SlideShare ist ein Scribd-Unternehmen logo
1 von 26
BY DESIGN, NOT BY CHANCE
CISO’S FIRST 100 DAYS
Michael A. Sadeghi, Ph.D. ABD, CISSP
AN IMPORTANT GOAL FOR TODAY’S
PRESENTATION
WHAT WE COVER TODAY
• Some Infosec facts and statistics
• Key questions for Senior leadership
• Defining the “CISO” terminology
• 360 deg. View of the role
• First 100 days roadmap
• Final thoughts
SOME STATISTICS (2018 VERIZON AND WTO REPORTS)
• The cost of cyber intrusion damage is estimated to be about a Trillion
dollars/Yr and increasing. As a comparison, the cost of all natural
disasters in 2017 was $300 Billion
• Economic cost of a major cloud provider taken down is about $50-120
Billion
• Equivalent to the Sandy to Katrina hurricane damages!!!
• In 87% of cases, attackers are able to compromise an organization within
minuets. 68% go undiscovered for months or more!
• 75% of attacks spread from Victim 0 to Victim 1 within 24 hours
• Organized Cybercriminals were behind 50% of all the breaches
• You have 16 min until the first click on the phishing campaign
• Insider attacks are particularly difficult to defend against
KEY QUESTIONS TO ASK
• How can you detect a compromise?
• How do you judge the severity of the compromise?
• What is the impact of the compromise to your organization?
• Who is responsible for detecting and reacting to the compromise?
• Who should be informed or involved, and when do you deal with a
compromise when its detected?
• How and when should you communicate a compromise internally or
externally? (Note, sometimes engaging authorities is required by law.)
BROAD STROKES
• Good news
• Most typical threat vectors are well understood and are defended
against!
• Rising tide has raised the average IT and information security
implementation
• Bad news
• If you are a targeted industry, the attack vectors are much more extreme
and hard to defend against!
• DoD and Intel, Research and development organizations, HHS, FDA, Medical,
etc.
• Its not a question of IF but WHEN a major breach will occur.
DEFINING THE CISO TERMINOLOGY
• Traditional vs. Other/Alternative?
• Difference is in sufficient responsibility and authority
• Wikipedia definition – Key takeaways
• Senior level executive, Responsible for enterprise vision, strategy and
program, to insure information assets and technologies are adequately
protected.
• Typically CISO’s influence reaches the entire organization
• Responds to Incidents, Establish standards, Manage security technologies,
and Direct implementation of policies and procedures
CISO CAN COME IN DIFFERENT “FLAVORS”
Traditional
• Most senior manager specifically dedicated to InfoSec
• Is no more than two steps away from the CEO
• Has a staff of SMEs covering each of the areas of the responsibility
• Alternative/Other
• Scope may be limited to a division, business unit or geography
• May be a collateral duty
• May be buried deeper in the hierarchy
• Key question – Is this a Traditional or Alternative role
360 VIEW OF THE ROLE AND RECOMMENDATIONS
Effectiveness starts with understanding
THE FIRST 100 DAYS
ROADMAP OF THE FIRST 100 DAYS
Days
Communicate
Measure
Act
Plan
Assess
Prepare
-10 0 15 30 45 60 75 90-
100
Days
Communicate
Measure
Act
Plan
Assess
Prepare
-10 0 15 30 45 60 75
“Lets do lunch”
PREPARE
• Learn about responsibilities within the constraints of the culture of the
company
• Draft communications to make a great impression on day 1
• Set up meetings with your team and key business, IT leaders and
auditors.
• Use lunch as a relationship building opportunity
• Learn about colleagues and staff
• Colleagues – Be prepared to mend fences and reset expectations
• Assess staff - Any skill deficiencies, any attitude issues?
ASSESS
Gain comprehensive insight
• Commitment of the leadership to the security effort – involved vs
committed
• In a Ham and Egg breakfast, Egg is involved and Pig is committed 
