Improving Systems Engineering through Operational Risk Management
|
|
|
- Ronald Walters
- 10 years ago
- Views:
Transcription
1 Improving Systems Engineering through Operational Risk Management Brian Gallagher SVP, Operational Excellence CACI, Inc. Dr. Ken Nidiffer Dir. of Strategic Plans for Government Programs Carnegie Mellon University Software Engineering Institute INFORMATION DEPLOYED. SOLUTIONS ADVANCED. MISSIONS ACCOMPLISHED.
2 Problem Statement Many programs fail to address the real operational need when fielding new capabilities resulting in a gap between business and mission needs and operational capabilities. Two major root causes Requirements failed to capture true mission and business needs The mission and business needs evolve during development and project team fails to evolve as quickly Gaps between need and capability increases operational risk. 2
3 Example: ECSS Air Force Expeditionary Combat Support System (ECSS) began development in 2004 Program had vague set of objectives Lack of clarity in operational need and what mission and business needs were being addressed Major disconnect between solving critical operational threats and risks versus solving strategic needs (cost reduction, affordability, consolidation, etc.) Result: $1.1B in wasted funding and a system that was not deployable The Air Force s Expeditionary Combat Support System, or ECSS., is a prime example of how a system designed to save money can actually waste billions of taxpayer dollars without producing any usable capability. Sen. John McCain 3
4 Example: Improvised Explosive Device (IED) Defeat During Operation Iraqi Freedom, IEDs posed a new and real threat Existing capabilities couldn t detect or defeat the threat The military urgently needed new capabilities fast Army created the Joint IED Defeat Organization (JIEDDO) with the sole purpose of defeating this new operational risk Ability to bypass traditional acquisition process Fielded less mature, but effective solutions Lives were saved Quickly fielded systems lacked certain quality attributes such as robustness, evolvability, and maintainability Tactical mission risks mitigated yet strategic business risks ignored: Total Cost of Ownership and Logistical Complexity Increased 4
5 Operational Risk to Balance the Need The purpose of any new system, component or capability development should be to mitigate operational risk During development, operational risk changes Systems engineering activities during the project lifecycle should evolve through operational risk considerations 5
6 Typical Risk Management Acquisition Risk Management During Acquisition Planning and Execution Focus is on programmatic risk Program and Engineering Risk Management During Development Identify and mitigate risks associated with cost and schedule Identify and mitigate technical risks associated with technical approach Concept of Operational Risk is Lacking 6
7 The More Effective Approach 7
8 Operational Risk-Driven Engineering Requirements/ Engineering Development (ORDERED) 8
9 ORDERED Steps 9
10 ORDERED Risk Taxonomy 10
11 Example: Cyber Security Operations Center* The purpose of the CSOC is to ensure that cybersecurity incidents do not impact agency operations. *Case study is fictitious and any resemblance to a real program or agency is not intended 11
12 Example: CSOC Identify Operational Risks Risks identified by operational users during a facilitated workshop using the ORDERED taxonomy Risk ID CSOC001 CSOC002 CSOC003 CSOC004 CSOC005 Risk Statement Incident occurance is unpredictable; may not have adequate resources to respond during crisis Heavy compliance and oversight make processes rigid; may not be able to adjust quickly to new events Current intrusion detection system is proprietary and vendor is not responsive when changes are needed; system may not detect newer threats, cost of support is high We hire new operators with little experience; Lower mission effectiveness 80% of operator time is spent responding to incidents; may not see trends or understand root cause of indidents 12
13 Example: CSOC Analyze Operational Risks Risks characterized by probability and impact and sorted into Top 5 Top "N" Risk ID Risk Statement Prob Imp Risk Exposure 1 CSOC004 We hire new operators with little experience; Lower mission effectiveness CSOC003 Current intrusion detection system is proprietary and vendor is not responsive when changes are needed; system may not detect newer threats, cost of support is high 3 CSOC005 80% of operator time is spent responding to incidents; may not see trends or understand root cause of indidents CSOC001 Incident occurance is unpredictable; may not have adequate resources to respond during crisis CSOC002 Heavy compliance and oversight make processes rigid; may not be able to adjust quickly to new events
14 Example: CSOC Identify Risk Attributes Most important risks further clarified by identifying the attribute and attribute concern. Risk Attribute: a characteristic of the operational mission or business which will be judged negatively by stakeholders unless the operational risk is mitigated Top "N" Risk ID Risk Statement Risk Attributes Attribute Concern 1 CSOC004 2 CSOC003 We hire new operators with little experience; Lower mission effectiveness Current intrusion detection system is proprietary and vendor is not responsive when changes are needed; system may not detect newer threats, cost of support is high 1. Operator: Training, Skill Level 2. Mission Execution: Effectiveness 1. Operational Systems: Flexibility 2. Mission Execution: Affordability Assimilation of new staff and planned growth in mission Mission expansion and attack sophistication 14
