Don t Get Left in the Dust: How to Evolve from CISO to CIRO
|
|
|
- Barnaby Harmon
- 10 years ago
- Views:
Transcription
1 SESSION ID: CXO-W04 Don t Get Left in the Dust: How to Evolve from CISO to CIRO JC-JC James Christiansen VP Information Risk Management Accuvant [email protected] Bradley J. Schaufenbuel, CISSP Director of Information Security Midland States Bank [email protected]
2 Agenda The Evolution of the Role Drivers of CIRO Emergence What Makes the CIRO Different Making the Transition How to Apply Summary CIRO JC-JC 2
3 Introduction The security landscape is changing. There is a disconnect between the objectives of the traditional CISO and the businesses they serve. It is time to evolve with the organizations we serve. JC-JC 3
4 Business Strategy The Six Forces Require a Resilient Security Strategy Global Social and Political Forces Government and Industry Regulations IT Organization, Systems and Infrastructure Organizational Culture Adversaries and Threats JC-JC 4
5 Progression of this Field IT Security Info Sec IT Risk Management 2015-??? Information Risk Management? JC-JC 5
6 The Security Journey A business aligned strategy includes understanding the business and compliance objectives, threats, and risks AD HOC Shortcut = Failure to Pass COMPLIANCE BASED INFRASTRUCTURE BASED THREAT BASED RISK BASED INTEL DRIVEN BUSINESS ALIGNED JC-JC 6
7 Executive Management / Board NACD Guidance from the National Association of Corporate Directors (NACD) PRINCIPLE 1: Cybersecurity is an enterprisewide risk management issue, not just an IT issue PRINCIPLE 2: Understand Legal implications of cyber PRINCIPLE 3: Have regular updates and access to cyber security experts PRINCIPLE 4: Establish an enterprisewide cyber-risk management framework with adequate staffing and budget Guidance includes specific questions about program maturity, breach notification, situational awareness, strategy and incident response PRINCIPLE 5: Discussion of which risks to avoid, accept, mitigate, or transfer through cyber insurance JC-BS 7
8 Drivers of the Emergence of the CIRO 1/2 Greater expectations of boards and executive teams Increase in outsourcing (greater emphasis on third party oversight) Changing threat landscape (need for risk based remediation) BS-BS 8
9 Drivers of the Emergence of the CIRO 2/2 Misalignment of security spending with business risk Lack of support for taking calculated risks Divergence amongst existing information governance functions BS-BS 9
10 Where CISOs Fall Short 1/2 Focus on information protection at the expense of other corporate goals. Information risk is a business problem with a shared budget responsibility Focus on technology solutions in lieu of other controls (continual search for the next silver bullet) BS-BS 10
11 Where CISOs Fall Short 2/2 Emphasize risk elimination instead of risk optimization ( no instead of yes if we ) Even risk enlightened leaders are fixated on technology risks (focus on IT risk instead of information risk) BS-BS 11
12 The Ideal CIRO Traditional security knowledge (CISSP, CISM, etc.) Business savvy (MBA) Thinks like a lawyer and a hacker Leader (comfortable in front of the board) Understands risk management principles Can implement project management fundamentals BS-JC 12
13 The Successful Chief Information Risk Officer Information Security is a Business Imperative Enable Business to Securely Deliver Product and Services Positive Interaction With Partners, Third-parties and Regulators CIRO Information Driven Decision Making Strategic and Operational Metrics / Dashboard Information Risk Assessment and Management Integration with Enterprise Risk Management Shared Budget Responsibility Corporate and Business Unit - Balanced Risk and Cost Prioritization With Other Strategic Business Projects JC-JC 13
14 What Makes the CIRO Different? Organizational profile Executive team member with board access Organizational alignment Strategy dovetails with organization s Depth and breadth of skills Business risk based approach Leadership JC-JC 14
