SlideShare une entreprise Scribd logo
1  sur  39
DOES TITLE MAKE A
DIFFERENCE?
A personal view of
corporate governance
Pete Nieminen
Enfo Oyj
pete@enfogroup.com
@PeteNieminen
https://www.linkedin.com/in/petenieminen/
28.3.2019
WHO IS RESPONSIBLE FOR
MANAGING SECURITY?
NTT Security Risk:Value report 2019, decision makers believe on security responsibility
22% of believe CIO is responsible for managing security
20% of believe CEO is responsible for managing security
19% of believe CISO is responsible for managing security
0% of CIO’s believe they are responsible for managing security
0% of CEO’s believe they are responsible for managing security
100% of CISO’s believe they are responsible for managing security
39% have no idea who is responsible for managing security
…but they sure hope some-one is
CISO
BUSINESS CONTINUITY
CONCERNS
AND GOALS
CISO
Strategic alignment
Regulations
Cloud security
Staffing
Emerging technologies
Response and remediation
Expanding responsibilities
Large scale attacks
Managing data
Foundational security
CIO
GROWTH ENABLEMENT
CONCERNS
AND GOALS
CIO
New business models
Increased customer focus
Manage information security
People and talent management
Digital transformation
Public cloud
Application upgrades
More value for investments, digital twins
New technologies (analytics/BI/AI/IoT/RPA)
Personal transformation
CEO
OWNER VALUE
CONCERNS
AND GOALS
CEO
Attracting and retaining top talent
New business models with disruptive technologies
Leading business transformation
Leadership development for future leaders
Navigating and communicating constant change
Business growth, stayng ahead of competition
Managing data and skill gaps
Nurturing a strong company culture
Choosing the right opportunities
Fear of recession
GROWTH
CONTINUITY
RESIDUAL
RISK
Traditional roles on
business growth vs
continuity
Gartner 2019
99% CEO’s estimate cybercrime to rise during 2019
Gartner 2019
100% of CISO’s are pissed about the previous fact
5% of CEO’s plan to do something about it
99% CEO’s estimate cybercrime to rise during 2019
Executives fired
due
major security
incidents 2012-
2017.
Gartner 2019
THREAT VECTOR EXAMPLE
BUSINESS VALUE
BUSINESS INNOVATIONREACTIVE DEVELOPMENT
OPERATIONL EXCELLENCE
STAGE 0
STAGE 1
STAGE 2
PAR
AD
IG
M
SH
IFT
CLOUD ADOPTION
CLOUDMATURITY
IN
N
O
VATIO
N
Enfo, 2018
ENFO CLOUD ASSESSMENT
CIO 2018
REACTIVE DEVELOPMENT
IT uses public cloud to answer business requirements. Most
business support and IT processes are based on manual execution.
On-demand skills and partnerships.
OPERATIONAL EXCELLENCE
Advanced understanding and automated usage of IaaS services.
Fine tuned ITSM and agile public cloud design with trusted partners.
IT centric service culture. Cloud and control established.
BUSINESS INNOVATION
Business and IT work tightly together to create more agile and
scalable solutions in the public cloud. IT skills or/and partners are
not quite mature enough for automated execution.
BUSINESS VALUE
Business model and processes aligned with extensive public cloud
experience. IT is seen as an investment and it scales with the
business. Advanced service automation, agile processes and multi-
cloud management with skilled partners.
EXPER
IEN
C
E
/
O
PTIM
IZATIO
N
SECURITY
BY DESIGN
What to expect at 2019
• More data leaks and exposures
• Work-From-Home scenarios will open enterprises to BYOD-like security risks
• Brexit will hamper U.K. tech, startup and filial growth
• Facebook’s privacy woes will spread to other Silicon Valley giants
• One incident away from sparking another Apple v. FBI crypto-war
• Innocent victims will get caught in the cyberwar crossfire
• Focus on cloud-based security platforms and aim to be secure by design
• Tighter regulation is affecting risk profiles (GDPR, Australia, California)
• Mass real-world use of breached credentials
• Voice-controlled digital Assistants the next vector in attacking
• Cybercriminals will use more advanced techniques to blend in
CAN CISO GET CIO AND CEO TO UNDERSTAND?
YES
SUSTAINABLE
MEASURABLE
DEFINED
BENEFITS
NON-IT VALUE
COST
CONTROL
BUSINESS
DECISION
PROCESS
GOVERNANCE
Treat security like a business service
Business security services
Enterprise risk and
security requirements
defined in business terms
How does the service
affect the business, results
and value
What are the service
businesses want to buy
Business services
reflected to customer
facing services
Business centric view to
Cybersecurity
• Treat risk and security as a business service
• Move cybersecurity from project management to product management
• Integrate cybersecurity with customer experience
• Create the right balance between effort and value
• Address risk-aware cultural challenges and disconnects
• Increase the engagement of executives
• Prioritize based on business outcomes and value delivery
• Balance business between risk and security
• Focus on transparency and communications
• Try hacking instead of traditional
SIZEOFBUSINESS
MORE A TARGET
LOW RISK
HIGH COST
HIGH RISK
LOW COST
SECURITY
BUSINESS
Create sustainable program to protect the business
Reconstituting continous plan according business growth
BALANCE BETWEEN
RISK AND COST
Maintain a risk-based funding plan
BUDGET
YEAR 1
YEAR 2
YEAR 3
1
2
3
4
5
6
7
8
9
10
PRIORITY
RESIDUAL
RISK
PROJECTS
Strategic plan
• Prioritize projects on budget, impact and schedule.
• Create a roadmap, where all the projects are listed.
• Concentrate on the recommendation for the
improvement and lowering risk on the first year.
Three-year plan
• Get funding for the first year (strategic).
• At the end of the year, do not just start the year
two.
• Each year, reconstitute the entire plan, so you
always have a three-year plan with always funded
first year.
• This way you have the funding for the critical
projects and keep your focus on execution.
• If the residual risk grows too high, you need more
annual funding.
CONFIDENTIALITY
PRIVACY
AVAILABILITY
RISK MANAGEMENT
BUSINESS CONTINUITY
SOURCING
INTEGRITY
Percentage of deals lost to competitive
intelligence
Percentage of incidents where customer
personal data is put at risk
Percentage of lost or delayed inventory due
failure
Percentage of critical business processes
that have had a risk assessment in the past
24 months
Percentage of disaster recovery plans
tested in the past 12 months
Percentage of suppliers with approved
security control frameworks
Defect rate attribute to integrity
failures
Competiteveness index
Customer satisfaction and renewal indexes
Manufacturing capacity index
Related to bad managemet decisions
High personnel turnover
Sales index
Financial integrity, engineering effectiveness
Business/real-world KRI and KPI mappings
KEY RISK INDICATORS KEY PERFORMANCE INDICATORS
Typical security
metrics
MEASURE KPI INDICATOR OF
Server patching Time to patch critical vulnerabilities in
servers or time to patch vulnerabilities in
critical servers
Operational disruption,
reputation
Client patching Time to patch OS and other key software by
client OS
Operational disruption,
reputation
AV coverage Percentage of clients by OS with up to date
AV
Operational disruption,
reputation
Penetration testing Mean time to fix critical and high
vulnerabilities by stream, percent not fixed
within SLA
Operational disruption,
reputation
Training completion Percentrage of employees that have
completed their annual training
Operational disruption,
reputation
Phishing results Phising test failure rates by campaign Operational disruption,
reputation
Compromized customer accounts Number of customer accounts that are
known to have been compromised
Reputation, financial
Fraudulent orders using hacked
accounts
Value and quantity on fraudulent orders
placed using a hacked account
Reputation, financial
Incidents Mean time to identify and mean time to
contain
Operational disruption
Map risks to business
Vulnerability
breach
Critical
application
failure
Business process
shutdown
KPI:
Time to patch
KPI:
Application usability
KPI:
Production utilization
KRI indicator leading to… KRI indicator leading to… KRI indicator leading to…
TECHNOLOGY DEPENDENCY ANALYSIS
TRADITIONAL
TOP DOWN
Business
metrics
Business metric for
technology informs
business decisions
related to business
outcomes that are
dependent on
technolgy
”Automated loan origination process impacts the number of in
branch service people are needed”
•Technology dependency creates a lot of opportunity to influence investment
decisions across both technology and business operations
Business metric
aligns with and
informs business
decisions
”Inventory turnover informs the investment of inventory”
IT metric aligns
with and informs IT
decisions
”Mean time between failure informs the upgrade and
maintenance schedules of hardware”
Ten takeaways for
raising the bar
• Understand the roles, concerns and the goals
• Make responsibilities clear and communicated
• Know business threat horizon and vectors
• Build a sustainable security program
• Create a risk-based funding plan and a roadmap
• Offer security as a business service
• Learn a business centric view to cybersecurity
• Map risks to business
• Perform Top-down dependency analysis
• Remember to use business metrics
Does title make a difference?

