SlideShare a Scribd company logo
1 of 64
Part I
Cybersecurity Risk Management
and the Framework For Improving
Critical Infrastructure Cybersecurity
Anisa Fatakh Sabila
• Cyber security is about managing risk. Risk governance and
management is about informed decision making. Therefore, the cyber
security equation has two components: business enablement and
asset
protection.
• First, cyber security efforts must be aligned to fit the enterprise GRC
framework by delivering on business strategy. Cyber risk is a critical
business risk and thus an important element.
• Second, information is a key enterprise asset and must be protected
based on criticality, integrity and availability needs. Cyber security
must be considered in the larger picture of enterprise GRC scope,
because of the need to move information in today’s economy is vital
to success.
• Determine what assets it needs to protect and place a priority on
• Cybersecurity should follow a layered approach, with additional
protections for the most important assets, such as corporate and
customer data. Remember that reputational harm from a breach can
do more damage than the breach itself.
•Cybersecurity Risk Management” means
technologies, practices, and policies that address
threats or vulnerabilities in networks, computers,
programs and data, flowing from or enabled by
connection to digital infrastructure, information
systems, or industrial control systems, including but
not limited to, information security, supply chain
assurance, information assurance, and hardware and
software assurance.
Cyber security, therefore, requires several levels of effort involving:
• Application of technology
• Management oversight
• Legal and regulatory awareness
• Employee training
• Adoption and implementation of policies and procedures governing
the information technology environment
• Recognizing that cyber security is no longer only an IT issue,
leadership should ensure that the enterprise develops a cyber
security/risk framework.
• To manage cybersecurity risks, a clear understanding of the
organization’s business drivers and security considerations specific to
its use of technology is required. Because each organization’s risks,
priorities, and systems are unique, the tools and methods used to
achieve the outcomes described by the Framework will vary.
Structure of the NIST Cybersecurity Framework
Functions of the NIST CSF Framework Core
NIST CSF and COBIT 5 Implementation
Alignment
NIST CSF STEP 1: Prioritize and scope
NIST CSF STEPS 2 AND 3: Orient and Create a
current profile
NIST CSF Implementation Tiers
NIST CSF STEPS 2 AND 3: Orient and Create a
current profile
NIST CSF Current Profile Template
NIST CSF Current Profile Template
NIST CSF STEPS 4 AND 5: Conduct a risk
assessment and Create a target profile
Where do we want to be?
COBIT 5 for Risk
Process
Assessment
Model (PAM)
COBIT 5
Assessor’s
Guide
COBIT 5
COBIT 5 process
APO12,
Manage Risk.
The target profile is similar to the current profile template
and should include the following information:
• Applicable function
• Applicable category
• Applicable subcategory
• COBIT 5 reference to identify practices required to meet
the goals of the subcategory
• Achievement rating (e.g., not achieved, partially achieved, largely
achieved, fully achieved) based on existing procedures
• Practices, policies and procedures identified in the risk assessment
• Description of how the achievement rating was determined
• Actions required to achieve the target state goals
• Resources required
NIST CSF STEP 6: Determine, analyze and
prioritize gaps
What needs to be done?
COBIT 5:
Enabling
Processes
An action plan should include the following:
• Identification
• Priority
• Assumptions and constraints
• Rationale
• Specific actions
• Resources
• Schedule/milestones
• Status
• Pre-requisites/dependencies
• Action assignee
• Stakeholder roles
NIST CSF STEP 7: Implement action plan
How do we get there?
COBIT 5
Implementation
Guide:
COBIT 5 Implementation Guide:
Test the approach by making small improvements initially
and to provide some quick wins
Involve all stakeholders
Improve processes before attempting to apply automation
Set clear, measurable goals and produce scorecards
showing how performance is being measured
Communicate in business impact terms
NIST CSF STEP 8: CSF action plan review
Did we get there?
The enterprise assesses the activities from the
implementation step to ensure that improvements achieve
the anticipated goals and risk management objectives. The
enterprise documents the lessons learned and identifies any
specific ongoing monitoring needs.
NIST CSF STEP 9: CSF lifecycle management
• Initiate
• Identify further governance or
management requirements
• Support continual improvement
How do we keep the
momentum going?
Three Lines of Defense Model Based on COBIT 5
for Risk
10 Tips for Adopting NIST Using COBIT 5
Know the Stakeholders
Understand Why
Leverage industry available frameworks
Get top management involved
Instill accountability
Demonstrate quick wins
Use a continuos cycle
Embed new approaches
Formal documentation
Train
Part II
Cybersecurity, Governance,
Audit, and The COBIT 5
Framework
Anisa Fatakh Sabila
Cybersecurity Framework
Framework Principles
Principle 1 (P1)
• Meeting stakeholder needs
Principle 2 (P2)
• Covering the enterprise end to end
Principle 3 (P3)
• Applying a single, integrated framework
Principle 4 (P4)
• Enabling a holistic approach
Principle 5 (P5)
• Separating governance from management
Framework Model
Practical enterprise dialogue of various CMMI levels
Decomposition of Framework
Framework Principles: Creation
Quality confentiality Cost integrity Delivery availability
Effectiveness and
efficiency of
operations
Reliability of
information
Compliance with
laws and regulations
Process flow for COBIT 5
Control Issue
Seven Enablers of COBIT 5, working as a cohesive unit.
