SlideShare ist ein Scribd-Unternehmen logo
1 von 17
S The New  C I O ^ SECURITY The 3rd Kuwait InfoSecurityConference May 26, 2011 Pradeep Menon Executive Vice President and Director Quadrant Risk Management >
AGENDA The Evolving Role of the CISO Selling Security Internally 2
The CISO  ,[object Object]
Some of the Key Drivers for this Strategic Visibility include:S C I O ^ 3
Why should organizations have a CISO?  Fraud Insider Theft Lack of single source of truth Third party exposure ? S Rate of Adoption of New Technologies C I O Hacking ^ Evolving Technologies Lack of monitoring and controls 4
Evolution of the role for Information Security Since last 2-3 years 5-8 years ago 9-12 years ago Source: Forrester Research 5
New Responsibilities ,[object Object]
Marketing and selling of Information Security within the organization
Quantifying benefits
Controller to Business Enabler
Program Managing Security rather than Project Managing
Representation in the Senior Management Decision Making Bodies6
The Major Roadblocks that still CISOs face 7
AGENDA The Evolving Role of the CISO Selling Security Internally 8
Tips for Enhancing CISO Value and Reach Branding Security ,[object Object]
Creating characters, voices and visuals that represent security in a meaningful way
E.g. - Salim from aeCERT9

Weitere ähnliche Inhalte

Was ist angesagt?

Cyber Security Developments for BCM Practitioners
Cyber Security Developments for BCM PractitionersCyber Security Developments for BCM Practitioners
Cyber Security Developments for BCM PractitionersContinuity and Resilience
 
Cyber Recovery - Legal Toolkit
Cyber Recovery - Legal ToolkitCyber Recovery - Legal Toolkit
Cyber Recovery - Legal ToolkitKevin Duffey
 
CEOs leading Recovery from Cyber Attack
CEOs leading Recovery from Cyber AttackCEOs leading Recovery from Cyber Attack
CEOs leading Recovery from Cyber AttackKevin Duffey
 
Key Elements of an Effective Anti-Bribery Management System Implementation
Key Elements of an Effective Anti-Bribery Management System ImplementationKey Elements of an Effective Anti-Bribery Management System Implementation
Key Elements of an Effective Anti-Bribery Management System ImplementationPECB
 
BCS ITNow 201506 - Silver Bullet
BCS ITNow 201506 - Silver BulletBCS ITNow 201506 - Silver Bullet
BCS ITNow 201506 - Silver BulletGareth Niblett
 
Strategies for cyber resilience - Everyone has a Role
Strategies for cyber resilience - Everyone has a RoleStrategies for cyber resilience - Everyone has a Role
Strategies for cyber resilience - Everyone has a RoleKevin Duffey
 
How To Integrate Business Risk & IT Risk
How To Integrate Business Risk & IT Risk How To Integrate Business Risk & IT Risk
How To Integrate Business Risk & IT Risk SureCloud
 
Building the Next Generation ISAC-- A Blueprint for Success
Building the Next Generation ISAC-- A Blueprint for SuccessBuilding the Next Generation ISAC-- A Blueprint for Success
Building the Next Generation ISAC-- A Blueprint for SuccessBooz Allen Hamilton
 
Organizational Resilience – How ISO 22316 Provides Guidance for Your Organiza...
Organizational Resilience – How ISO 22316 Provides Guidance for Your Organiza...Organizational Resilience – How ISO 22316 Provides Guidance for Your Organiza...
Organizational Resilience – How ISO 22316 Provides Guidance for Your Organiza...PECB
 
Sans 20 CSC: Connecting Security to the Business Mission
Sans 20 CSC: Connecting Security to the Business MissionSans 20 CSC: Connecting Security to the Business Mission
Sans 20 CSC: Connecting Security to the Business MissionTripwire
 
Information security governance
Information security governanceInformation security governance
Information security governanceKoen Maris
 