• Compile a list of the stakeholders and involvement – Maybe a long list
• Cybersecurity Posture
• Identify the business and IT goals
• Identify people, metrics, technology and financial parameters
• Which security initiatives have been implemented in the last few years?
• Has organization experienced any cyberattack or date breaches? What was the
Days
Communicate
Measure
Act
Plan
Assess
Prepare
-10 0 15 30 45 60 75
EXECUTIVE SPONSORSHIP
Do a quick determination of commitment of
executives:
• Committed or Involved ?
• Investment in resources ?
• Willingness to hold people responsible ?
• Direction will be guided by the answer
Education Execution
ASSESSMENT METHODOLOGY
NIST CYBERSECURITY FRAMEWORK
EVALUATION VS. EXPECTATION EXAMPLE
0 1 2 3 4 5 6
Identify
Protect
Detect
Respond
Recover
PLAN
Will define a blueprint for action
• Is leadership involved or committed – Plan action accordingly
• Will define security strategy
• Mission statement
• Strategic goals
• Scope
• Model of operation – Physical, virtual, or hybrid?
• Services – Responsible for the entire network or subset of the network,
specify the details
• Roadmap
• Key performance indicators (KPI) and metrics
• Plan the budget for the next 2-3 months
Days
Communicate
Measure
Act
Plan
Assess
Prepare
-10 0 15 30 45 60 75
NIST CYBERSECURITY FRAMEWORK
ACT
• Ensure senior management is commitment to the security charter
• Redefine/hire team as necessary
• Get involved in existing projects
• Help Design – Physical, Virtual or Hybrid solution?
• Technology selection is a major part of current and future SOC state
• How SOC will collect data – Centralized Security Information and Event
Management (SIEM) Tool
• Set budgets
• Establish/re-establish security governance processes and forums
Days
Communicate
Measure
Act
Plan
Assess
Prepare
-10 0 15 30 45 60 75
EXAMPLE OF MATURE SOC W. LAYERED SECURITY, NETWORK
SEGMENTATION, AND MONITORING TECHOLOGIES
INTERNAL SOC
ADVANTAGES DISADVANTAGES
• Dedicated staff • Larger up-front investments
• Known environment, better than third
party
• Higher pressure to show ROI quickly
• Solutions are generally easier to
customize
• Higher potential for collusion between
analyst and attacker
• Potential to be most effective • Less likely to recognize large-scale,
subtle patterns that include multiple
groups
• Most likely to notice correlations
between internal groups
• Can be hard to find competent SOC
analyst
• Logs stored locally
OUTSOURCED SOC
ADVANTAGES DISADVANTAGES
• Avoid capital expenses – It’s their
hardware and software
• Contractors will never know your
environment like internal employees
• Exposure to multiple customers in
similar industry segments
• Sending jobs outside the organization
can lower morale
• Often cheaper than inhouse • Lack of dedicated staff to a single client
• Less potential for collusion between
monitoring team and attacker
• Lack of capital retention
• Good security people are often difficult
to find
• Risk of external data mishandling
• Unbiased • Log data not always archived
• Potential to be very scalable & flexible • Log data stored off-premises
• Expertise in monitoring and SIEM tools • Lack of customization
• SLA
TECHNOLOGIES TO ADDRESS DIFFERENT
ASPECTS OF THE ATTACK CONTINUUM
MEASURE
• Start providing evidence of impact and reports
• Develop an executive reporting framework and
process
• Monitor program and project progress
• Highlight early wins and challenges
Days
Communicate
Measure
Act
Plan
Assess
Prepare
-10 0 15 30 45 60 75 9
1
0
FINAL THOUGHTS
Strategic
Effective
Relationshi
Technical
Catalyst for
Risk
Leadership
& Vision
THANK YOU!
References:
• Verizon 2018 Data Breach Investigation Report
• 2018 WTO Global Risk Report
• CISCO’s building and operating a successful SOC report
• Gartner’s roadmap for CISOs to succeed
• Co3Systems, Bill Campbell CISO your first 90 days report
Michael A. Sadeghi, Ph.D. ABD. CISSP. |
msadeghi@edgeworktech.com