Navigation Issue
Shows a simplified conceptualization of how the navigation issue flows
Framework Structure’s
Generic Domains
COBIT’s Framework Structure
Operational Managerial Organizational
Three vantage points
Planning and organization
Conceptualization of COBIT 5 elements and supporting question
Acquisition and Implementation
Business system document (finalized draft)
Design specification document (finalized draft)
Interface control document (1st draft, living document)
System deployment document (1st draft, living document)
Transition management document (1st draft, living document)
User training documentation (1st draft, living document)
Computer operator’s handbook (1st draft, living document)
Delivery and Support
Business system document
Design specification document
Interface control document (finalized draft)
System deployment document (finalized draft)
Transition management document
User training documentation (finalized draft)
Computer operator’s handbook (finalized draft)
Transitioning a newly built system, essential document and questions
Monitoring
Preventive maintenance and performance optimization are
IT disciplines that are usually mastered by system
administrators and database administrators as opposed to
developers.
Decomposition of COBIT 5 Principles
Purpose of COBIT Control Objectives and Principles
Principle 1: Installing the Integrated IT Architectural Framework
These needs are then fed through COBIT’s seven enablers:
(1) processes, (2) principles and policies, (3) organizational structures,
(4) skills and competencies, (5) culture and behavior, (6) service
capabilities, and (7) information
Principle 2: What Do Stakeholders Value?
Centralized
The catalog of stakeholder’s needs
should serve as a single point of
reference
One must also take into
consideration the culture in many
organizations
This also applies to various levels of
the centralized stakeholders
Outer
Benefis realization
Risk balancing
Cost optimization
Principle 3: The Business Context Focus
Financial
Customer
related
Internal
(enterprise)
Principle 4: Measuring Performance
The measurement of projects throughout their life cycles
should be evident in most organizations and processes
should also be in place. To this end, there is an important
distinction between governance and management. The
governance in an organization is the pathway.
COBIT Management Guidelines
Enterprise Management
Conceptualization of COBIT 5, value creation
Risk Management
Risk management and security assurance depend on the
ability to apply specific, repeatable management practices.
Risk management should be proactive for the most part but
when we think about disaster recovery and how this IT
discipline focuses around simulating various events and the
preparedness of the enterprise to handle those risks, it can
be argued that it is reactive.
Status of IT Systems
There was an application that ran on data center
infrastructures, which would show indicator readings on
a Graphical User Interface (GUI), reflecting the status of
systems. If a system or application was down, it would
show a red status on the GUI and the dashboard
consisted of several indicator bubbles, each of which is
represented on system, server, or application.
Continuous Improvement
Conceptualization of COBIT 5, differences between management and
governance
COBIT Management Dashboard
Performance Measurement
1. Performance measurement—What are the indicators
of good performance?
2. IT control profiling
a. What is important?
b. What are the critical success factors for control?
3. Awareness—What are the risks of not achieving our
objectives?
4. Benchmarking—What do others do? How do we
measure and compare?
IT Control Profiling
Environment
Stakeholders
Leadership
Personnel
Awareness
COBIT 5 sets out to increase awareness from the
governance in the enterprise, which is composed of several
levels of technical stakeholders and throughout the
enterprise.
Benchmarking
This is the research component to the implementing
framework. It requires the organization to have an in-depth
understanding of what is going on in the industry and how
are other agencies or companies accomplishing the same
initiatives using the COBIT 5 Framework.
What COBIT Sets Out to Accomplish
Adaptability to Existing Frameworks
ISO/IEC
38500:2008
Corporate
Governance of
Information
Technology
ITIL 2011
PRINCE2 2009 PMBOK
Constituency of Governance for Finance
CIO CEO CFO
COBIT 5 distributes the responsibility for the governance of finance
to through the Board
Constituency of Governance for IT
The constituency in IT consists of the CIO and top-
management team from the enterprise
Internal Audits
Purpose of Internal Audits
Conceptualization of COBIT 1 through COBIT 5, the framework’s
maturity
Roles That Potentially Use COBIT
IT auditor
Business
process auditor
IT inspection
team
Internal system
administrator
groups
Managers of
system
administrators
Cybersecurity
analysts
Approaches to Using COBIT in an
Internal Audit
Internal auditors following COBIT to conduct their auditing
generally approach audits when: formulating control
baselines and standards, building or coordinating
performance metrics for risk assessments, authoring and
maintaining the audit plan, driving the audit, and mitigating
risk or relaying advisements and recommendations to the IT
manager and IT personnel.
Types of Audits That Can Be Facilitated
Using COBIT
Some include analyses of requirements baselines and
standards processes for IT, application and software
development implementations, predevelopment planning,
certification reviews, milestone entries and exits, lessons
learned, post implementation reviews, programmer’s peer
reviews, enterprise operation reviews, or data center
reviews.
Advantages of Using COBIT in Internal
Audits
Conceptualization of COBIT 5, roles, activities, and relationships in an
enterprise
Terimakasih 

