SlideShare uma empresa Scribd logo
1 de 16
Emerging Need of a Chief Information Security Officer (CISO) Dr. Maurice Dawson, Dr. Darrell Burrell, Dr. EmadRahim, & Mr. Stephen Brewster
Purpose The purpose of this submission is to present an argument and discussion on the subject concerning the roles and responsibilities of the Chief Information Security Officer (CISO). Five steps to an effective strategic plan is also included. The paper shall  discuss the author’s view as written and the view from the Defense and Aerospace Industry to include further discussion as to how to properly implement information security. A key component to every good security team is the Chief Security Officer. This administrative role is primarily responsible for all information security within the organization. The security directives, policy, and responsibilities are strictly managed under the CISO position.  The CISO’s three most primary objectives are: Ensure business continuity and disaster recovery  (Barr, 2007) Enforcing security policy (Barr, 2007) Aligning security strategy with business goals (Barr, 2007)
Engagement The CISO must engage the C-Suite Colleagues, such as the Chief Executive Officer (CEO), in order to gain support of security objectives within the company.   The CISO must procure security funds for training and technologies though communications with the CEO. The CEO ensures that proper funding is allocated for training, personnel, and technology.  The CISO must motivate and lead teams and bring about a security aware culture within the organization. CISOs are constantly testing and evaluating the effectiveness of company security policies, procedures, and practices.  This allows for the CISO to divert procured funds to resolve high priority risk. In order for the CISO to reduce security administration costs, the CEO must provide solutions to business barriers which prevent the merge of security functions. Likewise, in order for the CEO to maintain a level security funding the CISO must present performance metrics.
Skill sets The CISO maintains a set of skills in which lie the foundation of his/her performance. These skill sets include budgeting, team building, crisis management, and vendor management. Often times CISOs are required to obtain their Masters in Business Administration in order to better integrate organizational business goals with security objectives (Barr, 2007). The budget is critical to any security plan. The CISO must use budgeting skills to reflect a positive return on security investments. “Approximately 42 percent of organizations polled in the 2007 Computer Security Institute Computer Crime and Security Survey said they used Return On Investment (ROI) to measure their information security investments” (Fitzgerald, 2008).   There has been a 39 percent increase from the previous year. However, this increase is 55 percent less than reported in 2004. The Internal Rate of Return (IRR) measures were reportedly used by 21 percent of the respondents, and Net Present Value was reported by 19 percent of the respondents (Fitzgerald, 2008).
Skill sets The CISO must develop security policy analysis of Commercial Off The Shelf (COTS) technology, and personnel that provide the CEO with multiple financial options. The CISO is responsible for developing a security team. The CISO has to see beyond the  documented skill sets of potential team candidates and assess the interoperability of the potential employee (Barr, 2009). The CISO must manage and periodically review risk to company assets from probable threats and vulnerabilities. However, risks are never alleviated, only reduced. Thus, in a time of crisis a CISO must remain calm, decisive, and authoritative as not to tarry. Vendor management allows for the CISO to produce project management metrics such as earned value management information (Barr, 2009).   Also, the CISO must negotiate all customer Service Level Agreements (SLA) between their current organization and outsourced companies.  The role of the CISO is both rewarding and complex. The CISO must perform as an administrator, yet also put forth efforts managing the implementation and development of security controls. This role is critical in order to align the business objectives of an organization with that of the security objectives. Financial, personnel, vendor, security, and company direction are all influenced by the CISO. Organizational culture is implemented from top down, from C-Suite Colleagues to the workstation employee. Therefore the culture of any organization can only obtain security practice standards through the effective leadership of the CISO.
