SlideShare ist ein Scribd-Unternehmen logo
1 von 32
SESSION ID:
#RSAC
Frank Kim
Ten Tenets of CISO Success
STR-W04
Founder
ThinkSec
@fykim
www.frankkim.net
#RSAC
#1 Catch the Culture
# R S A C
Organizational Culture
3
“Culture eats strategy for breakfast.”
- Peter Drucker
#RSAC
#2 Relate to Risk
# R S A C
Business Risk
5
First Website
1995 2000 2005 2010 2015
Mobile Devices
Global Network
Wireless Network
Mobile Payments
Cloud Computing
Big Data
First Mobile App
Internet of
Things
Basic Threats
Insider Threats
Partners
Organized Crime
Activists
Edward Snowden
Advanced Persistent Threats
Stuxnet
Nation States
“Year of the Breach…”
Technology
Threats
Sophistication
$1 Trillion
Cost of Cyber
crime
- World
Economic Forum
Graphic credit: Omar Khawaja
#RSAC
#3 Create Credibility
# R S A C
Creating Credibility
7
“A big part of being believable and
building our trust is showing us how we
compare to competitors, other industries,
some kind of standards or benchmarks.”
- Board Member
#RSAC
#4 Shape the Strategy
# R S A C
Identifying a Security Framework
9
Security frameworks provide a blueprint for
Building security programs
Managing risk
Communicating about security
Many frameworks share common security concepts
Common program frameworks include:
ISO 27000 Series
— 27001 – ISMS requirements
— 27002 – Code of practice
— 27003 – Implementation guidance
— 27004 – Measurement
• COBIT
• ENISA Evaluation Framework
• FFIEC Cybersecurity Assessment Tool
• NIST Cybersecurity Framework
# R S A C
NIST Cybersecurity Framework
10
Composed of three parts
Core, Implementation Tiers, Profiles
Defines a common language for managing
security risk
Core has five Functions that provide a high-level,
strategic view of the security life cycle
Helps organizations ask:
What are we doing today?
How are we doing?
Where do we want to go?
When do we want to get there?
Identify
Protect
Detect
Respond
Recover
# R S A C
Maturity Comparison Example
11
0 1 2 3 4 5
Recover
Respond
Detect
Protect
Identify
Current
state
Target state
Lagging Industry Leadin
g
#RSAC
#5 Deliver the Deal
# R S A C
Mapping to Strategic Objectives
Financial/Stewards
hip
Customer/Stakehol
der
Internal
Business
Process
Organizational
Capacity or
“Security
Capability”
Increased
profitability
Increased
revenue
Lower wait
times
Increase process
efficiency
Lower cycle
times
Improved knowledge
& skills
Improved tools
& technology
Business
innovation/new
product support
Improved
compliance &
regulatory
Improved
satisfaction
Improved availability
& resiliency
Lower costs
# R S A C
Provide Options
14
Highlight trade-offs with business value, risk reduction, cost
Option A
✔
$
Business value
Risk reduction
Cost
Option B
✔✔
$$
Option C
✔✔✔
$$$
#RSAC
#6 Invest in Individuals
# R S A C
Putting Leadership Into Perspective
Boss ✗ Manager ✔ Leader ✔
Drives people Manages things Coach, mentor, and grow people
Thinks short-term Thinks mid-term Thinks long-term
Focused on self Focused on process Focused on people
Instills fear Earns respect Generates enthusiasm
Says “I” Says “Our” Says “We”
Micromanages Delegates Motivates
Places blame on roadblocks Navigates roadblocks Removes roadblocks
Dictates how it’s done Shows how it’s done Influences how it’s done
Takes credit Shares credit Gives credit
Commands Asks Influences
Says “Go” Says “Let’s go” Says “Way to go”
# R S A C
Career Management – P.I.E.
17
Everyone should have a piece of the P.I.E.
Performance
Perform exceptionally well
Image
Cultivate the proper image
Exposure
Manage their exposure so the right people will know them
#RSAC
#7 Make Metrics Matter
# R S A C
Metrics Hiearchary
Strategic
Operational
Technical