More Related Content

What's hot

ISMS Part I
ISMS Part IISMS Part I
ISMS Part Ikhushboo
 
Iso 27001 2013 clause 6 - planning - by Software development company in india
Iso 27001 2013 clause 6 - planning - by Software development company in indiaIso 27001 2013 clause 6 - planning - by Software development company in india
Iso 27001 2013 clause 6 - planning - by Software development company in indiaiFour Consultancy
 
Use of the COBIT Security Baseline
Use of the COBIT Security BaselineUse of the COBIT Security Baseline
Use of the COBIT Security BaselineBarry Caplin
 
ISO 27001 ISMS MEASUREMENT
ISO 27001 ISMS MEASUREMENTISO 27001 ISMS MEASUREMENT
ISO 27001 ISMS MEASUREMENTGaffri Johnson
 
PECB Certified ISO 27001:2013 Lead Implementer by Kinverg
PECB Certified ISO 27001:2013 Lead Implementer by KinvergPECB Certified ISO 27001:2013 Lead Implementer by Kinverg
PECB Certified ISO 27001:2013 Lead Implementer by KinvergKinverg
 
Iso 27001 certification
Iso 27001 certificationIso 27001 certification
Iso 27001 certificationramya119
 
Iso 27001 metrics and implementation guide
Iso 27001 metrics and implementation guideIso 27001 metrics and implementation guide
Iso 27001 metrics and implementation guidemfmurat
 
Implementing a Security Framework based on ISO/IEC 27002
Implementing a Security Framework based on ISO/IEC 27002Implementing a Security Framework based on ISO/IEC 27002
Implementing a Security Framework based on ISO/IEC 27002pgpmikey
 
Overview of ISO 27001 ISMS
Overview of ISO 27001 ISMSOverview of ISO 27001 ISMS
Overview of ISO 27001 ISMSAkhil Garg
 
Transitioning to iso 27001 2013
Transitioning to iso 27001 2013Transitioning to iso 27001 2013
Transitioning to iso 27001 2013SAIGlobalAssurance
 
ISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process OverviewISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process OverviewShankar Subramaniyan
 

What's hot (20)

Isms
IsmsIsms
Isms
 
Iso 27001 awareness
Iso 27001 awarenessIso 27001 awareness
Iso 27001 awareness
 
ISMS Part I
ISMS Part IISMS Part I
ISMS Part I
 
Iso 27001 Checklist
Iso 27001 ChecklistIso 27001 Checklist
Iso 27001 Checklist
 
ISO/IEC 27001:2005 naar ISO 27001:2013 Checklist
ISO/IEC 27001:2005 naar ISO 27001:2013  ChecklistISO/IEC 27001:2005 naar ISO 27001:2013  Checklist
ISO/IEC 27001:2005 naar ISO 27001:2013 Checklist
 
Iso 27001 2013 clause 6 - planning - by Software development company in india
Iso 27001 2013 clause 6 - planning - by Software development company in indiaIso 27001 2013 clause 6 - planning - by Software development company in india
Iso 27001 2013 clause 6 - planning - by Software development company in india
 
Use of the COBIT Security Baseline
Use of the COBIT Security BaselineUse of the COBIT Security Baseline
Use of the COBIT Security Baseline
 
ISO 27001 ISMS MEASUREMENT
ISO 27001 ISMS MEASUREMENTISO 27001 ISMS MEASUREMENT
ISO 27001 ISMS MEASUREMENT
 
Iso 27001 2013
Iso 27001 2013Iso 27001 2013
Iso 27001 2013
 
PECB Certified ISO 27001:2013 Lead Implementer by Kinverg
PECB Certified ISO 27001:2013 Lead Implementer by KinvergPECB Certified ISO 27001:2013 Lead Implementer by Kinverg
PECB Certified ISO 27001:2013 Lead Implementer by Kinverg
 
Iso 27001 certification
Iso 27001 certificationIso 27001 certification
Iso 27001 certification
 
Popular Pitfalls In Isms Compliance
Popular Pitfalls In Isms CompliancePopular Pitfalls In Isms Compliance
Popular Pitfalls In Isms Compliance
 
Iso 27001 metrics and implementation guide
Iso 27001 metrics and implementation guideIso 27001 metrics and implementation guide
Iso 27001 metrics and implementation guide
 