Weitere ähnliche Inhalte

Was ist angesagt?

Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Edureka!
 
How To Present Cyber Security To Senior Management Complete Deck
How To Present Cyber Security To Senior Management Complete DeckHow To Present Cyber Security To Senior Management Complete Deck
How To Present Cyber Security To Senior Management Complete DeckSlideTeam
 
Rothke secure360 building a security operations center (soc)
Rothke   secure360 building a security operations center (soc)Rothke   secure360 building a security operations center (soc)
Rothke secure360 building a security operations center (soc)Ben Rothke
 
Does Anyone Remember Enterprise Security Architecture?
Does Anyone Remember Enterprise Security Architecture?Does Anyone Remember Enterprise Security Architecture?
Does Anyone Remember Enterprise Security Architecture?rbrockway
 
Building Security Operation Center
Building Security Operation CenterBuilding Security Operation Center
Building Security Operation CenterS.E. CTS CERT-GOV-MD
 
Rothke rsa 2012 building a security operations center (soc)
Rothke rsa 2012  building a security operations center (soc)Rothke rsa 2012  building a security operations center (soc)
Rothke rsa 2012 building a security operations center (soc)Ben Rothke
 
WHY SOC Services needed?
WHY SOC Services needed?WHY SOC Services needed?
WHY SOC Services needed?manoharparakh
 
Iso27001 Risk Assessment Approach
Iso27001   Risk Assessment ApproachIso27001   Risk Assessment Approach
Iso27001 Risk Assessment Approachtschraider
 
Cyber Defense Matrix: Reloaded
Cyber Defense Matrix: ReloadedCyber Defense Matrix: Reloaded
Cyber Defense Matrix: ReloadedSounil Yu
 
Strategy considerations for building a security operations center
Strategy considerations for building a security operations centerStrategy considerations for building a security operations center
Strategy considerations for building a security operations centerCMR WORLD TECH
 
The Measure of Success: Security Metrics to Tell Your Story
The Measure of Success: Security Metrics to Tell Your StoryThe Measure of Success: Security Metrics to Tell Your Story
The Measure of Success: Security Metrics to Tell Your StoryPriyanka Aash
 
Next-Gen security operation center
Next-Gen security operation centerNext-Gen security operation center
Next-Gen security operation centerMuhammad Sahputra
 
An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)Ahmad Haghighi
 
Iso27001 The Road To Certification
Iso27001   The Road To CertificationIso27001   The Road To Certification
Iso27001 The Road To Certificationtschraider
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Stephen Cobb
 
The information security audit
The information security auditThe information security audit
The information security auditDhani Ahmad
 
NIST Risk Management Framework (RMF)
NIST Risk Management Framework (RMF)NIST Risk Management Framework (RMF)
NIST Risk Management Framework (RMF)James W. De Rienzo
 
From SIEM to SOC: Crossing the Cybersecurity Chasm
From SIEM to SOC: Crossing the Cybersecurity ChasmFrom SIEM to SOC: Crossing the Cybersecurity Chasm
From SIEM to SOC: Crossing the Cybersecurity ChasmPriyanka Aash
 
Enterprise Cybersecurity: From Strategy to Operating Model
Enterprise Cybersecurity: From Strategy to Operating ModelEnterprise Cybersecurity: From Strategy to Operating Model
Enterprise Cybersecurity: From Strategy to Operating ModelEryk Budi Pratama
 

Was ist angesagt? (20)

Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
 
How To Present Cyber Security To Senior Management Complete Deck
How To Present Cyber Security To Senior Management Complete DeckHow To Present Cyber Security To Senior Management Complete Deck
How To Present Cyber Security To Senior Management Complete Deck
 
Rothke secure360 building a security operations center (soc)
Rothke   secure360 building a security operations center (soc)Rothke   secure360 building a security operations center (soc)
Rothke secure360 building a security operations center (soc)
 
Does Anyone Remember Enterprise Security Architecture?
Does Anyone Remember Enterprise Security Architecture?Does Anyone Remember Enterprise Security Architecture?
Does Anyone Remember Enterprise Security Architecture?
 
Building Security Operation Center
Building Security Operation CenterBuilding Security Operation Center
Building Security Operation Center
 
Rothke rsa 2012 building a security operations center (soc)
Rothke rsa 2012  building a security operations center (soc)Rothke rsa 2012  building a security operations center (soc)
Rothke rsa 2012 building a security operations center (soc)
 
WHY SOC Services needed?
WHY SOC Services needed?WHY SOC Services needed?
WHY SOC Services needed?
 