Focus & actions increase as
you move up the pyramid
Volume of information
increases as you move
down the pyramid
Focus
Data
Implementation
Charts
& Graphs
Type
Measures
Focus
Analysis
& Trends
Implementation
Security
Dashboard
Type
Metrics
Focus
Strategic
Objectives
Implementation
Balanced
Scorecard
Type
KPIs
# R S A C
Balanced Scorecard Example
20
Financial/Stewardship Customer / Stakeholder Internal Business Process
Q4 % Product Development Budget Allocated to
Security
Q4 % of Products Delivered On Time and On
Budget
Q4 % of Developers Training in Secure Coding
Principles
Target 5% ✔
Trend 
• Increased support for legal as they piloted their
case management system
Target 95% ✔
Trend 
• 18% increase over Q3 in on-time and on budget
delivery. Security staffed temporary PMO team
to meet goal
Target 95% ✔
Trend 
• 100% of flagship application developers
completed training reducing overall risk to
organization
Q4 & YTD Security Budget Allocation Customer Satisfaction Q4 % of Developers Attaining Certification
Target 90% ✗
Trend 
• 8% increase over Q3 in customer satisfaction
rating of 4 or higher out of 5 possible
Target 95% ✗
Trend 
• Mitigation plan: Follow-up with developers after
training is complete for certification
5% 95% 97%
85% 42%
Q1 Q2 Q3 Q4
Products $575,000 $597,000 $425,000 $732,000
Services $1,590,000 $1,320,000 $1,190,000 $1,090,000
Training $326,000 $315,000 $427,000 $301,000
Actuals $2,491,000 $2,232,000 $2,042,000 $2,123,000
Budget $2,190,000 $2,211,900 $2,234,019 $2,256,359
$Variance -$301,000 -$20,100 $192,019 $133,359
YTD
# R S A C
Security Capability Example
21
Security Capability Status Trend Highlights
Identify: Manage risk to systems, assets, data, and
capabilities
Yellow 
• 32% increase in unauthorized devices
• 29% IT
• 3 % HR
• 27% increase in unauthorized software
• Attributed to Q4 BYOD pilot
Protect: Ensure delivery of critical infrastructure
services
Green 
• 12% of users failed sponsored email phishing tests
• 15% of employees have not passed security awareness
assessments
Detect: Identify occurrence of a cybersecurity event Green 
• 27% decrease in elevated access accounts
• 275 total elevated access accounts
Respond: Take action regarding a detected
cybersecurity event
Green 
• 5% of database systems with sensitive information have
not been scanned by vulnerability scanners
Recover: Maintain plans for resilience and to restore
any capabilities or services that were impaired due to
cybersecurity event
Red 
• 34% of systems not enabled with up to date anti-
malware
• Attributed to Q4 BYOD pilot
#RSAC
#8 Master Your Message
# R S A C
Effective Communications
23
“Security people don’t speak our
language.
In fact, at each briefing they seem to
speak
a different language.”
- Board Member
# R S A C
24
#RSAC
#9 Champion Change
# R S A C
Breaking Down the Walls
26
Agile
Break down walls between
development and the business
DevOps
Break down walls between
development and operations
SecDevOps
Break down walls between security
and development, operations,
business
# R S A C
Improve Effectiveness
27
#RSAC
#10 Solve Business Problems
# R S A C
Evolution of Security Leadership
IT SecurityIT Security
Old
Scho
ol
New
Scho
ol
Risk Management
Regulatory, Compliance,
Legal, Privacy
Business Savvy
Graphic credit: https://www.rsaconference.com/writable/presentations/file_upload/prof-m07-from-cave-man_to-business-man-the-evolution-of-the-ciso-to-ciro.pdf
Technology Focus
Business Focus
# R S A C
# R S A C
Ten Tenets of CISO Success
31
#1
#2
#3
#4
#5
#6
#7
#8
#9
#10
#RSAC
Frank Kim
@fykim
www.frankkim.net
Material based on SANS MGT514
Security Strategic Planning, Policy, and Leadership

