Enviar pesquisa
Carregar
What CIOs and CFOs Need to Know About Cyber Security
•
3 gostaram
•
1,899 visualizações
Phil Agcaoili
Seguir
IABIA and Kettering Executive Network Joint Briefing for the Atlanta CIOs
Leia menos
Leia mais
Tecnologia
Denunciar
Compartilhar
Denunciar
Compartilhar
1 de 17
Baixar agora
Baixar para ler offline
Recomendados
Dwight Koop's Chicago ECFT talk "The Chicago School of Cybersecurity Thinking...
Dwight Koop's Chicago ECFT talk "The Chicago School of Cybersecurity Thinking...
Cohesive Networks
2015 KSU So You Want To Be in Cyber Security
2015 KSU So You Want To Be in Cyber Security
Phil Agcaoili
Accountability for Corporate Cybersecurity - Who Owns What?
Accountability for Corporate Cybersecurity - Who Owns What?
Henry Draughon
Archer Users Group / Southern Risk Council 2016 Enterprise Risk Management an...
Archer Users Group / Southern Risk Council 2016 Enterprise Risk Management an...
Phil Agcaoili
Cybersecurity Goverence for Boards of Directors
Cybersecurity Goverence for Boards of Directors
Paul Feldman
What CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber Security
Karyl Scott
Cyber security: Five leadership issues worthy of board and executive attention
Cyber security: Five leadership issues worthy of board and executive attention
Ramón Gómez de Olea y Bustinza
Improving Cyber Security Literacy in Boards & Executives
Improving Cyber Security Literacy in Boards & Executives
Tripwire
Mais conteúdo relacionado
Mais procurados
Cybersecurity in the Boardroom
Cybersecurity in the Boardroom
Marko Suswanto
New CISO - The First 90 Days
New CISO - The First 90 Days
Resilient Systems
Cybersecurity solution-guide
Cybersecurity solution-guide
AdilsonSuende
A Look at Cyber Insurance -- A Corporate Perspective
A Look at Cyber Insurance -- A Corporate Perspective
Dawn Yankeelov
The CISO in 2020: Prepare for the Unexpected
The CISO in 2020: Prepare for the Unexpected
IBM Security
Cybersecurity Risks for Businesses
Cybersecurity Risks for Businesses
Alex Rudie
Case Study: The Role of Human Error in Information Security
Case Study: The Role of Human Error in Information Security
PECB
Cybersecurity Risk Management for Financial Institutions
Cybersecurity Risk Management for Financial Institutions
Sarah Cirelli
Cyber resilience itsm academy_april2015
Cyber resilience itsm academy_april2015
ITSM Academy, Inc.
Cyber Security Threats Facing Small Businesses--June 2019
Cyber Security Threats Facing Small Businesses--June 2019
Dawn Yankeelov
What it Takes to be a CISO in 2017
What it Takes to be a CISO in 2017
Doug Copley
Information security governance
Information security governance
Koen Maris
How an ISO/IEC 27001 Based ISMS Will Support the EU GDPR
How an ISO/IEC 27001 Based ISMS Will Support the EU GDPR
PECB
Leveraging Board Governance for Cybersecurity
Leveraging Board Governance for Cybersecurity
ShareDocView.com
Cyber Security Tips and Resources for Financial Institutions
Cyber Security Tips and Resources for Financial Institutions
Colleen Beck-Domanico
Vulnerability management - beyond scanning
Vulnerability management - beyond scanning
Vladimir Jirasek
2011 FCC CSRIC WG2A Cyber Security Best Practices Final Report
2011 FCC CSRIC WG2A Cyber Security Best Practices Final Report
Phil Agcaoili
Cyber Security in the Digital Age: A Survey and its Analysis
Cyber Security in the Digital Age: A Survey and its Analysis
Rahul Neel Mani
Implementing a Security Management Framework
Implementing a Security Management Framework
Joseph Wynn
Managing Enterprise Risk: Why U No Haz Metrics?
Managing Enterprise Risk: Why U No Haz Metrics?