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016FERMA
 
Scaling an Application Security Program at the IMF: A Case Study
Scaling an Application Security Program at the IMF: A Case StudyScaling an Application Security Program at the IMF: A Case Study
Scaling an Application Security Program at the IMF: A Case StudyPriyanka Aash
 
Insurance and security: finding common ground in a volatile security risk env...
Insurance and security: finding common ground in a volatile security risk env...Insurance and security: finding common ground in a volatile security risk env...
Insurance and security: finding common ground in a volatile security risk env...Doreen Loeber
 
The missing parts of the governance puzzle : The 2000 tide and what to expect...
The missing parts of the governance puzzle : The 2000 tide and what to expect...The missing parts of the governance puzzle : The 2000 tide and what to expect...
The missing parts of the governance puzzle : The 2000 tide and what to expect...PECB
 

Was ist angesagt? (15)

Cyber Security Developments for BCM Practitioners
Cyber Security Developments for BCM PractitionersCyber Security Developments for BCM Practitioners
Cyber Security Developments for BCM Practitioners
 
Cyber Recovery - Legal Toolkit
Cyber Recovery - Legal ToolkitCyber Recovery - Legal Toolkit
Cyber Recovery - Legal Toolkit
 
CEOs leading Recovery from Cyber Attack
CEOs leading Recovery from Cyber AttackCEOs leading Recovery from Cyber Attack
CEOs leading Recovery from Cyber Attack
 
Key Elements of an Effective Anti-Bribery Management System Implementation
Key Elements of an Effective Anti-Bribery Management System ImplementationKey Elements of an Effective Anti-Bribery Management System Implementation
Key Elements of an Effective Anti-Bribery Management System Implementation
 
BCS ITNow 201506 - Silver Bullet
BCS ITNow 201506 - Silver BulletBCS ITNow 201506 - Silver Bullet
BCS ITNow 201506 - Silver Bullet
 
Strategies for cyber resilience - Everyone has a Role
Strategies for cyber resilience - Everyone has a RoleStrategies for cyber resilience - Everyone has a Role
Strategies for cyber resilience - Everyone has a Role
 
How To Integrate Business Risk & IT Risk
How To Integrate Business Risk & IT Risk How To Integrate Business Risk & IT Risk
How To Integrate Business Risk & IT Risk
 
Building the Next Generation ISAC-- A Blueprint for Success
Building the Next Generation ISAC-- A Blueprint for SuccessBuilding the Next Generation ISAC-- A Blueprint for Success
Building the Next Generation ISAC-- A Blueprint for Success
 
Organizational Resilience – How ISO 22316 Provides Guidance for Your Organiza...
Organizational Resilience – How ISO 22316 Provides Guidance for Your Organiza...Organizational Resilience – How ISO 22316 Provides Guidance for Your Organiza...
Organizational Resilience – How ISO 22316 Provides Guidance for Your Organiza...
 
Sans 20 CSC: Connecting Security to the Business Mission
Sans 20 CSC: Connecting Security to the Business MissionSans 20 CSC: Connecting Security to the Business Mission
Sans 20 CSC: Connecting Security to the Business Mission
 
Information security governance
Information security governanceInformation security governance
Information security governance
 
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
 
Scaling an Application Security Program at the IMF: A Case Study
Scaling an Application Security Program at the IMF: A Case StudyScaling an Application Security Program at the IMF: A Case Study
Scaling an Application Security Program at the IMF: A Case Study
 
Insurance and security: finding common ground in a volatile security risk env...
Insurance and security: finding common ground in a volatile security risk env...Insurance and security: finding common ground in a volatile security risk env...
Insurance and security: finding common ground in a volatile security risk env...
 
The missing parts of the governance puzzle : The 2000 tide and what to expect...
The missing parts of the governance puzzle : The 2000 tide and what to expect...The missing parts of the governance puzzle : The 2000 tide and what to expect...
The missing parts of the governance puzzle : The 2000 tide and what to expect...
 