Weitere ähnliche Inhalte

Was ist angesagt?

NIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewNIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An Overview
Tandhy Simanjuntak
 
Iso27001 Risk Assessment Approach
Iso27001   Risk Assessment ApproachIso27001   Risk Assessment Approach
Iso27001 Risk Assessment Approach
tschraider
 

Was ist angesagt? (20)

How to become a Cybersecurity Engineer? | Cybersecurity Salary | Cybersecurit...
How to become a Cybersecurity Engineer? | Cybersecurity Salary | Cybersecurit...How to become a Cybersecurity Engineer? | Cybersecurity Salary | Cybersecurit...
How to become a Cybersecurity Engineer? | Cybersecurity Salary | Cybersecurit...
 
Lessons Learned from the NIST CSF
Lessons Learned from the NIST CSFLessons Learned from the NIST CSF
Lessons Learned from the NIST CSF
 
Information Security Governance and Strategy - 3
Information Security Governance and Strategy - 3Information Security Governance and Strategy - 3
Information Security Governance and Strategy - 3
 
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
 
Nist cybersecurity framework isc2 quantico
Nist cybersecurity framework  isc2 quanticoNist cybersecurity framework  isc2 quantico
Nist cybersecurity framework isc2 quantico
 
Building an effective Information Security Roadmap
Building an effective Information Security RoadmapBuilding an effective Information Security Roadmap
Building an effective Information Security Roadmap
 
ISO 27001 2013 isms final overview
ISO 27001 2013 isms final overviewISO 27001 2013 isms final overview
ISO 27001 2013 isms final overview
 
Cyber Security Maturity Assessment
 Cyber Security Maturity Assessment Cyber Security Maturity Assessment
Cyber Security Maturity Assessment
 
NIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewNIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An Overview
 
Iso27001 Risk Assessment Approach
Iso27001   Risk Assessment ApproachIso27001   Risk Assessment Approach
Iso27001 Risk Assessment Approach
 
27001 awareness Training
27001 awareness Training27001 awareness Training
27001 awareness Training
 
Adaptive Enterprise Security Architecture
Adaptive Enterprise Security ArchitectureAdaptive Enterprise Security Architecture
Adaptive Enterprise Security Architecture
 
Iso 27001 isms presentation
Iso 27001 isms presentationIso 27001 isms presentation
Iso 27001 isms presentation
 
Journey to cyber resilience
Journey to cyber resilienceJourney to cyber resilience
Journey to cyber resilience
 
ISO 27001_2022 What has changed 2.0 for ISACA.pdf
ISO 27001_2022 What has changed 2.0 for ISACA.pdfISO 27001_2022 What has changed 2.0 for ISACA.pdf
ISO 27001_2022 What has changed 2.0 for ISACA.pdf
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
HITRUST 101: All the basics you need to know
HITRUST 101: All the basics you need to knowHITRUST 101: All the basics you need to know
HITRUST 101: All the basics you need to know
 
NIST Cybersecurity Framework (CSF) 2.0: What has changed?
NIST Cybersecurity Framework (CSF) 2.0: What has changed?NIST Cybersecurity Framework (CSF) 2.0: What has changed?
NIST Cybersecurity Framework (CSF) 2.0: What has changed?
 
Information Security Architecture: Building Security Into Your Organziation
Information Security Architecture: Building Security Into Your OrganziationInformation Security Architecture: Building Security Into Your Organziation
Information Security Architecture: Building Security Into Your Organziation
 
Enterprise Security Architecture for Cyber Security
Enterprise Security Architecture for Cyber SecurityEnterprise Security Architecture for Cyber Security
Enterprise Security Architecture for Cyber Security
 

Ähnlich wie Ten Tenets of CISO Success

Adaptive & Unified Approach to Risk Management & Compliance-via-ccf
Adaptive & Unified Approach to Risk Management & Compliance-via-ccfAdaptive & Unified Approach to Risk Management & Compliance-via-ccf
Adaptive & Unified Approach to Risk Management & Compliance-via-ccf
awish11
 
2023-it-roadmap-for-cybersecurity-techcnical
2023-it-roadmap-for-cybersecurity-techcnical2023-it-roadmap-for-cybersecurity-techcnical
2023-it-roadmap-for-cybersecurity-techcnical
Jack585826
 