Contenu connexe

Tendances

What You Don't Know about Document Management, But Should - M-Files
What You Don't Know about Document Management, But Should - M-FilesWhat You Don't Know about Document Management, But Should - M-Files
What You Don't Know about Document Management, But Should - M-FilesMarcoTechnologies
 
Azure Reserved VM Instances Made Simple
Azure Reserved VM Instances Made SimpleAzure Reserved VM Instances Made Simple
Azure Reserved VM Instances Made SimpleCloudHealth by VMware
 
The IDC and Equinix Webinar - 2018 - The Year of the Intelligence Ready Digit...
The IDC and Equinix Webinar - 2018 - The Year of the Intelligence Ready Digit...The IDC and Equinix Webinar - 2018 - The Year of the Intelligence Ready Digit...
The IDC and Equinix Webinar - 2018 - The Year of the Intelligence Ready Digit...Equinix
 
Alfresco Day Amsterdam 2015 - "Digital Transformation in the Netherlands", IDC
Alfresco Day Amsterdam 2015 - "Digital Transformation in the Netherlands", IDCAlfresco Day Amsterdam 2015 - "Digital Transformation in the Netherlands", IDC
Alfresco Day Amsterdam 2015 - "Digital Transformation in the Netherlands", IDCAlfresco Software
 
Fred Isbell SAPinsider Projects 2016 Session: Making a Business Case for Clou...
Fred Isbell SAPinsider Projects 2016 Session: Making a Business Case for Clou...Fred Isbell SAPinsider Projects 2016 Session: Making a Business Case for Clou...
Fred Isbell SAPinsider Projects 2016 Session: Making a Business Case for Clou...Fred Isbell
 
AWS Summit Singapore 2019 | Five Common Technical Challenges for Startups
AWS Summit Singapore 2019 | Five Common Technical Challenges for StartupsAWS Summit Singapore 2019 | Five Common Technical Challenges for Startups
AWS Summit Singapore 2019 | Five Common Technical Challenges for StartupsAWS Summits
 
Welcome to Love Cloud London | 27th February 2018
Welcome to Love Cloud London | 27th February 2018Welcome to Love Cloud London | 27th February 2018
Welcome to Love Cloud London | 27th February 2018Vuzion
 
Exciting it trends in 2015 why you should consider shifting and upgrading yo...
Exciting it trends in 2015  why you should consider shifting and upgrading yo...Exciting it trends in 2015  why you should consider shifting and upgrading yo...
Exciting it trends in 2015 why you should consider shifting and upgrading yo...lithanhall
 
-Enrichment - Unlocking the value of data for digital transformation - Big Da...
-Enrichment - Unlocking the value of data for digital transformation - Big Da...-Enrichment - Unlocking the value of data for digital transformation - Big Da...
-Enrichment - Unlocking the value of data for digital transformation - Big Da...webwinkelvakdag
 
Why cloud?
Why cloud?Why cloud?
Why cloud?Lilly V.
 
What AI and the Cloud Revolution Mean for Business Communications
What AI and the Cloud Revolution Mean for Business CommunicationsWhat AI and the Cloud Revolution Mean for Business Communications
What AI and the Cloud Revolution Mean for Business CommunicationsRingCentral, Inc.
 
