SlideShare une entreprise Scribd logo
1  sur  9
Created by SideChannel
Readme: Slides Guidelines
SLIDE
4 General framing of NIST framework as common language.
5 NIST CSF deep dive to use per specific needs.
6 NIST scorecard. To fill this you must map your existing technologies and procedures to the detailed NIST 800-171 controls’
list. Alternatively, if you’re engaged in a 3rd party assessment, present the interim results. That way or the other, you’ll need
to populate a NIST 800-171 controls’ spreadsheet to aggregate into a bar chart.
7 Map the various security stakeholders within your organization + description of delivered success.
8 • Operational metrics, divided to two parts:
• Security technologies – the example in this slides includes events from firewall and endpoint. In real life you’ll
include the outputs of your entire security stack.
• Security team - overall number + selected examples. We suggest to pick three that represent the events in the
given timeframe. Each example can trigger elaboration on the related security risk and needs.
9 Concise risk metric dashboard that you fill according to your security posture.
Agenda
• Cyber Security Strategy
• NIST Cyber Security Framework Scorecard
• Cyber Security Governance
• Defense – Operational Metrics
• Defense – Risk Matrix Dashboard
Cyber Security Strategy
Design, implement and continually improve a cyber discipline
aligned to the National Institute of Standards and Technology
cybersecurity framework (NIST CSF)
IDENTIFY PROTECT DETECT RESPOND RECOVER
BUSINESS OPPORTUNITY KEY ENABLERS
Develop the organizational understanding
of cybersecurity risk to manage it and its
impact on systems, data, employees, and
capabilities.
• Business Context
• Asset Management
• Governance
• Risk Assessment
• Risk Management
Strategy
Develop and implement the appropriate
safeguards to ensure delivery of critical
infrastructure services.
• Access Control
• Awareness and Training
• Data Security
• Information Protection
Policies and Procedures
• Proactive Maintenance
• Protective Technology
Develop and implement the appropriate
activities to identify the occurrence of a
cybersecurity event.
• Anomaly and Event
Detection
• Security Continuous
Monitoring
• Detection Processes
Develop and implement the appropriate
activities to take action regarding a
detected cybersecurity event.
• Incident Response
Planning
• Communications
• Analysis
• Mitigation
Develop and implement the appropriate
activities to maintain plans for resilience
and to restore any capabilities that were
impaired due to a cybersecurity event.
• Incident Recovery
Planning
• Communications
NIST CSF
Deep Dive
IDENTIFY
PROTECT
DETECT
RESPOND
RECOVER
0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100%
Recover
Respond
Detect
Protect
Identify
NUMBER OF CONTROLS
NIST
CORE
FUNCTIONS
NIST Cyber Security Framework Scorecard
NIST CSF
Metric
Start Current Target Trend
Controls
Met
35% 55% 80% Improving
Met
Partially Met
Not Yet Met
Employee – Title
Employee – Title
Employee – Title
Employee – Title
Employee – Title
Employee – Title
D A T A
S E C U R I T Y &
P R I V A C Y
C O M P L I A N C E
I N F O R M A T I O N
T E C H N O L O G Y
S T R A T E G Y & G O V E R N A N C E
T E C H N I C A L E X E C U T I O N
Employee – Title
Employee – Title
Employee – Title
R I S K P R I O R I T I Z A T I O N
E N T E R P R I S E
R I S K
M A N A G E M E N T
Cyber Security Governance – One Company, One Mission
SUCCESSES DELIVERED(xQ20xx)
Topic Area 1 Include brief description of success seen by
business and how it reduced risk
Topic Area 2 Include brief description of success seen by
business and how it reduced risk
Topic Area 3 Include brief description of success seen by
business and how it reduced risk
Topic Area 4 Include brief description of success seen by
business and how it reduced risk
Topic Area 5 Include brief description of success seen by
business and how it reduced risk
Security
Technologies
• Perimeter firewalls blocked XXX inbound events
• Endpoint controls blocked XXX events
• Other (email protection, IDS, etc.) identifiedblocked XXX events
Security
Team
Overall
Number of
incidents:
XXXX
Selected
Examples
Employee account
compromise
example
Description:
• Employee clicked phishing link and submitted username/password
• Analyst responded to compromise and recovered operations for employee
Elaboration point: data or PII lost and impact
Malware
installation via
malicious
advertising website
Description:
• Employee’s laptop was vulnerable to exploit and was compromised
• Analyst detected malware, contained, and quarantined laptop
• Analyst worked with Helpdesk to recover operations for employee
Elaboration point: time lost for desktop support team to remediate and business impact to use
Employee accessed
or attempted
access to
prohibited
websites
Description:
• Analyst detected attempts, researched incident and monitored employee
• Employee’s network history and / or laptop is secured for HR investigation
• Analysts work with HR and / or Legal
Elaboration point: insider threat, IP loss, or reputation damage
Technology solutions and resource investments are proving to be effective
Defense – Operational Metrics
Cybersecurity Risk Metric
Update
Period Target 1Q2018 2Q2018 3Q2018 4Q2018 Trend
Severity 1 Cybersecurity Incidents Reported Quarterly 0 0 0 Steady
Unresolved Cybersecurity Audit Items > 30 days old Quarterly 0 0 0 Steady
Data Breaches Quarterly 0 0 0 Steady
Unresolved Penetration Test Findings > 90 days old % Quarterly < 5% 3% 0% Improving
Tier-1 Applications Availability % Quarterly 99.75% 99.985% 100% Improving
Employee Cybersecurity Training Completion % Bi-Annually 100% 89.5% Steady
Cybersecurity investment (% of annual IT budget devoted to
IT security, risk and privacy)
Quarterly 5% 3% 3.5% Improving
Measurable events and incident levels are commensurate to a business of our size and industry sector.
Technology solutions and cybersecurity prioritization activities are proving to be effective.
Defense – Cyber Security Risk Metric Dashboard