15 Example: CSOC Develop Risk Scenarios Scenarios are simply expressions of real-world interactions Used in engineering to express expectedbehavior of systems, components or capabilities Operational Risk Scenarios describe the unwantedbehavior of the system that would cause mission or business impact to the operational organization. 15
16 Example: CSOC Develop Risk Scenarios CSOC Risks and Risk Scenarios Top "N" Risk ID Risk Statement Risk Attributes Attribute Concern 1 CSOC004 We hire new operators with little experience; Lower mission effectiveness 1. Operator: Training, Skill Level 2. Mission Execution: Effectiveness Assimilation of new staff and planned growth in mission Operational Risk Scenarios 1. New operator joins organization and fails to be completely certified and capable within 2 weeks 2. OPs staff grows by 200% increasing number of teams performing the mission. New teams not fully capable of supporting operations within 1 month 2 CSOC003 Current intrusion detection system is proprietary and vendor is not responsive when changes are needed; system may not detect newer threats, cost of support is high 1. Operational Systems: Flexibility 2. Mission Execution: Affordability Mission expansion and attack sophistication Operational Risk Scenarios 1. New mission tasking requires additional intrusion detection across new agency locations. Current system fails to scale and vendor is unresponsive in making required system changes 2. A new hacker group uses alternative means to access closed system and uses technology not detected by current system. Complete redesign of detection system required to implement new detection algorithms. 16
17 Example: CSOC Prioritizing Risk Scenarios Mission or Business Criticality HIGH Serious mission or business impact MEDIUM Moderate mission or business impact LOW Low mission or business impact Plan Gap HIGH No accommodation based on current operations or engineering plan (requirements, design, implementation, testing, deployment) MEDIUM Some accommodation based on current operations or engineering plan (requirements, design, implementation, testing, deployment) LOW Accommodated in current operations or engineering plan (requirements, design, implementation, testing, deployment) 17
18 Example: CSOC Prioritized Risk Scenarios Based on inputs from operational staff Scenario Number Operational Risk Scenario Criticality Gap CSOC003-1 CSOC004-2 New mission tasking requires additional intrusion detection across new agency locations. Current system fails to scale and vendor is unresponsive in making required system changes OPs staff grows by 200% increasing number of teams performing the mission. New teams not fully capable of supporting operations within 1 month HIGH HIGH HIGH MEDIUM CSOC003-2 A new hacker group uses alternative means to access closed system and uses technology not detected by current system. Complete re-design of detection system required to implement new detection algorithms. MEDIUM HIGH CSOC004-1 New operator joins organization and fails to be completely certified and capable within 2 weeks MEDIUM MEDIUM 18
19 Influencing the Engineering Process Continuous operational risk identification and risk scenario evolution used to influence every aspect of the systems engineering process 19
20 Example: CSOC Influencing the Engineering Process Potential activities identified: CSOC003-1: Non-functional requirements of scalability, flexibility and evolvability were ignored. ECP issued to add additional architectural trade-studies with the goal of maximizing the non-functional requirements. CSOC004-2: Lack of a separate training environment identified. Change request initiated to add the requirement for an operationally relevant training environment. CSOC003-1: The architecture team had failed to consider structural and behavioral patterns that would help avoid the risk scenario. Team revised their approach and selected additional architectural patterns to increase the scalability, flexibility and evolvability of the solution. 20
21 Summary By using a structured approach to incorporate operational risk considerations into the engineering process, evolving mission and business risks are considered and mitigated increasing the likelihood of fielding an operationally effective system, component or capability 21
22 Next Steps Use of ORDERED process and/or concepts of operational risk management on critical programs Evaluation of results Evolution of the ORDERED process based on use and learning 22
23 Interested in Advancing Research in Applying Operational Risk Concepts to Systems Engineering? Looking for individuals, programsor organizationsinterested in applying the ORDERED process and sharing results Characteristics of Individuals: Interested in exploring operational risk management concepts Characteristics of Programs: Software-intensive or complex service delivery Operational uncertainty during development Characteristics of Organizations: Operational organizations looking for structure operational risk identification process to influence system development Contact: Brian Gallagher 23
24 Questions? 24
25 Selected References Aronin, B.S., et al., Expeditionary Combat Support System: Root Cause Analysis. 2011, DTIC Document. Carney, David J., and David Biber. The Adventures of Ricky & Stick: Fables in Software Acquisition. Carnegie Mellon University, Software Engineering Institute, 2006 Carr, M.J., et al., Taxonomy-based risk identification. 1993, DTIC Document. Ellis, R.F., R.D. Rogers, and B.M. Cochran, Joint Improvised Explosive Device Defeat Organization (JIEDDO): Tactical Successes Mired in Organizational Chaos; Roadblock in the Counter-IED Fight. 2007, DTIC Document. Gallagher, B.P., et al., A Taxonomy of Operational Risks Gallagher, B.P., Interpreting Capability Maturity Model Integration (CMMI) for Operational Organizations Gallagher, B., et al., CMMI for Acquisition: Guidelines for Improving the Acquisition of Products and Services. 2011: Addison- Wesley Professional. McCain, J. FLOOR REMARKS BY SENATOR JOHN MCCAIN ON THE AIR FORCE S ECSS PROGRAM [cited August, 2015]; Available from: 25