John D. Johnson
Mais procurados
(20)
Cybersecurity in the Boardroom
Cybersecurity in the Boardroom
New CISO - The First 90 Days
New CISO - The First 90 Days
Cybersecurity solution-guide
Cybersecurity solution-guide
A Look at Cyber Insurance -- A Corporate Perspective
A Look at Cyber Insurance -- A Corporate Perspective
The CISO in 2020: Prepare for the Unexpected
The CISO in 2020: Prepare for the Unexpected
Cybersecurity Risks for Businesses
Cybersecurity Risks for Businesses
Case Study: The Role of Human Error in Information Security
Case Study: The Role of Human Error in Information Security
Cybersecurity Risk Management for Financial Institutions
Cybersecurity Risk Management for Financial Institutions
Cyber resilience itsm academy_april2015
Cyber resilience itsm academy_april2015
Cyber Security Threats Facing Small Businesses--June 2019
Cyber Security Threats Facing Small Businesses--June 2019
What it Takes to be a CISO in 2017
What it Takes to be a CISO in 2017
Information security governance
Information security governance
How an ISO/IEC 27001 Based ISMS Will Support the EU GDPR
How an ISO/IEC 27001 Based ISMS Will Support the EU GDPR
Leveraging Board Governance for Cybersecurity
Leveraging Board Governance for Cybersecurity
Cyber Security Tips and Resources for Financial Institutions
Cyber Security Tips and Resources for Financial Institutions
Vulnerability management - beyond scanning
Vulnerability management - beyond scanning
2011 FCC CSRIC WG2A Cyber Security Best Practices Final Report
2011 FCC CSRIC WG2A Cyber Security Best Practices Final Report
Cyber Security in the Digital Age: A Survey and its Analysis
Cyber Security in the Digital Age: A Survey and its Analysis
Implementing a Security Management Framework
Implementing a Security Management Framework
Managing Enterprise Risk: Why U No Haz Metrics?
Managing Enterprise Risk: Why U No Haz Metrics?
Destaque
Infrastructure Interdependencies: Connections that Alter Consequences
Infrastructure Interdependencies: Connections that Alter Consequences
Rhode Island Emergency Management Agency
6Aheidithurgood
6Aheidithurgood
thurgoodh
Cybersecurity for Critical National Information Infrastructure
Cybersecurity for Critical National Information Infrastructure
Dr David Probert
Gis based method to analyse vulnerability of transportation infrastructure
Gis based method to analyse vulnerability of transportation infrastructure
HAO YE
IoT, Big Data Healthcare Summit Western Canada - IoT Health - Enterprise - Ri...
IoT, Big Data Healthcare Summit Western Canada - IoT Health - Enterprise - Ri...
Ingunn Grip Fjær
3 Things Every Sales Team Needs to Be Thinking About in 2017
3 Things Every Sales Team Needs to Be Thinking About in 2017
Drift
How to Become a Thought Leader in Your Niche
How to Become a Thought Leader in Your Niche
Leslie Samuel
Destaque
(7)
Infrastructure Interdependencies: Connections that Alter Consequences
Infrastructure Interdependencies: Connections that Alter Consequences
6Aheidithurgood
6Aheidithurgood
Cybersecurity for Critical National Information Infrastructure
Cybersecurity for Critical National Information Infrastructure
Gis based method to analyse vulnerability of transportation infrastructure
Gis based method to analyse vulnerability of transportation infrastructure
IoT, Big Data Healthcare Summit Western Canada - IoT Health - Enterprise - Ri...
IoT, Big Data Healthcare Summit Western Canada - IoT Health - Enterprise - Ri...
3 Things Every Sales Team Needs to Be Thinking About in 2017
3 Things Every Sales Team Needs to Be Thinking About in 2017
How to Become a Thought Leader in Your Niche
How to Become a Thought Leader in Your Niche
Semelhante a What CIOs and CFOs Need to Know About Cyber Security
Speaker Kiersten E. Todt, President and Managing Partner, Liberty Group Ventu...