Accelerating Innovation with IBM Cloud
Accelerating Innovation with IBM CloudAccelerating Innovation with IBM Cloud
Accelerating Innovation with IBM CloudLaurenWendler
 
Expert Bar - Get advice from our Cloud Advisor
Expert Bar - Get advice from our Cloud AdvisorExpert Bar - Get advice from our Cloud Advisor
Expert Bar - Get advice from our Cloud AdvisorLaurenWendler
 

Tendances (20)

What You Don't Know about Document Management, But Should - M-Files
What You Don't Know about Document Management, But Should - M-FilesWhat You Don't Know about Document Management, But Should - M-Files
What You Don't Know about Document Management, But Should - M-Files
 
Fast Track AIOps Automation with Prebuilt Databots
Fast Track AIOps Automation with Prebuilt DatabotsFast Track AIOps Automation with Prebuilt Databots
Fast Track AIOps Automation with Prebuilt Databots
 
Azure Reserved VM Instances Made Simple
Azure Reserved VM Instances Made SimpleAzure Reserved VM Instances Made Simple
Azure Reserved VM Instances Made Simple
 
The IDC and Equinix Webinar - 2018 - The Year of the Intelligence Ready Digit...
The IDC and Equinix Webinar - 2018 - The Year of the Intelligence Ready Digit...The IDC and Equinix Webinar - 2018 - The Year of the Intelligence Ready Digit...
The IDC and Equinix Webinar - 2018 - The Year of the Intelligence Ready Digit...
 
Alfresco Day Amsterdam 2015 - "Digital Transformation in the Netherlands", IDC
Alfresco Day Amsterdam 2015 - "Digital Transformation in the Netherlands", IDCAlfresco Day Amsterdam 2015 - "Digital Transformation in the Netherlands", IDC
Alfresco Day Amsterdam 2015 - "Digital Transformation in the Netherlands", IDC
 
Fred Isbell SAPinsider Projects 2016 Session: Making a Business Case for Clou...
Fred Isbell SAPinsider Projects 2016 Session: Making a Business Case for Clou...Fred Isbell SAPinsider Projects 2016 Session: Making a Business Case for Clou...
Fred Isbell SAPinsider Projects 2016 Session: Making a Business Case for Clou...
 
4 Phases of Cloud Optimization
4 Phases of Cloud Optimization4 Phases of Cloud Optimization
4 Phases of Cloud Optimization
 
AWS Summit Singapore 2019 | Five Common Technical Challenges for Startups
AWS Summit Singapore 2019 | Five Common Technical Challenges for StartupsAWS Summit Singapore 2019 | Five Common Technical Challenges for Startups
AWS Summit Singapore 2019 | Five Common Technical Challenges for Startups
 
NYC AWS summit 2017
NYC AWS summit 2017NYC AWS summit 2017
NYC AWS summit 2017
 
Présentation Séminaire Alfabet Décembre 2014
Présentation Séminaire Alfabet Décembre 2014Présentation Séminaire Alfabet Décembre 2014
Présentation Séminaire Alfabet Décembre 2014
 
Welcome to Love Cloud London | 27th February 2018
Welcome to Love Cloud London | 27th February 2018Welcome to Love Cloud London | 27th February 2018
Welcome to Love Cloud London | 27th February 2018
 
Exciting it trends in 2015 why you should consider shifting and upgrading yo...
Exciting it trends in 2015  why you should consider shifting and upgrading yo...Exciting it trends in 2015  why you should consider shifting and upgrading yo...
Exciting it trends in 2015 why you should consider shifting and upgrading yo...
 
-Enrichment - Unlocking the value of data for digital transformation - Big Da...
-Enrichment - Unlocking the value of data for digital transformation - Big Da...-Enrichment - Unlocking the value of data for digital transformation - Big Da...
-Enrichment - Unlocking the value of data for digital transformation - Big Da...
 
Why cloud?
Why cloud?Why cloud?
Why cloud?
 
DBS2016: Super Emerging Technologies
DBS2016: Super Emerging TechnologiesDBS2016: Super Emerging Technologies
DBS2016: Super Emerging Technologies
 
What AI and the Cloud Revolution Mean for Business Communications
What AI and the Cloud Revolution Mean for Business CommunicationsWhat AI and the Cloud Revolution Mean for Business Communications
What AI and the Cloud Revolution Mean for Business Communications
 
DBS2016: The Digital Journey
DBS2016: The Digital JourneyDBS2016: The Digital Journey
DBS2016: The Digital Journey
 
Microsoft Dynamics Customer Stories
Microsoft Dynamics Customer StoriesMicrosoft Dynamics Customer Stories
Microsoft Dynamics Customer Stories
 
Accelerating Innovation with IBM Cloud
Accelerating Innovation with IBM CloudAccelerating Innovation with IBM Cloud
Accelerating Innovation with IBM Cloud
 
Expert Bar - Get advice from our Cloud Advisor
Expert Bar - Get advice from our Cloud AdvisorExpert Bar - Get advice from our Cloud Advisor
Expert Bar - Get advice from our Cloud Advisor
 

Similaire à Does title make a difference?

The pathway to technical debt recovery for mid size Australian business
The pathway to technical debt recovery for mid size Australian businessThe pathway to technical debt recovery for mid size Australian business
The pathway to technical debt recovery for mid size Australian businessNoel Lynam
 
Security of the future - Adapting Approaches to What We Need
Security of the future - Adapting Approaches to What We NeedSecurity of the future - Adapting Approaches to What We Need
Security of the future - Adapting Approaches to What We Needsimplyme12345
 
ICT eGuide: Switching foundation technology for better cyber security
ICT eGuide: Switching foundation technology for better cyber securityICT eGuide: Switching foundation technology for better cyber security
ICT eGuide: Switching foundation technology for better cyber securityNiamh Hughes
 
Top 5 Cybersecurity Trends in 2021 and Beyond
Top 5 Cybersecurity Trends in 2021 and BeyondTop 5 Cybersecurity Trends in 2021 and Beyond
Top 5 Cybersecurity Trends in 2021 and BeyondNandita Nityanandam
 
Business value of Enterprise Security Architecture
Business value of Enterprise Security Architecture Business value of Enterprise Security Architecture
Business value of Enterprise Security Architecture Ajay Kumar Uppal
 
Training Catalogue - CyberSec_Technocracy.pdf
Training Catalogue - CyberSec_Technocracy.pdfTraining Catalogue - CyberSec_Technocracy.pdf
Training Catalogue - CyberSec_Technocracy.pdfdotco
 