15 Not Just Context, but Also Content Not just protection, but also: Optimization of use: Are we extracting value from information? Collection practices: Do we even need to obtain the information? Timely destruction: What is the risk of keeping information too long or not long enough? JC-JC 15
16 What Functions Fall Under CIRO? May include parts of: Traditional Information Security Legal and Regulatory Compliance Privacy Third Party Oversight Business Resilience Physical Security JC-JC 16
17 Reporting Structures, Old and New JC-BS 17
18 Advantages of New Organizational Structure Aligns information risk with business priorities Visibility into organizational or product changes Supports shared responsibility for information risk Ensures that all types of information risk are addressed Able to address board, executive management and customers BS-BS 18
19 Do We Need Another C-Level Position? Value of information (and associated risk) rising. Executive composition should parallel board s fiduciary duties. Consolidation of existing C-level positions (CPO, CISO / CSO, etc.) BS-BS 19
20 Skills Required to Make the CIRO Transition Thorough understanding of risk management concepts Factor Analysis of Information Risk (FAIR) 1 Thorough understanding of your organization s business, objectives and growth plans Regular meetings with business executives Executive level communication skills Presentation Skills Toastmasters Written Skills College & Editors / Colleagues 1 Source: Risk Management Insight (riskmanagementinsight.com) BS-BS 20
21 The Information Risk Transformation Transition yourself from law enforcement / military mindset to that of a business risk manager Add risk management skill set to staff (through training or hiring) Don t forget about information in nonelectronic format BS-BS 21
22 How? Understanding Regulations: Translate legal regulations to internal activities to meet spirit (legislative intent) and letter of the law. Establish a good working relationship with your attorneys. Participate in standard setting and regulatory rulemaking processes (i.e., help shape the rules). Threat Landscape: Implement threat analytics maturity model Understand the corporate culture: Risk aversion, rate of change, cultural differences, countries of operation BS-JC 22
23 Evolution of the CISO to the CIRO CISO Securing the Organization CIRO Information Security Third-Party Risk Management Regulatory Compliance Management Business Acumen Secure the internal organization Manage the risk of third parties Manage regulatory risks Communicate current status and risks to board JC-JC 23
24 Executive Management / Board Tips Keep it short and concise Typically they will want pre-materials Never guess at an answer They read people very well! Information Risk Dashboard Include areas of risk inside and outside the organization Trends What areas of risk are increasing and decreasing New risk highlights Overall goal Demonstrate the effectiveness of your information risk management program over time. JC-BS 24 Source: NACD, Cyber-Risk Oversight, Directors Handbook 2014
25 Using Existing Enterprise Risk Management (ERM) Program (or Create One) Leverage the existing enterprise risk management (ERM) program (if one exists). Information risk is a subset of enterprise risk. If there isn t an enterprise risk management program, sponsor one (position yourself to be CRO). BS-BS 25
26 Leveraging Information Risk to Drive Value Concrete Examples: Factoring in an information risk discount on an acquisition valuation / purchase price Leveraging fraud and security data to improve customer experience BS-JC 26
27 Contributing to the Organization s Success Revenue Contribution Enable Business Efficiency Product Delivery Brand Name Confidence Earnings Contribution Reduced Operating Expenses Related to Security Failure Long Term Reduction of Security Program Costs Circumvent Costs of Regulatory Non-compliance JC-JC 27