Developing Talent National Defense University [applied] Information Resource Management College (IRMC) National Security Agency (NSA) & Department of Homeland Security (DHS) Centers of Academic Excellence  [research]
Sample Curriculum
Integrated Steps to Developing a Security Plan Presented by Sarah Scarlet is a paper detailing the five steps to an effective strategic plan as it relates to Information Assurance (IA) or Information Systems (IS) security
Step 1 The first item is to begin with the business’s big picture plan (Scarlet, 2005).  What this means is to start out what is overall goal for the business.  What is the intended function of the organization so one can develop a plan that is aligned with this particular function.  With this stated think of business plan that be aligned and changed as original plans morph themselves.  In the creation of this business plan the functional leaders from business need to be involved from the beginning to ensure that support is obtained.  This allows insight to budgets which directly affect what the IA department may be able to due to in planning for future requirements.  Knowing what the budget is shall help prioritize mission capabilities over a three year cycle.  However once the budget is known for the three year cycle is best to look at this budget quarterly to track progress and see if the budget has changed.
Step 2 The second step is to perform risk assessment as it relates to potential threats to the system.  Below is a diagram specifying the displaying potential threats, threat agents, and areas of potential harm as they relate to systems. These items will be protected through the technical security requirements.
Step 3 The third step is to set measurable goals (Scarlet, 2005).   Goals are useless if one cannot properly measure their effectiveness.  There needs to be a strategic plan which is the long term objective and a tactical plan which covers the short term objectives.  A short term plan could detail software patches.  A key items is to find metrics than can measure how well you can meet those objectives over time (Scarlet, 2005).
Step 4 The fourth step   is to recognize there is no correct time frame (Scarlet, 2005)  Scarlet discusses this in relation to non military government organizations however many military organizations are usually bound by budgets set forth by Congress which have strict timelines for program funding.  In the government there is a cycle for major funding which all goals and objectives must be stated and categorized according to mission need.  From this point is when the allocation is found and from here various milestones are created from previous stated mission needs, goals, and or objectives.
Step 5 The last step is to stay flexible as it is more important to know what is truly flexible than how far your plan stretches out (Scarlet, 2005).  With this stated this is very true and applicable in the military setting as one may have to prioritize goals.  When prioritization of goals occur in military programs some items may be pushed out further and other brought in.  This is generally up to the Program Manager (PM) to make this item occur as they are generally the ones responsible for managing the program.
Summary As the C-Suite continues to grow it is essential that emerging roles such as Information Assurance (IA), Software Assurance, Network Security, Physical Security, and Telecommunications Security has an executive voice.
References Barr, J. (2009). Essential CSO Skills. Faulkner information services. Retrieved January 26, 2010, fromhttp://wf2dnvr6.webfeat.org/   Barr, J. (2007). Profile: Today’s CSO. Faulkner information services. Retrieved January 25, 2010, fromhttp://wf2dnvr6.webfeat.org/   Benson, R. J., Bugnitz, T., and Walton, B. (2004). From Business Strategy to IT Action: Right Decisions for a Better Bottom Line. Wiley.   Fitzgerald, M. (2008, June 23). Security and business: financial basics [Web log message]. Retrieved fromhttp://www.csoonline.com/article/394963/security-and-business-financial-basics?page=1
Please contact Dr. Maurice Dawson Jr. at dr.mauricedawson@yahoo.com Any Questions

