SlideShare a Scribd company logo
1 of 39
Download to read offline
"In the spirit of reconciliation, Bond University acknowledges
the Kombumerri people, the traditional Owners and
Custodians of the land on which the university now stands.
We pay respect to Elders past, present and emerging."
Cybersecurity Project Management
Greg Skulmoski PhD, MBA, BEd, CITP, FBCS
Associate Professor, Project Management
Faculty of Society and Design
“Best I Have Seen In My Career”
Some of your explanations of familiar topics and tools
are among the best I have seen in my career.
Distinguished Professor Emeritus Timothy Kloppenborg PhD
Project Management, Xavier University, United States
Shields Up: Cybersecurity Project Management
Three Key Points
1
Cybersecurity is
risk management
2
Project delivery
underpins cybersecurity
3
Cybersecurity audit
project opportunities
Greg Skulmoski PhD, MBA, BEd, CITP, FBCS
Biography: Dual Careers
2004
PhD
Project Management
2017
CISO Rising Star
2018
Project Innovation Management
2021
Top 10 Medical Innovations
Cleveland Clinic
1990s
Challenged Technology
Projects
2022 August
Shields Up: Cybersecurity
Project Management
2023
Cybersecurity Readiness: A
Project Management Approach
to Training
2007
Top IT Teacher Award
Zayed University
2011
Project Manager
Cleveland Clinic Abu Dhabi
2000
PMBOK Guide
“Author”
Outline
1. High Demand for Cybersecurity Projects
2. Align Standards for Cybersecurity Project Success
3. Risk Management Technique Not in the PMBOK® Guide
“Expect attackers to be successful.”
(Gartner, How to Respond to the 2022 Cybersecurity Landscape, 2022, p. 4)
Outline
1. High Demand for Cybersecurity Projects
2. Align Standards for Cybersecurity Project Success
3. Risk Management Technique Not in the PMBOK®
Guide
“Expect attackers to be successful.”
(Gartner, How to Respond to the 2022 Cybersecurity Landscape, 2022, p. 4)
What is Cybersecurity?
Cybercrime
Target systems for
financial gain or to disrupt
Cyber-attack
Politically motivated
information gathering
Cyberterrorism
Undermine digital systems
to cause panic or fear
Defending digital assets from malicious attacks
287 Days
to detect and contain a security breach
Identify Mitigate
Risk Management!
August 22, 2023
Business Operations
How Does Cybersecurity Work?
Framework for Improving
Critical Infrastructure Cybersecurity
Version 1.1
National Institute of Standards and Technology
April 16, 2018
55 pages
1. Identify
2. Protect
3. Detect
4.
Respond
5. Recover
Quality
Improvement
Risk and Quality
Management
“NIST Cybersecurity Framework”
Result
Increase in Demand for Cybersecurity Projects
and Cybersecurity Project Managers
More
Digital
Transformation
AI and Quantum Computing
More
Cyber Attacks
Very Lucrative $$$
AI and Quantum Computing
More
Compliance
Regulations and Insurance
Three Cybersecurity Project Drivers
Supply
“Crisis!”
strong demand for cybersecurity
and cybersecurity projects and project managers!!!!
“The threat from state-sponsored
cybercrime is now so serious, it
is no exaggeration to say that it
is time for enterprises to put their
entire security teams on a
war footing.”
Ukrainian Minister of
Digital Transformation,
Is calling for “digital
talents” to join their
IT army. (p. 11)
262,000
“Hacktivists”
Microsoft Digital Defense Report 2021
Implemented
Optimized
Protected
Through
Projects
“Protective
Cybersecurity
Technologies”
“Defence must continue to
improve its cyber security if it is
to defend against constant and
malicious cyber activity and
succeed in future conflicts.”
“Defence adopts
leading cyber
security standards
that strengthen its
cyber security
posture.” (p. 11)
ISO 27001
At this stage of mass digitalization, it
is imperative that leadership prepare for
potential cyber disasters. (p. 29)
Hacking with Quantum
Computer Technologies
Status: “Cyber Arms Race”
Prepare for Quantum
Cybersecurity Threats
Cybersecurity is a
Critical Technology
Recommendation:
War Footing
Cybersecurity is a
National Security Priority
What’s the Best Project Management Approach?
What Standards Should We Follow? How?
ISO 31000
Risk Management
ISO 9001
Quality Management
ISO 27001
Information Security
Management
Project Management
Cybersecurity
“Expect attackers
to be successful.”
(Gartner, How to Respond to the 2022
Cybersecurity Landscape, 2022, p. 4)
What’s the “Best” Project Management Approach?
Initiate Plan Design Build Test T2P Closure
DEMAND VALUE
Value Proposition
Follow the project management approach to keep quality high and risks low
Go Live
Transition to Production
Final activities to bring the
technology to the end-users
Tailor Design Thinking and L6Σ Combine
“Most [cybersecurity] projects, most of the time”
This is Project Management Applied to Cybersecurity Projects
Checklist
Hybrid Project Management
“Free Lean Six Sigma
White Belt Training”
What About Agile Project Management?
Value Proposition
Follow the Agile project management approach to keep quality high and risks low
Iteration 1
“Sprint 1”
Iteration 2
“Sprint 2”
Iteration 3
“Sprint 3”
Product
Backlog
Continual Improvement
Plan
Design
Build
Test
Deliver
Plan
Design
Build
Test
Deliver
Plan
Design
Build
Test
Deliver
Traditional Project Management
Best Project Management Approach
Prioritize Quality Management
Quality
Assurance
Complete
the Work
Quality
Control
Quality Management Process
Assurance
Before
Control
Achieve QA With:
Training
Processes
Templates / Checklists
Project Plan
ISO 9001
Quality Management
Value Proposition
Follow the quality management approach to keep quality high and risks low
Find and fix defects
Achieve QC With:
Processes
Checklists
Stage Gates
Build a house
Create a website
Install an elevator system
Recruit the project manager
Rectify the contaminated site
Implement a pharmacy system
Test organosilicon electrolyte batteries
https://www.revealrisk.com/a-cloud-security-primer-how-to-
move-from-security-concerns-to-security-empowered-copy-
copy/
Continual Improvement
Deming Cycle
Classical Quality Management Theory
Ed Deming
ISO 9001
Quality Management
Used in
Cybersecurity
Projects ...
“Leadership is only 99%
of the problem”
Plan
Do
Check
Act
Plan Identify Analyze Treat Monitor
Risk Management Process
Value Proposition
Follow the risk management approach to keep quality high and risks low
ISO 31000
Risk Management
Best Project Management Approach
Include Risk Management
“Response”
PMBOK® Guide
Probability (H-M-L)
Impact (H-M-L)
Prevent
Mitigate
Best Project Management Approach
Incorporate Standards
Project Management Delivery Approach
Initiate Plan Design Build Test T2P Closure
Quality Management Risk Management
ISO 9001
Quality Management
ISO 31000
Risk Management
Quality and Risk Management are Best Practices in Project Management
Same-Same in Cybersecurity Projects!
Integration Management (Tailor and Combine ➔ Hybrid Project Management)
ITIL Service Management
A framework to guide organizations to deliver digital services
Strategy Management Project Management
Risk Management
Release Management
Service Desk
Incident Management
Service Request
Management
ITIL has 34 practices (vs 10 Knowledge Areas*)
Demand
or
Opportunity
Project Delivery
“Service Value Chain” Operations Provide Value
Continual
Improvement
Continual Improvement
ITIL “Service Value System”
ISO 31000
Risk Management
ISO 9001
Quality Management
COBIT 5
Principles
Meeting
stakeholder
needs
Covering the
enterprise
end to end
Applying a
single
integrated
framework
Enabling a
holistic
approach
Separating
governance
from
management
Incorporate Standards
Best Project Management Approach for Digital Requirements
