SlideShare ist ein Scribd-Unternehmen logo
1 von 11
Virtual CSO




What You Need, When
    You Need It
          Bryan Miller
      Syrinx Technologies
     bryan@syrinxtech.com
      www.syrinxtech.com
          804-539-9154
Virtual CSO

                     Agenda
   Security Roadblocks
   Business Benefits
   Technical Benefits
   Summary
   Next Steps
   Q&A



                                 2
Virtual CSO

                   Security Roadblocks
   Cost
       Perception of high cost of security
       Work overload – “I have enough to do already”

   Policy
       Implementation becomes an afterthought
       Lack of support for policy enforcement




                                                        3
Virtual CSO

                    Security Roadblocks

   Risk vs. Reward
       False Sense of Security
         We’ve never been hacked
         Who would want what we have
         We’re too small to be a target

     Security becomes a “nice to have”
     Security often seen as a cost, not a savings
     Security delays implementation



                                                     4
Virtual CSO

                  Business Benefits

   No payroll taxes or benefit costs

   No training costs

   Flexibility - each client chooses a customized
    solution to fit their budget



                                                     5
Virtual CSO

                    Technical Benefits

   Initial Policy and Procedure Development/Review
       Annual Updates

   Initial Internal and External Penetration Testing
       Develop a Baseline

   Follow-up Penetration Testing
       Annual External and Internal Testing


                                                        6
Virtual CSO

                    Technical Benefits

   Options
       Monthly Block Time

       Security Awareness Training Program Development

       Incident Response Program Development

       Compliance Program Consulting
         HIPAA, PCI, NCUA


                                                          7
Virtual CSO

                     Technical Benefits

   Options
       Developing/Updating Infrastructure Documentation

       Customized Vulnerability Notifications

       Server Hardening Best Practices

       Disaster Recovery (DR) and Business Continuity Plan
        (BCP) Development

                                                              8
Virtual CSO

              Summary

The CSO position is necessary but often
  unfunded.

Outsourcing provides a reasonable return
  on investment.


Syrinx Technologies can provide the
  required services at reduced costs.
                                           9
Virtual CSO

                         Next Steps

   Decide if this is right for your organization
       Assess your current security posture
       Compute the ROI

   Develop an action plan
       Work with Syrinx Technologies to choose your
        options and develop a roadmap

   Implement the plan
       Yearly program review and tuning

                                                       10
Virtual CSO

                                   Q&A

   How is this program priced?
       Once the client chooses their desired options, a yearly proposal
        will be provided.

   Are there any minimum or maximum service periods?
       The client may cancel at any time with 30 days written notice.

   How often am I billed?
       Syrinx Technologies will bill the client monthly.

   Are Service Level Agreements (SLA) available?
       Yes, specific SLAs can be written into the service agreement.


                                                                           11

Weitere ähnliche Inhalte

Was ist angesagt?

Presentation1
Presentation1Presentation1
Presentation1
STFA-EMX
 

Was ist angesagt? (10)

Embedding Security in IT Projects
Embedding Security in IT ProjectsEmbedding Security in IT Projects
Embedding Security in IT Projects
 
Achieving Compliance Through Security
Achieving Compliance Through SecurityAchieving Compliance Through Security
Achieving Compliance Through Security
 
Breaches Are Bad for Business. How Will You Detect and Respond to Your Next C...
Breaches Are Bad for Business. How Will You Detect and Respond to Your Next C...Breaches Are Bad for Business. How Will You Detect and Respond to Your Next C...
Breaches Are Bad for Business. How Will You Detect and Respond to Your Next C...
 
Cyber risk management-white-paper-v8 (2) 2015
Cyber risk management-white-paper-v8 (2) 2015Cyber risk management-white-paper-v8 (2) 2015
Cyber risk management-white-paper-v8 (2) 2015
 
NEMEA Compliance center
NEMEA Compliance centerNEMEA Compliance center
NEMEA Compliance center
 
AdvisorAssist Compliance ROI
AdvisorAssist Compliance ROIAdvisorAssist Compliance ROI
AdvisorAssist Compliance ROI
 
Presentation1
Presentation1Presentation1
Presentation1
 
Leading Enterprise Wide Projects
Leading Enterprise Wide ProjectsLeading Enterprise Wide Projects
Leading Enterprise Wide Projects
 
Simplifying PCI on a PaaS Environment
Simplifying PCI on a PaaS EnvironmentSimplifying PCI on a PaaS Environment
Simplifying PCI on a PaaS Environment
 