Ähnlich wie Pradeep menon how to influence people and win top management buy0in for ciso

IREC165473PR RP 2017 Security Outlook
IREC165473PR RP 2017 Security OutlookIREC165473PR RP 2017 Security Outlook
IREC165473PR RP 2017 Security OutlookChris Cornillie
 
110.decision makers.cio.ciso
110.decision makers.cio.ciso110.decision makers.cio.ciso
110.decision makers.cio.cisoLarry Smith
 
ITS Innovation Series
ITS Innovation SeriesITS Innovation Series
ITS Innovation SeriesGreg Serian
 
speaking-to-board-securiity-whitepaper
speaking-to-board-securiity-whitepaperspeaking-to-board-securiity-whitepaper
speaking-to-board-securiity-whitepaperBilha Diaz
 
Four Key Attributes of a Successful CISO.pdf
Four Key Attributes of a Successful CISO.pdfFour Key Attributes of a Successful CISO.pdf
Four Key Attributes of a Successful CISO.pdfEnterprise Insider
 
Fortinet: The New CISO – From Technology to Business Focused Leadership
Fortinet: The New CISO – From Technology to Business Focused LeadershipFortinet: The New CISO – From Technology to Business Focused Leadership
Fortinet: The New CISO – From Technology to Business Focused LeadershipMighty Guides, Inc.
 
Business Intelligence Productionization
Business Intelligence ProductionizationBusiness Intelligence Productionization
Business Intelligence ProductionizationDavid Moore
 
Cs from corporate laws expert to corporate leader kanpur 12-oct[1]
Cs from corporate laws expert to  corporate leader   kanpur 12-oct[1]Cs from corporate laws expert to  corporate leader   kanpur 12-oct[1]
Cs from corporate laws expert to corporate leader kanpur 12-oct[1]Pavan Kumar Vijay
 
From Cave Man to Business Man, the Evolution of the CISO to CIRO
From Cave Man to Business Man, the Evolution of the CISO to CIROFrom Cave Man to Business Man, the Evolution of the CISO to CIRO
From Cave Man to Business Man, the Evolution of the CISO to CIROPriyanka Aash
 
Cobit 5 for Information Security
Cobit 5 for Information SecurityCobit 5 for Information Security
Cobit 5 for Information SecuritySeto Joseles
 
Webinar for September 2019 - Organisational Design and Strategy
Webinar for September 2019 - Organisational Design and StrategyWebinar for September 2019 - Organisational Design and Strategy
Webinar for September 2019 - Organisational Design and StrategyThe Digital Insurer
 
India security conclave brochure 2016
India security conclave brochure 2016India security conclave brochure 2016
India security conclave brochure 2016Cruxcreative
 
Cyber Defence - Service portfolio
Cyber Defence - Service portfolioCyber Defence - Service portfolio
Cyber Defence - Service portfolioKaloyan Krastev
 
Safe executive summary 2013
Safe executive summary 2013Safe executive summary 2013
Safe executive summary 2013Bill Joyce
 
NUS-ISS Learning Day 2019-Architecting security in the digital age
NUS-ISS Learning Day 2019-Architecting security in the digital ageNUS-ISS Learning Day 2019-Architecting security in the digital age
NUS-ISS Learning Day 2019-Architecting security in the digital ageNUS-ISS
 
Cyber security: five leadership issues worthy of Board and executive attention
Cyber security: five leadership issues worthy of Board and executive attentionCyber security: five leadership issues worthy of Board and executive attention
Cyber security: five leadership issues worthy of Board and executive attentionRamón Gómez de Olea y Bustinza
 
Cyber security: Five leadership issues worthy of board and executive attention
Cyber security: Five leadership issues worthy of board and executive attentionCyber security: Five leadership issues worthy of board and executive attention
Cyber security: Five leadership issues worthy of board and executive attentionRamón Gómez de Olea y Bustinza
 

Ähnlich wie Pradeep menon how to influence people and win top management buy0in for ciso (20)