Cloud Migration Checklist: A Better Way to Set Priorities, Assess Your Progre...
Cloud Migration Checklist: A Better Way to Set Priorities, Assess Your Progre...Cloud Migration Checklist: A Better Way to Set Priorities, Assess Your Progre...
Cloud Migration Checklist: A Better Way to Set Priorities, Assess Your Progre...Enterprise Management Associates
 
Cyber security framework
Cyber security frameworkCyber security framework
Cyber security frameworkYann Lecourt
 
From checkboxes to frameworks
From checkboxes to frameworksFrom checkboxes to frameworks
From checkboxes to frameworksVincent Bellamy
 
New technologies - Amer Haza'a
New technologies - Amer Haza'aNew technologies - Amer Haza'a
New technologies - Amer Haza'aFahmi Albaheth
 
Enterprise Architecture - Information Security
Enterprise Architecture - Information SecurityEnterprise Architecture - Information Security
Enterprise Architecture - Information SecurityAjay Kumar Uppal
 
T Bytes Digital customer experience
T Bytes Digital customer experienceT Bytes Digital customer experience
T Bytes Digital customer experienceEGBG Services
 
Responding to the Pandemic: Information Security and Technology Trends
Responding to the Pandemic: Information Security and Technology Trends Responding to the Pandemic: Information Security and Technology Trends
Responding to the Pandemic: Information Security and Technology Trends Enterprise Management Associates
 
Executive Perspective Building an OT Security Program from the Top Down
Executive Perspective Building an OT Security Program from the Top DownExecutive Perspective Building an OT Security Program from the Top Down
Executive Perspective Building an OT Security Program from the Top Downaccenture
 
Cybersecurity In The Cognitive Era: Priming Your Digital Immune System
Cybersecurity In The Cognitive Era: Priming Your Digital Immune SystemCybersecurity In The Cognitive Era: Priming Your Digital Immune System
Cybersecurity In The Cognitive Era: Priming Your Digital Immune SystemIBM Security
 
Meraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldMeraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldnooralmousa
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxYoisRoberthTapiadeLa
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxVictoriaChavesta
 
Symantec investor presentation august 2016
Symantec investor presentation august 2016Symantec investor presentation august 2016
Symantec investor presentation august 2016InvestorSymantec
 

Similaire à Does title make a difference? (20)

The pathway to technical debt recovery for mid size Australian business
The pathway to technical debt recovery for mid size Australian businessThe pathway to technical debt recovery for mid size Australian business
The pathway to technical debt recovery for mid size Australian business
 
Security of the future - Adapting Approaches to What We Need
Security of the future - Adapting Approaches to What We NeedSecurity of the future - Adapting Approaches to What We Need
Security of the future - Adapting Approaches to What We Need
 
ICT eGuide: Switching foundation technology for better cyber security
ICT eGuide: Switching foundation technology for better cyber securityICT eGuide: Switching foundation technology for better cyber security
ICT eGuide: Switching foundation technology for better cyber security
 
Top 5 Cybersecurity Trends in 2021 and Beyond
Top 5 Cybersecurity Trends in 2021 and BeyondTop 5 Cybersecurity Trends in 2021 and Beyond
Top 5 Cybersecurity Trends in 2021 and Beyond
 
Business value of Enterprise Security Architecture
Business value of Enterprise Security Architecture Business value of Enterprise Security Architecture
Business value of Enterprise Security Architecture
 
Training Catalogue - CyberSec_Technocracy.pdf
Training Catalogue - CyberSec_Technocracy.pdfTraining Catalogue - CyberSec_Technocracy.pdf
Training Catalogue - CyberSec_Technocracy.pdf
 
Cloud Migration Checklist: A Better Way to Set Priorities, Assess Your Progre...
Cloud Migration Checklist: A Better Way to Set Priorities, Assess Your Progre...Cloud Migration Checklist: A Better Way to Set Priorities, Assess Your Progre...
Cloud Migration Checklist: A Better Way to Set Priorities, Assess Your Progre...
 
Cloud webinar final
Cloud webinar finalCloud webinar final
Cloud webinar final
 
Cyber security framework
Cyber security frameworkCyber security framework
Cyber security framework
 
From checkboxes to frameworks
From checkboxes to frameworksFrom checkboxes to frameworks
From checkboxes to frameworks
 
New technologies - Amer Haza'a
New technologies - Amer Haza'aNew technologies - Amer Haza'a
New technologies - Amer Haza'a
 
Enterprise Architecture - Information Security
Enterprise Architecture - Information SecurityEnterprise Architecture - Information Security
Enterprise Architecture - Information Security
 
T Bytes Digital customer experience
T Bytes Digital customer experienceT Bytes Digital customer experience
T Bytes Digital customer experience
 
Responding to the Pandemic: Information Security and Technology Trends
Responding to the Pandemic: Information Security and Technology Trends Responding to the Pandemic: Information Security and Technology Trends
Responding to the Pandemic: Information Security and Technology Trends
 
Executive Perspective Building an OT Security Program from the Top Down
Executive Perspective Building an OT Security Program from the Top DownExecutive Perspective Building an OT Security Program from the Top Down
Executive Perspective Building an OT Security Program from the Top Down
 
Cybersecurity In The Cognitive Era: Priming Your Digital Immune System
Cybersecurity In The Cognitive Era: Priming Your Digital Immune SystemCybersecurity In The Cognitive Era: Priming Your Digital Immune System
Cybersecurity In The Cognitive Era: Priming Your Digital Immune System
 
Meraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldMeraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless world
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
 
Symantec investor presentation august 2016
Symantec investor presentation august 2016Symantec investor presentation august 2016
Symantec investor presentation august 2016
 

Plus de Pete Nieminen

Combining ERP, Public Cloud and Cybersecurity
Combining ERP, Public Cloud and CybersecurityCombining ERP, Public Cloud and Cybersecurity
Combining ERP, Public Cloud and CybersecurityPete Nieminen
 
Tivi - Tunnistautuminen - 2020
Tivi - Tunnistautuminen - 2020Tivi - Tunnistautuminen - 2020
Tivi - Tunnistautuminen - 2020Pete Nieminen
 
Mythbusting the Hype
Mythbusting the HypeMythbusting the Hype
Mythbusting the HypePete Nieminen
 