Implementing a Security Framework based on ISO/IEC 27002
Implementing a Security Framework based on ISO/IEC 27002Implementing a Security Framework based on ISO/IEC 27002
Implementing a Security Framework based on ISO/IEC 27002
 
Overview of ISO 27001 ISMS
Overview of ISO 27001 ISMSOverview of ISO 27001 ISMS
Overview of ISO 27001 ISMS
 
Transitioning to iso 27001 2013
Transitioning to iso 27001 2013Transitioning to iso 27001 2013
Transitioning to iso 27001 2013
 
ISMS implementation challenges-KASYS
ISMS implementation challenges-KASYSISMS implementation challenges-KASYS
ISMS implementation challenges-KASYS
 
Silabus el5213 internal auditing (audit internal) v021
Silabus el5213 internal auditing (audit internal) v021Silabus el5213 internal auditing (audit internal) v021
Silabus el5213 internal auditing (audit internal) v021
 
ISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process OverviewISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process Overview
 
ISO 27001:2013 - Changes
ISO 27001:2013 -  ChangesISO 27001:2013 -  Changes
ISO 27001:2013 - Changes
 

Similar to Diskusi buku: Securing an IT Organization through Governance, Risk Management, and Audit

Frameworks For Predictability
Frameworks For PredictabilityFrameworks For Predictability
Frameworks For Predictabilitytlknecht
 
Comparison of it governance framework-COBIT, ITIL, BS7799
Comparison of it governance framework-COBIT, ITIL, BS7799Comparison of it governance framework-COBIT, ITIL, BS7799
Comparison of it governance framework-COBIT, ITIL, BS7799Meghna Verma
 
IT frameworks
IT frameworksIT frameworks
IT frameworkscyouss
 
Pmi, Opm3 And Cmmi Assessment Overview
Pmi, Opm3 And Cmmi Assessment OverviewPmi, Opm3 And Cmmi Assessment Overview
Pmi, Opm3 And Cmmi Assessment OverviewAlan McSweeney
 
WLS Services Brochure March 2013
WLS Services Brochure March 2013WLS Services Brochure March 2013
WLS Services Brochure March 2013Mike Wright
 
John Mcdermott - Gold sponsor session: Hybrid - IT needs hybrid good practice
John Mcdermott - Gold sponsor session: Hybrid - IT needs hybrid good practiceJohn Mcdermott - Gold sponsor session: Hybrid - IT needs hybrid good practice
John Mcdermott - Gold sponsor session: Hybrid - IT needs hybrid good practiceitSMF UK
 
IT Governance Framework
IT Governance FrameworkIT Governance Framework
IT Governance FrameworkSherri Booher
 
Cobit 2019 framework by ISACA
Cobit 2019 framework by ISACACobit 2019 framework by ISACA
Cobit 2019 framework by ISACAMDFazlaRabbiAbir
 
Governance Tools Boyd Carter 2006
Governance Tools Boyd Carter 2006Governance Tools Boyd Carter 2006
Governance Tools Boyd Carter 2006Freelancer Training
 
02. cobit 41 dan iso 17799
02. cobit 41 dan iso 1779902. cobit 41 dan iso 17799
02. cobit 41 dan iso 17799Mulyadi Yusuf
 
The relation in between ITIL, Cobit, Togaf and CMMI.
The relation in between ITIL, Cobit, Togaf and CMMI.The relation in between ITIL, Cobit, Togaf and CMMI.
The relation in between ITIL, Cobit, Togaf and CMMI.Mücahit Sidimi
 
Cobit Foundation Training
Cobit Foundation TrainingCobit Foundation Training
Cobit Foundation Trainingvyomlabs
 
ICAB - ITK Chapter 5 Set 2 - Internal Control in IT Systems
ICAB - ITK Chapter 5 Set 2 - Internal Control in IT SystemsICAB - ITK Chapter 5 Set 2 - Internal Control in IT Systems
ICAB - ITK Chapter 5 Set 2 - Internal Control in IT SystemsMohammad Abdul Matin Emon
 
Using COBIT PO9 to perform Project Risk Analysis
Using COBIT PO9 to perform Project Risk AnalysisUsing COBIT PO9 to perform Project Risk Analysis
Using COBIT PO9 to perform Project Risk Analysiswebmentorman
 
ISE 204 IT Service Management Frameworks.pdf
ISE 204 IT Service Management Frameworks.pdfISE 204 IT Service Management Frameworks.pdf
ISE 204 IT Service Management Frameworks.pdfMarkMandeoya
 

Similar to Diskusi buku: Securing an IT Organization through Governance, Risk Management, and Audit (20)

Frameworks For Predictability
Frameworks For PredictabilityFrameworks For Predictability
Frameworks For Predictability
 
Comparison of it governance framework-COBIT, ITIL, BS7799
Comparison of it governance framework-COBIT, ITIL, BS7799Comparison of it governance framework-COBIT, ITIL, BS7799
Comparison of it governance framework-COBIT, ITIL, BS7799
 