Speaker Kiersten E. Todt, President and Managing Partner, Liberty Group Ventu...
Investorideas.com
Breaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gaps
IBM Security
Indusrty Strategy For Action
Indusrty Strategy For Action
Barry Greene
IDC Best Practices in Private Sector Cyber Security
IDC Best Practices in Private Sector Cyber Security
inside-BigData.com
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
International Federation of Accountants
What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?
PECB
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
Puneet Kukreja
Introduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security Framework
PECB
ciso-platform-annual-summit-2013-ciso assessment exec summary _ibm
ciso-platform-annual-summit-2013-ciso assessment exec summary _ibm
Priyanka Aash
Nuovi modelli di sicurezza IT: le trasformazioni degli Innovation Accelerators
Nuovi modelli di sicurezza IT: le trasformazioni degli Innovation Accelerators
IDC Italy
7th ERM - S2 - Cyber security, Cyber Risk and Data Privacy - Kalpesh Doshi (1...
7th ERM - S2 - Cyber security, Cyber Risk and Data Privacy - Kalpesh Doshi (1...
TraintechTde
Introduction to RESILIA and Cyber Resilience
Introduction to RESILIA and Cyber Resilience
Christian F. Nissen
Ciso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data security
Priyanka Aash
NIST Cyber Security Framework: 4 Steps for CIOs - Deloitte CIO - WSJ
NIST Cyber Security Framework: 4 Steps for CIOs - Deloitte CIO - WSJ
Sherry Jones
2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity
Matthew Rosenquist
Cyber Critical Infrastructure Framework Panel
Cyber Critical Infrastructure Framework Panel
Paul Di Gangi
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
OSIsoft, LLC
Mmt2 Task1 Wgu Essay
Mmt2 Task1 Wgu Essay
Jennifer Wright
Cybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas Company
Eryk Budi Pratama
FFIEC and NIST: What You Need to Know About Two Prevalent New IT Security Com...
FFIEC and NIST: What You Need to Know About Two Prevalent New IT Security Com...
West Monroe Partners
Semelhante a What CIOs and CFOs Need to Know About Cyber Security
(20)
Speaker Kiersten E. Todt, President and Managing Partner, Liberty Group Ventu...
Speaker Kiersten E. Todt, President and Managing Partner, Liberty Group Ventu...
Breaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gaps
Indusrty Strategy For Action
Indusrty Strategy For Action
IDC Best Practices in Private Sector Cyber Security
IDC Best Practices in Private Sector Cyber Security
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
Introduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security Framework
ciso-platform-annual-summit-2013-ciso assessment exec summary _ibm
ciso-platform-annual-summit-2013-ciso assessment exec summary _ibm
Nuovi modelli di sicurezza IT: le trasformazioni degli Innovation Accelerators
Nuovi modelli di sicurezza IT: le trasformazioni degli Innovation Accelerators
7th ERM - S2 - Cyber security, Cyber Risk and Data Privacy - Kalpesh Doshi (1...
7th ERM - S2 - Cyber security, Cyber Risk and Data Privacy - Kalpesh Doshi (1...
Introduction to RESILIA and Cyber Resilience
Introduction to RESILIA and Cyber Resilience
Ciso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data security
NIST Cyber Security Framework: 4 Steps for CIOs - Deloitte CIO - WSJ
NIST Cyber Security Framework: 4 Steps for CIOs - Deloitte CIO - WSJ
2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity
Cyber Critical Infrastructure Framework Panel
Cyber Critical Infrastructure Framework Panel
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
Mmt2 Task1 Wgu Essay
Mmt2 Task1 Wgu Essay
Cybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas Company
FFIEC and NIST: What You Need to Know About Two Prevalent New IT Security Com...
FFIEC and NIST: What You Need to Know About Two Prevalent New IT Security Com...