Service, Project, Quality and Risk Management Standards Alignment
Demand
or
Opportunity
Project Delivery
Provide Value to
Operations
Continuous Improvement
Integration Management / Combining / Tailoring
Cybersecurity Projects
Best Digital Project Management Approach
Incorporate Standards
Demand
or
Opportunity
Project Delivery
Provide Value to
Operations
Continuous Improvement
Integration Management / Combining / Tailoring
Apply this integrated approach to cybersecurity project management
3 Use Cases
Cybersecurity Project Management
Use Case
#1 Implement Cybersecurity Software
Implement SOAR (Security Orchestration, Automation and Response) software v2.3
Project Rationale: Improve detection and response capabilities
Project Management Delivery Approach
Cybersecurity
Cybersecurity IN Technology Projects
Use Case
#2 Design-in Cybersecurity
Implement technology (e.g., industrial automation) and “design-in” security
Initiate Plan Design Build Test T2P Closure
Invite IT Security
Verify the T2P Checklist
Inform IT Security
Project Stakeholder Management
Verify design with IT Security
IT Security completes
T2P Checklist Items
NIST Cybersecurity Tiers
Tier 1
Partial
Tier 2
Risk Informed
Tier 3
Repeatable
Tier 4
Adaptive
Use Case
#3
Conduct a cybersecurity internal audit
LOW Complexity Project
Clear Requirements - NIST
No Testing
Follow the Audit Process
Cybersecurity Audit Guidance
Application
Plan, improve and demonstrate
cybersecurity capabilities
CYBERSECURITY AUDIT
5 NIST CYBERSECURITY FUNCTIONS
Awareness and Training Category
IMPLEMENTED THROUGH PROJECTS
INTENDED OUTCOMES BY CATEGORY AND SUBCATEGORY
Function Category Subcategory References
Protect (PR) Awareness and Training (PR.AT)
The organization’s personnel and partners
are provided cybersecurity awareness
education and are trained to perform their
cybersecurity-related duties and
responsibilities consistent with related policies,
procedures, and agreements.
PR.AT-1
All users are informed and trained
CIS CSC 17, 18
COBIT 5 APO07.03, BAI05.07
ISA 62443-2-1:2009 4.3.2.4.2
ISO/IEC 27001:2013 A.7.2.2, A.12.2.1
NIST SP 800-53 Rev. 4 AT-2, PM-13
PR.AT-2
Privileged users understand their roles
and responsibilities
CIS CSC 5, 17, 18
COBIT 5 APO07.02, DSS05.04, DSS06.03
ISA 62443-2-1:2009 4.3.2.4.2, 4.3.2.4.3
ISO/IEC 27001:2013 A.6.1.1, A.7.2.2
NIST SP 800-53 Rev. 4 AT-3, PM-13
PR.AT-3
Third-party stakeholders
(e.g., suppliers, customers, partners)
understand their roles and responsibilities
CIS CSC 17
COBIT 5 APO07.03, APO07.06, APO10.04, APO10.05
ISA 62443-2-1:2009 4.3.2.4.2
ISO/IEC 27001:2013 A.6.1.1, A.7.2.1, A.7.2.2
NIST SP 800-53 Rev. 4 PS-7, SA-9, SA-16
PR.AT-4
Senior executives understand their roles
and responsibilities
CIS CSC 17, 19
COBIT 5 EDM01.01, APO01.02, APO07.03
ISA 62443-2-1:2009 4.3.2.4.2
ISO/IEC 27001:2013 A.6.1.1, A.7.2.2
NIST SP 800-53 Rev. 4 AT-3, PM-13
PR.AT-5
Physical and cybersecurity personnel
understand their roles and responsibilities
CIS CSC 17
COBIT 5 APO07.03
ISA 62443-2-1:2009 4.3.2.4.2
ISO/IEC 27001:2013 A.6.1.1, A.7.2.2
Auditors assess each
category and subcategory,
and document evidence
R e a d i n e s s
Projects
CYBERSECURITY IMPROVEMENT PROCESS
Auditing Steps
Step 1: Prioritize and Scope
Step 2: Orient
Step 3: Create a Current Profile
Step 4: Conduct a Risk Assessment
Step 5: Create a Target Profile
Step 6: Determine, Analyse, and Prioritize Gaps
Step 7: Implement Action Plan (project)
Description
Identify the business objectives and priorities to make cybersecurity decisions about
the scope of the cybersecurity program
Identify systems and assets, regulatory frameworks and overall risk approach, then
identify related vulnerabilities and threats
Identify the functions, categories and subcategories being achieved
Assess the organisation against the framework noting compliance evidence
Create a target profile of where the organisation’s cybersecurity program desired
outcome
Determine, analyse and prioritise any cybersecurity gaps
Develop a plan to address any gaps. Some gaps will require more formal projects.
Compliance = More Cybersecurity Projects
NIST CYBERSECURITY FRAMEWORK
Target Profile
Current Profile
Gap Analysis
Prioritised Cybersecurity
Initiatives and Projects
1. Greg Skulmoski, “Project Maturity and Competence
Interface,” Cost Engineering, Vol. 43, No. 6, June 2001,
2. Greg Skulmoski and John Schlichter, “Organisational
Project Management Maturity: New Frontiers,” Project,
May 2000,
3. John Schlichter and Greg Skulmoski, “Organizational
Project Management Maturity: New Frontiers,” Congress
2000, 15th IPMA World Congress on Project
Management, London, England, May 2000,
4. Ginger Levin and Greg Skulmoski, “Using a Project
Management Maturity Assessment to Promote Project
Management Improvements,” Managing Business by
Projects, Helsinki, Finland, September 16 - 17, 1999,
5. Francis Hartman and Greg Skulmoski, “Project
Management Maturity,” Project Management, Vol. 4, No.
1, 1998: 74-78.
QUALITY IMPROVEMENT THROUGH MATURITY
Organizational Project Management
Maturity Model (OPM3)
Guidance Committee Member 1999
Value Proposition
Follow the project management maturity
approach to keep quality high and risks low
Implement Cybersecurity Software
Design-in Cybersecurity
Audit Cybersecurity Capabilities
Three Use Cases
Cybersecurity Project Management
Project Management Delivery Approach
“Value”
Cybersecurity
Deliver
Operations (aka Production) Environment
Project Environment
Cybersecurity Project Management: Standards Alignment
Demand for
Technology
Project Delivery
Provide Value
to End-user
Continuous
Improvement
Technology
Management
ISO 31000
Risk Management
ISO 9001
Quality Management
ISO 27001
Information Security
Management
Process People
Technology
Continuous Improvement
Project Management Delivery Approach
“Value”
Cybersecurity
Deliver
Compliance ǂ Protection
Measure Cybersecurity Performance KPI’s
Protect, Detect, Respond, Recover
Caution: Standards Compliance Focus
ISO 31000
Risk Management
ISO 9001
Quality Management
ISO 27001
Information Security
Management
Continuous Improvement
Process People
Technology
Shields Up: Cybersecurity Project Management
Conclusion: Three Key Points
1
Cybersecurity is
risk management
2
Project management
underpins cybersecurity
3
Cybersecurity
audit projects
Project Management Delivery Approach
Continuous Improvement
Optimization
Sprint
ADDIE
Sprint
Cybersecurity
Go-Live
Demand for
Technology
Project Delivery
Provide Value
to End-user
Continuous
Improvement
Technology
Management
Process People
Technology
ISO 31000
Risk Management
ISO 9001
Quality Management
ISO 27001
Information Security
Management
Cybersecurity Project Management
Advance Praise
“Must Read”
Jason Roos, Chief Information Officer
King Abdullah University of Science and
Technology, Saudi Arabia
“Unique Resource”
Professor Craig Langston PhD, Project Management
Bond University, Australia
“Critical Tools”
Derek Molnar, PMP, Project Manager
University of Colorado, United States
“Best I Have Seen In My Career”
Distinguished Professor Emeritus Timothy Kloppenborg PhD,
Project Management
Xavier University, United States
“A Solid Guide”
Thiago Santos, Senior Technical Architect
Mulesoft, Canada
“Perfect Alignment”
Irene Corpuz, PMP, ITIL, CISA, CEH, ISO 27001
Lead Implementer & Auditor, Manager Projects
Federal Higher Education, United Arab Emirates
United Nations Sustainable Development Goal #9: Recognizable Contribution
Discussion
Greg Skulmoski PhD, MBA, BEd, CITP, FBCS
Associate Professor, Project Innovation Management
Faculty of Society and Design