28 Managing Information Risk Information Risk Management Information Security Regulatory Compliance Third Party Risk People Information Technology Governance Effective Compliance Ease of Doing Business Process Improvement Enhanced Security Global Execution Regulations Third Parties JC-JC 28
29 The Reward Earned respect from organizational peers Inclusion in your organization s strategic decision making processes and forums Perception shifts from marginal cost center to value adding unit JC-BS 29
30 Summary We have established: The current CISO role is not meeting organizational needs CISO must adapt or go the way of the Dodo bird A focus on managing information risk offers a superior alignment to the organization s objectives There are steps you can take to position yourself for this transition BS-BS 30
31 Apply It TODAY Immediate actions: Assess you and your program s readiness to make the CIRO transition 90 DAYS Establish YOUR plan to gain and implement necessary skills +90 DAYS Take steps to realign skill sets, focus, and organizational structure to an information risk based approach BS-BS 31
32 Resources The Evolution of the CISO (accuvant.com/resources/risk-and-the-cisorole#sthash.tumiwwv7.dpuf) NACD Cyber-Risk Oversight Handbook (nacdonline.org/cyber) Introduction to Factor Analysis of Information Risk (FAIR) (riskmanagementinsight.com) Six Forces of Security Strategy (accuvant.com/resources/accuvants-sixforces-of-security-strategy) BS-BS 32
33 Questions? 33
FFIEC Cybersecurity Assessment Tool Overview for Chief Executive Officers and Boards of Directors
Overview for Chief Executive Officers and Boards of Directors In light of the increasing volume and sophistication of cyber threats, the Federal Financial Institutions Examination Council 1 (FFIEC) developed
Connecting the dots: A proactive approach to cybersecurity oversight in the boardroom. kpmg.bm
Connecting the dots: A proactive approach to cybersecurity oversight in the boardroom kpmg.bm Connecting the dots: A proactive approach to cybersecurity oversight in the boardroom 1 Connecting the dots:
Cyber Risk Managemet Next? What Board Members, Shareholders, Government, Auditors and Others Will be Asking from the CIO Next:
11 Cyber Risk Managemet Next? What Board Members, Shareholders, Government, Auditors and Others Will be Asking from the CIO Next: 1. Why the Conversation has shifted. 2. How Boards are reacting. 3. What
Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model
Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model Stéphane Hurtaud Partner Governance Risk & Compliance Deloitte Laurent De La Vaissière Director Governance Risk & Compliance
The Changing IT Risk Landscape Understanding and managing existing and emerging risks
The Changing IT Risk Landscape Understanding and managing existing and emerging risks IIA @ Noon Kareem Sadek Senior Manager, Deloitte Canada Chris Close Senior Manager, Deloitte Canada December 2, 2015
Feature. Developing an Information Security and Risk Management Strategy
Feature Developing an Information Security and Risk Management Strategy John P. Pironti, CISA, CISM, CGEIT, CISSP, ISSAP, ISSMP, is the president of IP Architects LLC. He has designed and implemented enterprisewide
Addressing Cyber Risk Building robust cyber governance
Addressing Cyber Risk Building robust cyber governance Mike Maddison Partner Head of Cyber Risk Services The future of security The business environment is changing The IT environment is changing The cyber
Third-Party Cybersecurity and Data Loss Prevention
Third-Party Cybersecurity and Data Loss Prevention SESSION ID: DSP-W04A Brad Keller Sr. Vice President Santa Fe Group Jonathan Dambrot, CISSP CEO, Co-Founder Prevalent Networks 3rd Party Risk Management
FFIEC Cybersecurity Assessment Tool
Overview In light of the increasing volume and sophistication of cyber threats, the Federal Financial Institutions Examination Council 1 (FFIEC) developed the Cybersecurity Tool (), on behalf of its members,