Mais conteúdo relacionado

Mais procurados

A CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk ManagementA CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk Management
Daren Dunkel
 
Cybertopic_1security
Cybertopic_1securityCybertopic_1security
Cybertopic_1security
Anne Starr
 
Build and Information Security Strategy
Build and Information Security StrategyBuild and Information Security Strategy
Build and Information Security Strategy
Info-Tech Research Group
 

Mais procurados (20)

A CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk ManagementA CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk Management
 
Cybertopic_1security
Cybertopic_1securityCybertopic_1security
Cybertopic_1security
 
"Thinking diffrent" about your information security strategy
"Thinking diffrent" about your information security strategy"Thinking diffrent" about your information security strategy
"Thinking diffrent" about your information security strategy
 
How to measure your cybersecurity performance
How to measure your cybersecurity performanceHow to measure your cybersecurity performance
How to measure your cybersecurity performance
 
The Measure of Success: Security Metrics to Tell Your Story
The Measure of Success: Security Metrics to Tell Your StoryThe Measure of Success: Security Metrics to Tell Your Story
The Measure of Success: Security Metrics to Tell Your Story
 
Keynote Session : NIST - Cyber Security Framework Measuring Security
Keynote Session : NIST - Cyber Security Framework Measuring SecurityKeynote Session : NIST - Cyber Security Framework Measuring Security
Keynote Session : NIST - Cyber Security Framework Measuring Security
 
Making the Business Case for Security Investment
Making the Business Case for Security InvestmentMaking the Business Case for Security Investment
Making the Business Case for Security Investment
 
Build and Information Security Strategy
Build and Information Security StrategyBuild and Information Security Strategy
Build and Information Security Strategy
 
Using Security Metrics to Drive Action in Asia Pacific - 22 Experts Share How...
Using Security Metrics to Drive Action in Asia Pacific - 22 Experts Share How...Using Security Metrics to Drive Action in Asia Pacific - 22 Experts Share How...
Using Security Metrics to Drive Action in Asia Pacific - 22 Experts Share How...
 
For Corporate Boards, a Cyber Security Top 10
For Corporate Boards, a Cyber Security Top 10For Corporate Boards, a Cyber Security Top 10
For Corporate Boards, a Cyber Security Top 10
 
Risk Assessments
Risk AssessmentsRisk Assessments
Risk Assessments
 
IT Risk Management - the right posture
IT Risk Management - the right postureIT Risk Management - the right posture
IT Risk Management - the right posture
 
The CIO Viewpoint : How to Partner with the Top IT Executive
The CIO Viewpoint : How to Partner with the Top IT ExecutiveThe CIO Viewpoint : How to Partner with the Top IT Executive
The CIO Viewpoint : How to Partner with the Top IT Executive
 
Implementing Business Aligned Security Strategy Dane Warren Li
Implementing Business Aligned Security Strategy Dane Warren LiImplementing Business Aligned Security Strategy Dane Warren Li
Implementing Business Aligned Security Strategy Dane Warren Li
 
Protecting the Crown Jewels – Enlist the Beefeaters
Protecting the Crown Jewels – Enlist the BeefeatersProtecting the Crown Jewels – Enlist the Beefeaters
Protecting the Crown Jewels – Enlist the Beefeaters
 
IT Risk Management
IT Risk ManagementIT Risk Management
IT Risk Management
 
State of Security Operations 2016 report of capabilities and maturity of cybe...
State of Security Operations 2016 report of capabilities and maturity of cybe...State of Security Operations 2016 report of capabilities and maturity of cybe...
State of Security Operations 2016 report of capabilities and maturity of cybe...
 
Organizational Integrity & Its Relationship with Management Systems and Enter...
Organizational Integrity & Its Relationship with Management Systems and Enter...Organizational Integrity & Its Relationship with Management Systems and Enter...
Organizational Integrity & Its Relationship with Management Systems and Enter...
 
Information Security Risk Management
Information Security Risk ManagementInformation Security Risk Management
Information Security Risk Management
 
infosec-it
infosec-itinfosec-it
infosec-it
 

Destaque

Safety At Work
Safety At WorkSafety At Work
Safety At Work
Renny
 
Security Officer Training Manual
Security Officer Training ManualSecurity Officer Training Manual
Security Officer Training Manual
Scott Warner
 

Destaque (20)

File1
File1File1
File1
 
Florida Security License Types
Florida Security License Types Florida Security License Types
Florida Security License Types
 
Safety At Work
Safety At WorkSafety At Work
Safety At Work
 
Find The Band
Find The BandFind The Band
Find The Band
 
SAFETY AT WORK
SAFETY AT WORK SAFETY AT WORK
SAFETY AT WORK
 
Work Safety
Work SafetyWork Safety
Work Safety
 
Safety at Work
Safety at WorkSafety at Work
Safety at Work
 
Health And Safety At Work Act 2015
Health And Safety At Work Act 2015Health And Safety At Work Act 2015
Health And Safety At Work Act 2015
 
Security guard training
Security guard trainingSecurity guard training
Security guard training
 
Security Officer Training Manual
Security Officer Training ManualSecurity Officer Training Manual
Security Officer Training Manual
 
A day in the life of a CISO (and advice for people looking to come into the C...
A day in the life of a CISO (and advice for people looking to come into the C...A day in the life of a CISO (and advice for people looking to come into the C...
A day in the life of a CISO (and advice for people looking to come into the C...
 