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...
Taiye Lambo
 

Ähnlich wie Ten Tenets of CISO Success (20)

From Cave Man to Business Man, the Evolution of the CISO to CIRO
From Cave Man to Business Man, the Evolution of the CISO to CIROFrom Cave Man to Business Man, the Evolution of the CISO to CIRO
From Cave Man to Business Man, the Evolution of the CISO to CIRO
 
Insight into Security Leader Success Part 2
Insight into Security Leader Success Part 2Insight into Security Leader Success Part 2
Insight into Security Leader Success Part 2
 
Adaptive & Unified Approach to Risk Management & Compliance-via-ccf
Adaptive & Unified Approach to Risk Management & Compliance-via-ccfAdaptive & Unified Approach to Risk Management & Compliance-via-ccf
Adaptive & Unified Approach to Risk Management & Compliance-via-ccf
 
Deliver the ‘Right’ Customer Experience without Compromising Data Security
Deliver the ‘Right’ Customer Experience without Compromising Data SecurityDeliver the ‘Right’ Customer Experience without Compromising Data Security
Deliver the ‘Right’ Customer Experience without Compromising Data Security
 
Does title make a difference?
Does title make a difference?Does title make a difference?
Does title make a difference?
 
The Measure of Success: Security Metrics to Tell Your Story
The Measure of Success: Security Metrics to Tell Your StoryThe Measure of Success: Security Metrics to Tell Your Story
The Measure of Success: Security Metrics to Tell Your Story
 
The Measure of Success: Security Metrics to Tell Your Story
The Measure of Success: Security Metrics to Tell Your StoryThe Measure of Success: Security Metrics to Tell Your Story
The Measure of Success: Security Metrics to Tell Your Story
 
Top 5 secrets to successfully jumpstarting your cyber-risk program
Top 5 secrets to successfully jumpstarting your cyber-risk programTop 5 secrets to successfully jumpstarting your cyber-risk program
Top 5 secrets to successfully jumpstarting your cyber-risk program
 
Security of the future - Adapting Approaches to What We Need
Security of the future - Adapting Approaches to What We NeedSecurity of the future - Adapting Approaches to What We Need
Security of the future - Adapting Approaches to What We Need
 
2023-it-roadmap-for-cybersecurity-techcnical
2023-it-roadmap-for-cybersecurity-techcnical2023-it-roadmap-for-cybersecurity-techcnical
2023-it-roadmap-for-cybersecurity-techcnical
 
NUS-ISS Learning Day 2019-Architecting security in the digital age
NUS-ISS Learning Day 2019-Architecting security in the digital ageNUS-ISS Learning Day 2019-Architecting security in the digital age
NUS-ISS Learning Day 2019-Architecting security in the digital age
 
Cyber Defence - Service portfolio
Cyber Defence - Service portfolioCyber Defence - Service portfolio
Cyber Defence - Service portfolio
 
Business Value Measurements and the Solution Design Framework
Business Value Measurements and the Solution Design FrameworkBusiness Value Measurements and the Solution Design Framework
Business Value Measurements and the Solution Design Framework
 
Agile Capitalization For Greater Business Value
Agile Capitalization For Greater Business ValueAgile Capitalization For Greater Business Value
Agile Capitalization For Greater Business Value
 
Practical Implementation Tips For Implementing a Financial Planning - QueBIT ...
Practical Implementation Tips For Implementing a Financial Planning - QueBIT ...Practical Implementation Tips For Implementing a Financial Planning - QueBIT ...
Practical Implementation Tips For Implementing a Financial Planning - QueBIT ...
 
New technologies - Amer Haza'a
New technologies - Amer Haza'aNew technologies - Amer Haza'a
New technologies - Amer Haza'a
 
Sept 2008 Presentation Quality & Project Management
Sept 2008 Presentation Quality & Project ManagementSept 2008 Presentation Quality & Project Management
Sept 2008 Presentation Quality & Project Management
 
2018 sans security awareness report
2018 sans security awareness report2018 sans security awareness report
2018 sans security awareness report
 
CRISC – Certified in Risk & Information Systems Control| Virtual and Classroom
CRISC – Certified in Risk & Information Systems Control| Virtual and ClassroomCRISC – Certified in Risk & Information Systems Control| Virtual and Classroom
CRISC – Certified in Risk & Information Systems Control| Virtual and Classroom
 
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...
 