Cybersecurity in the States 2012: Priorities, Issues and Trends
Cybersecurity in the States 2012: Priorities, Issues and Trends Commission on Maryland Cyber Security and Innovation June 8, 2012 Pam Walker, Director of Government Affairs National Association of State
Accenture Risk Management. Industry Report. Life Sciences
Accenture Risk Management Industry Report Life Sciences Risk management as a source of competitive advantage and high performance in the life sciences industry Risk management that enables long-term competitive
Managing cyber risks with insurance
www.pwc.com.tr/cybersecurity Managing cyber risks with insurance Key factors to consider when evaluating how cyber insurance can enhance your security program June 2014 Managing cyber risks to sensitive
www.pwc.com The data breach lifecycle: From prevention to response IAPP global privacy summit March 6, 2014 (4:30-5:30) Draft v8 2-25-14
www.pwc.com The data breach lifecycle: From prevention to response IAPP global privacy summit (4:30-5:30) Draft v8 2-25-14 Common Myths 1. You have not been hacked. 2. Cyber security is about keeping the
www.pwc.com Developing a robust cyber security governance framework 16 April 2015
www.pwc.com Developing a robust cyber security governance framework 16 April 2015 Cyber attacks are ubiquitous Anonymous hacker group declares cyber war on Hong Kong government, police - SCMP, 2 October
Consumer Goods and Services
Accenture Risk Management Industry Report Consumer Goods and Services 2011 Global Risk Management Point of View Consumer Goods and Services 2011 Global Risk Management Point of View Consumer Goods and
PwC Cybersecurity Briefing
www.pwc.com/cybersecurity Cybersecurity Briefing June 25, 2014 The views expressed in these slides are solely the views of the presenters and do not necessarily reflect the views of the PCAOB, the members
Vendor Risk Management Financial Organizations
Webinar Series Vendor Risk Management Financial Organizations Bob Justus Chief Security Officer Allgress Randy Potts Managing Consultant FishNet Security Bob Justus Chief Security Officer, Allgress Current
Defending Against Data Beaches: Internal Controls for Cybersecurity
Defending Against Data Beaches: Internal Controls for Cybersecurity Presented by: Michael Walter, Managing Director and Chris Manning, Associate Director Protiviti Atlanta Office Agenda Defining Cybersecurity
Cyber security: everybody s imperative. A guide for the C-suite and boards on guarding against cyber risks
Cyber security: everybody s imperative A guide for the C-suite and boards on guarding against cyber risks Secure Enhance risk-prioritized controls to protect against known and emerging threats, and comply
Address C-level Cybersecurity issues to enable and secure Digital transformation
Home Overview Challenges Global Resource Growth Impacting Industries Address C-level Cybersecurity issues to enable and secure Digital transformation We support cybersecurity transformations with assessments,
INFOCUS. Five Questions to Guide Cybersecurity Risk Management BY EARL CRANE
promontory.com INFOCUS JUNE 3, 2015 BY EARL CRANE Five Questions to Guide Cybersecurity Risk Management The quick transformation of cybersecurity risk management from obscure specialty to top-of-thehouse
The NIST Cybersecurity Framework
View the online version at http://us.practicallaw.com/5-599-6825 The NIST Cybersecurity Framework RICHARD RAYSMAN, HOLLAND & KNIGHT LLP AND JOHN ROGERS, BOOZ ALLEN HAMILTON A Practice Note discussing the
Sarbanes-Oxley Compliance for Cloud Applications
Sarbanes-Oxley Compliance for Cloud Applications What Is Sarbanes-Oxley? Sarbanes-Oxley Act (SOX) aims to protect investors and the general public from accounting errors and fraudulent practices. For this
Cybersecurity The role of Internal Audit
Cybersecurity The role of Internal Audit Cyber risk High on the agenda Audit committees and board members are seeing cybersecurity as a top risk, underscored by recent headlines and increased government
ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES
ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES Leonard Levy PricewaterhouseCoopers LLP Session ID: SEC-W03 Session Classification: Intermediate Agenda The opportunity Assuming
fs viewpoint www.pwc.com/fsi
fs viewpoint www.pwc.com/fsi June 2013 02 11 16 21 24 Point of view Competitive intelligence A framework for response How PwC can help Appendix It takes two to tango: Managing technology risk is now a
THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS
THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS Download the entire guide and follow the conversation at SecurityRoundtable.org Collaboration and communication between technical
Intel Security Professional Services Leveraging NIST Cybersecurity Framework (CSF): Complexity is the enemy of security
Intel Security Professional Services Leveraging NIST Cybersecurity Framework (CSF): Complexity is the enemy of security David Brezinski, Professional Services, Enterprise Security Architect Agenda Overview
CFO Changing the CFO Mindset on Cybersecurity
CFO Changing the CFO Mindset on Cybersecurity What CFOs don t know can hurt their bottom line Despite increasing cybersecurity involvement, too many CFOs still lack the cyber-savvy necessary to get ahead
Understanding Enterprise Risk Management. Presented by Dorothy Gjerdrum Arthur J Gallagher
Understanding Enterprise Risk Management Presented by Dorothy Gjerdrum Arthur J Gallagher Learning Objectives Understand the components of a wellrun ERM program Review scope and process Explore the role
PRIORITIZING CYBERSECURITY
April 2016 PRIORITIZING CYBERSECURITY Five Investor Questions for Portfolio Company Boards Foreword As the frequency and severity of cyber attacks against global businesses continue to escalate, both companies
WSECU Cyber Security Journey. David Luchtel VP IT Infrastructure & Opera:ons
WSECU Cyber Security Journey David Luchtel VP IT Infrastructure & Opera:ons Objec:ve of Presenta:on Share WSECU s journey Overview of WSECU s Security Program approach Overview of WSECU s self- assessment
CISM (Certified Information Security Manager) Document version: 6.28.11
CISM (Certified Information Security Manager) Document version: 6.28.11 Important Note About CISM PDF techexams CISM PDF is a comprehensive compilation of questions and answers that have been developed
Cybersecurity: You re Doing IT Wrong
SESSION ID: CXO-F01 Cybersecurity: You re Doing IT Wrong Jared Carstensen Chief Information Security Officer (CISO), CRH Plc @jaredcarstensen Introduction My Journey Every kid has dream jobs growing up
Experience the commitment WHITE PAPER. Information Security Continuous Monitoring. Charting the Right Course. cgi.com 2014 CGI GROUP INC.
Experience the commitment WHITE PAPER Information Security Continuous Monitoring Charting the Right Course May 2014 cgi.com 2014 CGI GROUP INC. During the last few months of 2013, six federal agencies
Rethinking Information Security for Advanced Threats. CEB Information Risk Leadership Council
Rethinking Information Security for Advanced Threats CEB Information Risk Leadership Council Advanced threats differ from conventional security threats along many dimensions, making them much more difficult
Blending Corporate Governance with. Information Security
Blending Corporate Governance with Information Security WHAT IS CORPORATE GOVERNANCE? Governance has proved an issue since people began to organise themselves for a common purpose. How to ensure the power
How To Transform It Risk Management
The transformation of IT Risk Management kpmg.com The transformation of IT Risk Management The role of IT Risk Management Scope of IT risk management Examples of IT risk areas of focus How KPMG can help
The CIPM certification is comprised of two domains: Privacy Program Governance (I) and Privacy Program Operational Life Cycle (II).