IREC165473PR RP 2017 Security Outlook
IREC165473PR RP 2017 Security OutlookIREC165473PR RP 2017 Security Outlook
IREC165473PR RP 2017 Security Outlook
 
Insight into Security Leader Success Part 2
Insight into Security Leader Success Part 2Insight into Security Leader Success Part 2
Insight into Security Leader Success Part 2
 
110.decision makers.cio.ciso
110.decision makers.cio.ciso110.decision makers.cio.ciso
110.decision makers.cio.ciso
 
ITS Innovation Series
ITS Innovation SeriesITS Innovation Series
ITS Innovation Series
 
speaking-to-board-securiity-whitepaper
speaking-to-board-securiity-whitepaperspeaking-to-board-securiity-whitepaper
speaking-to-board-securiity-whitepaper
 
Four Key Attributes of a Successful CISO.pdf
Four Key Attributes of a Successful CISO.pdfFour Key Attributes of a Successful CISO.pdf
Four Key Attributes of a Successful CISO.pdf
 
Fortinet: The New CISO – From Technology to Business Focused Leadership
Fortinet: The New CISO – From Technology to Business Focused LeadershipFortinet: The New CISO – From Technology to Business Focused Leadership
Fortinet: The New CISO – From Technology to Business Focused Leadership
 
Business Intelligence Productionization
Business Intelligence ProductionizationBusiness Intelligence Productionization
Business Intelligence Productionization
 
Cs from corporate laws expert to corporate leader kanpur 12-oct[1]
Cs from corporate laws expert to  corporate leader   kanpur 12-oct[1]Cs from corporate laws expert to  corporate leader   kanpur 12-oct[1]
Cs from corporate laws expert to corporate leader kanpur 12-oct[1]
 
From Cave Man to Business Man, the Evolution of the CISO to CIRO
From Cave Man to Business Man, the Evolution of the CISO to CIROFrom Cave Man to Business Man, the Evolution of the CISO to CIRO
From Cave Man to Business Man, the Evolution of the CISO to CIRO
 
Cobit 5 for Information Security
Cobit 5 for Information SecurityCobit 5 for Information Security
Cobit 5 for Information Security
 
Webinar for September 2019 - Organisational Design and Strategy
Webinar for September 2019 - Organisational Design and StrategyWebinar for September 2019 - Organisational Design and Strategy
Webinar for September 2019 - Organisational Design and Strategy
 
India security conclave brochure 2016
India security conclave brochure 2016India security conclave brochure 2016
India security conclave brochure 2016
 
Engaging stakeholders in Collective Action
Engaging stakeholders in Collective ActionEngaging stakeholders in Collective Action
Engaging stakeholders in Collective Action
 
Cyber Defence - Service portfolio
Cyber Defence - Service portfolioCyber Defence - Service portfolio
Cyber Defence - Service portfolio
 
Safe executive summary 2013
Safe executive summary 2013Safe executive summary 2013
Safe executive summary 2013
 
CISO as a service in India | Senselearner
CISO as a service in India | SenselearnerCISO as a service in India | Senselearner
CISO as a service in India | Senselearner
 
NUS-ISS Learning Day 2019-Architecting security in the digital age
NUS-ISS Learning Day 2019-Architecting security in the digital ageNUS-ISS Learning Day 2019-Architecting security in the digital age
NUS-ISS Learning Day 2019-Architecting security in the digital age
 
Cyber security: five leadership issues worthy of Board and executive attention
Cyber security: five leadership issues worthy of Board and executive attentionCyber security: five leadership issues worthy of Board and executive attention
Cyber security: five leadership issues worthy of Board and executive attention
 
Cyber security: Five leadership issues worthy of board and executive attention
Cyber security: Five leadership issues worthy of board and executive attentionCyber security: Five leadership issues worthy of board and executive attention
Cyber security: Five leadership issues worthy of board and executive attention
 