More Related Content

What's hot

Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023PECB
 
Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Edureka!
 
Lessons Learned from the NIST CSF
Lessons Learned from the NIST CSFLessons Learned from the NIST CSF
Lessons Learned from the NIST CSFDigital Bond
 
Improve Cybersecurity posture by using ISO/IEC 27032
Improve Cybersecurity posture by using ISO/IEC 27032Improve Cybersecurity posture by using ISO/IEC 27032
Improve Cybersecurity posture by using ISO/IEC 27032PECB
 
How To Present Cyber Security To Senior Management Complete Deck
How To Present Cyber Security To Senior Management Complete DeckHow To Present Cyber Security To Senior Management Complete Deck
How To Present Cyber Security To Senior Management Complete DeckSlideTeam
 
ISO 27001 - information security user awareness training presentation -part 2
ISO 27001 - information security user awareness training presentation -part 2ISO 27001 - information security user awareness training presentation -part 2
ISO 27001 - information security user awareness training presentation -part 2Tanmay Shinde
 
ISMS Requirements
ISMS RequirementsISMS Requirements
ISMS Requirementshumanus2
 
Project plan for ISO 27001
Project plan for ISO 27001Project plan for ISO 27001
Project plan for ISO 27001technakama
 
Intro to Security in SDLC
Intro to Security in SDLCIntro to Security in SDLC
Intro to Security in SDLCTjylen Veselyj
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness TrainingWilliam Mann
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligenceseadeloitte
 
NQA ISO 27701 Implementation Guide
NQA ISO 27701 Implementation GuideNQA ISO 27701 Implementation Guide
NQA ISO 27701 Implementation GuideNA Putra
 
Chapter 11: Information Security Incident Management
Chapter 11: Information Security Incident ManagementChapter 11: Information Security Incident Management
Chapter 11: Information Security Incident ManagementNada G.Youssef
 
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Edureka!
 
Iso27001 The Road To Certification
Iso27001   The Road To CertificationIso27001   The Road To Certification
Iso27001 The Road To Certificationtschraider
 

What's hot (20)

Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023
 
Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...
 
Lessons Learned from the NIST CSF
Lessons Learned from the NIST CSFLessons Learned from the NIST CSF
Lessons Learned from the NIST CSF
 
Improve Cybersecurity posture by using ISO/IEC 27032
Improve Cybersecurity posture by using ISO/IEC 27032Improve Cybersecurity posture by using ISO/IEC 27032
Improve Cybersecurity posture by using ISO/IEC 27032
 
How To Present Cyber Security To Senior Management Complete Deck
How To Present Cyber Security To Senior Management Complete DeckHow To Present Cyber Security To Senior Management Complete Deck
How To Present Cyber Security To Senior Management Complete Deck
 
ISO 27001 - information security user awareness training presentation -part 2
ISO 27001 - information security user awareness training presentation -part 2ISO 27001 - information security user awareness training presentation -part 2
ISO 27001 - information security user awareness training presentation -part 2
 
ISMS Requirements
ISMS RequirementsISMS Requirements
ISMS Requirements
 
ISO 27001 How to use the ISMS Implementation Toolkit.pdf
ISO 27001 How to use the ISMS Implementation Toolkit.pdfISO 27001 How to use the ISMS Implementation Toolkit.pdf
ISO 27001 How to use the ISMS Implementation Toolkit.pdf
 
27001 awareness Training
27001 awareness Training27001 awareness Training
27001 awareness Training
 
Project plan for ISO 27001
Project plan for ISO 27001Project plan for ISO 27001
Project plan for ISO 27001
 
Intro to Security in SDLC
Intro to Security in SDLCIntro to Security in SDLC
Intro to Security in SDLC
 
Aujas Cyber Security
Aujas Cyber SecurityAujas Cyber Security
Aujas Cyber Security
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
NQA ISO 27701 Implementation Guide
NQA ISO 27701 Implementation GuideNQA ISO 27701 Implementation Guide
NQA ISO 27701 Implementation Guide
 
Chapter 11: Information Security Incident Management
Chapter 11: Information Security Incident ManagementChapter 11: Information Security Incident Management
Chapter 11: Information Security Incident Management
 
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
 
ISO 27001:2022 What has changed.pdf
ISO 27001:2022 What has changed.pdfISO 27001:2022 What has changed.pdf
ISO 27001:2022 What has changed.pdf
 
Iso27001 The Road To Certification
Iso27001   The Road To CertificationIso27001   The Road To Certification
Iso27001 The Road To Certification
 
From NIST CSF 1.1 to 2.0.pdf
From NIST CSF 1.1 to 2.0.pdfFrom NIST CSF 1.1 to 2.0.pdf
From NIST CSF 1.1 to 2.0.pdf
 

Similar to Shields Up Presentation.pdf

Protecting Vital Data With NIST Framework - Patrick Kerpan's Secure260 presen...
Protecting Vital Data With NIST Framework - Patrick Kerpan's Secure260 presen...Protecting Vital Data With NIST Framework - Patrick Kerpan's Secure260 presen...
Protecting Vital Data With NIST Framework - Patrick Kerpan's Secure260 presen...Cohesive Networks
 
Global CCISO Forum 2018 | Tari Schreider "The Fault Lies in the Architecture"
Global CCISO Forum 2018 | Tari Schreider "The Fault Lies in the Architecture"Global CCISO Forum 2018 | Tari Schreider "The Fault Lies in the Architecture"
Global CCISO Forum 2018 | Tari Schreider "The Fault Lies in the Architecture"EC-Council
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxYoisRoberthTapiadeLa
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxVictoriaChavesta
 
Application Security - Dont leave your AppSec for the last moment Meetup 2104...
Application Security - Dont leave your AppSec for the last moment Meetup 2104...Application Security - Dont leave your AppSec for the last moment Meetup 2104...
Application Security - Dont leave your AppSec for the last moment Meetup 2104...lior mazor
 
Introduction of Secure Software Development Lifecycle
Introduction of Secure Software Development LifecycleIntroduction of Secure Software Development Lifecycle
Introduction of Secure Software Development LifecycleRishi Kant
 
Secure SDLC Framework
Secure SDLC FrameworkSecure SDLC Framework
Secure SDLC FrameworkRishi Kant
 
Secure DevOPS Implementation Guidance
Secure DevOPS Implementation GuidanceSecure DevOPS Implementation Guidance
Secure DevOPS Implementation GuidanceTej Luthra
 
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptxEmphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptxlior mazor
 
Integrating of security activates in agile process
Integrating of security activates in agile processIntegrating of security activates in agile process
Integrating of security activates in agile processZubair Rahim
 
Applicaiton Security - Building The Audit Program
Applicaiton Security - Building The Audit ProgramApplicaiton Security - Building The Audit Program
Applicaiton Security - Building The Audit ProgramMichael Davis
 
(SACON) Dr. Soumya Maity & Lokesh Balu - A scalable, control-based, developer...
(SACON) Dr. Soumya Maity & Lokesh Balu - A scalable, control-based, developer...(SACON) Dr. Soumya Maity & Lokesh Balu - A scalable, control-based, developer...
(SACON) Dr. Soumya Maity & Lokesh Balu - A scalable, control-based, developer...Priyanka Aash
 