Chief Information Security Officer - A Critical Leadership Role
Chief Information Security Officer - A Critical Leadership RoleChief Information Security Officer - A Critical Leadership Role
Chief Information Security Officer - A Critical Leadership Role
 
The CISO in 2020: Prepare for the Unexpected
The CISO in 2020: Prepare for the UnexpectedThe CISO in 2020: Prepare for the Unexpected
The CISO in 2020: Prepare for the Unexpected
 
RSA 2017 - CISO's 5 steps to Success
RSA 2017 - CISO's 5 steps to SuccessRSA 2017 - CISO's 5 steps to Success
RSA 2017 - CISO's 5 steps to Success
 
Vulnerability Management: What You Need to Know to Prioritize Risk
Vulnerability Management: What You Need to Know to Prioritize RiskVulnerability Management: What You Need to Know to Prioritize Risk
Vulnerability Management: What You Need to Know to Prioritize Risk
 
(Consulting) Couch to CISO: A Security Leader's First 100 Days and Beyond
(Consulting) Couch to CISO: A Security Leader's First 100 Days and Beyond(Consulting) Couch to CISO: A Security Leader's First 100 Days and Beyond
(Consulting) Couch to CISO: A Security Leader's First 100 Days and Beyond
 
Super CISO 2020: How to Keep Your Job
Super CISO 2020: How to Keep Your JobSuper CISO 2020: How to Keep Your Job
Super CISO 2020: How to Keep Your Job
 
The Changing Organization of Work and the Safety and Health of Working People
The Changing Organization of Work and the Safety and Health of Working PeopleThe Changing Organization of Work and the Safety and Health of Working People
The Changing Organization of Work and the Safety and Health of Working People
 
Criminal Record Management
Criminal Record ManagementCriminal Record Management
Criminal Record Management
 
Security as an Enabler for the Digital World - CISO Perspective
Security as an Enabler for the Digital World - CISO PerspectiveSecurity as an Enabler for the Digital World - CISO Perspective
Security as an Enabler for the Digital World - CISO Perspective
 

Semelhante a Emerging Need of a Chief Information Security Officer (CISO)

Discussion 1Recommend three countermeasures that could enhance.docx
Discussion 1Recommend three countermeasures that could enhance.docxDiscussion 1Recommend three countermeasures that could enhance.docx
Discussion 1Recommend three countermeasures that could enhance.docx
elinoraudley582231
 
D e c e m b e r 2 0 1 4 J O U R N A L O F I N T E R N E T
D e c e m b e r  2 0 1 4  J O U R N A L  O F  I N T E R N E T D e c e m b e r  2 0 1 4  J O U R N A L  O F  I N T E R N E T
D e c e m b e r 2 0 1 4 J O U R N A L O F I N T E R N E T
OllieShoresna
 
NIST to CSF to ISO or EC 27002 2022 with NIST
NIST to CSF to ISO or EC 27002 2022 with NISTNIST to CSF to ISO or EC 27002 2022 with NIST
NIST to CSF to ISO or EC 27002 2022 with NIST
ebonyman0007
 
Information Assurance Guidelines For Commercial Buildings...
Information Assurance Guidelines For Commercial Buildings...Information Assurance Guidelines For Commercial Buildings...
Information Assurance Guidelines For Commercial Buildings...
Laura Benitez
 
Chapter 1The International Information Systems Security Certifi.docx
Chapter 1The International Information Systems Security Certifi.docxChapter 1The International Information Systems Security Certifi.docx
Chapter 1The International Information Systems Security Certifi.docx
cravennichole326
 
The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020
The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020
The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020
Jessica Graf
 
Discussion 1Improving Risk Management Capabilities        To .docx
Discussion  1Improving Risk Management Capabilities        To .docxDiscussion  1Improving Risk Management Capabilities        To .docx
Discussion 1Improving Risk Management Capabilities        To .docx
charlieppalmer35273
 
vision 2020 testimony
vision 2020 testimonyvision 2020 testimony
vision 2020 testimony
Rob Arnold
 