Mehr von nooralmousa

Mr. Vivek Ramachandran - Advanced Wi-­Fi Security Penetration Testing
Mr. Vivek Ramachandran - Advanced Wi-­Fi Security Penetration TestingMr. Vivek Ramachandran - Advanced Wi-­Fi Security Penetration Testing
Mr. Vivek Ramachandran - Advanced Wi-­Fi Security Penetration Testingnooralmousa
 
Mr. Bulent Teksoz - Security trends and innovations
Mr. Bulent Teksoz  - Security trends and innovationsMr. Bulent Teksoz  - Security trends and innovations
Mr. Bulent Teksoz - Security trends and innovationsnooralmousa
 
Mr. Mohammed Aldoub - A case study of django web applications that are secur...
Mr. Mohammed Aldoub  - A case study of django web applications that are secur...Mr. Mohammed Aldoub  - A case study of django web applications that are secur...
Mr. Mohammed Aldoub - A case study of django web applications that are secur...nooralmousa
 
Mr. Khalid Shaikh - emerging trends in managing it security
Mr. Khalid Shaikh  - emerging trends in managing it securityMr. Khalid Shaikh  - emerging trends in managing it security
Mr. Khalid Shaikh - emerging trends in managing it securitynooralmousa
 
Mr. Andrey Belenko - secure password managers and military-grade encryption o...
Mr. Andrey Belenko - secure password managers and military-grade encryption o...Mr. Andrey Belenko - secure password managers and military-grade encryption o...
Mr. Andrey Belenko - secure password managers and military-grade encryption o...nooralmousa
 
Mr. Burhan Khalid - secure dev.
Mr. Burhan Khalid - secure dev.Mr. Burhan Khalid - secure dev.
Mr. Burhan Khalid - secure dev.nooralmousa
 
Sudarsan Jayaraman - Open information security management maturity model
Sudarsan Jayaraman  - Open information security management maturity modelSudarsan Jayaraman  - Open information security management maturity model
Sudarsan Jayaraman - Open information security management maturity modelnooralmousa
 
Meraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldMeraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldnooralmousa
 
Renaud Bido & Mohammad Shams - Hijacking web servers & clients
Renaud Bido & Mohammad Shams - Hijacking web servers & clientsRenaud Bido & Mohammad Shams - Hijacking web servers & clients
Renaud Bido & Mohammad Shams - Hijacking web servers & clientsnooralmousa
 
Ahmed Al Barrak - Staff information security practices - a latent threat
Ahmed Al Barrak - Staff information security practices - a latent threatAhmed Al Barrak - Staff information security practices - a latent threat
Ahmed Al Barrak - Staff information security practices - a latent threatnooralmousa
 
Fadi Mutlak - Information security governance
Fadi Mutlak - Information security governanceFadi Mutlak - Information security governance
Fadi Mutlak - Information security governancenooralmousa
 
Mohammed Al Mulla - Best practices to secure working environments
Mohammed Al Mulla - Best practices to secure working environmentsMohammed Al Mulla - Best practices to secure working environments
Mohammed Al Mulla - Best practices to secure working environmentsnooralmousa
 
Nabil Malik - Security performance metrics
Nabil Malik - Security performance metricsNabil Malik - Security performance metrics
Nabil Malik - Security performance metricsnooralmousa
 
Khaled al amri using fingerprints as private and public keys
Khaled al amri   using fingerprints as private and public keysKhaled al amri   using fingerprints as private and public keys
Khaled al amri using fingerprints as private and public keysnooralmousa
 
Hisham Dalle - Zero client computing - taking the desktop into the cloud
Hisham Dalle - Zero client computing - taking the desktop into the cloudHisham Dalle - Zero client computing - taking the desktop into the cloud
Hisham Dalle - Zero client computing - taking the desktop into the cloudnooralmousa
 
Ghassan farra it security a cio perspective
Ghassan farra   it security a cio perspectiveGhassan farra   it security a cio perspective
Ghassan farra it security a cio perspectivenooralmousa
 