Quality at Speed: The Imperatives of Integration Tomorrow
Quality at Speed: The Imperatives of Integration TomorrowQuality at Speed: The Imperatives of Integration Tomorrow
Quality at Speed: The Imperatives of Integration TomorrowAntoine Craske
 
OT Security Architecture & Resilience: Designing for Security Success
OT Security Architecture & Resilience:  Designing for Security SuccessOT Security Architecture & Resilience:  Designing for Security Success
OT Security Architecture & Resilience: Designing for Security Successaccenture
 
DevSecCon Asia 2017 Ante Gulam: Integrating crowdsourced security into agile ...
DevSecCon Asia 2017 Ante Gulam: Integrating crowdsourced security into agile ...DevSecCon Asia 2017 Ante Gulam: Integrating crowdsourced security into agile ...
DevSecCon Asia 2017 Ante Gulam: Integrating crowdsourced security into agile ...DevSecCon
 
Journey to the Cloud: Securing Your AWS Applications - April 2015
Journey to the Cloud: Securing Your AWS Applications - April 2015Journey to the Cloud: Securing Your AWS Applications - April 2015
Journey to the Cloud: Securing Your AWS Applications - April 2015Alert Logic
 
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...PECB
 
Fortifying Cyber Defense: How to Act Now to Protect Global Supply Chains
Fortifying Cyber Defense: How to Act Now to Protect Global Supply ChainsFortifying Cyber Defense: How to Act Now to Protect Global Supply Chains
Fortifying Cyber Defense: How to Act Now to Protect Global Supply ChainsIgnyte Assurance Platform
 
Integrated Security for Software Development and Advanced Penetration Testing...
Integrated Security for Software Development and Advanced Penetration Testing...Integrated Security for Software Development and Advanced Penetration Testing...
Integrated Security for Software Development and Advanced Penetration Testing...Symptai Consulting Limited
 
Cloud Security Engineer Skills, Roles Responsibilities Salary Trends.pdf
Cloud Security Engineer Skills, Roles  Responsibilities  Salary Trends.pdfCloud Security Engineer Skills, Roles  Responsibilities  Salary Trends.pdf
Cloud Security Engineer Skills, Roles Responsibilities Salary Trends.pdfInfosec Train
 

Similar to Shields Up Presentation.pdf (20)

Protecting Vital Data With NIST Framework - Patrick Kerpan's Secure260 presen...
Protecting Vital Data With NIST Framework - Patrick Kerpan's Secure260 presen...Protecting Vital Data With NIST Framework - Patrick Kerpan's Secure260 presen...
Protecting Vital Data With NIST Framework - Patrick Kerpan's Secure260 presen...
 
Global CCISO Forum 2018 | Tari Schreider "The Fault Lies in the Architecture"
Global CCISO Forum 2018 | Tari Schreider "The Fault Lies in the Architecture"Global CCISO Forum 2018 | Tari Schreider "The Fault Lies in the Architecture"
Global CCISO Forum 2018 | Tari Schreider "The Fault Lies in the Architecture"
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
 
Application Security - Dont leave your AppSec for the last moment Meetup 2104...
Application Security - Dont leave your AppSec for the last moment Meetup 2104...Application Security - Dont leave your AppSec for the last moment Meetup 2104...
Application Security - Dont leave your AppSec for the last moment Meetup 2104...
 
Introduction of Secure Software Development Lifecycle
Introduction of Secure Software Development LifecycleIntroduction of Secure Software Development Lifecycle
Introduction of Secure Software Development Lifecycle
 
Secure SDLC Framework
Secure SDLC FrameworkSecure SDLC Framework
Secure SDLC Framework
 
Secure DevOPS Implementation Guidance
Secure DevOPS Implementation GuidanceSecure DevOPS Implementation Guidance
Secure DevOPS Implementation Guidance
 
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptxEmphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
 
Integrating of security activates in agile process
Integrating of security activates in agile processIntegrating of security activates in agile process
Integrating of security activates in agile process
 
Applicaiton Security - Building The Audit Program
Applicaiton Security - Building The Audit ProgramApplicaiton Security - Building The Audit Program
Applicaiton Security - Building The Audit Program
 
(SACON) Dr. Soumya Maity & Lokesh Balu - A scalable, control-based, developer...
(SACON) Dr. Soumya Maity & Lokesh Balu - A scalable, control-based, developer...(SACON) Dr. Soumya Maity & Lokesh Balu - A scalable, control-based, developer...
(SACON) Dr. Soumya Maity & Lokesh Balu - A scalable, control-based, developer...
 
Quality at Speed: The Imperatives of Integration Tomorrow
Quality at Speed: The Imperatives of Integration TomorrowQuality at Speed: The Imperatives of Integration Tomorrow
Quality at Speed: The Imperatives of Integration Tomorrow
 
OT Security Architecture & Resilience: Designing for Security Success
OT Security Architecture & Resilience:  Designing for Security SuccessOT Security Architecture & Resilience:  Designing for Security Success
OT Security Architecture & Resilience: Designing for Security Success
 
DevSecCon Asia 2017 Ante Gulam: Integrating crowdsourced security into agile ...
DevSecCon Asia 2017 Ante Gulam: Integrating crowdsourced security into agile ...DevSecCon Asia 2017 Ante Gulam: Integrating crowdsourced security into agile ...
DevSecCon Asia 2017 Ante Gulam: Integrating crowdsourced security into agile ...
 
Journey to the Cloud: Securing Your AWS Applications - April 2015
Journey to the Cloud: Securing Your AWS Applications - April 2015Journey to the Cloud: Securing Your AWS Applications - April 2015
Journey to the Cloud: Securing Your AWS Applications - April 2015
 
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
 
Fortifying Cyber Defense: How to Act Now to Protect Global Supply Chains
Fortifying Cyber Defense: How to Act Now to Protect Global Supply ChainsFortifying Cyber Defense: How to Act Now to Protect Global Supply Chains
Fortifying Cyber Defense: How to Act Now to Protect Global Supply Chains
 
Integrated Security for Software Development and Advanced Penetration Testing...
Integrated Security for Software Development and Advanced Penetration Testing...Integrated Security for Software Development and Advanced Penetration Testing...
Integrated Security for Software Development and Advanced Penetration Testing...
 
Cloud Security Engineer Skills, Roles Responsibilities Salary Trends.pdf
Cloud Security Engineer Skills, Roles  Responsibilities  Salary Trends.pdfCloud Security Engineer Skills, Roles  Responsibilities  Salary Trends.pdf
Cloud Security Engineer Skills, Roles Responsibilities Salary Trends.pdf
 

More from PMIUKChapter

Learning Leadership Lessons from Rock’n’Roll
Learning Leadership Lessons from Rock’n’RollLearning Leadership Lessons from Rock’n’Roll
Learning Leadership Lessons from Rock’n’RollPMIUKChapter
 
Overview PMI Infinity - UK Chapter presentation
Overview PMI Infinity - UK Chapter presentationOverview PMI Infinity - UK Chapter presentation
Overview PMI Infinity - UK Chapter presentationPMIUKChapter
 
The Tay Bridge Disaster presentation pdf
The Tay Bridge Disaster presentation pdfThe Tay Bridge Disaster presentation pdf
The Tay Bridge Disaster presentation pdfPMIUKChapter
 
Innovation Basket webinar presentation 2024
Innovation Basket webinar presentation 2024Innovation Basket webinar presentation 2024
Innovation Basket webinar presentation 2024PMIUKChapter
 
How Pencils and Scotch Tape Led to the Space Elevator - slides.pptx
How Pencils and Scotch Tape Led to the Space Elevator - slides.pptxHow Pencils and Scotch Tape Led to the Space Elevator - slides.pptx
How Pencils and Scotch Tape Led to the Space Elevator - slides.pptxPMIUKChapter
 
Supercharge Your Project Management Skills with CHATGPT practical - UK.pdf
Supercharge Your Project Management Skills with CHATGPT practical - UK.pdfSupercharge Your Project Management Skills with CHATGPT practical - UK.pdf
Supercharge Your Project Management Skills with CHATGPT practical - UK.pdfPMIUKChapter
 