Contenu connexe

Tendances

Information Security Awareness
Information Security Awareness Information Security Awareness
Information Security Awareness Net at Work
 
Cyber Security For Organization Proposal PowerPoint Presentation Slides
Cyber Security For Organization Proposal PowerPoint Presentation SlidesCyber Security For Organization Proposal PowerPoint Presentation Slides
Cyber Security For Organization Proposal PowerPoint Presentation SlidesSlideTeam
 
1. Security and Risk Management
1. Security and Risk Management1. Security and Risk Management
1. Security and Risk ManagementSam Bowne
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness TrainingWilliam Mann
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsKrishna Srikanth Manda
 
Cyber security fundamentals
Cyber security fundamentalsCyber security fundamentals
Cyber security fundamentalsCloudflare
 
Security operations center 5 security controls
 Security operations center 5 security controls Security operations center 5 security controls
Security operations center 5 security controlsAlienVault
 
Cyber Threat hunting workshop
Cyber Threat hunting workshopCyber Threat hunting workshop
Cyber Threat hunting workshopArpan Raval
 
Security operation center (SOC)
Security operation center (SOC)Security operation center (SOC)
Security operation center (SOC)Ahmed Ayman
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligenceseadeloitte
 
INCIDENT RESPONSE OVERVIEW
INCIDENT RESPONSE OVERVIEWINCIDENT RESPONSE OVERVIEW
INCIDENT RESPONSE OVERVIEWSylvain Martinez
 
Information Security Governance and Strategy - 3
Information Security Governance and Strategy - 3Information Security Governance and Strategy - 3
Information Security Governance and Strategy - 3Dam Frank
 
Cyber threat intelligence ppt
Cyber threat intelligence pptCyber threat intelligence ppt
Cyber threat intelligence pptKumar Gaurav
 
CyberSecurity Certifications | CyberSecurity Career | CyberSecurity Certifica...
CyberSecurity Certifications | CyberSecurity Career | CyberSecurity Certifica...CyberSecurity Certifications | CyberSecurity Career | CyberSecurity Certifica...
CyberSecurity Certifications | CyberSecurity Career | CyberSecurity Certifica...Edureka!
 
Introduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security FrameworkIntroduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security FrameworkPECB
 

Tendances (20)

Information Security Awareness
Information Security Awareness Information Security Awareness
Information Security Awareness
 
Cyber Security For Organization Proposal PowerPoint Presentation Slides
Cyber Security For Organization Proposal PowerPoint Presentation SlidesCyber Security For Organization Proposal PowerPoint Presentation Slides
Cyber Security For Organization Proposal PowerPoint Presentation Slides
 
1. Security and Risk Management
1. Security and Risk Management1. Security and Risk Management
1. Security and Risk Management
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Incident response
Incident responseIncident response
Incident response
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber kill chain
Cyber kill chainCyber kill chain
Cyber kill chain
 
Cyber security fundamentals
Cyber security fundamentalsCyber security fundamentals
Cyber security fundamentals
 
Security operations center 5 security controls
 Security operations center 5 security controls Security operations center 5 security controls
Security operations center 5 security controls
 
Cyber Threat hunting workshop
Cyber Threat hunting workshopCyber Threat hunting workshop
Cyber Threat hunting workshop
 
Security operation center (SOC)
Security operation center (SOC)Security operation center (SOC)
Security operation center (SOC)
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
INCIDENT RESPONSE OVERVIEW
INCIDENT RESPONSE OVERVIEWINCIDENT RESPONSE OVERVIEW
INCIDENT RESPONSE OVERVIEW
 
Information Security Governance and Strategy - 3
Information Security Governance and Strategy - 3Information Security Governance and Strategy - 3
Information Security Governance and Strategy - 3
 
Cyber threat intelligence ppt
Cyber threat intelligence pptCyber threat intelligence ppt
Cyber threat intelligence ppt
 
CyberSecurity Certifications | CyberSecurity Career | CyberSecurity Certifica...
CyberSecurity Certifications | CyberSecurity Career | CyberSecurity Certifica...CyberSecurity Certifications | CyberSecurity Career | CyberSecurity Certifica...
CyberSecurity Certifications | CyberSecurity Career | CyberSecurity Certifica...
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Introduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security FrameworkIntroduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security Framework
 

Similaire à PPT-Security-for-Management.pptx

Closing the Gap for Advanced Enterprise Cybersecurity Skills with CompTIA Adv...
Closing the Gap for Advanced Enterprise Cybersecurity Skills with CompTIA Adv...Closing the Gap for Advanced Enterprise Cybersecurity Skills with CompTIA Adv...
Closing the Gap for Advanced Enterprise Cybersecurity Skills with CompTIA Adv...CompTIA
 
SLVA - Security monitoring and reporting itweb workshop
SLVA - Security monitoring and reporting   itweb workshopSLVA - Security monitoring and reporting   itweb workshop
SLVA - Security monitoring and reporting itweb workshopSLVA Information Security
 
framework-version-1.1-overview-20180427-for-web-002.pptx
framework-version-1.1-overview-20180427-for-web-002.pptxframework-version-1.1-overview-20180427-for-web-002.pptx
framework-version-1.1-overview-20180427-for-web-002.pptxAshishRanjan546644
 
Building Security Operation Center
Building Security Operation CenterBuilding Security Operation Center
Building Security Operation CenterS.E. CTS CERT-GOV-MD
 
DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)Shah Sheikh
 
NIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewNIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewTandhy Simanjuntak
 
CONTEXTUAL ARCHITECTURE.pptx
CONTEXTUAL ARCHITECTURE.pptxCONTEXTUAL ARCHITECTURE.pptx
CONTEXTUAL ARCHITECTURE.pptxPandiya Rajan
 
Risk Based Security and Self Protection Powerpoint
Risk Based Security and Self Protection PowerpointRisk Based Security and Self Protection Powerpoint
Risk Based Security and Self Protection Powerpointrandalje86
 
Adding Analytics to your Cybersecurity Toolkit with CompTIA Cybersecurity Ana...
Adding Analytics to your Cybersecurity Toolkit with CompTIA Cybersecurity Ana...Adding Analytics to your Cybersecurity Toolkit with CompTIA Cybersecurity Ana...
Adding Analytics to your Cybersecurity Toolkit with CompTIA Cybersecurity Ana...CompTIA
 