IoT - faktaa ja käytännön esimerkkejä
IoT - faktaa ja käytännön esimerkkejäIoT - faktaa ja käytännön esimerkkejä
IoT - faktaa ja käytännön esimerkkejäPete Nieminen
 
Focus 2015 - Internet of Things - Ei mystiikkaa, vaan konkretiaa
Focus 2015 - Internet of Things - Ei mystiikkaa, vaan konkretiaaFocus 2015 - Internet of Things - Ei mystiikkaa, vaan konkretiaa
Focus 2015 - Internet of Things - Ei mystiikkaa, vaan konkretiaaPete Nieminen
 
Palveluliiketoiminnassa Internet of Things kohtaa digitalisaation
Palveluliiketoiminnassa Internet of Things kohtaa digitalisaationPalveluliiketoiminnassa Internet of Things kohtaa digitalisaation
Palveluliiketoiminnassa Internet of Things kohtaa digitalisaationPete Nieminen
 
Digitalisaatio ja mobiliteetti toiminnan kehittäjänä
Digitalisaatio ja mobiliteetti toiminnan kehittäjänäDigitalisaatio ja mobiliteetti toiminnan kehittäjänä
Digitalisaatio ja mobiliteetti toiminnan kehittäjänäPete Nieminen
 
Korkeakoulujen IT-päivät 2014 - Mobiliteetti ja mobiilistrategia
Korkeakoulujen IT-päivät 2014 - Mobiliteetti ja mobiilistrategiaKorkeakoulujen IT-päivät 2014 - Mobiliteetti ja mobiilistrategia
Korkeakoulujen IT-päivät 2014 - Mobiliteetti ja mobiilistrategiaPete Nieminen
 
Sukupolvierot tietotekniikan hyödyntämisessä
Sukupolvierot tietotekniikan hyödyntämisessäSukupolvierot tietotekniikan hyödyntämisessä
Sukupolvierot tietotekniikan hyödyntämisessäPete Nieminen
 
Liiketoiminnan ja tietotekniikan johtaminen
Liiketoiminnan ja tietotekniikan johtaminenLiiketoiminnan ja tietotekniikan johtaminen
Liiketoiminnan ja tietotekniikan johtaminenPete Nieminen
 
Digitalisaatio ja käyttäytymismallipohjaisuus
Digitalisaatio ja käyttäytymismallipohjaisuusDigitalisaatio ja käyttäytymismallipohjaisuus
Digitalisaatio ja käyttäytymismallipohjaisuusPete Nieminen
 
Yliopistojen ATK-yhteistyöpäivät 2013
Yliopistojen ATK-yhteistyöpäivät 2013Yliopistojen ATK-yhteistyöpäivät 2013
Yliopistojen ATK-yhteistyöpäivät 2013Pete Nieminen
 
Focus 2013 - Sanoista tekoihin
Focus 2013 - Sanoista tekoihinFocus 2013 - Sanoista tekoihin
Focus 2013 - Sanoista tekoihinPete Nieminen
 
Tietoturva tuottavuuden tukena
Tietoturva tuottavuuden tukenaTietoturva tuottavuuden tukena
Tietoturva tuottavuuden tukenaPete Nieminen
 
Tietoturva 2011, Tietoturvamyytit
Tietoturva 2011, Tietoturvamyytit Tietoturva 2011, Tietoturvamyytit
Tietoturva 2011, Tietoturvamyytit Pete Nieminen
 
Tietoturva ry lyhyesti
Tietoturva ry lyhyestiTietoturva ry lyhyesti
Tietoturva ry lyhyestiPete Nieminen
 

Plus de Pete Nieminen (20)

CIO Agenda
CIO AgendaCIO Agenda
CIO Agenda
 
Combining ERP, Public Cloud and Cybersecurity
Combining ERP, Public Cloud and CybersecurityCombining ERP, Public Cloud and Cybersecurity
Combining ERP, Public Cloud and Cybersecurity
 
Tivi - Tunnistautuminen - 2020
Tivi - Tunnistautuminen - 2020Tivi - Tunnistautuminen - 2020
Tivi - Tunnistautuminen - 2020
 
Mythbusting the Hype
Mythbusting the HypeMythbusting the Hype
Mythbusting the Hype
 
IoT - faktaa ja käytännön esimerkkejä
IoT - faktaa ja käytännön esimerkkejäIoT - faktaa ja käytännön esimerkkejä
IoT - faktaa ja käytännön esimerkkejä
 
Focus 2015 - Internet of Things - Ei mystiikkaa, vaan konkretiaa
Focus 2015 - Internet of Things - Ei mystiikkaa, vaan konkretiaaFocus 2015 - Internet of Things - Ei mystiikkaa, vaan konkretiaa
Focus 2015 - Internet of Things - Ei mystiikkaa, vaan konkretiaa
 
Palveluliiketoiminnassa Internet of Things kohtaa digitalisaation
Palveluliiketoiminnassa Internet of Things kohtaa digitalisaationPalveluliiketoiminnassa Internet of Things kohtaa digitalisaation
Palveluliiketoiminnassa Internet of Things kohtaa digitalisaation
 
Olarin lukio 2015
Olarin lukio 2015Olarin lukio 2015
Olarin lukio 2015
 
Digitalisaatio ja mobiliteetti toiminnan kehittäjänä
Digitalisaatio ja mobiliteetti toiminnan kehittäjänäDigitalisaatio ja mobiliteetti toiminnan kehittäjänä
Digitalisaatio ja mobiliteetti toiminnan kehittäjänä
 
Korkeakoulujen IT-päivät 2014 - Mobiliteetti ja mobiilistrategia
Korkeakoulujen IT-päivät 2014 - Mobiliteetti ja mobiilistrategiaKorkeakoulujen IT-päivät 2014 - Mobiliteetti ja mobiilistrategia
Korkeakoulujen IT-päivät 2014 - Mobiliteetti ja mobiilistrategia
 
Sukupolvierot tietotekniikan hyödyntämisessä
Sukupolvierot tietotekniikan hyödyntämisessäSukupolvierot tietotekniikan hyödyntämisessä
Sukupolvierot tietotekniikan hyödyntämisessä
 
Liiketoiminnan ja tietotekniikan johtaminen
Liiketoiminnan ja tietotekniikan johtaminenLiiketoiminnan ja tietotekniikan johtaminen
Liiketoiminnan ja tietotekniikan johtaminen
 