Iso27001 Risk Assessment Approach
Iso27001   Risk Assessment ApproachIso27001   Risk Assessment Approach
Iso27001 Risk Assessment Approach
 
Cyber Defense Matrix: Reloaded
Cyber Defense Matrix: ReloadedCyber Defense Matrix: Reloaded
Cyber Defense Matrix: Reloaded
 
Strategy considerations for building a security operations center
Strategy considerations for building a security operations centerStrategy considerations for building a security operations center
Strategy considerations for building a security operations center
 
The Measure of Success: Security Metrics to Tell Your Story
The Measure of Success: Security Metrics to Tell Your StoryThe Measure of Success: Security Metrics to Tell Your Story
The Measure of Success: Security Metrics to Tell Your Story
 
Next-Gen security operation center
Next-Gen security operation centerNext-Gen security operation center
Next-Gen security operation center
 
An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)
 
Iso27001 The Road To Certification
Iso27001   The Road To CertificationIso27001   The Road To Certification
Iso27001 The Road To Certification
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
 
The information security audit
The information security auditThe information security audit
The information security audit
 
NIST Risk Management Framework (RMF)
NIST Risk Management Framework (RMF)NIST Risk Management Framework (RMF)
NIST Risk Management Framework (RMF)
 
From SIEM to SOC: Crossing the Cybersecurity Chasm
From SIEM to SOC: Crossing the Cybersecurity ChasmFrom SIEM to SOC: Crossing the Cybersecurity Chasm
From SIEM to SOC: Crossing the Cybersecurity Chasm
 
IT Risk Management
IT Risk ManagementIT Risk Management
IT Risk Management
 
Enterprise Cybersecurity: From Strategy to Operating Model
Enterprise Cybersecurity: From Strategy to Operating ModelEnterprise Cybersecurity: From Strategy to Operating Model
Enterprise Cybersecurity: From Strategy to Operating Model
 

Ähnlich wie CISO's First 100 Days Roadmap

SAL-DR-01-ELC 10 Understanding the SOC Audience.pptx
SAL-DR-01-ELC 10 Understanding the SOC Audience.pptxSAL-DR-01-ELC 10 Understanding the SOC Audience.pptx
SAL-DR-01-ELC 10 Understanding the SOC Audience.pptxhforhassan101
 
How to Mitigate Risk From Your Expanding Digital Presence
How to Mitigate Risk From Your Expanding Digital PresenceHow to Mitigate Risk From Your Expanding Digital Presence
How to Mitigate Risk From Your Expanding Digital PresenceSurfWatch Labs
 
Getting Started with Business Continuity
Getting Started with Business ContinuityGetting Started with Business Continuity
Getting Started with Business ContinuityStephen Cobb
 
Building an effective Information Security Roadmap
Building an effective Information Security RoadmapBuilding an effective Information Security Roadmap
Building an effective Information Security RoadmapElliott Franklin
 
Your cyber security webinar
Your cyber security webinarYour cyber security webinar
Your cyber security webinarIntergen
 
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...EC-Council
 
Cybersecurity-Real World Approach FINAL 2-24-16
Cybersecurity-Real World Approach FINAL 2-24-16Cybersecurity-Real World Approach FINAL 2-24-16
Cybersecurity-Real World Approach FINAL 2-24-16James Rutt
 
How to Boost your Cyber Risk Management Program and Capabilities?
How to Boost your Cyber Risk Management Program and Capabilities?How to Boost your Cyber Risk Management Program and Capabilities?
How to Boost your Cyber Risk Management Program and Capabilities?PECB
 
Security Program Guidance and Establishing a Culture of Security
Security Program Guidance and Establishing a Culture of SecuritySecurity Program Guidance and Establishing a Culture of Security
Security Program Guidance and Establishing a Culture of SecurityDoug Copley
 
3 focus areas for any organisation's IT & Security department
3 focus areas for any organisation's IT & Security department 3 focus areas for any organisation's IT & Security department
3 focus areas for any organisation's IT & Security department Sandeep S Jaryal
 
Your cyber security webinar
Your cyber security webinarYour cyber security webinar
Your cyber security webinarEmpired
 
Best practices to mitigate data breach risk
Best practices to mitigate data breach riskBest practices to mitigate data breach risk
Best practices to mitigate data breach riskLivingstone Advisory
 
Bob West - Educating the Board of Directors
Bob West - Educating the Board of DirectorsBob West - Educating the Board of Directors
Bob West - Educating the Board of Directorscentralohioissa
 