Luncheon 2015-06-18 Security Industry 2.0: Survival in the Boardroom by David...
Luncheon 2015-06-18 Security Industry 2.0: Survival in the Boardroom by David...Luncheon 2015-06-18 Security Industry 2.0: Survival in the Boardroom by David...
Luncheon 2015-06-18 Security Industry 2.0: Survival in the Boardroom by David...North Texas Chapter of the ISSA
 
From SIEM to SOC: Crossing the Cybersecurity Chasm
From SIEM to SOC: Crossing the Cybersecurity ChasmFrom SIEM to SOC: Crossing the Cybersecurity Chasm
From SIEM to SOC: Crossing the Cybersecurity ChasmPriyanka Aash
 
Security & Risk Management
Security & Risk ManagementSecurity & Risk Management
Security & Risk ManagementAhmed Sayed-
 
MS. Cybersecurity Reference Architecture
MS. Cybersecurity Reference ArchitectureMS. Cybersecurity Reference Architecture
MS. Cybersecurity Reference Architectureangelohammond
 
Cissp exam-outline
Cissp exam-outlineCissp exam-outline
Cissp exam-outlineAhmet E
 
ICS Cyber Security Effectiveness Measurement
ICS Cyber Security Effectiveness MeasurementICS Cyber Security Effectiveness Measurement
ICS Cyber Security Effectiveness MeasurementAleksey Lukatskiy
 
RMS Security Breakfast
RMS Security BreakfastRMS Security Breakfast
RMS Security BreakfastRackspace
 
Cybersecurity Frameworks and You: The Perfect Match
Cybersecurity Frameworks and You: The Perfect MatchCybersecurity Frameworks and You: The Perfect Match
Cybersecurity Frameworks and You: The Perfect MatchMcKonly & Asbury, LLP
 
NIST CSF review - Essential Protections (a K12 perspective)
NIST CSF review - Essential Protections (a K12 perspective)NIST CSF review - Essential Protections (a K12 perspective)
NIST CSF review - Essential Protections (a K12 perspective)April Mardock CISSP
 
Lessons Learned from the NIST CSF
Lessons Learned from the NIST CSFLessons Learned from the NIST CSF
Lessons Learned from the NIST CSFDigital Bond
 

Similaire à PPT-Security-for-Management.pptx (20)

Closing the Gap for Advanced Enterprise Cybersecurity Skills with CompTIA Adv...
Closing the Gap for Advanced Enterprise Cybersecurity Skills with CompTIA Adv...Closing the Gap for Advanced Enterprise Cybersecurity Skills with CompTIA Adv...
Closing the Gap for Advanced Enterprise Cybersecurity Skills with CompTIA Adv...
 
Soc
SocSoc
Soc
 
SLVA - Security monitoring and reporting itweb workshop
SLVA - Security monitoring and reporting   itweb workshopSLVA - Security monitoring and reporting   itweb workshop
SLVA - Security monitoring and reporting itweb workshop
 
framework-version-1.1-overview-20180427-for-web-002.pptx
framework-version-1.1-overview-20180427-for-web-002.pptxframework-version-1.1-overview-20180427-for-web-002.pptx
framework-version-1.1-overview-20180427-for-web-002.pptx
 
Building Security Operation Center
Building Security Operation CenterBuilding Security Operation Center
Building Security Operation Center
 
DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)
 
NIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewNIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An Overview
 
CONTEXTUAL ARCHITECTURE.pptx
CONTEXTUAL ARCHITECTURE.pptxCONTEXTUAL ARCHITECTURE.pptx
CONTEXTUAL ARCHITECTURE.pptx
 
Risk Based Security and Self Protection Powerpoint
Risk Based Security and Self Protection PowerpointRisk Based Security and Self Protection Powerpoint
Risk Based Security and Self Protection Powerpoint
 
Adding Analytics to your Cybersecurity Toolkit with CompTIA Cybersecurity Ana...
Adding Analytics to your Cybersecurity Toolkit with CompTIA Cybersecurity Ana...Adding Analytics to your Cybersecurity Toolkit with CompTIA Cybersecurity Ana...
Adding Analytics to your Cybersecurity Toolkit with CompTIA Cybersecurity Ana...
 