Doctoral Research Conference 2022.pdf
Doctoral Research Conference 2022.pdfDoctoral Research Conference 2022.pdf
Doctoral Research Conference 2022.pdfPMIUKChapter
 
PMI Generational Leadership Matrix.pdf
PMI Generational Leadership Matrix.pdfPMI Generational Leadership Matrix.pdf
PMI Generational Leadership Matrix.pdfPMIUKChapter
 
NAVIGATING THE GRAY OF LEADING ACROSS THE GENERATIONS.pdf
NAVIGATING THE GRAY OF LEADING ACROSS THE GENERATIONS.pdfNAVIGATING THE GRAY OF LEADING ACROSS THE GENERATIONS.pdf
NAVIGATING THE GRAY OF LEADING ACROSS THE GENERATIONS.pdfPMIUKChapter
 
Agile and Product Management Presentation by Pamela Schure
Agile and Product Management Presentation by Pamela SchureAgile and Product Management Presentation by Pamela Schure
Agile and Product Management Presentation by Pamela SchurePMIUKChapter
 
Invisible to Invaluable Presentation.pptx
Invisible to Invaluable Presentation.pptxInvisible to Invaluable Presentation.pptx
Invisible to Invaluable Presentation.pptxPMIUKChapter
 
Project Management Methodologies and Project Governance
Project Management Methodologies and Project GovernanceProject Management Methodologies and Project Governance
Project Management Methodologies and Project GovernancePMIUKChapter
 
Product Management Strategy and Product Governance
Product Management Strategy and Product GovernanceProduct Management Strategy and Product Governance
Product Management Strategy and Product GovernancePMIUKChapter
 
Stuart Thorp's Presntation.pptx
Stuart Thorp's Presntation.pptxStuart Thorp's Presntation.pptx
Stuart Thorp's Presntation.pptxPMIUKChapter
 
Sam Baker's Presentation.pptx
Sam Baker's Presentation.pptxSam Baker's Presentation.pptx
Sam Baker's Presentation.pptxPMIUKChapter
 
Playing Project Management PMI UK Chapter May 2023.pdf
Playing Project Management PMI UK Chapter May 2023.pdfPlaying Project Management PMI UK Chapter May 2023.pdf
Playing Project Management PMI UK Chapter May 2023.pdfPMIUKChapter
 
Multi-level Network Governance for Chaotic Disaster Management Contexts by Br...
Multi-level Network Governance for Chaotic Disaster Management Contexts by Br...Multi-level Network Governance for Chaotic Disaster Management Contexts by Br...
Multi-level Network Governance for Chaotic Disaster Management Contexts by Br...PMIUKChapter
 
Delivering Crisis Projects with Business Resilience by Serhiy Kovela, Sheila ...
Delivering Crisis Projects with Business Resilience by Serhiy Kovela, Sheila ...Delivering Crisis Projects with Business Resilience by Serhiy Kovela, Sheila ...
Delivering Crisis Projects with Business Resilience by Serhiy Kovela, Sheila ...PMIUKChapter
 
Istanbul Earthquake Loss Assessment Studies by Himmet Karaman
Istanbul Earthquake Loss Assessment Studies by Himmet Karaman Istanbul Earthquake Loss Assessment Studies by Himmet Karaman
Istanbul Earthquake Loss Assessment Studies by Himmet Karaman PMIUKChapter
 

More from PMIUKChapter (20)

Learning Leadership Lessons from Rock’n’Roll
Learning Leadership Lessons from Rock’n’RollLearning Leadership Lessons from Rock’n’Roll
Learning Leadership Lessons from Rock’n’Roll
 
Overview PMI Infinity - UK Chapter presentation
Overview PMI Infinity - UK Chapter presentationOverview PMI Infinity - UK Chapter presentation
Overview PMI Infinity - UK Chapter presentation
 
The Tay Bridge Disaster presentation pdf
The Tay Bridge Disaster presentation pdfThe Tay Bridge Disaster presentation pdf
The Tay Bridge Disaster presentation pdf
 
Innovation Basket webinar presentation 2024
Innovation Basket webinar presentation 2024Innovation Basket webinar presentation 2024
Innovation Basket webinar presentation 2024
 
How Pencils and Scotch Tape Led to the Space Elevator - slides.pptx
How Pencils and Scotch Tape Led to the Space Elevator - slides.pptxHow Pencils and Scotch Tape Led to the Space Elevator - slides.pptx
How Pencils and Scotch Tape Led to the Space Elevator - slides.pptx
 
Supercharge Your Project Management Skills with CHATGPT practical - UK.pdf
Supercharge Your Project Management Skills with CHATGPT practical - UK.pdfSupercharge Your Project Management Skills with CHATGPT practical - UK.pdf
Supercharge Your Project Management Skills with CHATGPT practical - UK.pdf
 
Doctoral Research Conference 2022.pdf
Doctoral Research Conference 2022.pdfDoctoral Research Conference 2022.pdf
Doctoral Research Conference 2022.pdf
 
Leadership
LeadershipLeadership
Leadership
 
PMI Generational Leadership Matrix.pdf
PMI Generational Leadership Matrix.pdfPMI Generational Leadership Matrix.pdf
PMI Generational Leadership Matrix.pdf
 
NAVIGATING THE GRAY OF LEADING ACROSS THE GENERATIONS.pdf
NAVIGATING THE GRAY OF LEADING ACROSS THE GENERATIONS.pdfNAVIGATING THE GRAY OF LEADING ACROSS THE GENERATIONS.pdf
NAVIGATING THE GRAY OF LEADING ACROSS THE GENERATIONS.pdf
 
Agile and Product Management Presentation by Pamela Schure
Agile and Product Management Presentation by Pamela SchureAgile and Product Management Presentation by Pamela Schure
Agile and Product Management Presentation by Pamela Schure
 
Invisible to Invaluable Presentation.pptx
Invisible to Invaluable Presentation.pptxInvisible to Invaluable Presentation.pptx
Invisible to Invaluable Presentation.pptx
 
Project Management Methodologies and Project Governance
Project Management Methodologies and Project GovernanceProject Management Methodologies and Project Governance
Project Management Methodologies and Project Governance
 
Product Management Strategy and Product Governance
Product Management Strategy and Product GovernanceProduct Management Strategy and Product Governance
Product Management Strategy and Product Governance
 
Stuart Thorp's Presntation.pptx
Stuart Thorp's Presntation.pptxStuart Thorp's Presntation.pptx
Stuart Thorp's Presntation.pptx
 
Sam Baker's Presentation.pptx
Sam Baker's Presentation.pptxSam Baker's Presentation.pptx
Sam Baker's Presentation.pptx
 
Playing Project Management PMI UK Chapter May 2023.pdf
Playing Project Management PMI UK Chapter May 2023.pdfPlaying Project Management PMI UK Chapter May 2023.pdf
Playing Project Management PMI UK Chapter May 2023.pdf
 
Multi-level Network Governance for Chaotic Disaster Management Contexts by Br...
Multi-level Network Governance for Chaotic Disaster Management Contexts by Br...Multi-level Network Governance for Chaotic Disaster Management Contexts by Br...
Multi-level Network Governance for Chaotic Disaster Management Contexts by Br...
 
Delivering Crisis Projects with Business Resilience by Serhiy Kovela, Sheila ...
Delivering Crisis Projects with Business Resilience by Serhiy Kovela, Sheila ...Delivering Crisis Projects with Business Resilience by Serhiy Kovela, Sheila ...
Delivering Crisis Projects with Business Resilience by Serhiy Kovela, Sheila ...
 