Mobiilistrategia
MobiilistrategiaMobiilistrategia
Mobiilistrategia
 
Digitalisaatio ja käyttäytymismallipohjaisuus
Digitalisaatio ja käyttäytymismallipohjaisuusDigitalisaatio ja käyttäytymismallipohjaisuus
Digitalisaatio ja käyttäytymismallipohjaisuus
 
Yliopistojen ATK-yhteistyöpäivät 2013
Yliopistojen ATK-yhteistyöpäivät 2013Yliopistojen ATK-yhteistyöpäivät 2013
Yliopistojen ATK-yhteistyöpäivät 2013
 
Focus 2013 - Sanoista tekoihin
Focus 2013 - Sanoista tekoihinFocus 2013 - Sanoista tekoihin
Focus 2013 - Sanoista tekoihin
 
Tietoturva tuottavuuden tukena
Tietoturva tuottavuuden tukenaTietoturva tuottavuuden tukena
Tietoturva tuottavuuden tukena
 
Pilvipalvelut
PilvipalvelutPilvipalvelut
Pilvipalvelut
 
Tietoturva 2011, Tietoturvamyytit
Tietoturva 2011, Tietoturvamyytit Tietoturva 2011, Tietoturvamyytit
Tietoturva 2011, Tietoturvamyytit
 
Tietoturva ry lyhyesti
Tietoturva ry lyhyestiTietoturva ry lyhyesti
Tietoturva ry lyhyesti
 

Dernier

Motivational theories an leadership skills
Motivational theories an leadership skillsMotivational theories an leadership skills
Motivational theories an leadership skillskristinalimarenko7
 
How-How Diagram: A Practical Approach to Problem Resolution
How-How Diagram: A Practical Approach to Problem ResolutionHow-How Diagram: A Practical Approach to Problem Resolution
How-How Diagram: A Practical Approach to Problem ResolutionCIToolkit
 
Measuring True Process Yield using Robust Yield Metrics
Measuring True Process Yield using Robust Yield MetricsMeasuring True Process Yield using Robust Yield Metrics
Measuring True Process Yield using Robust Yield MetricsCIToolkit
 
From Goals to Actions: Uncovering the Key Components of Improvement Roadmaps
From Goals to Actions: Uncovering the Key Components of Improvement RoadmapsFrom Goals to Actions: Uncovering the Key Components of Improvement Roadmaps
From Goals to Actions: Uncovering the Key Components of Improvement RoadmapsCIToolkit
 
LPC Warehouse Management System For Clients In The Business Sector
LPC Warehouse Management System For Clients In The Business SectorLPC Warehouse Management System For Clients In The Business Sector
LPC Warehouse Management System For Clients In The Business Sectorthomas851723
 
Fifteenth Finance Commission Presentation
Fifteenth Finance Commission PresentationFifteenth Finance Commission Presentation
Fifteenth Finance Commission Presentationmintusiprd
 
LPC Operations Review PowerPoint | Operations Review
LPC Operations Review PowerPoint | Operations ReviewLPC Operations Review PowerPoint | Operations Review
LPC Operations Review PowerPoint | Operations Reviewthomas851723
 
Reflecting, turning experience into insight
Reflecting, turning experience into insightReflecting, turning experience into insight
Reflecting, turning experience into insightWayne Abrahams
 
Simplifying Complexity: How the Four-Field Matrix Reshapes Thinking
Simplifying Complexity: How the Four-Field Matrix Reshapes ThinkingSimplifying Complexity: How the Four-Field Matrix Reshapes Thinking
Simplifying Complexity: How the Four-Field Matrix Reshapes ThinkingCIToolkit
 
Introduction to LPC - Facility Design And Re-Engineering
Introduction to LPC - Facility Design And Re-EngineeringIntroduction to LPC - Facility Design And Re-Engineering
Introduction to LPC - Facility Design And Re-Engineeringthomas851723
 
原版1:1复刻密西西比大学毕业证Mississippi毕业证留信学历认证
原版1:1复刻密西西比大学毕业证Mississippi毕业证留信学历认证原版1:1复刻密西西比大学毕业证Mississippi毕业证留信学历认证
原版1:1复刻密西西比大学毕业证Mississippi毕业证留信学历认证jdkhjh
 
Unlocking Productivity and Personal Growth through the Importance-Urgency Matrix
Unlocking Productivity and Personal Growth through the Importance-Urgency MatrixUnlocking Productivity and Personal Growth through the Importance-Urgency Matrix
Unlocking Productivity and Personal Growth through the Importance-Urgency MatrixCIToolkit
 
Farmer Representative Organization in Lucknow | Rashtriya Kisan Manch
Farmer Representative Organization in Lucknow | Rashtriya Kisan ManchFarmer Representative Organization in Lucknow | Rashtriya Kisan Manch
Farmer Representative Organization in Lucknow | Rashtriya Kisan ManchRashtriya Kisan Manch
 
Call Us🔝⇛+91-97111🔝47426 Call In girls Munirka (DELHI)
Call Us🔝⇛+91-97111🔝47426 Call In girls Munirka (DELHI)Call Us🔝⇛+91-97111🔝47426 Call In girls Munirka (DELHI)
Call Us🔝⇛+91-97111🔝47426 Call In girls Munirka (DELHI)jennyeacort
 
Beyond the Five Whys: Exploring the Hierarchical Causes with the Why-Why Diagram
Beyond the Five Whys: Exploring the Hierarchical Causes with the Why-Why DiagramBeyond the Five Whys: Exploring the Hierarchical Causes with the Why-Why Diagram
Beyond the Five Whys: Exploring the Hierarchical Causes with the Why-Why DiagramCIToolkit
 
Management and managerial skills training manual.pdf
Management and managerial skills training manual.pdfManagement and managerial skills training manual.pdf
Management and managerial skills training manual.pdffillmonipdc
 
Board Diversity Initiaive Launch Presentation
Board Diversity Initiaive Launch PresentationBoard Diversity Initiaive Launch Presentation
Board Diversity Initiaive Launch Presentationcraig524401
 

Dernier (18)

Motivational theories an leadership skills
Motivational theories an leadership skillsMotivational theories an leadership skills
Motivational theories an leadership skills
 