Taiye Lambo - Auditing the cloud
Taiye Lambo - Auditing the cloudTaiye Lambo - Auditing the cloud
Taiye Lambo - Auditing the cloudnooralmousa
 

Mehr von nooralmousa (17)

Mr. Vivek Ramachandran - Advanced Wi-­Fi Security Penetration Testing
Mr. Vivek Ramachandran - Advanced Wi-­Fi Security Penetration TestingMr. Vivek Ramachandran - Advanced Wi-­Fi Security Penetration Testing
Mr. Vivek Ramachandran - Advanced Wi-­Fi Security Penetration Testing
 
Mr. Bulent Teksoz - Security trends and innovations
Mr. Bulent Teksoz  - Security trends and innovationsMr. Bulent Teksoz  - Security trends and innovations
Mr. Bulent Teksoz - Security trends and innovations
 
Mr. Mohammed Aldoub - A case study of django web applications that are secur...
Mr. Mohammed Aldoub  - A case study of django web applications that are secur...Mr. Mohammed Aldoub  - A case study of django web applications that are secur...
Mr. Mohammed Aldoub - A case study of django web applications that are secur...
 
Mr. Khalid Shaikh - emerging trends in managing it security
Mr. Khalid Shaikh  - emerging trends in managing it securityMr. Khalid Shaikh  - emerging trends in managing it security
Mr. Khalid Shaikh - emerging trends in managing it security
 
Mr. Andrey Belenko - secure password managers and military-grade encryption o...
Mr. Andrey Belenko - secure password managers and military-grade encryption o...Mr. Andrey Belenko - secure password managers and military-grade encryption o...
Mr. Andrey Belenko - secure password managers and military-grade encryption o...
 
Mr. Burhan Khalid - secure dev.
Mr. Burhan Khalid - secure dev.Mr. Burhan Khalid - secure dev.
Mr. Burhan Khalid - secure dev.
 
Sudarsan Jayaraman - Open information security management maturity model
Sudarsan Jayaraman  - Open information security management maturity modelSudarsan Jayaraman  - Open information security management maturity model
Sudarsan Jayaraman - Open information security management maturity model
 
Meraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldMeraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless world
 
Renaud Bido & Mohammad Shams - Hijacking web servers & clients
Renaud Bido & Mohammad Shams - Hijacking web servers & clientsRenaud Bido & Mohammad Shams - Hijacking web servers & clients
Renaud Bido & Mohammad Shams - Hijacking web servers & clients
 
Ahmed Al Barrak - Staff information security practices - a latent threat
Ahmed Al Barrak - Staff information security practices - a latent threatAhmed Al Barrak - Staff information security practices - a latent threat
Ahmed Al Barrak - Staff information security practices - a latent threat
 
Fadi Mutlak - Information security governance
Fadi Mutlak - Information security governanceFadi Mutlak - Information security governance
Fadi Mutlak - Information security governance
 
Mohammed Al Mulla - Best practices to secure working environments
Mohammed Al Mulla - Best practices to secure working environmentsMohammed Al Mulla - Best practices to secure working environments
Mohammed Al Mulla - Best practices to secure working environments
 
Nabil Malik - Security performance metrics
Nabil Malik - Security performance metricsNabil Malik - Security performance metrics
Nabil Malik - Security performance metrics
 
Khaled al amri using fingerprints as private and public keys
Khaled al amri   using fingerprints as private and public keysKhaled al amri   using fingerprints as private and public keys
Khaled al amri using fingerprints as private and public keys
 
Hisham Dalle - Zero client computing - taking the desktop into the cloud
Hisham Dalle - Zero client computing - taking the desktop into the cloudHisham Dalle - Zero client computing - taking the desktop into the cloud
Hisham Dalle - Zero client computing - taking the desktop into the cloud
 
Ghassan farra it security a cio perspective
Ghassan farra   it security a cio perspectiveGhassan farra   it security a cio perspective
Ghassan farra it security a cio perspective
 