IT frameworks
IT frameworksIT frameworks
IT frameworks
 
Co5bit
Co5bitCo5bit
Co5bit
 
Pmi, Opm3 And Cmmi Assessment Overview
Pmi, Opm3 And Cmmi Assessment OverviewPmi, Opm3 And Cmmi Assessment Overview
Pmi, Opm3 And Cmmi Assessment Overview
 
WLS Services Brochure March 2013
WLS Services Brochure March 2013WLS Services Brochure March 2013
WLS Services Brochure March 2013
 
Cobi t vs itil
Cobi t vs itilCobi t vs itil
Cobi t vs itil
 
John Mcdermott - Gold sponsor session: Hybrid - IT needs hybrid good practice
John Mcdermott - Gold sponsor session: Hybrid - IT needs hybrid good practiceJohn Mcdermott - Gold sponsor session: Hybrid - IT needs hybrid good practice
John Mcdermott - Gold sponsor session: Hybrid - IT needs hybrid good practice
 
Cobit5 and-grc
Cobit5 and-grcCobit5 and-grc
Cobit5 and-grc
 
IT Governance Framework
IT Governance FrameworkIT Governance Framework
IT Governance Framework
 
CISSPills #3.02
CISSPills #3.02CISSPills #3.02
CISSPills #3.02
 
Cobit 2019 framework by ISACA
Cobit 2019 framework by ISACACobit 2019 framework by ISACA
Cobit 2019 framework by ISACA
 
Governance Tools Boyd Carter 2006
Governance Tools Boyd Carter 2006Governance Tools Boyd Carter 2006
Governance Tools Boyd Carter 2006
 
02. cobit 41 dan iso 17799
02. cobit 41 dan iso 1779902. cobit 41 dan iso 17799
02. cobit 41 dan iso 17799
 
Audit rizkie hafizzah
Audit rizkie hafizzahAudit rizkie hafizzah
Audit rizkie hafizzah
 
The relation in between ITIL, Cobit, Togaf and CMMI.
The relation in between ITIL, Cobit, Togaf and CMMI.The relation in between ITIL, Cobit, Togaf and CMMI.
The relation in between ITIL, Cobit, Togaf and CMMI.
 
Cobit Foundation Training
Cobit Foundation TrainingCobit Foundation Training
Cobit Foundation Training
 
ICAB - ITK Chapter 5 Set 2 - Internal Control in IT Systems
ICAB - ITK Chapter 5 Set 2 - Internal Control in IT SystemsICAB - ITK Chapter 5 Set 2 - Internal Control in IT Systems
ICAB - ITK Chapter 5 Set 2 - Internal Control in IT Systems
 
Using COBIT PO9 to perform Project Risk Analysis
Using COBIT PO9 to perform Project Risk AnalysisUsing COBIT PO9 to perform Project Risk Analysis
Using COBIT PO9 to perform Project Risk Analysis
 
ISE 204 IT Service Management Frameworks.pdf
ISE 204 IT Service Management Frameworks.pdfISE 204 IT Service Management Frameworks.pdf
ISE 204 IT Service Management Frameworks.pdf
 

More from Sarwono Sutikno, Dr.Eng.,CISA,CISSP,CISM,CSX-F

More from Sarwono Sutikno, Dr.Eng.,CISA,CISSP,CISM,CSX-F (20)

TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Keamanan Data Digital - SPI ITB - Rabu 3 Agustus 2022 -v2.pdf
Keamanan Data Digital - SPI ITB - Rabu 3 Agustus 2022 -v2.pdfKeamanan Data Digital - SPI ITB - Rabu 3 Agustus 2022 -v2.pdf
Keamanan Data Digital - SPI ITB - Rabu 3 Agustus 2022 -v2.pdf
 
Keamanan Informasi Metaverse - 18 Juni 2022.pdf
Keamanan Informasi Metaverse - 18 Juni 2022.pdfKeamanan Informasi Metaverse - 18 Juni 2022.pdf
Keamanan Informasi Metaverse - 18 Juni 2022.pdf
 
Webinar Sabtu 14 Mei 2022 - Digital Signature dan Keamanan Transaksi Keuangan...
Webinar Sabtu 14 Mei 2022 - Digital Signature dan Keamanan Transaksi Keuangan...Webinar Sabtu 14 Mei 2022 - Digital Signature dan Keamanan Transaksi Keuangan...
Webinar Sabtu 14 Mei 2022 - Digital Signature dan Keamanan Transaksi Keuangan...
 