Luncheon 2015-06-18 Security Industry 2.0: Survival in the Boardroom by David...
Luncheon 2015-06-18 Security Industry 2.0: Survival in the Boardroom by David...Luncheon 2015-06-18 Security Industry 2.0: Survival in the Boardroom by David...
Luncheon 2015-06-18 Security Industry 2.0: Survival in the Boardroom by David...
 
From SIEM to SOC: Crossing the Cybersecurity Chasm
From SIEM to SOC: Crossing the Cybersecurity ChasmFrom SIEM to SOC: Crossing the Cybersecurity Chasm
From SIEM to SOC: Crossing the Cybersecurity Chasm
 
Security & Risk Management
Security & Risk ManagementSecurity & Risk Management
Security & Risk Management
 
MS. Cybersecurity Reference Architecture
MS. Cybersecurity Reference ArchitectureMS. Cybersecurity Reference Architecture
MS. Cybersecurity Reference Architecture
 
Cissp exam-outline
Cissp exam-outlineCissp exam-outline
Cissp exam-outline
 
ICS Cyber Security Effectiveness Measurement
ICS Cyber Security Effectiveness MeasurementICS Cyber Security Effectiveness Measurement
ICS Cyber Security Effectiveness Measurement
 
RMS Security Breakfast
RMS Security BreakfastRMS Security Breakfast
RMS Security Breakfast
 
Cybersecurity Frameworks and You: The Perfect Match
Cybersecurity Frameworks and You: The Perfect MatchCybersecurity Frameworks and You: The Perfect Match
Cybersecurity Frameworks and You: The Perfect Match
 
NIST CSF review - Essential Protections (a K12 perspective)
NIST CSF review - Essential Protections (a K12 perspective)NIST CSF review - Essential Protections (a K12 perspective)
NIST CSF review - Essential Protections (a K12 perspective)
 
Lessons Learned from the NIST CSF
Lessons Learned from the NIST CSFLessons Learned from the NIST CSF
Lessons Learned from the NIST CSF
 

Dernier

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 

Dernier (20)