Semelhante a Emerging Need of a Chief Information Security Officer (CISO) (20)

Discussion 1Recommend three countermeasures that could enhance.docx
Discussion 1Recommend three countermeasures that could enhance.docxDiscussion 1Recommend three countermeasures that could enhance.docx
Discussion 1Recommend three countermeasures that could enhance.docx
 
A Framework For Information Security Risk Management Communication
A Framework For Information Security Risk Management CommunicationA Framework For Information Security Risk Management Communication
A Framework For Information Security Risk Management Communication
 
Information Security Maturity Model
Information Security Maturity ModelInformation Security Maturity Model
Information Security Maturity Model
 
D e c e m b e r 2 0 1 4 J O U R N A L O F I N T E R N E T
D e c e m b e r  2 0 1 4  J O U R N A L  O F  I N T E R N E T D e c e m b e r  2 0 1 4  J O U R N A L  O F  I N T E R N E T
D e c e m b e r 2 0 1 4 J O U R N A L O F I N T E R N E T
 
NIST to CSF to ISO or EC 27002 2022 with NIST
NIST to CSF to ISO or EC 27002 2022 with NISTNIST to CSF to ISO or EC 27002 2022 with NIST
NIST to CSF to ISO or EC 27002 2022 with NIST
 
Information Assurance Guidelines For Commercial Buildings...
Information Assurance Guidelines For Commercial Buildings...Information Assurance Guidelines For Commercial Buildings...
Information Assurance Guidelines For Commercial Buildings...
 
Chapter 1The International Information Systems Security Certifi.docx
Chapter 1The International Information Systems Security Certifi.docxChapter 1The International Information Systems Security Certifi.docx
Chapter 1The International Information Systems Security Certifi.docx
 
Case Study on Effective IS Governance within a Department of Defense Organiza...
Case Study on Effective IS Governance within a Department of Defense Organiza...Case Study on Effective IS Governance within a Department of Defense Organiza...
Case Study on Effective IS Governance within a Department of Defense Organiza...
 
From checkboxes to frameworks
From checkboxes to frameworksFrom checkboxes to frameworks
From checkboxes to frameworks
 
Standards For Wright Aircraft Corp
Standards For Wright Aircraft CorpStandards For Wright Aircraft Corp
Standards For Wright Aircraft Corp
 
The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020
The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020
The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020
 
Finding a strategic voice
Finding a strategic voiceFinding a strategic voice
Finding a strategic voice
 
Insights from the IBM Chief Information Security Officer Assessment
Insights from the IBM Chief Information Security Officer AssessmentInsights from the IBM Chief Information Security Officer Assessment
Insights from the IBM Chief Information Security Officer Assessment
 
CTI_introduction_recording final.pptx
CTI_introduction_recording final.pptxCTI_introduction_recording final.pptx
CTI_introduction_recording final.pptx
 
The Significance of IT Security Management & Risk Assessment
The Significance of IT Security Management & Risk AssessmentThe Significance of IT Security Management & Risk Assessment
The Significance of IT Security Management & Risk Assessment
 
Discussion 1Improving Risk Management Capabilities        To .docx
Discussion  1Improving Risk Management Capabilities        To .docxDiscussion  1Improving Risk Management Capabilities        To .docx
Discussion 1Improving Risk Management Capabilities        To .docx
 
vision 2020 testimony
vision 2020 testimonyvision 2020 testimony
vision 2020 testimony
 
Assessing and Managing IT Security Risks
Assessing and Managing IT Security RisksAssessing and Managing IT Security Risks
Assessing and Managing IT Security Risks
 
RH-ISAC_BuildingtheFoundation_WhitePaper.pdf
RH-ISAC_BuildingtheFoundation_WhitePaper.pdfRH-ISAC_BuildingtheFoundation_WhitePaper.pdf
RH-ISAC_BuildingtheFoundation_WhitePaper.pdf
 
Module 2 - Cybersecurity On the Defense.pdf
Module 2 - Cybersecurity On the Defense.pdfModule 2 - Cybersecurity On the Defense.pdf
Module 2 - Cybersecurity On the Defense.pdf
 