Simplify Your Approach To_Assess The Risks Of Moving Into The Cloud
Simplify Your Approach To_Assess The Risks Of Moving Into The CloudSimplify Your Approach To_Assess The Risks Of Moving Into The Cloud
Simplify Your Approach To_Assess The Risks Of Moving Into The Cloud
 

Ähnlich wie Virtual CSO

Cynergies One Page Overview
Cynergies One Page OverviewCynergies One Page Overview
Cynergies One Page Overview
debbieholy
 
Adaptive & Unified Approach to Risk Management & Compliance-via-ccf
Adaptive & Unified Approach to Risk Management & Compliance-via-ccfAdaptive & Unified Approach to Risk Management & Compliance-via-ccf
Adaptive & Unified Approach to Risk Management & Compliance-via-ccf
awish11
 
Zero Trust and Data Security
Zero Trust and Data SecurityZero Trust and Data Security
Zero Trust and Data Security
Career Communications Group
 
Introducing Ethical Hacking to the Ministry of Defence.pdf
Introducing Ethical Hacking to the Ministry of Defence.pdfIntroducing Ethical Hacking to the Ministry of Defence.pdf
Introducing Ethical Hacking to the Ministry of Defence.pdf
Association for Project Management
 

Ähnlich wie Virtual CSO (20)

Rothke secure360 building a security operations center (soc)
Rothke   secure360 building a security operations center (soc)Rothke   secure360 building a security operations center (soc)
Rothke secure360 building a security operations center (soc)
 
Ivanti Webinar - How to Win Budget and Influence Non-InfoSec Stakeholders
Ivanti Webinar - How to Win Budget and Influence Non-InfoSec StakeholdersIvanti Webinar - How to Win Budget and Influence Non-InfoSec Stakeholders
Ivanti Webinar - How to Win Budget and Influence Non-InfoSec Stakeholders
 
How to Raise Cyber Risk Awareness and Management to the C-Suite
How to Raise Cyber Risk Awareness and Management to the C-SuiteHow to Raise Cyber Risk Awareness and Management to the C-Suite
How to Raise Cyber Risk Awareness and Management to the C-Suite
 
Looking Forward: What to Expect With PCI 4.0
Looking Forward: What to Expect With PCI 4.0Looking Forward: What to Expect With PCI 4.0
Looking Forward: What to Expect With PCI 4.0
 
How to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackHow to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT Stack
 
How to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackHow to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT Stack
 
Scot Secure 2019 Edinburgh (Day 2)
Scot Secure 2019 Edinburgh (Day 2)Scot Secure 2019 Edinburgh (Day 2)
Scot Secure 2019 Edinburgh (Day 2)
 
Executive Perspective Building an OT Security Program from the Top Down
Executive Perspective Building an OT Security Program from the Top DownExecutive Perspective Building an OT Security Program from the Top Down
Executive Perspective Building an OT Security Program from the Top Down
 
Cynergies One Page Overview
Cynergies One Page OverviewCynergies One Page Overview
Cynergies One Page Overview
 
How to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackHow to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT Stack
 
Adaptive & Unified Approach to Risk Management & Compliance-via-ccf
Adaptive & Unified Approach to Risk Management & Compliance-via-ccfAdaptive & Unified Approach to Risk Management & Compliance-via-ccf
Adaptive & Unified Approach to Risk Management & Compliance-via-ccf
 
Zero Trust and Data Security
Zero Trust and Data SecurityZero Trust and Data Security
Zero Trust and Data Security
 
Operation: Next Summit Takeaways
Operation: Next Summit TakeawaysOperation: Next Summit Takeaways
Operation: Next Summit Takeaways
 
Information Security - Back to Basics - Own Your Vulnerabilities
Information Security - Back to Basics - Own Your VulnerabilitiesInformation Security - Back to Basics - Own Your Vulnerabilities
Information Security - Back to Basics - Own Your Vulnerabilities
 
Security of the future - Adapting Approaches to What We Need
Security of the future - Adapting Approaches to What We NeedSecurity of the future - Adapting Approaches to What We Need
Security of the future - Adapting Approaches to What We Need
 
How to measure your cybersecurity performance
How to measure your cybersecurity performanceHow to measure your cybersecurity performance
How to measure your cybersecurity performance
 
Introducing Ethical Hacking to the Ministry of Defence.pdf
Introducing Ethical Hacking to the Ministry of Defence.pdfIntroducing Ethical Hacking to the Ministry of Defence.pdf
Introducing Ethical Hacking to the Ministry of Defence.pdf
 
New technologies - Amer Haza'a
New technologies - Amer Haza'aNew technologies - Amer Haza'a
New technologies - Amer Haza'a
 
Why physical security just isn’t enough, Sending the heavies into virtualized...
Why physical security just isn’t enough, Sending the heavies into virtualized...Why physical security just isn’t enough, Sending the heavies into virtualized...
Why physical security just isn’t enough, Sending the heavies into virtualized...
 