Tata Kelola Informasi & Teknologi (I&T), dan Aset Informasi
Tata Kelola Informasi & Teknologi (I&T), dan Aset InformasiTata Kelola Informasi & Teknologi (I&T), dan Aset Informasi
Tata Kelola Informasi & Teknologi (I&T), dan Aset Informasi
 
Kuliah tamu itb 11 maret 2020
Kuliah tamu itb 11 maret 2020Kuliah tamu itb 11 maret 2020
Kuliah tamu itb 11 maret 2020
 
Keamanan Informasi - batasan
Keamanan Informasi - batasanKeamanan Informasi - batasan
Keamanan Informasi - batasan
 
Buku gratifikasi dalam perspektif agama - Desember 2019 - KPK
Buku gratifikasi dalam perspektif agama - Desember 2019 - KPKBuku gratifikasi dalam perspektif agama - Desember 2019 - KPK
Buku gratifikasi dalam perspektif agama - Desember 2019 - KPK
 
Rancang bangun portable hacking station menggunakan raspberry pi tesis-sath...
Rancang bangun portable hacking station menggunakan raspberry pi   tesis-sath...Rancang bangun portable hacking station menggunakan raspberry pi   tesis-sath...
Rancang bangun portable hacking station menggunakan raspberry pi tesis-sath...
 
Sistem Tata Kelola Keamanan Informasi SPBE menggunakan COBIT 2019
Sistem Tata Kelola Keamanan Informasi SPBE menggunakan COBIT 2019   Sistem Tata Kelola Keamanan Informasi SPBE menggunakan COBIT 2019
Sistem Tata Kelola Keamanan Informasi SPBE menggunakan COBIT 2019
 
Indeks Presepsi Korupsi Indonesia 20 thn Reformasi - TII
Indeks Presepsi Korupsi Indonesia 20 thn Reformasi - TIIIndeks Presepsi Korupsi Indonesia 20 thn Reformasi - TII
Indeks Presepsi Korupsi Indonesia 20 thn Reformasi - TII
 
Materi wisuda untag 7 sep2019 won
Materi wisuda untag 7 sep2019   wonMateri wisuda untag 7 sep2019   won
Materi wisuda untag 7 sep2019 won
 
Materi caleg road show bus nganjuk - mod won
Materi caleg road show bus  nganjuk - mod wonMateri caleg road show bus  nganjuk - mod won
Materi caleg road show bus nganjuk - mod won
 
Antikorupsi mahasiswa
Antikorupsi mahasiswaAntikorupsi mahasiswa
Antikorupsi mahasiswa
 
Islam, pendidikan karakter & antikorupsi mod won v02
Islam, pendidikan karakter & antikorupsi mod won v02Islam, pendidikan karakter & antikorupsi mod won v02
Islam, pendidikan karakter & antikorupsi mod won v02
 
SMKI vs SMAP vs SMM vs SML v04
SMKI vs SMAP vs SMM vs SML v04SMKI vs SMAP vs SMM vs SML v04
SMKI vs SMAP vs SMM vs SML v04
 
Perguruan tinggi dan pencegahan korupsi mod won
Perguruan tinggi dan pencegahan korupsi mod wonPerguruan tinggi dan pencegahan korupsi mod won
Perguruan tinggi dan pencegahan korupsi mod won
 
Majalah Integrito, KPK, edisi 1-tahun-2019 #Pemilihan Umum 2019
Majalah Integrito, KPK, edisi 1-tahun-2019 #Pemilihan Umum 2019Majalah Integrito, KPK, edisi 1-tahun-2019 #Pemilihan Umum 2019
Majalah Integrito, KPK, edisi 1-tahun-2019 #Pemilihan Umum 2019
 
Pengantar tot persiapan implementasi pak di lingkungan KKP
Pengantar tot persiapan implementasi pak di lingkungan KKPPengantar tot persiapan implementasi pak di lingkungan KKP
Pengantar tot persiapan implementasi pak di lingkungan KKP
 
Generasi muda melawan korupsi 21 Jan 2019 di STP Bandung
Generasi muda melawan korupsi   21 Jan 2019 di STP BandungGenerasi muda melawan korupsi   21 Jan 2019 di STP Bandung
Generasi muda melawan korupsi 21 Jan 2019 di STP Bandung
 

Recently uploaded

Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxannathomasp01
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the ClassroomPooky Knightsmith
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structuredhanjurrannsibayan2
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Pooja Bhuva
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Pooja Bhuva
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxPooja Bhuva
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17Celine George
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 

Recently uploaded (20)

Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 

Diskusi buku: Securing an IT Organization through Governance, Risk Management, and Audit