Kürzlich hochgeladen

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Kürzlich hochgeladen (20)

A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 

Ten Tenets of CISO Success

  • 1. SESSION ID: #RSAC Frank Kim Ten Tenets of CISO Success STR-W04 Founder ThinkSec @fykim www.frankkim.net
  • 3. # R S A C Organizational Culture 3 “Culture eats strategy for breakfast.” - Peter Drucker
  • 5. # R S A C Business Risk 5 First Website 1995 2000 2005 2010 2015 Mobile Devices Global Network Wireless Network Mobile Payments Cloud Computing Big Data First Mobile App Internet of Things Basic Threats Insider Threats Partners Organized Crime Activists Edward Snowden Advanced Persistent Threats Stuxnet Nation States “Year of the Breach…” Technology Threats Sophistication $1 Trillion Cost of Cyber crime - World Economic Forum Graphic credit: Omar Khawaja
  • 7. # R S A C Creating Credibility 7 “A big part of being believable and building our trust is showing us how we compare to competitors, other industries, some kind of standards or benchmarks.” - Board Member
  • 9. # R S A C Identifying a Security Framework 9 Security frameworks provide a blueprint for Building security programs Managing risk Communicating about security Many frameworks share common security concepts Common program frameworks include: ISO 27000 Series — 27001 – ISMS requirements — 27002 – Code of practice — 27003 – Implementation guidance — 27004 – Measurement • COBIT • ENISA Evaluation Framework • FFIEC Cybersecurity Assessment Tool • NIST Cybersecurity Framework
  • 10. # R S A C NIST Cybersecurity Framework 10 Composed of three parts Core, Implementation Tiers, Profiles Defines a common language for managing security risk Core has five Functions that provide a high-level, strategic view of the security life cycle Helps organizations ask: What are we doing today? How are we doing? Where do we want to go? When do we want to get there? Identify Protect Detect Respond Recover
  • 11. # R S A C Maturity Comparison Example 11 0 1 2 3 4 5 Recover Respond Detect Protect Identify Current state Target state Lagging Industry Leadin g
  • 13. # R S A C Mapping to Strategic Objectives Financial/Stewards hip Customer/Stakehol der Internal Business Process Organizational Capacity or “Security Capability” Increased profitability Increased revenue Lower wait times Increase process efficiency Lower cycle times Improved knowledge & skills Improved tools & technology Business innovation/new product support Improved compliance & regulatory Improved satisfaction Improved availability & resiliency Lower costs
  • 14. # R S A C Provide Options 14 Highlight trade-offs with business value, risk reduction, cost Option A ✔ $ Business value Risk reduction Cost Option B ✔✔ $$ Option C ✔✔✔ $$$
  • 15. #RSAC #6 Invest in Individuals
  • 16. # R S A C Putting Leadership Into Perspective Boss ✗ Manager ✔ Leader ✔ Drives people Manages things Coach, mentor, and grow people Thinks short-term Thinks mid-term Thinks long-term Focused on self Focused on process Focused on people Instills fear Earns respect Generates enthusiasm Says “I” Says “Our” Says “We” Micromanages Delegates Motivates Places blame on roadblocks Navigates roadblocks Removes roadblocks Dictates how it’s done Shows how it’s done Influences how it’s done Takes credit Shares credit Gives credit Commands Asks Influences Says “Go” Says “Let’s go” Says “Way to go”
  • 17. # R S A C Career Management – P.I.E. 17 Everyone should have a piece of the P.I.E. Performance Perform exceptionally well Image Cultivate the proper image Exposure Manage their exposure so the right people will know them
  • 19. # R S A C Metrics Hiearchary Strategic Operational Technical Focus & actions increase as you move up the pyramid Volume of information increases as you move down the pyramid Focus Data Implementation Charts & Graphs Type Measures Focus Analysis & Trends Implementation Security Dashboard Type Metrics Focus Strategic Objectives Implementation Balanced Scorecard Type KPIs