Istanbul Earthquake Loss Assessment Studies by Himmet Karaman
Istanbul Earthquake Loss Assessment Studies by Himmet Karaman Istanbul Earthquake Loss Assessment Studies by Himmet Karaman
Istanbul Earthquake Loss Assessment Studies by Himmet Karaman
 

Recently uploaded

{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, Mumbai
{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, Mumbai{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, Mumbai
{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, MumbaiPooja Nehwal
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Ameerpet high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls Ameerpet high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls Ameerpet high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls Ameerpet high-profile Call Girladitipandeya
 
Day 0- Bootcamp Roadmap for PLC Bootcamp
Day 0- Bootcamp Roadmap for PLC BootcampDay 0- Bootcamp Roadmap for PLC Bootcamp
Day 0- Bootcamp Roadmap for PLC BootcampPLCLeadershipDevelop
 
VIP Kolkata Call Girl Rajarhat 👉 8250192130 Available With Room
VIP Kolkata Call Girl Rajarhat 👉 8250192130  Available With RoomVIP Kolkata Call Girl Rajarhat 👉 8250192130  Available With Room
VIP Kolkata Call Girl Rajarhat 👉 8250192130 Available With Roomdivyansh0kumar0
 
CALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual serviceanilsa9823
 
Call Now Pooja Mehta : 7738631006 Door Step Call Girls Rate 100% Satisfactio...
Call Now Pooja Mehta :  7738631006 Door Step Call Girls Rate 100% Satisfactio...Call Now Pooja Mehta :  7738631006 Door Step Call Girls Rate 100% Satisfactio...
Call Now Pooja Mehta : 7738631006 Door Step Call Girls Rate 100% Satisfactio...Pooja Nehwal
 
internal analysis on strategic management
internal analysis on strategic managementinternal analysis on strategic management
internal analysis on strategic managementharfimakarim
 
Does Leadership Possible Without a Vision.pptx
Does Leadership Possible Without a Vision.pptxDoes Leadership Possible Without a Vision.pptx
Does Leadership Possible Without a Vision.pptxSaqib Mansoor Ahmed
 
GENUINE Babe,Call Girls IN Baderpur Delhi | +91-8377087607
GENUINE Babe,Call Girls IN Baderpur  Delhi | +91-8377087607GENUINE Babe,Call Girls IN Baderpur  Delhi | +91-8377087607
GENUINE Babe,Call Girls IN Baderpur Delhi | +91-8377087607dollysharma2066
 
Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...
Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...
Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...Pooja Nehwal
 
Call now : 9892124323 Nalasopara Beautiful Call Girls Vasai virar Best Call G...
Call now : 9892124323 Nalasopara Beautiful Call Girls Vasai virar Best Call G...Call now : 9892124323 Nalasopara Beautiful Call Girls Vasai virar Best Call G...
Call now : 9892124323 Nalasopara Beautiful Call Girls Vasai virar Best Call G...Pooja Nehwal
 
CEO of Google, Sunder Pichai's biography
CEO of Google, Sunder Pichai's biographyCEO of Google, Sunder Pichai's biography
CEO of Google, Sunder Pichai's biographyHafizMuhammadAbdulla5
 

Recently uploaded (20)

{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, Mumbai
{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, Mumbai{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, Mumbai
{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, Mumbai
 
Discover -CQ Master Class - Rikita Wadhwa.pdf
Discover -CQ Master Class - Rikita Wadhwa.pdfDiscover -CQ Master Class - Rikita Wadhwa.pdf
Discover -CQ Master Class - Rikita Wadhwa.pdf
 
Leadership in Crisis - Helio Vogas, Risk & Leadership Keynote Speaker
Leadership in Crisis - Helio Vogas, Risk & Leadership Keynote SpeakerLeadership in Crisis - Helio Vogas, Risk & Leadership Keynote Speaker
Leadership in Crisis - Helio Vogas, Risk & Leadership Keynote Speaker
 
Unlocking the Future - Dr Max Blumberg, Founder of Blumberg Partnership
Unlocking the Future - Dr Max Blumberg, Founder of Blumberg PartnershipUnlocking the Future - Dr Max Blumberg, Founder of Blumberg Partnership
Unlocking the Future - Dr Max Blumberg, Founder of Blumberg Partnership
 
Imagine - Creating Healthy Workplaces - Anthony Montgomery.pdf
Imagine - Creating Healthy Workplaces - Anthony Montgomery.pdfImagine - Creating Healthy Workplaces - Anthony Montgomery.pdf
Imagine - Creating Healthy Workplaces - Anthony Montgomery.pdf
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Ameerpet high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls Ameerpet high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls Ameerpet high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls Ameerpet high-profile Call Girl
 
Day 0- Bootcamp Roadmap for PLC Bootcamp
Day 0- Bootcamp Roadmap for PLC BootcampDay 0- Bootcamp Roadmap for PLC Bootcamp
Day 0- Bootcamp Roadmap for PLC Bootcamp
 
VIP Kolkata Call Girl Rajarhat 👉 8250192130 Available With Room
VIP Kolkata Call Girl Rajarhat 👉 8250192130  Available With RoomVIP Kolkata Call Girl Rajarhat 👉 8250192130  Available With Room
VIP Kolkata Call Girl Rajarhat 👉 8250192130 Available With Room
 
CALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual service
 
Call Now Pooja Mehta : 7738631006 Door Step Call Girls Rate 100% Satisfactio...
Call Now Pooja Mehta :  7738631006 Door Step Call Girls Rate 100% Satisfactio...Call Now Pooja Mehta :  7738631006 Door Step Call Girls Rate 100% Satisfactio...
Call Now Pooja Mehta : 7738631006 Door Step Call Girls Rate 100% Satisfactio...
 
internal analysis on strategic management
internal analysis on strategic managementinternal analysis on strategic management
internal analysis on strategic management
 
Does Leadership Possible Without a Vision.pptx
Does Leadership Possible Without a Vision.pptxDoes Leadership Possible Without a Vision.pptx
Does Leadership Possible Without a Vision.pptx
 
Empowering Local Government Frontline Services - Mo Baines.pdf
Empowering Local Government Frontline Services - Mo Baines.pdfEmpowering Local Government Frontline Services - Mo Baines.pdf
Empowering Local Government Frontline Services - Mo Baines.pdf
 
Peak Performance & Resilience - Dr Dorian Dugmore
Peak Performance & Resilience - Dr Dorian DugmorePeak Performance & Resilience - Dr Dorian Dugmore
Peak Performance & Resilience - Dr Dorian Dugmore
 
GENUINE Babe,Call Girls IN Baderpur Delhi | +91-8377087607
GENUINE Babe,Call Girls IN Baderpur  Delhi | +91-8377087607GENUINE Babe,Call Girls IN Baderpur  Delhi | +91-8377087607
GENUINE Babe,Call Girls IN Baderpur Delhi | +91-8377087607
 
Imagine - HR; are handling the 'bad banter' - Stella Chandler.pdf
Imagine - HR; are handling the 'bad banter' - Stella Chandler.pdfImagine - HR; are handling the 'bad banter' - Stella Chandler.pdf
Imagine - HR; are handling the 'bad banter' - Stella Chandler.pdf
 
Call Girls Service Tilak Nagar @9999965857 Delhi 🫦 No Advance VVIP 🍎 SERVICE
Call Girls Service Tilak Nagar @9999965857 Delhi 🫦 No Advance  VVIP 🍎 SERVICECall Girls Service Tilak Nagar @9999965857 Delhi 🫦 No Advance  VVIP 🍎 SERVICE
Call Girls Service Tilak Nagar @9999965857 Delhi 🫦 No Advance VVIP 🍎 SERVICE
 
Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...
Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...
Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...
 
Call now : 9892124323 Nalasopara Beautiful Call Girls Vasai virar Best Call G...
Call now : 9892124323 Nalasopara Beautiful Call Girls Vasai virar Best Call G...Call now : 9892124323 Nalasopara Beautiful Call Girls Vasai virar Best Call G...
Call now : 9892124323 Nalasopara Beautiful Call Girls Vasai virar Best Call G...
 