Mais de Phil Agcaoili
Cybersecurity Market 2020 - Bring the Noise
Cybersecurity Market 2020 - Bring the Noise
Phil Agcaoili
4th Industrial Revolution (4IR) - Cyber Canaries Get Out of the Mine
4th Industrial Revolution (4IR) - Cyber Canaries Get Out of the Mine
Phil Agcaoili
2016 ISSA Conference Threat Intelligence Keynote philA
2016 ISSA Conference Threat Intelligence Keynote philA
Phil Agcaoili
CSA Atlanta Q1'2016 Chapter Meeting
CSA Atlanta Q1'2016 Chapter Meeting
Phil Agcaoili
OWASP Knoxville Inaugural Chapter Meeting
OWASP Knoxville Inaugural Chapter Meeting
Phil Agcaoili
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015
Phil Agcaoili
Intel Presentation from NIST Cybersecurity Framework Workshop 6
Intel Presentation from NIST Cybersecurity Framework Workshop 6
Phil Agcaoili
Data Breaches. Are you next? What does the data say?
Data Breaches. Are you next? What does the data say?
Phil Agcaoili
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and Afraid
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and Afraid
Phil Agcaoili
2014 - KSU - So You Want to Be in Cyber Security?
2014 - KSU - So You Want to Be in Cyber Security?
Phil Agcaoili
CSA Atlanta and Metro Atlanta ISSA Chapter Meeting May 2014 - Key Threats to ...
CSA Atlanta and Metro Atlanta ISSA Chapter Meeting May 2014 - Key Threats to ...
Phil Agcaoili
Good Security Starts with Software Assurance - Software Assurance Market Plac...
Good Security Starts with Software Assurance - Software Assurance Market Plac...
Phil Agcaoili
Southern Risk Council - Cybersecurity Update 10-9-13
Southern Risk Council - Cybersecurity Update 10-9-13
Phil Agcaoili
CSO Magazine Confab 2013 Atlanta - Cyber Security
CSO Magazine Confab 2013 Atlanta - Cyber Security
Phil Agcaoili
CSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA Announcements
CSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA Announcements
Phil Agcaoili
Moneysec - Moneyball for Security
Moneysec - Moneyball for Security
Phil Agcaoili
IAPP Atlanta Chapter Meeting 2013 February
IAPP Atlanta Chapter Meeting 2013 February
Phil Agcaoili
Cloud Security Alliance (CSA) Chapter Meeting Atlanta 082312
Cloud Security Alliance (CSA) Chapter Meeting Atlanta 082312
Phil Agcaoili
2013 Democratization Of Technology How Cloud And Consumerization Change Eve...
2013 Democratization Of Technology How Cloud And Consumerization Change Eve...
Phil Agcaoili
Cloud Security Alliance, Atlanta Chapter Meeting Q1 2012 - SSAE16 SOC 1 2 3 I...
Cloud Security Alliance, Atlanta Chapter Meeting Q1 2012 - SSAE16 SOC 1 2 3 I...
Phil Agcaoili
Mais de Phil Agcaoili
(20)
Cybersecurity Market 2020 - Bring the Noise
Cybersecurity Market 2020 - Bring the Noise
4th Industrial Revolution (4IR) - Cyber Canaries Get Out of the Mine
4th Industrial Revolution (4IR) - Cyber Canaries Get Out of the Mine
2016 ISSA Conference Threat Intelligence Keynote philA
2016 ISSA Conference Threat Intelligence Keynote philA
CSA Atlanta Q1'2016 Chapter Meeting
CSA Atlanta Q1'2016 Chapter Meeting
OWASP Knoxville Inaugural Chapter Meeting
OWASP Knoxville Inaugural Chapter Meeting
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015
Intel Presentation from NIST Cybersecurity Framework Workshop 6
Intel Presentation from NIST Cybersecurity Framework Workshop 6
Data Breaches. Are you next? What does the data say?
Data Breaches. Are you next? What does the data say?
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and Afraid
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and Afraid
2014 - KSU - So You Want to Be in Cyber Security?
2014 - KSU - So You Want to Be in Cyber Security?
CSA Atlanta and Metro Atlanta ISSA Chapter Meeting May 2014 - Key Threats to ...
CSA Atlanta and Metro Atlanta ISSA Chapter Meeting May 2014 - Key Threats to ...