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 

PPT-Security-for-Management.pptx

  • 2. Readme: Slides Guidelines SLIDE 4 General framing of NIST framework as common language. 5 NIST CSF deep dive to use per specific needs. 6 NIST scorecard. To fill this you must map your existing technologies and procedures to the detailed NIST 800-171 controls’ list. Alternatively, if you’re engaged in a 3rd party assessment, present the interim results. That way or the other, you’ll need to populate a NIST 800-171 controls’ spreadsheet to aggregate into a bar chart. 7 Map the various security stakeholders within your organization + description of delivered success. 8 • Operational metrics, divided to two parts: • Security technologies – the example in this slides includes events from firewall and endpoint. In real life you’ll include the outputs of your entire security stack. • Security team - overall number + selected examples. We suggest to pick three that represent the events in the given timeframe. Each example can trigger elaboration on the related security risk and needs. 9 Concise risk metric dashboard that you fill according to your security posture.
  • 3. Agenda • Cyber Security Strategy • NIST Cyber Security Framework Scorecard • Cyber Security Governance • Defense – Operational Metrics • Defense – Risk Matrix Dashboard
  • 4. Cyber Security Strategy Design, implement and continually improve a cyber discipline aligned to the National Institute of Standards and Technology cybersecurity framework (NIST CSF) IDENTIFY PROTECT DETECT RESPOND RECOVER
  • 5. BUSINESS OPPORTUNITY KEY ENABLERS Develop the organizational understanding of cybersecurity risk to manage it and its impact on systems, data, employees, and capabilities. • Business Context • Asset Management • Governance • Risk Assessment • Risk Management Strategy Develop and implement the appropriate safeguards to ensure delivery of critical infrastructure services. • Access Control • Awareness and Training • Data Security • Information Protection Policies and Procedures • Proactive Maintenance • Protective Technology Develop and implement the appropriate activities to identify the occurrence of a cybersecurity event. • Anomaly and Event Detection • Security Continuous Monitoring • Detection Processes Develop and implement the appropriate activities to take action regarding a detected cybersecurity event. • Incident Response Planning • Communications • Analysis • Mitigation Develop and implement the appropriate activities to maintain plans for resilience and to restore any capabilities that were impaired due to a cybersecurity event. • Incident Recovery Planning • Communications NIST CSF Deep Dive IDENTIFY PROTECT DETECT RESPOND RECOVER
  • 6. 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% Recover Respond Detect Protect Identify NUMBER OF CONTROLS NIST CORE FUNCTIONS NIST Cyber Security Framework Scorecard NIST CSF Metric Start Current Target Trend Controls Met 35% 55% 80% Improving Met Partially Met Not Yet Met
  • 7. Employee – Title Employee – Title Employee – Title Employee – Title Employee – Title Employee – Title D A T A S E C U R I T Y & P R I V A C Y C O M P L I A N C E I N F O R M A T I O N T E C H N O L O G Y S T R A T E G Y & G O V E R N A N C E T E C H N I C A L E X E C U T I O N Employee – Title Employee – Title Employee – Title R I S K P R I O R I T I Z A T I O N E N T E R P R I S E R I S K M A N A G E M E N T Cyber Security Governance – One Company, One Mission SUCCESSES DELIVERED(xQ20xx) Topic Area 1 Include brief description of success seen by business and how it reduced risk Topic Area 2 Include brief description of success seen by business and how it reduced risk Topic Area 3 Include brief description of success seen by business and how it reduced risk Topic Area 4 Include brief description of success seen by business and how it reduced risk Topic Area 5 Include brief description of success seen by business and how it reduced risk
  • 8. Security Technologies • Perimeter firewalls blocked XXX inbound events • Endpoint controls blocked XXX events • Other (email protection, IDS, etc.) identifiedblocked XXX events Security Team Overall Number of incidents: XXXX Selected Examples Employee account compromise example Description: • Employee clicked phishing link and submitted username/password • Analyst responded to compromise and recovered operations for employee Elaboration point: data or PII lost and impact Malware installation via malicious advertising website Description: • Employee’s laptop was vulnerable to exploit and was compromised • Analyst detected malware, contained, and quarantined laptop • Analyst worked with Helpdesk to recover operations for employee Elaboration point: time lost for desktop support team to remediate and business impact to use Employee accessed or attempted access to prohibited websites Description: • Analyst detected attempts, researched incident and monitored employee • Employee’s network history and / or laptop is secured for HR investigation • Analysts work with HR and / or Legal Elaboration point: insider threat, IP loss, or reputation damage Technology solutions and resource investments are proving to be effective Defense – Operational Metrics
  • 9. Cybersecurity Risk Metric Update Period Target 1Q2018 2Q2018 3Q2018 4Q2018 Trend Severity 1 Cybersecurity Incidents Reported Quarterly 0 0 0 Steady Unresolved Cybersecurity Audit Items > 30 days old Quarterly 0 0 0 Steady Data Breaches Quarterly 0 0 0 Steady Unresolved Penetration Test Findings > 90 days old % Quarterly < 5% 3% 0% Improving Tier-1 Applications Availability % Quarterly 99.75% 99.985% 100% Improving Employee Cybersecurity Training Completion % Bi-Annually 100% 89.5% Steady Cybersecurity investment (% of annual IT budget devoted to IT security, risk and privacy) Quarterly 5% 3% 3.5% Improving Measurable events and incident levels are commensurate to a business of our size and industry sector. Technology solutions and cybersecurity prioritization activities are proving to be effective. Defense – Cyber Security Risk Metric Dashboard

Notes de l'éditeur

  1. This slide uses an excel sheet behind the chart to show percentages of met, partially met, or not met controls against the NIST CSF.