CEO of Google, Sunder Pichai's biography
CEO of Google, Sunder Pichai's biographyCEO of Google, Sunder Pichai's biography
CEO of Google, Sunder Pichai's biography
 

Shields Up Presentation.pdf

  • 1. "In the spirit of reconciliation, Bond University acknowledges the Kombumerri people, the traditional Owners and Custodians of the land on which the university now stands. We pay respect to Elders past, present and emerging." Cybersecurity Project Management Greg Skulmoski PhD, MBA, BEd, CITP, FBCS Associate Professor, Project Management Faculty of Society and Design “Best I Have Seen In My Career” Some of your explanations of familiar topics and tools are among the best I have seen in my career. Distinguished Professor Emeritus Timothy Kloppenborg PhD Project Management, Xavier University, United States
  • 2. Shields Up: Cybersecurity Project Management Three Key Points 1 Cybersecurity is risk management 2 Project delivery underpins cybersecurity 3 Cybersecurity audit project opportunities
  • 3. Greg Skulmoski PhD, MBA, BEd, CITP, FBCS Biography: Dual Careers 2004 PhD Project Management 2017 CISO Rising Star 2018 Project Innovation Management 2021 Top 10 Medical Innovations Cleveland Clinic 1990s Challenged Technology Projects 2022 August Shields Up: Cybersecurity Project Management 2023 Cybersecurity Readiness: A Project Management Approach to Training 2007 Top IT Teacher Award Zayed University 2011 Project Manager Cleveland Clinic Abu Dhabi 2000 PMBOK Guide “Author”
  • 4. Outline 1. High Demand for Cybersecurity Projects 2. Align Standards for Cybersecurity Project Success 3. Risk Management Technique Not in the PMBOK® Guide “Expect attackers to be successful.” (Gartner, How to Respond to the 2022 Cybersecurity Landscape, 2022, p. 4)
  • 5. Outline 1. High Demand for Cybersecurity Projects 2. Align Standards for Cybersecurity Project Success 3. Risk Management Technique Not in the PMBOK® Guide “Expect attackers to be successful.” (Gartner, How to Respond to the 2022 Cybersecurity Landscape, 2022, p. 4)
  • 6. What is Cybersecurity? Cybercrime Target systems for financial gain or to disrupt Cyber-attack Politically motivated information gathering Cyberterrorism Undermine digital systems to cause panic or fear Defending digital assets from malicious attacks 287 Days to detect and contain a security breach Identify Mitigate Risk Management! August 22, 2023
  • 7. Business Operations How Does Cybersecurity Work? Framework for Improving Critical Infrastructure Cybersecurity Version 1.1 National Institute of Standards and Technology April 16, 2018 55 pages 1. Identify 2. Protect 3. Detect 4. Respond 5. Recover Quality Improvement Risk and Quality Management “NIST Cybersecurity Framework”
  • 8. Result Increase in Demand for Cybersecurity Projects and Cybersecurity Project Managers More Digital Transformation AI and Quantum Computing More Cyber Attacks Very Lucrative $$$ AI and Quantum Computing More Compliance Regulations and Insurance Three Cybersecurity Project Drivers Supply “Crisis!”
  • 9. strong demand for cybersecurity and cybersecurity projects and project managers!!!!
  • 10. “The threat from state-sponsored cybercrime is now so serious, it is no exaggeration to say that it is time for enterprises to put their entire security teams on a war footing.” Ukrainian Minister of Digital Transformation, Is calling for “digital talents” to join their IT army. (p. 11) 262,000 “Hacktivists” Microsoft Digital Defense Report 2021
  • 12. “Defence must continue to improve its cyber security if it is to defend against constant and malicious cyber activity and succeed in future conflicts.” “Defence adopts leading cyber security standards that strengthen its cyber security posture.” (p. 11) ISO 27001
  • 13. At this stage of mass digitalization, it is imperative that leadership prepare for potential cyber disasters. (p. 29) Hacking with Quantum Computer Technologies Status: “Cyber Arms Race”
  • 14. Prepare for Quantum Cybersecurity Threats Cybersecurity is a Critical Technology Recommendation: War Footing Cybersecurity is a National Security Priority
  • 15. What’s the Best Project Management Approach? What Standards Should We Follow? How? ISO 31000 Risk Management ISO 9001 Quality Management ISO 27001 Information Security Management Project Management Cybersecurity “Expect attackers to be successful.” (Gartner, How to Respond to the 2022 Cybersecurity Landscape, 2022, p. 4)
  • 16. What’s the “Best” Project Management Approach? Initiate Plan Design Build Test T2P Closure DEMAND VALUE Value Proposition Follow the project management approach to keep quality high and risks low Go Live Transition to Production Final activities to bring the technology to the end-users Tailor Design Thinking and L6Σ Combine “Most [cybersecurity] projects, most of the time” This is Project Management Applied to Cybersecurity Projects Checklist Hybrid Project Management “Free Lean Six Sigma White Belt Training”
  • 17. What About Agile Project Management? Value Proposition Follow the Agile project management approach to keep quality high and risks low Iteration 1 “Sprint 1” Iteration 2 “Sprint 2” Iteration 3 “Sprint 3” Product Backlog Continual Improvement Plan Design Build Test Deliver Plan Design Build Test Deliver Plan Design Build Test Deliver Traditional Project Management
  • 18. Best Project Management Approach Prioritize Quality Management Quality Assurance Complete the Work Quality Control Quality Management Process Assurance Before Control Achieve QA With: Training Processes Templates / Checklists Project Plan ISO 9001 Quality Management Value Proposition Follow the quality management approach to keep quality high and risks low Find and fix defects Achieve QC With: Processes Checklists Stage Gates Build a house Create a website Install an elevator system Recruit the project manager Rectify the contaminated site Implement a pharmacy system Test organosilicon electrolyte batteries https://www.revealrisk.com/a-cloud-security-primer-how-to- move-from-security-concerns-to-security-empowered-copy- copy/
  • 19. Continual Improvement Deming Cycle Classical Quality Management Theory Ed Deming ISO 9001 Quality Management Used in Cybersecurity Projects ... “Leadership is only 99% of the problem” Plan Do Check Act
  • 20. Plan Identify Analyze Treat Monitor Risk Management Process Value Proposition Follow the risk management approach to keep quality high and risks low ISO 31000 Risk Management Best Project Management Approach Include Risk Management “Response” PMBOK® Guide Probability (H-M-L) Impact (H-M-L) Prevent Mitigate
  • 21. Best Project Management Approach Incorporate Standards Project Management Delivery Approach Initiate Plan Design Build Test T2P Closure Quality Management Risk Management ISO 9001 Quality Management ISO 31000 Risk Management Quality and Risk Management are Best Practices in Project Management Same-Same in Cybersecurity Projects! Integration Management (Tailor and Combine ➔ Hybrid Project Management)
  • 22. ITIL Service Management A framework to guide organizations to deliver digital services Strategy Management Project Management Risk Management Release Management Service Desk Incident Management Service Request Management ITIL has 34 practices (vs 10 Knowledge Areas*) Demand or Opportunity Project Delivery “Service Value Chain” Operations Provide Value Continual Improvement Continual Improvement ITIL “Service Value System” ISO 31000 Risk Management ISO 9001 Quality Management COBIT 5 Principles Meeting stakeholder needs Covering the enterprise end to end Applying a single integrated framework Enabling a holistic approach Separating governance from management