  • 1.
  • 2.
  • 3.
  • 4. Part I Cybersecurity Risk Management and the Framework For Improving Critical Infrastructure Cybersecurity Anisa Fatakh Sabila
  • 5. • Cyber security is about managing risk. Risk governance and management is about informed decision making. Therefore, the cyber security equation has two components: business enablement and asset protection.
  • 6. • First, cyber security efforts must be aligned to fit the enterprise GRC framework by delivering on business strategy. Cyber risk is a critical business risk and thus an important element. • Second, information is a key enterprise asset and must be protected based on criticality, integrity and availability needs. Cyber security must be considered in the larger picture of enterprise GRC scope, because of the need to move information in today’s economy is vital to success.
  • 7. • Determine what assets it needs to protect and place a priority on • Cybersecurity should follow a layered approach, with additional protections for the most important assets, such as corporate and customer data. Remember that reputational harm from a breach can do more damage than the breach itself.
  • 8. •Cybersecurity Risk Management” means technologies, practices, and policies that address threats or vulnerabilities in networks, computers, programs and data, flowing from or enabled by connection to digital infrastructure, information systems, or industrial control systems, including but not limited to, information security, supply chain assurance, information assurance, and hardware and software assurance.
  • 9. Cyber security, therefore, requires several levels of effort involving: • Application of technology • Management oversight • Legal and regulatory awareness • Employee training • Adoption and implementation of policies and procedures governing the information technology environment
  • 10. • Recognizing that cyber security is no longer only an IT issue, leadership should ensure that the enterprise develops a cyber security/risk framework.
  • 11. • To manage cybersecurity risks, a clear understanding of the organization’s business drivers and security considerations specific to its use of technology is required. Because each organization’s risks, priorities, and systems are unique, the tools and methods used to achieve the outcomes described by the Framework will vary.
  • 12. Structure of the NIST Cybersecurity Framework
  • 13. Functions of the NIST CSF Framework Core
  • 14. NIST CSF and COBIT 5 Implementation Alignment
  • 15. NIST CSF STEP 1: Prioritize and scope
  • 16. NIST CSF STEPS 2 AND 3: Orient and Create a current profile NIST CSF Implementation Tiers
  • 17. NIST CSF STEPS 2 AND 3: Orient and Create a current profile NIST CSF Current Profile Template
  • 18. NIST CSF Current Profile Template
  • 19. NIST CSF STEPS 4 AND 5: Conduct a risk assessment and Create a target profile Where do we want to be? COBIT 5 for Risk Process Assessment Model (PAM) COBIT 5 Assessor’s Guide COBIT 5 COBIT 5 process APO12, Manage Risk.
  • 20. The target profile is similar to the current profile template and should include the following information: • Applicable function • Applicable category • Applicable subcategory • COBIT 5 reference to identify practices required to meet the goals of the subcategory • Achievement rating (e.g., not achieved, partially achieved, largely achieved, fully achieved) based on existing procedures • Practices, policies and procedures identified in the risk assessment • Description of how the achievement rating was determined • Actions required to achieve the target state goals • Resources required
  • 21. NIST CSF STEP 6: Determine, analyze and prioritize gaps What needs to be done? COBIT 5: Enabling Processes
  • 22. An action plan should include the following: • Identification • Priority • Assumptions and constraints • Rationale • Specific actions • Resources • Schedule/milestones • Status • Pre-requisites/dependencies • Action assignee • Stakeholder roles
  • 23. NIST CSF STEP 7: Implement action plan How do we get there? COBIT 5 Implementation Guide:
  • 24. COBIT 5 Implementation Guide: Test the approach by making small improvements initially and to provide some quick wins Involve all stakeholders Improve processes before attempting to apply automation Set clear, measurable goals and produce scorecards showing how performance is being measured Communicate in business impact terms
  • 25. NIST CSF STEP 8: CSF action plan review Did we get there? The enterprise assesses the activities from the implementation step to ensure that improvements achieve the anticipated goals and risk management objectives. The enterprise documents the lessons learned and identifies any specific ongoing monitoring needs.
  • 26. NIST CSF STEP 9: CSF lifecycle management • Initiate • Identify further governance or management requirements • Support continual improvement
  • 27. How do we keep the momentum going?
  • 28. Three Lines of Defense Model Based on COBIT 5 for Risk
  • 29. 10 Tips for Adopting NIST Using COBIT 5 Know the Stakeholders Understand Why Leverage industry available frameworks Get top management involved Instill accountability
  • 30. Demonstrate quick wins Use a continuos cycle Embed new approaches Formal documentation Train
  • 31. Part II Cybersecurity, Governance, Audit, and The COBIT 5 Framework Anisa Fatakh Sabila
  • 32. Cybersecurity Framework Framework Principles Principle 1 (P1) • Meeting stakeholder needs Principle 2 (P2) • Covering the enterprise end to end Principle 3 (P3) • Applying a single, integrated framework Principle 4 (P4) • Enabling a holistic approach Principle 5 (P5) • Separating governance from management
  • 33. Framework Model Practical enterprise dialogue of various CMMI levels
  • 34. Decomposition of Framework Framework Principles: Creation Quality confentiality Cost integrity Delivery availability Effectiveness and efficiency of operations Reliability of information Compliance with laws and regulations
  • 35. Process flow for COBIT 5