Mais de Maurice Dawson

Understanding the Challenge of Cybersecurity in Critical Infrastructure Sectors
Understanding the Challenge of Cybersecurity in Critical Infrastructure SectorsUnderstanding the Challenge of Cybersecurity in Critical Infrastructure Sectors
Understanding the Challenge of Cybersecurity in Critical Infrastructure Sectors
Maurice Dawson
 
MWAIS 2018 : 13th Annual Conference of the Midwest Association for Informatio...
MWAIS 2018 : 13th Annual Conference of the Midwest Association for Informatio...MWAIS 2018 : 13th Annual Conference of the Midwest Association for Informatio...
MWAIS 2018 : 13th Annual Conference of the Midwest Association for Informatio...
Maurice Dawson
 

Mais de Maurice Dawson (20)

Understanding the Challenge of Cybersecurity in Critical Infrastructure Sectors
Understanding the Challenge of Cybersecurity in Critical Infrastructure SectorsUnderstanding the Challenge of Cybersecurity in Critical Infrastructure Sectors
Understanding the Challenge of Cybersecurity in Critical Infrastructure Sectors
 
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...
 
Security Solutions for Hyperconnectivity in the Internet of Things
Security Solutions for Hyperconnectivity in the Internet of ThingsSecurity Solutions for Hyperconnectivity in the Internet of Things
Security Solutions for Hyperconnectivity in the Internet of Things
 
Framework for the Development of Virtual Labs for Industrial Internet of Thin...
Framework for the Development of Virtual Labs for Industrial Internet of Thin...Framework for the Development of Virtual Labs for Industrial Internet of Thin...
Framework for the Development of Virtual Labs for Industrial Internet of Thin...
 
Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...
Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...
Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...
 
CTRL, Search, Exploit, and Destroy
CTRL, Search, Exploit, and DestroyCTRL, Search, Exploit, and Destroy
CTRL, Search, Exploit, and Destroy
 
MWAIS Fall 2017 Newsletter
MWAIS Fall 2017 NewsletterMWAIS Fall 2017 Newsletter
MWAIS Fall 2017 Newsletter
 
MWAIS Fall 2018 Newsletter
MWAIS Fall 2018 NewsletterMWAIS Fall 2018 Newsletter
MWAIS Fall 2018 Newsletter
 
Information Technology Use in West African Agriculture – challenges and oppor...
Information Technology Use in West African Agriculture – challenges and oppor...Information Technology Use in West African Agriculture – challenges and oppor...
Information Technology Use in West African Agriculture – challenges and oppor...
 
The Case for IT Training within Guinea’s Ministry of Agriculture: Evaluating ...
The Case for IT Training within Guinea’s Ministry of Agriculture: Evaluating ...The Case for IT Training within Guinea’s Ministry of Agriculture: Evaluating ...
The Case for IT Training within Guinea’s Ministry of Agriculture: Evaluating ...
 
Schedule for the 13th Annual Conference of the Midwest AIS
Schedule for the 13th Annual Conference of the Midwest AIS Schedule for the 13th Annual Conference of the Midwest AIS
Schedule for the 13th Annual Conference of the Midwest AIS
 
UMSL IS | Farmer 2 Farmer Program
UMSL IS | Farmer 2 Farmer ProgramUMSL IS | Farmer 2 Farmer Program
UMSL IS | Farmer 2 Farmer Program
 
Midwest Association for Information Systems - MWAIS2018
Midwest Association for Information Systems - MWAIS2018Midwest Association for Information Systems - MWAIS2018
Midwest Association for Information Systems - MWAIS2018
 
MWAIS 2018 - 13th Annual Conference
MWAIS 2018 - 13th Annual ConferenceMWAIS 2018 - 13th Annual Conference
MWAIS 2018 - 13th Annual Conference
 
MWAIS 2018 : 13th Annual Conference of the Midwest Association for Informatio...
MWAIS 2018 : 13th Annual Conference of the Midwest Association for Informatio...MWAIS 2018 : 13th Annual Conference of the Midwest Association for Informatio...
MWAIS 2018 : 13th Annual Conference of the Midwest Association for Informatio...
 