Taiye Lambo - Auditing the cloud
Taiye Lambo - Auditing the cloudTaiye Lambo - Auditing the cloud
Taiye Lambo - Auditing the cloud
 

Pradeep menon how to influence people and win top management buy0in for ciso

  • 1. S The New C I O ^ SECURITY The 3rd Kuwait InfoSecurityConference May 26, 2011 Pradeep Menon Executive Vice President and Director Quadrant Risk Management >
  • 2. AGENDA The Evolving Role of the CISO Selling Security Internally 2
  • 3.
  • 4. Some of the Key Drivers for this Strategic Visibility include:S C I O ^ 3
  • 5. Why should organizations have a CISO? Fraud Insider Theft Lack of single source of truth Third party exposure ? S Rate of Adoption of New Technologies C I O Hacking ^ Evolving Technologies Lack of monitoring and controls 4
  • 6. Evolution of the role for Information Security Since last 2-3 years 5-8 years ago 9-12 years ago Source: Forrester Research 5
  • 7.
  • 8. Marketing and selling of Information Security within the organization
  • 11. Program Managing Security rather than Project Managing
  • 12. Representation in the Senior Management Decision Making Bodies6
  • 13. The Major Roadblocks that still CISOs face 7
  • 14. AGENDA The Evolving Role of the CISO Selling Security Internally 8
  • 15.
  • 16. Creating characters, voices and visuals that represent security in a meaningful way
  • 17. E.g. - Salim from aeCERT9
  • 18.
  • 19. Make the CEO speak about security
  • 20. Educate the CEO with important news and reports through periodic meetingsCEO Involvement 10
  • 21.
  • 22. Let Business Users express their views
  • 23. Conduct white paper sessions to demonstrate how security issues can lead to loss of customers CEO Involvement Business Involvement 11
  • 24.
  • 25. Celebrate security practices and achievements
  • 26. Place Kiosks, Stalls etc. to create awareness about following security practices
  • 27. Let the CEO inaugurate the proceedings of the Day
  • 28. Involve people from business units
  • 29. Conduct contestsCEO Involvement Business Involvement Security Awareness Day 12
  • 30.
  • 31. Influence regulatory bodies and excellence centers such as CAIT and Central Banks
  • 32. e.g., SAMA regulation for Multi Factor Authentication
  • 33. ADSIC – Information Security ProgramCEO Involvement Business Involvement Security Awareness Day ‘External Agencies’ 13
  • 34.
  • 35. Creating a web portal for users to view various reports on the metrics based on which their contribution to IS initiatives are rated CEO Involvement Business Involvement Security Awareness Day External Agencies Annual ISMS Reporting 14
  • 36.
  • 37. Their experience is wide and deep in an area
  • 38. Utilizing consultancies for specific programs might be easier to get a management buy-in
  • 39. Organizational hierarchy could be a bottleneck to express views and concerns regarding security issues
  • 40. Look upon consultancies as partners or change agents, not as vendors or spendersCEO Involvement Business Involvement Security Awareness Day External Agencies Annual ISMS Reporting External Consultancies 15
  • 41.
  • 42. Forums such as LinkedIn and Facebook have been instrumental in generating “Networking”
  • 43. Involvement in joint research initiatives through organizations such as CAIT (The Central Agency for Information technology) , KITS (Kuwait Information Technology Society), aeCERT, OCERT etc.CEO Involvement Business Involvement Security Awareness Day External Agencies Annual ISMS Reporting External Consultants Other CISO Involvement 16
  • 44.
  • 45. Encourage publishing of white papers on popular websites and journals, on behalf of the organizationCEO Involvement Business Involvement Security Awareness Day External Agencies Annual ISMS Reporting External Consultants Other CISO Involvement External Involvement 17
  • 46. Thank You Pradeep Menon Executive Vice President and Director Quadrant Risk Management pradeep.menon@qrmi-me.com Tel: +971-4-6091970 Mob: +971-50-4815260