  • 36. Control Issue Seven Enablers of COBIT 5, working as a cohesive unit.
  • 37. Navigation Issue Shows a simplified conceptualization of how the navigation issue flows
  • 38. Framework Structure’s Generic Domains COBIT’s Framework Structure Operational Managerial Organizational Three vantage points
  • 39. Planning and organization Conceptualization of COBIT 5 elements and supporting question
  • 40. Acquisition and Implementation Business system document (finalized draft) Design specification document (finalized draft) Interface control document (1st draft, living document) System deployment document (1st draft, living document) Transition management document (1st draft, living document) User training documentation (1st draft, living document) Computer operator’s handbook (1st draft, living document)
  • 41. Delivery and Support Business system document Design specification document Interface control document (finalized draft) System deployment document (finalized draft) Transition management document User training documentation (finalized draft) Computer operator’s handbook (finalized draft)
  • 42. Transitioning a newly built system, essential document and questions
  • 43. Monitoring Preventive maintenance and performance optimization are IT disciplines that are usually mastered by system administrators and database administrators as opposed to developers.
  • 44. Decomposition of COBIT 5 Principles Purpose of COBIT Control Objectives and Principles Principle 1: Installing the Integrated IT Architectural Framework These needs are then fed through COBIT’s seven enablers: (1) processes, (2) principles and policies, (3) organizational structures, (4) skills and competencies, (5) culture and behavior, (6) service capabilities, and (7) information
  • 45. Principle 2: What Do Stakeholders Value? Centralized The catalog of stakeholder’s needs should serve as a single point of reference One must also take into consideration the culture in many organizations This also applies to various levels of the centralized stakeholders Outer Benefis realization Risk balancing Cost optimization
  • 46. Principle 3: The Business Context Focus Financial Customer related Internal (enterprise)
  • 47. Principle 4: Measuring Performance The measurement of projects throughout their life cycles should be evident in most organizations and processes should also be in place. To this end, there is an important distinction between governance and management. The governance in an organization is the pathway.
  • 48. COBIT Management Guidelines Enterprise Management Conceptualization of COBIT 5, value creation
  • 49. Risk Management Risk management and security assurance depend on the ability to apply specific, repeatable management practices. Risk management should be proactive for the most part but when we think about disaster recovery and how this IT discipline focuses around simulating various events and the preparedness of the enterprise to handle those risks, it can be argued that it is reactive.
  • 50. Status of IT Systems There was an application that ran on data center infrastructures, which would show indicator readings on a Graphical User Interface (GUI), reflecting the status of systems. If a system or application was down, it would show a red status on the GUI and the dashboard consisted of several indicator bubbles, each of which is represented on system, server, or application.
  • 51. Continuous Improvement Conceptualization of COBIT 5, differences between management and governance
  • 52. COBIT Management Dashboard Performance Measurement 1. Performance measurement—What are the indicators of good performance? 2. IT control profiling a. What is important? b. What are the critical success factors for control? 3. Awareness—What are the risks of not achieving our objectives? 4. Benchmarking—What do others do? How do we measure and compare?
  • 54. Awareness COBIT 5 sets out to increase awareness from the governance in the enterprise, which is composed of several levels of technical stakeholders and throughout the enterprise.
  • 55. Benchmarking This is the research component to the implementing framework. It requires the organization to have an in-depth understanding of what is going on in the industry and how are other agencies or companies accomplishing the same initiatives using the COBIT 5 Framework.
  • 56. What COBIT Sets Out to Accomplish Adaptability to Existing Frameworks ISO/IEC 38500:2008 Corporate Governance of Information Technology ITIL 2011 PRINCE2 2009 PMBOK
  • 57. Constituency of Governance for Finance CIO CEO CFO COBIT 5 distributes the responsibility for the governance of finance to through the Board
  • 58. Constituency of Governance for IT The constituency in IT consists of the CIO and top- management team from the enterprise
  • 59. Internal Audits Purpose of Internal Audits Conceptualization of COBIT 1 through COBIT 5, the framework’s maturity
  • 60. Roles That Potentially Use COBIT IT auditor Business process auditor IT inspection team Internal system administrator groups Managers of system administrators Cybersecurity analysts
  • 61. Approaches to Using COBIT in an Internal Audit Internal auditors following COBIT to conduct their auditing generally approach audits when: formulating control baselines and standards, building or coordinating performance metrics for risk assessments, authoring and maintaining the audit plan, driving the audit, and mitigating risk or relaying advisements and recommendations to the IT manager and IT personnel.
  • 62. Types of Audits That Can Be Facilitated Using COBIT Some include analyses of requirements baselines and standards processes for IT, application and software development implementations, predevelopment planning, certification reviews, milestone entries and exits, lessons learned, post implementation reviews, programmer’s peer reviews, enterprise operation reviews, or data center reviews.
  • 63. Advantages of Using COBIT in Internal Audits Conceptualization of COBIT 5, roles, activities, and relationships in an enterprise