How-How Diagram: A Practical Approach to Problem Resolution
How-How Diagram: A Practical Approach to Problem ResolutionHow-How Diagram: A Practical Approach to Problem Resolution
How-How Diagram: A Practical Approach to Problem Resolution
 
Measuring True Process Yield using Robust Yield Metrics
Measuring True Process Yield using Robust Yield MetricsMeasuring True Process Yield using Robust Yield Metrics
Measuring True Process Yield using Robust Yield Metrics
 
From Goals to Actions: Uncovering the Key Components of Improvement Roadmaps
From Goals to Actions: Uncovering the Key Components of Improvement RoadmapsFrom Goals to Actions: Uncovering the Key Components of Improvement Roadmaps
From Goals to Actions: Uncovering the Key Components of Improvement Roadmaps
 
LPC Warehouse Management System For Clients In The Business Sector
LPC Warehouse Management System For Clients In The Business SectorLPC Warehouse Management System For Clients In The Business Sector
LPC Warehouse Management System For Clients In The Business Sector
 
Fifteenth Finance Commission Presentation
Fifteenth Finance Commission PresentationFifteenth Finance Commission Presentation
Fifteenth Finance Commission Presentation
 
LPC Operations Review PowerPoint | Operations Review
LPC Operations Review PowerPoint | Operations ReviewLPC Operations Review PowerPoint | Operations Review
LPC Operations Review PowerPoint | Operations Review
 
Reflecting, turning experience into insight
Reflecting, turning experience into insightReflecting, turning experience into insight
Reflecting, turning experience into insight
 
Simplifying Complexity: How the Four-Field Matrix Reshapes Thinking
Simplifying Complexity: How the Four-Field Matrix Reshapes ThinkingSimplifying Complexity: How the Four-Field Matrix Reshapes Thinking
Simplifying Complexity: How the Four-Field Matrix Reshapes Thinking
 
Introduction to LPC - Facility Design And Re-Engineering
Introduction to LPC - Facility Design And Re-EngineeringIntroduction to LPC - Facility Design And Re-Engineering
Introduction to LPC - Facility Design And Re-Engineering
 
原版1:1复刻密西西比大学毕业证Mississippi毕业证留信学历认证
原版1:1复刻密西西比大学毕业证Mississippi毕业证留信学历认证原版1:1复刻密西西比大学毕业证Mississippi毕业证留信学历认证
原版1:1复刻密西西比大学毕业证Mississippi毕业证留信学历认证
 
Unlocking Productivity and Personal Growth through the Importance-Urgency Matrix
Unlocking Productivity and Personal Growth through the Importance-Urgency MatrixUnlocking Productivity and Personal Growth through the Importance-Urgency Matrix
Unlocking Productivity and Personal Growth through the Importance-Urgency Matrix
 
Farmer Representative Organization in Lucknow | Rashtriya Kisan Manch
Farmer Representative Organization in Lucknow | Rashtriya Kisan ManchFarmer Representative Organization in Lucknow | Rashtriya Kisan Manch
Farmer Representative Organization in Lucknow | Rashtriya Kisan Manch
 
Call Us🔝⇛+91-97111🔝47426 Call In girls Munirka (DELHI)
Call Us🔝⇛+91-97111🔝47426 Call In girls Munirka (DELHI)Call Us🔝⇛+91-97111🔝47426 Call In girls Munirka (DELHI)
Call Us🔝⇛+91-97111🔝47426 Call In girls Munirka (DELHI)
 
Beyond the Five Whys: Exploring the Hierarchical Causes with the Why-Why Diagram
Beyond the Five Whys: Exploring the Hierarchical Causes with the Why-Why DiagramBeyond the Five Whys: Exploring the Hierarchical Causes with the Why-Why Diagram
Beyond the Five Whys: Exploring the Hierarchical Causes with the Why-Why Diagram
 
Management and managerial skills training manual.pdf
Management and managerial skills training manual.pdfManagement and managerial skills training manual.pdf
Management and managerial skills training manual.pdf
 
Board Diversity Initiaive Launch Presentation
Board Diversity Initiaive Launch PresentationBoard Diversity Initiaive Launch Presentation
Board Diversity Initiaive Launch Presentation
 
sauth delhi call girls in Defence Colony🔝 9953056974 🔝 escort Service
sauth delhi call girls in Defence Colony🔝 9953056974 🔝 escort Servicesauth delhi call girls in Defence Colony🔝 9953056974 🔝 escort Service
sauth delhi call girls in Defence Colony🔝 9953056974 🔝 escort Service
 

Does title make a difference?