Page 1 of 7 The CIPM certification is comprised of two domains: Privacy Program Governance (I) and Privacy Program Operational Life Cycle (II). Domain I provides a solid foundation for the governance of
Key Cyber Risks at the ERP Level
Key Cyber Risks at the ERP Level Process & Industrial Products (P&IP) Sector December, 2014 Today s presenters Bhavin Barot, Sr. Manager Deloitte & Touche LLP Goran Ristovski, Manager Deloitte & Touche
CISM ITEM DEVELOPMENT GUIDE
CISM ITEM DEVELOPMENT GUIDE Updated January 2015 TABLE OF CONTENTS Content Page Purpose of the CISM Item Development Guide 3 CISM Exam Structure 3 Writing Quality Items 3 Multiple-Choice Items 4 Steps
IT AUDIT WHO WE ARE. Current Trends and Top Risks of 2015 10/9/2015. Eric Vyverberg. Randy Armknecht. David Kupinski
IT AUDIT Current Trends and Top Risks of 2015 2 02 Eric Vyverberg WHO WE ARE David Kupinski Randy Armknecht Associate Director Internal Audit Protiviti 317.510.4661 [email protected] Managing
Securing your Corporate Infrastructure What is really needed to keep your assets protected
Securing your Corporate Infrastructure What is really needed to keep your assets protected Joseph Burkard CISA, CISSP October 3, 2002 1 Securing your Corporate Infrastructure Management Dilemma or Technical
Independent Evaluation of NRC s Implementation of the Federal Information Security Modernization Act of 2014 for Fiscal Year 2015
Independent Evaluation of NRC s Implementation of the Federal Information Security Modernization Act of 2014 for Fiscal Year 2015 OIG-16-A-03 November 12, 2015 All publicly available OIG reports (including
SUSTAINING COMPETITIVE DIFFERENTIATION
SUSTAINING COMPETITIVE DIFFERENTIATION Maintaining a competitive edge in customer experience requires proactive vigilance and the ability to take quick, effective, and unified action E M C P e r s pec
Defending yesterday. Financial Services. Key findings from The Global State of Information Security Survey 2014
www.pwc.com/security Defending yesterday While organizations have made significant security improvements, they have not kept pace with today s determined adversaries. As a result, many rely on yesterday
Adopting a Cybersecurity Framework for Governance and Risk Management
The American Hospital Association s Center for Healthcare Governance 2015 Fall Symposium Adopting a Cybersecurity Framework for Governance and Risk Management Jim Giordano Vice Chairman & Chair of Finance
Executive Management of Information Security
WHITE PAPER Executive Management of Information Security _experience the commitment Entire contents 2004, 2010 by CGI Group Inc. All rights reserved. Reproduction of this publication in any form without
What can HITRUST do for me?
What can HITRUST do for me? Dr. Bryan Cline CISO & VP, CSF Development & Implementation [email protected] Jason Taule Chief Security & Privacy Officer [email protected] Introduction
Enterprise Risk Management & Information Technology
Enterprise Risk Management & Information Technology Presented by Scott Perry and Gary Ross Slalom Consulting, San Francisco Agenda Introductions Session Objectives Overview of Enterprise Risk Management
Tying It All Together: Practical ERM Integration. Richard Scanlon Vice President Enterprise Risk Management CIGNA Corporation
Tying It All Together: Practical ERM Integration Richard Scanlon Vice President Enterprise Risk Management CIGNA Corporation November 16, 2007 1 Agenda Basis for ERM Integration ERM Objectives ERM Focus
The College of New Jersey Enterprise Risk Management and Higher Education For Discussion Purposes Only January 2012
The College of New Jersey Enterprise Risk Management and Higher Education For Discussion Purposes Only Agenda Introduction Basic program components Recent trends in higher education risk management Why
Cyber threat intelligence and the lessons from law enforcement. kpmg.com/cybersecurity
Cyber threat intelligence and the lessons from law enforcement kpmg.com/cybersecurity Introduction Cyber security breaches are rarely out of the media s eye. As adversary sophistication increases, many
Breaking Down the Silos: A 21st Century Approach to Information Governance. May 2015
Breaking Down the Silos: A 21st Century Approach to Information Governance May 2015 Introduction With the spotlight on data breaches and privacy, organizations are increasing their focus on information
KPMG Internal Audit 2015: Top 10 considerations for private equity firms. kpmg.com
KPMG Internal Audit 2015: Top 10 considerations for private equity firms kpmg.com INTERNAL AUDIT TOP 10 CONSIDERATIONS IN 2015 1 Historically, private equity has been less regulated than other parts of
Best practices for planning and budgeting. A white paper prepared by Prophix
A white paper prepared by Prophix Executive summary The continual changes in the business climate constantly challenge companies to find more effective business practices. However, common budgeting limitations
Risk Considerations for Internal Audit
Risk Considerations for Internal Audit Cecile Galvez, Deloitte & Touche LLP Enterprise Risk Services Director Traci Mizoguchi, Deloitte & Touche LLP Enterprise Risk Services Senior Manager February 2013
Linking Risk Management to Business Strategy, Processes, Operations and Reporting
Linking Risk Management to Business Strategy, Processes, Operations and Reporting Financial Management Institute of Canada February 17 th, 2010 KPMG LLP Agenda 1. Leading Practice Risk Management Principles
Making Data Work. Florida Department of Transportation October 24, 2014
Making Data Work Florida Department of Transportation October 24, 2014 1 2 Data, Data Everywhere. Challenges in organizing this vast amount of data into something actionable: Where to find? How to store?