  • 23. Incorporate Standards Best Project Management Approach for Digital Requirements Service, Project, Quality and Risk Management Standards Alignment Demand or Opportunity Project Delivery Provide Value to Operations Continuous Improvement Integration Management / Combining / Tailoring Cybersecurity Projects
  • 24. Best Digital Project Management Approach Incorporate Standards Demand or Opportunity Project Delivery Provide Value to Operations Continuous Improvement Integration Management / Combining / Tailoring Apply this integrated approach to cybersecurity project management 3 Use Cases
  • 25. Cybersecurity Project Management Use Case #1 Implement Cybersecurity Software Implement SOAR (Security Orchestration, Automation and Response) software v2.3 Project Rationale: Improve detection and response capabilities Project Management Delivery Approach Cybersecurity
  • 26. Cybersecurity IN Technology Projects Use Case #2 Design-in Cybersecurity Implement technology (e.g., industrial automation) and “design-in” security Initiate Plan Design Build Test T2P Closure Invite IT Security Verify the T2P Checklist Inform IT Security Project Stakeholder Management Verify design with IT Security IT Security completes T2P Checklist Items
  • 27. NIST Cybersecurity Tiers Tier 1 Partial Tier 2 Risk Informed Tier 3 Repeatable Tier 4 Adaptive Use Case #3 Conduct a cybersecurity internal audit LOW Complexity Project Clear Requirements - NIST No Testing Follow the Audit Process Cybersecurity Audit Guidance Application Plan, improve and demonstrate cybersecurity capabilities
  • 28. CYBERSECURITY AUDIT 5 NIST CYBERSECURITY FUNCTIONS Awareness and Training Category
  • 29. IMPLEMENTED THROUGH PROJECTS INTENDED OUTCOMES BY CATEGORY AND SUBCATEGORY Function Category Subcategory References Protect (PR) Awareness and Training (PR.AT) The organization’s personnel and partners are provided cybersecurity awareness education and are trained to perform their cybersecurity-related duties and responsibilities consistent with related policies, procedures, and agreements. PR.AT-1 All users are informed and trained CIS CSC 17, 18 COBIT 5 APO07.03, BAI05.07 ISA 62443-2-1:2009 4.3.2.4.2 ISO/IEC 27001:2013 A.7.2.2, A.12.2.1 NIST SP 800-53 Rev. 4 AT-2, PM-13 PR.AT-2 Privileged users understand their roles and responsibilities CIS CSC 5, 17, 18 COBIT 5 APO07.02, DSS05.04, DSS06.03 ISA 62443-2-1:2009 4.3.2.4.2, 4.3.2.4.3 ISO/IEC 27001:2013 A.6.1.1, A.7.2.2 NIST SP 800-53 Rev. 4 AT-3, PM-13 PR.AT-3 Third-party stakeholders (e.g., suppliers, customers, partners) understand their roles and responsibilities CIS CSC 17 COBIT 5 APO07.03, APO07.06, APO10.04, APO10.05 ISA 62443-2-1:2009 4.3.2.4.2 ISO/IEC 27001:2013 A.6.1.1, A.7.2.1, A.7.2.2 NIST SP 800-53 Rev. 4 PS-7, SA-9, SA-16 PR.AT-4 Senior executives understand their roles and responsibilities CIS CSC 17, 19 COBIT 5 EDM01.01, APO01.02, APO07.03 ISA 62443-2-1:2009 4.3.2.4.2 ISO/IEC 27001:2013 A.6.1.1, A.7.2.2 NIST SP 800-53 Rev. 4 AT-3, PM-13 PR.AT-5 Physical and cybersecurity personnel understand their roles and responsibilities CIS CSC 17 COBIT 5 APO07.03 ISA 62443-2-1:2009 4.3.2.4.2 ISO/IEC 27001:2013 A.6.1.1, A.7.2.2 Auditors assess each category and subcategory, and document evidence R e a d i n e s s
  • 30. Projects CYBERSECURITY IMPROVEMENT PROCESS Auditing Steps Step 1: Prioritize and Scope Step 2: Orient Step 3: Create a Current Profile Step 4: Conduct a Risk Assessment Step 5: Create a Target Profile Step 6: Determine, Analyse, and Prioritize Gaps Step 7: Implement Action Plan (project) Description Identify the business objectives and priorities to make cybersecurity decisions about the scope of the cybersecurity program Identify systems and assets, regulatory frameworks and overall risk approach, then identify related vulnerabilities and threats Identify the functions, categories and subcategories being achieved Assess the organisation against the framework noting compliance evidence Create a target profile of where the organisation’s cybersecurity program desired outcome Determine, analyse and prioritise any cybersecurity gaps Develop a plan to address any gaps. Some gaps will require more formal projects.
  • 31. Compliance = More Cybersecurity Projects NIST CYBERSECURITY FRAMEWORK Target Profile Current Profile Gap Analysis Prioritised Cybersecurity Initiatives and Projects
  • 32. 1. Greg Skulmoski, “Project Maturity and Competence Interface,” Cost Engineering, Vol. 43, No. 6, June 2001, 2. Greg Skulmoski and John Schlichter, “Organisational Project Management Maturity: New Frontiers,” Project, May 2000, 3. John Schlichter and Greg Skulmoski, “Organizational Project Management Maturity: New Frontiers,” Congress 2000, 15th IPMA World Congress on Project Management, London, England, May 2000, 4. Ginger Levin and Greg Skulmoski, “Using a Project Management Maturity Assessment to Promote Project Management Improvements,” Managing Business by Projects, Helsinki, Finland, September 16 - 17, 1999, 5. Francis Hartman and Greg Skulmoski, “Project Management Maturity,” Project Management, Vol. 4, No. 1, 1998: 74-78. QUALITY IMPROVEMENT THROUGH MATURITY Organizational Project Management Maturity Model (OPM3) Guidance Committee Member 1999 Value Proposition Follow the project management maturity approach to keep quality high and risks low
  • 33. Implement Cybersecurity Software Design-in Cybersecurity Audit Cybersecurity Capabilities Three Use Cases Cybersecurity Project Management
  • 34. Project Management Delivery Approach “Value” Cybersecurity Deliver Operations (aka Production) Environment Project Environment Cybersecurity Project Management: Standards Alignment Demand for Technology Project Delivery Provide Value to End-user Continuous Improvement Technology Management ISO 31000 Risk Management ISO 9001 Quality Management ISO 27001 Information Security Management Process People Technology Continuous Improvement
  • 35. Project Management Delivery Approach “Value” Cybersecurity Deliver Compliance ǂ Protection Measure Cybersecurity Performance KPI’s Protect, Detect, Respond, Recover Caution: Standards Compliance Focus ISO 31000 Risk Management ISO 9001 Quality Management ISO 27001 Information Security Management Continuous Improvement Process People Technology
  • 36. Shields Up: Cybersecurity Project Management Conclusion: Three Key Points 1 Cybersecurity is risk management 2 Project management underpins cybersecurity 3 Cybersecurity audit projects
  • 37. Project Management Delivery Approach Continuous Improvement Optimization Sprint ADDIE Sprint Cybersecurity Go-Live Demand for Technology Project Delivery Provide Value to End-user Continuous Improvement Technology Management Process People Technology ISO 31000 Risk Management ISO 9001 Quality Management ISO 27001 Information Security Management Cybersecurity Project Management
  • 38. Advance Praise “Must Read” Jason Roos, Chief Information Officer King Abdullah University of Science and Technology, Saudi Arabia “Unique Resource” Professor Craig Langston PhD, Project Management Bond University, Australia “Critical Tools” Derek Molnar, PMP, Project Manager University of Colorado, United States “Best I Have Seen In My Career” Distinguished Professor Emeritus Timothy Kloppenborg PhD, Project Management Xavier University, United States “A Solid Guide” Thiago Santos, Senior Technical Architect Mulesoft, Canada “Perfect Alignment” Irene Corpuz, PMP, ITIL, CISA, CEH, ISO 27001 Lead Implementer & Auditor, Manager Projects Federal Higher Education, United Arab Emirates United Nations Sustainable Development Goal #9: Recognizable Contribution
  • 39. Discussion Greg Skulmoski PhD, MBA, BEd, CITP, FBCS Associate Professor, Project Innovation Management Faculty of Society and Design