  • 1. DOES TITLE MAKE A DIFFERENCE? A personal view of corporate governance Pete Nieminen Enfo Oyj pete@enfogroup.com @PeteNieminen https://www.linkedin.com/in/petenieminen/ 28.3.2019
  • 2. WHO IS RESPONSIBLE FOR MANAGING SECURITY?
  • 3. NTT Security Risk:Value report 2019, decision makers believe on security responsibility 22% of believe CIO is responsible for managing security 20% of believe CEO is responsible for managing security 19% of believe CISO is responsible for managing security 0% of CIO’s believe they are responsible for managing security 0% of CEO’s believe they are responsible for managing security 100% of CISO’s believe they are responsible for managing security
  • 4. 39% have no idea who is responsible for managing security …but they sure hope some-one is
  • 7. CONCERNS AND GOALS CISO Strategic alignment Regulations Cloud security Staffing Emerging technologies Response and remediation Expanding responsibilities Large scale attacks Managing data Foundational security
  • 8. CIO
  • 10. CONCERNS AND GOALS CIO New business models Increased customer focus Manage information security People and talent management Digital transformation Public cloud Application upgrades More value for investments, digital twins New technologies (analytics/BI/AI/IoT/RPA) Personal transformation
  • 11. CEO
  • 13. CONCERNS AND GOALS CEO Attracting and retaining top talent New business models with disruptive technologies Leading business transformation Leadership development for future leaders Navigating and communicating constant change Business growth, stayng ahead of competition Managing data and skill gaps Nurturing a strong company culture Choosing the right opportunities Fear of recession
  • 15. Gartner 2019 99% CEO’s estimate cybercrime to rise during 2019
  • 16.
  • 17.
  • 18.
  • 19.
  • 20. Gartner 2019 100% of CISO’s are pissed about the previous fact 5% of CEO’s plan to do something about it 99% CEO’s estimate cybercrime to rise during 2019
  • 23. BUSINESS VALUE BUSINESS INNOVATIONREACTIVE DEVELOPMENT OPERATIONL EXCELLENCE STAGE 0 STAGE 1 STAGE 2 PAR AD IG M SH IFT CLOUD ADOPTION CLOUDMATURITY IN N O VATIO N Enfo, 2018 ENFO CLOUD ASSESSMENT CIO 2018 REACTIVE DEVELOPMENT IT uses public cloud to answer business requirements. Most business support and IT processes are based on manual execution. On-demand skills and partnerships. OPERATIONAL EXCELLENCE Advanced understanding and automated usage of IaaS services. Fine tuned ITSM and agile public cloud design with trusted partners. IT centric service culture. Cloud and control established. BUSINESS INNOVATION Business and IT work tightly together to create more agile and scalable solutions in the public cloud. IT skills or/and partners are not quite mature enough for automated execution. BUSINESS VALUE Business model and processes aligned with extensive public cloud experience. IT is seen as an investment and it scales with the business. Advanced service automation, agile processes and multi- cloud management with skilled partners. EXPER IEN C E / O PTIM IZATIO N SECURITY BY DESIGN
  • 24.
  • 25. What to expect at 2019 • More data leaks and exposures • Work-From-Home scenarios will open enterprises to BYOD-like security risks • Brexit will hamper U.K. tech, startup and filial growth • Facebook’s privacy woes will spread to other Silicon Valley giants • One incident away from sparking another Apple v. FBI crypto-war • Innocent victims will get caught in the cyberwar crossfire • Focus on cloud-based security platforms and aim to be secure by design • Tighter regulation is affecting risk profiles (GDPR, Australia, California) • Mass real-world use of breached credentials • Voice-controlled digital Assistants the next vector in attacking • Cybercriminals will use more advanced techniques to blend in
  • 26. CAN CISO GET CIO AND CEO TO UNDERSTAND? YES
  • 28.
  • 29. Business security services Enterprise risk and security requirements defined in business terms How does the service affect the business, results and value What are the service businesses want to buy Business services reflected to customer facing services
  • 30. Business centric view to Cybersecurity • Treat risk and security as a business service • Move cybersecurity from project management to product management • Integrate cybersecurity with customer experience • Create the right balance between effort and value • Address risk-aware cultural challenges and disconnects • Increase the engagement of executives • Prioritize based on business outcomes and value delivery • Balance business between risk and security • Focus on transparency and communications • Try hacking instead of traditional
  • 31. SIZEOFBUSINESS MORE A TARGET LOW RISK HIGH COST HIGH RISK LOW COST SECURITY BUSINESS Create sustainable program to protect the business Reconstituting continous plan according business growth BALANCE BETWEEN RISK AND COST
  • 32. Maintain a risk-based funding plan BUDGET YEAR 1 YEAR 2 YEAR 3 1 2 3 4 5 6 7 8 9 10 PRIORITY RESIDUAL RISK PROJECTS Strategic plan • Prioritize projects on budget, impact and schedule. • Create a roadmap, where all the projects are listed. • Concentrate on the recommendation for the improvement and lowering risk on the first year. Three-year plan • Get funding for the first year (strategic). • At the end of the year, do not just start the year two. • Each year, reconstitute the entire plan, so you always have a three-year plan with always funded first year. • This way you have the funding for the critical projects and keep your focus on execution. • If the residual risk grows too high, you need more annual funding.
  • 33. CONFIDENTIALITY PRIVACY AVAILABILITY RISK MANAGEMENT BUSINESS CONTINUITY SOURCING INTEGRITY Percentage of deals lost to competitive intelligence Percentage of incidents where customer personal data is put at risk Percentage of lost or delayed inventory due failure Percentage of critical business processes that have had a risk assessment in the past 24 months Percentage of disaster recovery plans tested in the past 12 months Percentage of suppliers with approved security control frameworks Defect rate attribute to integrity failures Competiteveness index Customer satisfaction and renewal indexes Manufacturing capacity index Related to bad managemet decisions High personnel turnover Sales index Financial integrity, engineering effectiveness Business/real-world KRI and KPI mappings KEY RISK INDICATORS KEY PERFORMANCE INDICATORS
  • 34. Typical security metrics MEASURE KPI INDICATOR OF Server patching Time to patch critical vulnerabilities in servers or time to patch vulnerabilities in critical servers Operational disruption, reputation Client patching Time to patch OS and other key software by client OS Operational disruption, reputation AV coverage Percentage of clients by OS with up to date AV Operational disruption, reputation Penetration testing Mean time to fix critical and high vulnerabilities by stream, percent not fixed within SLA Operational disruption, reputation Training completion Percentrage of employees that have completed their annual training Operational disruption, reputation Phishing results Phising test failure rates by campaign Operational disruption, reputation Compromized customer accounts Number of customer accounts that are known to have been compromised Reputation, financial Fraudulent orders using hacked accounts Value and quantity on fraudulent orders placed using a hacked account Reputation, financial Incidents Mean time to identify and mean time to contain Operational disruption
  • 35. Map risks to business Vulnerability breach Critical application failure Business process shutdown KPI: Time to patch KPI: Application usability KPI: Production utilization KRI indicator leading to… KRI indicator leading to… KRI indicator leading to…
  • 37. Business metrics Business metric for technology informs business decisions related to business outcomes that are dependent on technolgy ”Automated loan origination process impacts the number of in branch service people are needed” •Technology dependency creates a lot of opportunity to influence investment decisions across both technology and business operations Business metric aligns with and informs business decisions ”Inventory turnover informs the investment of inventory” IT metric aligns with and informs IT decisions ”Mean time between failure informs the upgrade and maintenance schedules of hardware”
  • 38. Ten takeaways for raising the bar • Understand the roles, concerns and the goals • Make responsibilities clear and communicated • Know business threat horizon and vectors • Build a sustainable security program • Create a risk-based funding plan and a roadmap • Offer security as a business service • Learn a business centric view to cybersecurity • Map risks to business • Perform Top-down dependency analysis • Remember to use business metrics