Bridging the HIPAA/HITECH Compliance Gap
CyberSheath Healthcare Compliance Paper www.cybersheath.com -65 Bridging the HIPAA/HITECH Compliance Gap Security insights that help covered entities and business associates achieve compliance According
White Paper Achieving GLBA Compliance through Security Information Management. White Paper / GLBA
White Paper Achieving GLBA Compliance through Security Information Management White Paper / GLBA Contents Executive Summary... 1 Introduction: Brief Overview of GLBA... 1 The GLBA Challenge: Securing Financial
Healthcare Internal Audit: In a Time of Transition
The 2015 State of the Internal Audit Profession Study Healthcare Internal Audit: In a Time of Transition The healthcare industry in the United States is facing many challenges with the enactment of legislation
Strategic Meetings Management Program (SMMP) Implementation and Idea Guide
Title Page Strategic Meetings Management Program (SMMP) Implementation and Idea Guide By Corbin Ball Associates This report was commissioned by SignUp4 (www.signup4.com). Index Strategic Meetings Management
Data Governance. Unlocking Value and Controlling Risk. Data Governance. www.mindyourprivacy.com
Data Governance Unlocking Value and Controlling Risk 1 White Paper Data Governance Table of contents Introduction... 3 Data Governance Program Goals in light of Privacy... 4 Data Governance Program Pillars...
the evolving governance Model for CYBERSECURITY RISK By Gary owen, Director, Promontory Financial Group
the evolving governance Model for CYBERSECURITY RISK By Gary owen, Director, Promontory Financial Group 54 Banking PersPective Quarter 2, 2014 Responsibility for the oversight of information security and
IT Cost Reduction. Doing More with Less. Anita Ballaney, Vishwanath Shenoy, Michael Gavigan. Strategic IT cost reduction - Doing More with Less
IT Cost Reduction Doing More with Less Anita Ballaney, Vishwanath Shenoy, Michael Gavigan Strategic IT cost reduction - Doing More with Less The current economic climate will force all businesses to thoroughly
State of Security Survey GLOBAL FINDINGS
2011 State of Security Survey GLOBAL FINDINGS CONTENTS Introduction... 4 Methodology... 6 Finding 1: Cybersecurity is important to business... 8 Finding 2: The drivers of security are changing... 10 Finding
IMPROVING RISK VISIBILITY AND SECURITY POSTURE WITH IDENTITY INTELLIGENCE
IMPROVING RISK VISIBILITY AND SECURITY POSTURE WITH IDENTITY INTELLIGENCE ABSTRACT Changing regulatory requirements, increased attack surfaces and a need to more efficiently deliver access to the business
Enterprise Risk Management in Colleges and Universities
Enterprise Risk Management in Colleges and Universities Cherry Bekaert & Holland, L.L.P. Neal Beggan, CISA, CRISC Shane Hester, CPA, CISA Cherry, Bekaert & Holland, L.L.P. The Firm of Choice. 1 Cherry,
ENTERPRISE RISK MANAGEMENT FRAMEWORK
ENTERPRISE RISK MANAGEMENT FRAMEWORK COVENANT HEALTH LEGAL & RISK MANAGEMENT CONTENTS 1.0 PURPOSE OF THE DOCUMENT... 3 2.0 INTRODUCTION AND OVERVIEW... 4 3.0 GOVERNANCE STRUCTURE AND ACCOUNTABILITY...