Technological Advancements for Intelligence Collection, Analysis, and Dissemi...
Technological Advancements for Intelligence Collection, Analysis, and Dissemi...Technological Advancements for Intelligence Collection, Analysis, and Dissemi...
Technological Advancements for Intelligence Collection, Analysis, and Dissemi...
 
Hacking, Privacy and Security in a Hyperconnected Society
Hacking, Privacy and Security in a Hyperconnected SocietyHacking, Privacy and Security in a Hyperconnected Society
Hacking, Privacy and Security in a Hyperconnected Society
 
University of Missouri - Saint Louis Cyber Security
University of Missouri - Saint Louis Cyber SecurityUniversity of Missouri - Saint Louis Cyber Security
University of Missouri - Saint Louis Cyber Security
 
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
 
Security Solutions for Hyperconnectivity and the Internet of Things
Security Solutions for Hyperconnectivity and the Internet of ThingsSecurity Solutions for Hyperconnectivity and the Internet of Things
Security Solutions for Hyperconnectivity and the Internet of Things
 

Último

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Último (20)

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 

Emerging Need of a Chief Information Security Officer (CISO)

  • 1. Emerging Need of a Chief Information Security Officer (CISO) Dr. Maurice Dawson, Dr. Darrell Burrell, Dr. EmadRahim, & Mr. Stephen Brewster
  • 2. Purpose The purpose of this submission is to present an argument and discussion on the subject concerning the roles and responsibilities of the Chief Information Security Officer (CISO). Five steps to an effective strategic plan is also included. The paper shall discuss the author’s view as written and the view from the Defense and Aerospace Industry to include further discussion as to how to properly implement information security. A key component to every good security team is the Chief Security Officer. This administrative role is primarily responsible for all information security within the organization. The security directives, policy, and responsibilities are strictly managed under the CISO position. The CISO’s three most primary objectives are: Ensure business continuity and disaster recovery (Barr, 2007) Enforcing security policy (Barr, 2007) Aligning security strategy with business goals (Barr, 2007)
  • 3. Engagement The CISO must engage the C-Suite Colleagues, such as the Chief Executive Officer (CEO), in order to gain support of security objectives within the company. The CISO must procure security funds for training and technologies though communications with the CEO. The CEO ensures that proper funding is allocated for training, personnel, and technology. The CISO must motivate and lead teams and bring about a security aware culture within the organization. CISOs are constantly testing and evaluating the effectiveness of company security policies, procedures, and practices. This allows for the CISO to divert procured funds to resolve high priority risk. In order for the CISO to reduce security administration costs, the CEO must provide solutions to business barriers which prevent the merge of security functions. Likewise, in order for the CEO to maintain a level security funding the CISO must present performance metrics.
  • 4. Skill sets The CISO maintains a set of skills in which lie the foundation of his/her performance. These skill sets include budgeting, team building, crisis management, and vendor management. Often times CISOs are required to obtain their Masters in Business Administration in order to better integrate organizational business goals with security objectives (Barr, 2007). The budget is critical to any security plan. The CISO must use budgeting skills to reflect a positive return on security investments. “Approximately 42 percent of organizations polled in the 2007 Computer Security Institute Computer Crime and Security Survey said they used Return On Investment (ROI) to measure their information security investments” (Fitzgerald, 2008). There has been a 39 percent increase from the previous year. However, this increase is 55 percent less than reported in 2004. The Internal Rate of Return (IRR) measures were reportedly used by 21 percent of the respondents, and Net Present Value was reported by 19 percent of the respondents (Fitzgerald, 2008).