44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins
44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins
44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins44CON
 
Cybersecurity Frameworks and You: The Perfect Match
Cybersecurity Frameworks and You: The Perfect MatchCybersecurity Frameworks and You: The Perfect Match
Cybersecurity Frameworks and You: The Perfect MatchMcKonly & Asbury, LLP
 
Cybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your OrganizationCybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your OrganizationMcKonly & Asbury, LLP
 
The 5 ws of Cyber Security
The 5 ws of Cyber SecurityThe 5 ws of Cyber Security
The 5 ws of Cyber SecurityMisha Hanin
 
Risk Management Approach to Cyber Security
Risk Management  Approach to Cyber Security Risk Management  Approach to Cyber Security
Risk Management Approach to Cyber Security Ernest Staats
 
SLVA - Security monitoring and reporting itweb workshop
SLVA - Security monitoring and reporting   itweb workshopSLVA - Security monitoring and reporting   itweb workshop
SLVA - Security monitoring and reporting itweb workshopSLVA Information Security
 

Ähnlich wie CISO's First 100 Days Roadmap (20)

SAL-DR-01-ELC 10 Understanding the SOC Audience.pptx
SAL-DR-01-ELC 10 Understanding the SOC Audience.pptxSAL-DR-01-ELC 10 Understanding the SOC Audience.pptx
SAL-DR-01-ELC 10 Understanding the SOC Audience.pptx
 
How to Mitigate Risk From Your Expanding Digital Presence
How to Mitigate Risk From Your Expanding Digital PresenceHow to Mitigate Risk From Your Expanding Digital Presence
How to Mitigate Risk From Your Expanding Digital Presence
 
Getting Started with Business Continuity
Getting Started with Business ContinuityGetting Started with Business Continuity
Getting Started with Business Continuity
 
Building an effective Information Security Roadmap
Building an effective Information Security RoadmapBuilding an effective Information Security Roadmap
Building an effective Information Security Roadmap
 
Your cyber security webinar
Your cyber security webinarYour cyber security webinar
Your cyber security webinar
 
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
 
Cybersecurity-Real World Approach FINAL 2-24-16
Cybersecurity-Real World Approach FINAL 2-24-16Cybersecurity-Real World Approach FINAL 2-24-16
Cybersecurity-Real World Approach FINAL 2-24-16
 
How to Boost your Cyber Risk Management Program and Capabilities?
How to Boost your Cyber Risk Management Program and Capabilities?How to Boost your Cyber Risk Management Program and Capabilities?
How to Boost your Cyber Risk Management Program and Capabilities?
 
Security Program Guidance and Establishing a Culture of Security
Security Program Guidance and Establishing a Culture of SecuritySecurity Program Guidance and Establishing a Culture of Security
Security Program Guidance and Establishing a Culture of Security
 
3 focus areas for any organisation's IT & Security department
3 focus areas for any organisation's IT & Security department 3 focus areas for any organisation's IT & Security department
3 focus areas for any organisation's IT & Security department
 
Your cyber security webinar
Your cyber security webinarYour cyber security webinar
Your cyber security webinar
 
Best practices to mitigate data breach risk
Best practices to mitigate data breach riskBest practices to mitigate data breach risk
Best practices to mitigate data breach risk
 
Bob West - Educating the Board of Directors
Bob West - Educating the Board of DirectorsBob West - Educating the Board of Directors
Bob West - Educating the Board of Directors
 
Security Analytics Beyond Cyber
Security Analytics Beyond CyberSecurity Analytics Beyond Cyber
Security Analytics Beyond Cyber
 
44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins
44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins
44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins
 
Cybersecurity Frameworks and You: The Perfect Match
Cybersecurity Frameworks and You: The Perfect MatchCybersecurity Frameworks and You: The Perfect Match
Cybersecurity Frameworks and You: The Perfect Match
 
Cybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your OrganizationCybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your Organization
 
The 5 ws of Cyber Security
The 5 ws of Cyber SecurityThe 5 ws of Cyber Security
The 5 ws of Cyber Security
 
Risk Management Approach to Cyber Security
Risk Management  Approach to Cyber Security Risk Management  Approach to Cyber Security
Risk Management Approach to Cyber Security
 