Good Security Starts with Software Assurance - Software Assurance Market Plac...
Good Security Starts with Software Assurance - Software Assurance Market Plac...
Southern Risk Council - Cybersecurity Update 10-9-13
Southern Risk Council - Cybersecurity Update 10-9-13
CSO Magazine Confab 2013 Atlanta - Cyber Security
CSO Magazine Confab 2013 Atlanta - Cyber Security
CSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA Announcements
CSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA Announcements
Moneysec - Moneyball for Security
Moneysec - Moneyball for Security
IAPP Atlanta Chapter Meeting 2013 February
IAPP Atlanta Chapter Meeting 2013 February
Cloud Security Alliance (CSA) Chapter Meeting Atlanta 082312
Cloud Security Alliance (CSA) Chapter Meeting Atlanta 082312
2013 Democratization Of Technology How Cloud And Consumerization Change Eve...
2013 Democratization Of Technology How Cloud And Consumerization Change Eve...
Cloud Security Alliance, Atlanta Chapter Meeting Q1 2012 - SSAE16 SOC 1 2 3 I...
Cloud Security Alliance, Atlanta Chapter Meeting Q1 2012 - SSAE16 SOC 1 2 3 I...
Último
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6
DianaGray10
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptx
Matsuo Lab
20150722 - AGV
20150722 - AGV
Jamie (Taka) Wang
20230202 - Introduction to tis-py
20230202 - Introduction to tis-py
Jamie (Taka) Wang
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Website
dgelyza
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
bruanjhuli
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7
DianaGray10
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024
SkyPlanner
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation Developers
UiPathCommunity
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Aijun Zhang
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
Daniel Santiago Silva Capera
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
Matt Ray
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?
IES VE
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and Hazards
Seth Reyes
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.
YounusS2
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Will Schroeder
Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptx
Udaiappa Ramachandran
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdf
infogdgmi
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 Workshop
Bachir Benyammi
VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBX
Tarek Kalaji
Último
(20)
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptx
20150722 - AGV
20150722 - AGV
20230202 - Introduction to tis-py
20230202 - Introduction to tis-py
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation Developers
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and Hazards
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptx
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdf
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 Workshop
VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBX
What CIOs and CFOs Need to Know About Cyber Security
1.
© 2012 Liberty
Group Ventures. All rights reserved What CIOs and CFOs need to know about Cyber Security Phil Agcaoili March 14, 2014
2.
© 2012 Liberty
Group Ventures. All rights reserved 2 Special Thanks to Kiersten Todt Roger Cressey
3.
© 2012 Liberty
Group Ventures. All rights reserved 3 Isn’t this the same thing? Cyber Security Information Security
4.
© 2012 Liberty
Group Ventures. All rights reserved 4 U.S. Cyber Security Defined 2 Questions: •Are you U.S. Critical Infrastructure (CI)? •Do you have physical or virtual systems and assets so vital to the United States that the incapacity or destruction of such systems and assets would have a debilitating impact on – National security, – National economic security, and/or – National public health or safety?
5.
© 2012 Liberty
Group Ventures. All rights reserved 5 16 DHS Critical Infrastructure Sectors
6.
© 2012 Liberty
Group Ventures. All rights reserved 6 Framework Background Presidential Executive Order 13636 (2013) Failure by Congress to pass cyber legislation Unprecedented cyber threat environment Role of NIST Operates under Department of Commerce Develop industry-led voluntary framework Process Ten months, five workshops, transparent process 12,000 public comments adjudicated Collaboration between NIST, White House (NSC), DHS, and private sector http://www.nist.gov/cyberframework/
7.
© 2012 Liberty
Group Ventures. All rights reserved 7 Framework Basics Core: Set of cybersecurity activities and informative references common across CI Functions: Overview of organization’s management of cyber risks Identify, Protect, Detect, Respond, Recover (IPDRR) Tiers: Mechanism to view approach and processes for managing cyber risk 1. Partial 2. Risk Informed 3. Repeatable 4. Adaptive Tier 4 is not the goal for every organization
8.