  • 20. # R S A C Balanced Scorecard Example 20 Financial/Stewardship Customer / Stakeholder Internal Business Process Q4 % Product Development Budget Allocated to Security Q4 % of Products Delivered On Time and On Budget Q4 % of Developers Training in Secure Coding Principles Target 5% ✔ Trend  • Increased support for legal as they piloted their case management system Target 95% ✔ Trend  • 18% increase over Q3 in on-time and on budget delivery. Security staffed temporary PMO team to meet goal Target 95% ✔ Trend  • 100% of flagship application developers completed training reducing overall risk to organization Q4 & YTD Security Budget Allocation Customer Satisfaction Q4 % of Developers Attaining Certification Target 90% ✗ Trend  • 8% increase over Q3 in customer satisfaction rating of 4 or higher out of 5 possible Target 95% ✗ Trend  • Mitigation plan: Follow-up with developers after training is complete for certification 5% 95% 97% 85% 42% Q1 Q2 Q3 Q4 Products $575,000 $597,000 $425,000 $732,000 Services $1,590,000 $1,320,000 $1,190,000 $1,090,000 Training $326,000 $315,000 $427,000 $301,000 Actuals $2,491,000 $2,232,000 $2,042,000 $2,123,000 Budget $2,190,000 $2,211,900 $2,234,019 $2,256,359 $Variance -$301,000 -$20,100 $192,019 $133,359 YTD
  • 21. # R S A C Security Capability Example 21 Security Capability Status Trend Highlights Identify: Manage risk to systems, assets, data, and capabilities Yellow  • 32% increase in unauthorized devices • 29% IT • 3 % HR • 27% increase in unauthorized software • Attributed to Q4 BYOD pilot Protect: Ensure delivery of critical infrastructure services Green  • 12% of users failed sponsored email phishing tests • 15% of employees have not passed security awareness assessments Detect: Identify occurrence of a cybersecurity event Green  • 27% decrease in elevated access accounts • 275 total elevated access accounts Respond: Take action regarding a detected cybersecurity event Green  • 5% of database systems with sensitive information have not been scanned by vulnerability scanners Recover: Maintain plans for resilience and to restore any capabilities or services that were impaired due to cybersecurity event Red  • 34% of systems not enabled with up to date anti- malware • Attributed to Q4 BYOD pilot
  • 23. # R S A C Effective Communications 23 “Security people don’t speak our language. In fact, at each briefing they seem to speak a different language.” - Board Member
  • 24. # R S A C 24
  • 26. # R S A C Breaking Down the Walls 26 Agile Break down walls between development and the business DevOps Break down walls between development and operations SecDevOps Break down walls between security and development, operations, business
  • 27. # R S A C Improve Effectiveness 27
  • 29. # R S A C Evolution of Security Leadership IT SecurityIT Security Old Scho ol New Scho ol Risk Management Regulatory, Compliance, Legal, Privacy Business Savvy Graphic credit: https://www.rsaconference.com/writable/presentations/file_upload/prof-m07-from-cave-man_to-business-man-the-evolution-of-the-ciso-to-ciro.pdf Technology Focus Business Focus
  • 30. # R S A C
  • 31. # R S A C Ten Tenets of CISO Success 31 #1 #2 #3 #4 #5 #6 #7 #8 #9 #10
  • 32. #RSAC Frank Kim @fykim www.frankkim.net Material based on SANS MGT514 Security Strategic Planning, Policy, and Leadership

Hinweis der Redaktion

  1. https://www.weforum.org/agenda/2018/01/our-exposure-to-cyberattacks-is-growing-we-need-to-become-cyber-risk-ready/
  2. Image source: https://www.go-globe.com/blog/things-that-happen-every-60-seconds/
  3. James Christiansen gave a presentation at RSA 2016 entitled “From Caveman to Business Man: The Evolution of the CISO to CIRO”. This is a slightly modified version of the graphic from that talk.
  4. Based on the CISO Mind Map by: Rafeeq Rehman @rafeeq_rehman http://rafeeqrehman.com SANS CISO Mind Map poster available for download at: https://www.sans.org/security-resources/posters/leadership/security-leadership-poster-135