What Goes Into Onboarding New Cybersecurity Vendors
What Goes Into Onboarding New Cybersecurity VendorsWhat Goes Into Onboarding New Cybersecurity Vendors
What Goes Into Onboarding New Cybersecurity Vendors
 

Mehr von syrinxtech

Mehr von syrinxtech (10)

Security In an IoT World
Security In an IoT WorldSecurity In an IoT World
Security In an IoT World
 
Low Hanging Fruit from Penetration Testing
Low Hanging Fruit from Penetration TestingLow Hanging Fruit from Penetration Testing
Low Hanging Fruit from Penetration Testing
 
Infrastructure Auditing
Infrastructure AuditingInfrastructure Auditing
Infrastructure Auditing
 
Remote Access Security
Remote Access SecurityRemote Access Security
Remote Access Security
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 
Virtualization Security
Virtualization SecurityVirtualization Security
Virtualization Security
 
Focus Your Business
Focus Your BusinessFocus Your Business
Focus Your Business
 
Penetration Testing as an auditing tool
Penetration Testing as an auditing toolPenetration Testing as an auditing tool
Penetration Testing as an auditing tool
 
PCI Compliance - What does it mean to me?
PCI Compliance - What does it mean to me?PCI Compliance - What does it mean to me?
PCI Compliance - What does it mean to me?
 
Web Database Server Best Practices
Web Database Server Best PracticesWeb Database Server Best Practices
Web Database Server Best Practices
 

Virtual CSO

  • 1. Virtual CSO What You Need, When You Need It Bryan Miller Syrinx Technologies bryan@syrinxtech.com www.syrinxtech.com 804-539-9154
  • 2. Virtual CSO Agenda  Security Roadblocks  Business Benefits  Technical Benefits  Summary  Next Steps  Q&A 2
  • 3. Virtual CSO Security Roadblocks  Cost  Perception of high cost of security  Work overload – “I have enough to do already”  Policy  Implementation becomes an afterthought  Lack of support for policy enforcement 3
  • 4. Virtual CSO Security Roadblocks  Risk vs. Reward  False Sense of Security  We’ve never been hacked  Who would want what we have  We’re too small to be a target  Security becomes a “nice to have”  Security often seen as a cost, not a savings  Security delays implementation 4
  • 5. Virtual CSO Business Benefits  No payroll taxes or benefit costs  No training costs  Flexibility - each client chooses a customized solution to fit their budget 5
  • 6. Virtual CSO Technical Benefits  Initial Policy and Procedure Development/Review  Annual Updates  Initial Internal and External Penetration Testing  Develop a Baseline  Follow-up Penetration Testing  Annual External and Internal Testing 6
  • 7. Virtual CSO Technical Benefits  Options  Monthly Block Time  Security Awareness Training Program Development  Incident Response Program Development  Compliance Program Consulting  HIPAA, PCI, NCUA 7
  • 8. Virtual CSO Technical Benefits  Options  Developing/Updating Infrastructure Documentation  Customized Vulnerability Notifications  Server Hardening Best Practices  Disaster Recovery (DR) and Business Continuity Plan (BCP) Development 8
  • 9. Virtual CSO Summary The CSO position is necessary but often unfunded. Outsourcing provides a reasonable return on investment. Syrinx Technologies can provide the required services at reduced costs. 9
  • 10. Virtual CSO Next Steps  Decide if this is right for your organization  Assess your current security posture  Compute the ROI  Develop an action plan  Work with Syrinx Technologies to choose your options and develop a roadmap  Implement the plan  Yearly program review and tuning 10
  • 11. Virtual CSO Q&A  How is this program priced?  Once the client chooses their desired options, a yearly proposal will be provided.  Are there any minimum or maximum service periods?  The client may cancel at any time with 30 days written notice.  How often am I billed?  Syrinx Technologies will bill the client monthly.  Are Service Level Agreements (SLA) available?  Yes, specific SLAs can be written into the service agreement. 11