© 2012 Liberty
Group Ventures. All rights reserved 8 Framework Basics (continued) Profiles Alignment of IPDRR with business requirements, risk tolerance, and resources of organization Current Profile Target Profile Profiles create gap analysis Creating a profile helps a company understand its dependencies with business partners, vendors, and suppliers.
9.
© 2012 Liberty
Group Ventures. All rights reserved 9 What the Framework is Really About Creating a common language for cyber risk management COBIT 5, ISO/IEC 27001, NIST 800-53, CCS CSC, and ISA 62443 Objective: Facilitate behavioral change in organizations Treat cyber risk as a mission equal in priority to other corporate risk Intended for critical infrastructure owners and operators Can/May be used by many others Applies market-driven approach to cyber risk management Product of industry, not government Not one size fits all…user experience will vary
10.
© 2012 Liberty
Group Ventures. All rights reserved 10 How much more do we have to spend? Why?
11.
© 2012 Liberty
Group Ventures. All rights reserved 11 Implications of Framework Industry: Each Sector Will Define Adoption Identify metrics for success Facilitate information sharing within industry Defining cost-effectiveness Role for insurance….finally? Cyber Liability Cyber Breach Business Small (prioritize, develop risk management process) Medium (grow risk management process) Large (mature risk management process, share best practices and lessons learned)
12.
© 2012 Liberty
Group Ventures. All rights reserved 12 Framework: The Way Ahead (continued) Industry Adopt Framework by mapping it to existing risk management process and addressing gaps that are identified through profile development Conduct training to “normalize” cyber risk behavior, including simulations and exercises with corporate leadership Participate in additional workshops on implementation and areas for improvement Feedback to government: Lessons learned/what works/what doesn’t/what’s missing Industry input will shape development of Framework 2.0 Non-lifeline sector adoption Retail, Manufacturing, Information Technology, etc.
13.
© 2012 Liberty
Group Ventures. All rights reserved 13 Framework: The Way Ahead (continued) Government DHS role evolving Launched Critical Infrastructure Cyber Community (C3 or C Cubed) Voluntary Program Providing managed security services to states, localities who adopt framework - a good first step Work with Sector Specific Agencies (SSA) in first year, expand to all CI business in future Seeking input from small business on framework adoption Working on evolving incentives International adoption…and overcoming Snowden challenge Need for role of US business with global presence to engage and facilitate
14.
© 2012 Liberty
Group Ventures. All rights reserved 14 Framework: The Way Ahead NIST Initial Areas for Further Work Authentication Automated Indicator Sharing Conformity Assessment Cybersecurity Workforce Data Analytics Federal Agency Cybersecurity Alignment Supply Chain Risk Management International Aspects, Impacts, and Alignment Technical Privacy Standards
15.
© 2012 Liberty
Group Ventures. All rights reserved 15 Next Steps for You… Engage in Cybersecurity Framework development Increase senior leadership and board engagement on cybersecurity Promote and integrate the culture of cyber security Hire a CISO Have a plan Ensure Defensible Security Practices Use the NIST Cyber Security Framework Third Party Security Measure your security’s effectiveness Invest wisely
16.
© 2012 Liberty
Group Ventures. All rights reserved 16 Communicating Cyber Security to All Levels • Board Getting hacked is not a matter of IF, but When. • Management Security is a Journey. Not a Destination. • All Security is Everyone’s Responsibility. Stop. Think. Connect.
17.
© 2012 Liberty
Group Ventures. All rights reserved Thanks Phil Agcaoili Contributor, NIST Cybersecurity Framework version 1 Co-Founder & Board Member, Southern CISO Security Council Distinguished Fellow and Fellows Chairman, Ponemon Institute Founding Member, Cloud Security Alliance (CSA) Inventor & Co-Author, CSA Cloud Controls Matrix, GRC Stack, Security, Trust and Assurance Registry (STAR), and CSA Open Certification Framework (OCF) @hacksec https://www.linkedin.com/in/philA
Baixar agora