SLVA - Security monitoring and reporting itweb workshop
SLVA - Security monitoring and reporting   itweb workshopSLVA - Security monitoring and reporting   itweb workshop
SLVA - Security monitoring and reporting itweb workshop
 

Kürzlich hochgeladen

Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Paul Calvano
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一Fs
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa494f574xmv
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)Christopher H Felton
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Dana Luther
 
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Lucknow
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书zdzoqco
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一z xss
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMartaLoveguard
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Excelmac1
 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Sonam Pathan
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一Fs
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Sonam Pathan
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITMgdsc13
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxDyna Gilbert
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一Fs
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 

Kürzlich hochgeladen (20)

Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
 
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
 
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptx
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...
 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170
 
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITM
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptx
 
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
 

CISO's First 100 Days Roadmap

  • 1. BY DESIGN, NOT BY CHANCE CISO’S FIRST 100 DAYS Michael A. Sadeghi, Ph.D. ABD, CISSP
  • 2. AN IMPORTANT GOAL FOR TODAY’S PRESENTATION
  • 3. WHAT WE COVER TODAY • Some Infosec facts and statistics • Key questions for Senior leadership • Defining the “CISO” terminology • 360 deg. View of the role • First 100 days roadmap • Final thoughts
  • 4. SOME STATISTICS (2018 VERIZON AND WTO REPORTS) • The cost of cyber intrusion damage is estimated to be about a Trillion dollars/Yr and increasing. As a comparison, the cost of all natural disasters in 2017 was $300 Billion • Economic cost of a major cloud provider taken down is about $50-120 Billion • Equivalent to the Sandy to Katrina hurricane damages!!! • In 87% of cases, attackers are able to compromise an organization within minuets. 68% go undiscovered for months or more! • 75% of attacks spread from Victim 0 to Victim 1 within 24 hours • Organized Cybercriminals were behind 50% of all the breaches • You have 16 min until the first click on the phishing campaign • Insider attacks are particularly difficult to defend against
  • 5. KEY QUESTIONS TO ASK • How can you detect a compromise? • How do you judge the severity of the compromise? • What is the impact of the compromise to your organization? • Who is responsible for detecting and reacting to the compromise? • Who should be informed or involved, and when do you deal with a compromise when its detected? • How and when should you communicate a compromise internally or externally? (Note, sometimes engaging authorities is required by law.)
  • 6. BROAD STROKES • Good news • Most typical threat vectors are well understood and are defended against! • Rising tide has raised the average IT and information security implementation • Bad news • If you are a targeted industry, the attack vectors are much more extreme and hard to defend against! • DoD and Intel, Research and development organizations, HHS, FDA, Medical, etc. • Its not a question of IF but WHEN a major breach will occur.
  • 7. DEFINING THE CISO TERMINOLOGY • Traditional vs. Other/Alternative? • Difference is in sufficient responsibility and authority • Wikipedia definition – Key takeaways • Senior level executive, Responsible for enterprise vision, strategy and program, to insure information assets and technologies are adequately protected. • Typically CISO’s influence reaches the entire organization • Responds to Incidents, Establish standards, Manage security technologies, and Direct implementation of policies and procedures
  • 8. CISO CAN COME IN DIFFERENT “FLAVORS” Traditional • Most senior manager specifically dedicated to InfoSec • Is no more than two steps away from the CEO • Has a staff of SMEs covering each of the areas of the responsibility • Alternative/Other • Scope may be limited to a division, business unit or geography • May be a collateral duty • May be buried deeper in the hierarchy • Key question – Is this a Traditional or Alternative role
  • 9. 360 VIEW OF THE ROLE AND RECOMMENDATIONS Effectiveness starts with understanding
  • 11. ROADMAP OF THE FIRST 100 DAYS Days Communicate Measure Act Plan Assess Prepare -10 0 15 30 45 60 75 90- 100