Cyber Security and your Financial Institution: Are you ready for the increased scrutiny related to cyber risks?
Cyber Security and your Financial Institution: Are you ready for the increased scrutiny related to cyber risks? August 27, 2014 Presented by: Terry Ammons, Partner, Porter Keadle Moore Tim Davis, Senior,
Privacy Risk Assessments
Privacy Risk Assessments Michael Hulet Principal November 8, 2012 Agenda Privacy Review Definition Trends Privacy Program Considerations Privacy Risk Assessment Risk Assessment Tools Generally Accepted
Principled Performance & GRC
part of GRC Fundamentals Principled Performance & GRC How principled performance is the new normal and the imperative for integrating governance, performance, risk, internal control and compliance management
Cyber Security Auditing for Credit Unions. ACUIA Fall Meeting October 7-9, 2015
Cyber Security Auditing for Credit Unions ACUIA Fall Meeting October 7-9, 2015 Topics Introduction Cyber Security Auditing Program Discuss an effective and compliant Cyber Security Auditing Program from
The PNC Financial Services Group, Inc. Business Continuity Program
The PNC Financial Services Group, Inc. Business Continuity Program subsidiaries) 1 Content Overview A. Introduction Page 3 B. Governance Model Page 4 C. Program Components Page 4 Business Impact Analysis
Best Practices for Planning and Budgeting. A white paper prepared by PROPHIX Software October 2006
A white paper prepared by PROPHIX Software October 2006 Executive Summary The continual changes in the business climate constantly challenge companies to find more effective business practices. However,
Partnership for Cyber Resilience
Partnership for Cyber Resilience Principles for Cyber Resilience 1. Recognition of interdependence: All parties have a role in fostering a resilient shared digital space 2. Role of leadership: Encourage
PMO Director. PMO Director
PMO Director It s about you Are you curious about how individual projects further a company s strategy? Can you think at the macro level across broad groups of people and services? Do you have an eye for
Developing a Corporate Governance Framework
Developing a Corporate Governance Framework About ERM About The Speaker Karen Livingstone Practice Director at ERM Risk Management, Governance, Regulatory Compliance CPA, CISA, CIA, CRMA designations 20+
Organizational Structure What Works
Organizational Structure What Works Evan Wheeler Director, Omgeo Session ID: PROF-001 Session Classification: Professional Development Once you have gotten past the first few months, you will be presented
COBIT 5 For Cyber Security Governance and Management. Nasser El-Hout Managing Director Service Management Centre of Excellence (SMCE)
COBIT 5 For Cyber Security Governance and Management Nasser El-Hout Managing Director Service Management Centre of Excellence (SMCE) Cybersecurity Governance using COBIT5 Cyber Defence Summit Riyadh, KSA
Cyber Security and the Board of Directors
Helping clients build operational capability in cyber security. A DELTA RISK VIEWPOINT Cyber Security and the Board of Directors An essential responsibility in financial services About Delta Risk is a
Vulnerability Risk Management 2.0. Best Practices for Managing Risk in the New Digital War
Vulnerability Risk Management 2.0 Best Practices for Managing Risk in the New Digital War In 2015, 17 new security vulnerabilities are identified every day. One nearly every 90 minutes. This consistent
RSA ARCHER OPERATIONAL RISK MANAGEMENT
RSA ARCHER OPERATIONAL RISK MANAGEMENT 87% of organizations surveyed have seen the volume and complexity of risks increase over the past five years. Another 20% of these organizations have seen the volume
Security for Financial Services: Addressing the Perception Gaps in a Dynamic Landscape
White Paper Security for Financial Services: Addressing the Perception Gaps in a Dynamic Landscape Financial services organizations have a unique relationship with technology: electronic data and transactions