  • 5. Skill sets The CISO must develop security policy analysis of Commercial Off The Shelf (COTS) technology, and personnel that provide the CEO with multiple financial options. The CISO is responsible for developing a security team. The CISO has to see beyond the documented skill sets of potential team candidates and assess the interoperability of the potential employee (Barr, 2009). The CISO must manage and periodically review risk to company assets from probable threats and vulnerabilities. However, risks are never alleviated, only reduced. Thus, in a time of crisis a CISO must remain calm, decisive, and authoritative as not to tarry. Vendor management allows for the CISO to produce project management metrics such as earned value management information (Barr, 2009). Also, the CISO must negotiate all customer Service Level Agreements (SLA) between their current organization and outsourced companies. The role of the CISO is both rewarding and complex. The CISO must perform as an administrator, yet also put forth efforts managing the implementation and development of security controls. This role is critical in order to align the business objectives of an organization with that of the security objectives. Financial, personnel, vendor, security, and company direction are all influenced by the CISO. Organizational culture is implemented from top down, from C-Suite Colleagues to the workstation employee. Therefore the culture of any organization can only obtain security practice standards through the effective leadership of the CISO.
  • 6. Developing Talent National Defense University [applied] Information Resource Management College (IRMC) National Security Agency (NSA) & Department of Homeland Security (DHS) Centers of Academic Excellence [research]
  • 8. Integrated Steps to Developing a Security Plan Presented by Sarah Scarlet is a paper detailing the five steps to an effective strategic plan as it relates to Information Assurance (IA) or Information Systems (IS) security
  • 9. Step 1 The first item is to begin with the business’s big picture plan (Scarlet, 2005). What this means is to start out what is overall goal for the business. What is the intended function of the organization so one can develop a plan that is aligned with this particular function. With this stated think of business plan that be aligned and changed as original plans morph themselves. In the creation of this business plan the functional leaders from business need to be involved from the beginning to ensure that support is obtained. This allows insight to budgets which directly affect what the IA department may be able to due to in planning for future requirements. Knowing what the budget is shall help prioritize mission capabilities over a three year cycle. However once the budget is known for the three year cycle is best to look at this budget quarterly to track progress and see if the budget has changed.
  • 10. Step 2 The second step is to perform risk assessment as it relates to potential threats to the system. Below is a diagram specifying the displaying potential threats, threat agents, and areas of potential harm as they relate to systems. These items will be protected through the technical security requirements.
  • 11. Step 3 The third step is to set measurable goals (Scarlet, 2005). Goals are useless if one cannot properly measure their effectiveness. There needs to be a strategic plan which is the long term objective and a tactical plan which covers the short term objectives. A short term plan could detail software patches. A key items is to find metrics than can measure how well you can meet those objectives over time (Scarlet, 2005).
  • 12. Step 4 The fourth step is to recognize there is no correct time frame (Scarlet, 2005) Scarlet discusses this in relation to non military government organizations however many military organizations are usually bound by budgets set forth by Congress which have strict timelines for program funding. In the government there is a cycle for major funding which all goals and objectives must be stated and categorized according to mission need. From this point is when the allocation is found and from here various milestones are created from previous stated mission needs, goals, and or objectives.
  • 13. Step 5 The last step is to stay flexible as it is more important to know what is truly flexible than how far your plan stretches out (Scarlet, 2005). With this stated this is very true and applicable in the military setting as one may have to prioritize goals. When prioritization of goals occur in military programs some items may be pushed out further and other brought in. This is generally up to the Program Manager (PM) to make this item occur as they are generally the ones responsible for managing the program.
  • 14. Summary As the C-Suite continues to grow it is essential that emerging roles such as Information Assurance (IA), Software Assurance, Network Security, Physical Security, and Telecommunications Security has an executive voice.
  • 15. References Barr, J. (2009). Essential CSO Skills. Faulkner information services. Retrieved January 26, 2010, fromhttp://wf2dnvr6.webfeat.org/   Barr, J. (2007). Profile: Today’s CSO. Faulkner information services. Retrieved January 25, 2010, fromhttp://wf2dnvr6.webfeat.org/   Benson, R. J., Bugnitz, T., and Walton, B. (2004). From Business Strategy to IT Action: Right Decisions for a Better Bottom Line. Wiley.   Fitzgerald, M. (2008, June 23). Security and business: financial basics [Web log message]. Retrieved fromhttp://www.csoonline.com/article/394963/security-and-business-financial-basics?page=1
  • 16. Please contact Dr. Maurice Dawson Jr. at dr.mauricedawson@yahoo.com Any Questions