
 
Step by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohaniStep by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohani
 
Controls in Audit.pptx
Controls in Audit.pptxControls in Audit.pptx
Controls in Audit.pptx
 
A Guide for Businesses.pdf
A Guide for Businesses.pdfA Guide for Businesses.pdf
A Guide for Businesses.pdf
 
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAEIT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
 
Cybersecurity
Cybersecurity Cybersecurity
Cybersecurity
 
Grupo 4 - TEMA II.pptx
Grupo 4  - TEMA II.pptxGrupo 4  - TEMA II.pptx
Grupo 4 - TEMA II.pptx
 
Introduction to IT compliance program and Discuss the challenges IT .pdf
Introduction to IT compliance program and Discuss the challenges IT .pdfIntroduction to IT compliance program and Discuss the challenges IT .pdf
Introduction to IT compliance program and Discuss the challenges IT .pdf
 
Strategic Essentials for Effective Incident Response Planning.pptx
Strategic Essentials for Effective Incident Response Planning.pptxStrategic Essentials for Effective Incident Response Planning.pptx
Strategic Essentials for Effective Incident Response Planning.pptx
 
Vulnerability Management.pdf
Vulnerability Management.pdfVulnerability Management.pdf
Vulnerability Management.pdf
 
CCISO_Certification_Training_Course-Outline.pdf
CCISO_Certification_Training_Course-Outline.pdfCCISO_Certification_Training_Course-Outline.pdf
CCISO_Certification_Training_Course-Outline.pdf
 

Dernier

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 

Dernier (20)

Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 

Assuring Digital Strategic Initiatives by

  • 1. Assuring Digital Strategic Initiatives: Implementation of an effective Information Security Management System
  • 2. Information security program management Information security program management is the discipline of designing, implementing and maturing security practices to protect critical business processes and IT assets across the enterprise. The future of enterprises depends on the quality of security and risk management—information, information systems and technologies may bring about numerous benefits to any organization; however, they can also become its main source of vulnerability if they are not managed efficiently.
  • 3. Information Security Management System Its objectives, among others, are to: • Protect the organization and its information assets by keeping security at a desired level • Manage risks by identifying assets, discovering threats and estimating the risk • Provide direction for security by documenting security policies, procedures, etc. • Plan and justify budgets and resources related to security • Assess effectiveness of the implemented controls by using metrics and indicators.
  • 4. Ensure You have C- Suite support • Security culture and support for security comes from the top • It is important to ensure a common understanding of the threats • How do you find out whether you have support? Ask!
  • 5. Align to Business Strategy • Determine aims to achieve during a defined period • Influenced, to a great deal, by the organization’s business strategy. Align with organization’s vision, mission, goals, strategy.
  • 6. Environmental Trends • Trends in the economic, business, market, regulatory, political and technology environments can have a great impact on the security risk facing the enterprise. • Widespread cyber threats to businesses include: Spam; phishing emails; viruses; Trojans; spyware; malware; ransomware; rootkits; drive-by downloads; password decryption; denial-of-service (DoS) attack; out-of-date, unpatched software
  • 7. Security Assessment Assess the overall effectiveness and efficiency of security in the company by performing: - Vulnerability assessments and penetration tests to assess the technical infrastructure - Risk assessments to balance the investment on controls appropriate to the actual risks - Internal and external audit results to assess the effectiveness of policy and controls compliance and more
  • 8. Organisation’s Risk Appetite • The consequence and likelihood of the risk occurring should determine the level of acceptable risk • management can prioritize resources for taking action based on the appetite it has set Consider risk appetite in these areas: • Asset management. • Access control. • Cryptography. • Physical and environmental security. • Operations security. • Communications security. • System acquisition development and maintenance. • Supplier relationships. • Information security incident management. • Business continuity management
  • 9. Gap Analysis • Consists of mapping the current state against the vision statement, identifying the • gaps between the two states in order to derive the actions and projects required to close these gaps.
  • 10. Prioritization Almost no organization will have the resources required to execute on all of the identified security projects and activities. Prioritization criteria include the following: - The level of risk reduction potentially achieved by a given project/activity - The resources (skills, staff and systems) required - The financial cost - The "time to value", the period between the initial investment and the point at which the project will start accruing value to the organization.
  • 11. Approval • The final step is to obtain executive approval and budget. • The strategy should be communicated using a written report and an executive presentation clearly • describing the current state, the desired state, and how the projects with their respective phases and milestones will help to achieve the desired state.
  • 12. Review & Reporting • Use Metrics that Matter - False Positive Reporting, incident response volumes, Fully Revealed Incidents Rate, Percentage Of Security Incidents Detected By An Automated Control • Measure Performance, Not Activity • Measure to Objectives • Progress should be reported to the Upper Management on a regular basis.
  • 13. Security Awareness Security education is an important component of any organization's information security program. If employees don't know their security responsibilities they cannot be depended upon to do their part
  • 14.
  • 15. Security Programs Success  Security programs will be successful when they are:  Supported by executive  Aligned with organisational goals  Risk-based, aligned with business and risk appetite  Standards-based, evolve over time  Capture present and target state accurately  Plans are realistic and actionable  Resourced effectively  Focused on building security in from the ground up  Measured/monitored  Continuous improvement  Communicated appropriately  Executed on
  • 16. Digital strategic initiatives • Business innovation means extending beyond the enterprise. Organizations leverage information technology to power their innovation efforts, while battling mounting regulation and escalating threats to information. Without the right security strategy, business can be stifled or put the organization at great risk. • Enter new markets, launch new products or services, create new business models, establish new channels or partnerships, or achieve operational transformation. • Need to work on business problems, not compliance issues