  • 12. Days Communicate Measure Act Plan Assess Prepare -10 0 15 30 45 60 75 “Lets do lunch” PREPARE • Learn about responsibilities within the constraints of the culture of the company • Draft communications to make a great impression on day 1 • Set up meetings with your team and key business, IT leaders and auditors. • Use lunch as a relationship building opportunity • Learn about colleagues and staff • Colleagues – Be prepared to mend fences and reset expectations • Assess staff - Any skill deficiencies, any attitude issues?
  • 13. ASSESS Gain comprehensive insight • Commitment of the leadership to the security effort – involved vs committed • In a Ham and Egg breakfast, Egg is involved and Pig is committed  • Compile a list of the stakeholders and involvement – Maybe a long list • Cybersecurity Posture • Identify the business and IT goals • Identify people, metrics, technology and financial parameters • Which security initiatives have been implemented in the last few years? • Has organization experienced any cyberattack or date breaches? What was the Days Communicate Measure Act Plan Assess Prepare -10 0 15 30 45 60 75
  • 14. EXECUTIVE SPONSORSHIP Do a quick determination of commitment of executives: • Committed or Involved ? • Investment in resources ? • Willingness to hold people responsible ? • Direction will be guided by the answer Education Execution
  • 16. NIST CYBERSECURITY FRAMEWORK EVALUATION VS. EXPECTATION EXAMPLE 0 1 2 3 4 5 6 Identify Protect Detect Respond Recover
  • 17. PLAN Will define a blueprint for action • Is leadership involved or committed – Plan action accordingly • Will define security strategy • Mission statement • Strategic goals • Scope • Model of operation – Physical, virtual, or hybrid? • Services – Responsible for the entire network or subset of the network, specify the details • Roadmap • Key performance indicators (KPI) and metrics • Plan the budget for the next 2-3 months Days Communicate Measure Act Plan Assess Prepare -10 0 15 30 45 60 75
  • 19. ACT • Ensure senior management is commitment to the security charter • Redefine/hire team as necessary • Get involved in existing projects • Help Design – Physical, Virtual or Hybrid solution? • Technology selection is a major part of current and future SOC state • How SOC will collect data – Centralized Security Information and Event Management (SIEM) Tool • Set budgets • Establish/re-establish security governance processes and forums Days Communicate Measure Act Plan Assess Prepare -10 0 15 30 45 60 75
  • 20. EXAMPLE OF MATURE SOC W. LAYERED SECURITY, NETWORK SEGMENTATION, AND MONITORING TECHOLOGIES
  • 21. INTERNAL SOC ADVANTAGES DISADVANTAGES • Dedicated staff • Larger up-front investments • Known environment, better than third party • Higher pressure to show ROI quickly • Solutions are generally easier to customize • Higher potential for collusion between analyst and attacker • Potential to be most effective • Less likely to recognize large-scale, subtle patterns that include multiple groups • Most likely to notice correlations between internal groups • Can be hard to find competent SOC analyst • Logs stored locally
  • 22. OUTSOURCED SOC ADVANTAGES DISADVANTAGES • Avoid capital expenses – It’s their hardware and software • Contractors will never know your environment like internal employees • Exposure to multiple customers in similar industry segments • Sending jobs outside the organization can lower morale • Often cheaper than inhouse • Lack of dedicated staff to a single client • Less potential for collusion between monitoring team and attacker • Lack of capital retention • Good security people are often difficult to find • Risk of external data mishandling • Unbiased • Log data not always archived • Potential to be very scalable & flexible • Log data stored off-premises • Expertise in monitoring and SIEM tools • Lack of customization • SLA
  • 23. TECHNOLOGIES TO ADDRESS DIFFERENT ASPECTS OF THE ATTACK CONTINUUM
  • 24. MEASURE • Start providing evidence of impact and reports • Develop an executive reporting framework and process • Monitor program and project progress • Highlight early wins and challenges Days Communicate Measure Act Plan Assess Prepare -10 0 15 30 45 60 75 9 1 0
  • 26. THANK YOU! References: • Verizon 2018 Data Breach Investigation Report • 2018 WTO Global Risk Report • CISCO’s building and operating a successful SOC report • Gartner’s roadmap for CISOs to succeed • Co3Systems, Bill Campbell CISO your first 90 days report Michael A. Sadeghi, Ph.D. ABD. CISSP. | msadeghi@edgeworktech.com

Hinweis der Redaktion

  1. Security defenses must expand across all areas of the network. If you don't provide the same level of security for the various parts of your network, the least-protected area will most likely be targeted by malicious parties for attack. Design areas included are securing the network edge, mobile devices, user desktops, branch offices, and the datacenter.