A Taxonomy of Operational Risks
Sponsored by the U.S. Department of Defense 2005 by Carnegie Mellon University A Taxonomy of Operational Risks Brian Gallagher Director, Acquisition Support page 1 Operational Risk By its nature, the uncertainty
GAO MAJOR AUTOMATED INFORMATION SYSTEMS. Selected Defense Programs Need to Implement Key Acquisition Practices
GAO United States Government Accountability Office Report to Congressional Addressees March 2013 MAJOR AUTOMATED INFORMATION SYSTEMS Selected Defense Programs Need to Implement Key Acquisition Practices
How To Write A Cybersecurity Framework
NIST Cybersecurity Framework Overview Executive Order 13636 Improving Critical Infrastructure Cybersecurity 2nd ENISA International Conference on Cyber Crisis Cooperation and Exercises Executive Order
EASPI EASPI. The Integrated CMMI-based Improvement Framework for Test and Evaluation. Jeffrey L. Dutton Principal Consultant
The Integrated CMMI-based Improvement Framework for Test and Evaluation Jeffrey L. Dutton Principal Consultant Engineering and Services Performance Improvement LLC 22 Copyrights and Service Marks CMMI
Cybersecurity Framework. Executive Order 13636 Improving Critical Infrastructure Cybersecurity
Cybersecurity Framework Executive Order 13636 Improving Critical Infrastructure Cybersecurity National Institute of Standards and Technology (NIST) Mission To promote U.S. innovation and industrial competitiveness
FFIEC Cybersecurity Assessment Tool Overview for Chief Executive Officers and Boards of Directors
Overview for Chief Executive Officers and Boards of Directors In light of the increasing volume and sophistication of cyber threats, the Federal Financial Institutions Examination Council 1 (FFIEC) developed
The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/ 287-1808
cover_comp_01 9/9/02 5:01 PM Page 1 For further information, please contact: The President s Critical Infrastructure Protection Board Office of Energy Assurance U.S. Department of Energy 202/ 287-1808
Cyber Security and Privacy - Program 183
Program Program Overview Cyber/physical security and data privacy have become critical priorities for electric utilities. The evolving electric sector is increasingly dependent on information technology
Cybersecurity Awareness for Executives
SESSION ID: SOP-R04 Cybersecurity Awareness for Executives Rob Sloan Head of Cyber Content and Data Dow Jones @_rob_sloan Session Overview Aim: Provide a high level overview of an effective cybersecurity
The Comprehensive National Cybersecurity Initiative
The Comprehensive National Cybersecurity Initiative President Obama has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation, but one that we
A Report on The Capability Maturity Model
A Report on The Capability Maturity Model Hakan Bayraksan hxb07u 29 November 2009 G53QAT Table of Contents Introduction...2 The evolution of CMMI...3 CMM... 3 CMMI... 3 The definition of CMMI... 4 Level
Middle Class Economics: Cybersecurity Updated August 7, 2015
Middle Class Economics: Cybersecurity Updated August 7, 2015 The President's 2016 Budget is designed to bring middle class economics into the 21st Century. This Budget shows what we can do if we invest
Cybersecurity. Are you prepared?
Cybersecurity Are you prepared? First Cash, then your customer, now YOU! What is Cybersecurity? The body of technologies, processes, practices designed to protect networks, computers, programs, and data
Cloud Computing. Key Initiative Overview
David W. Cearley Research Vice President and Gartner Fellow This overview provides a high-level description of the Cloud Computing Key Initiative. IT leaders can use this guide to understand what they
Business resilience: The best defense is a good offense
IBM Business Continuity and Resiliency Services January 2009 Business resilience: The best defense is a good offense Develop a best practices strategy using a tiered approach Page 2 Contents 2 Introduction
Executive Summary. Cybersecurity cannot be completely solved, and will remain a risk we must actively manage.
Executive Summary Statement of Nadya Bartol Vice President, Industry Affairs and Cybersecurity Strategist Utilities Telecom Council Before the Subcommittee on Oversight and Subcommittee on Energy Committee
Cisco Security Optimization Service
Cisco Security Optimization Service Proactively strengthen your network to better respond to evolving security threats and planned and unplanned events. Service Overview Optimize Your Network for Borderless
www.pwc.com The data breach lifecycle: From prevention to response IAPP global privacy summit March 6, 2014 (4:30-5:30) Draft v8 2-25-14
www.pwc.com The data breach lifecycle: From prevention to response IAPP global privacy summit (4:30-5:30) Draft v8 2-25-14 Common Myths 1. You have not been hacked. 2. Cyber security is about keeping the
Developing CMMI in IT Projects with Considering other Development Models
Developing CMMI in IT Projects with Considering other Development Models Anahita Ahmadi* MSc in Socio Economic Systems Engineering Organizational Process Development Engineer, International Systems Engineering
Cloud Security Benchmark: Top 10 Cloud Service Providers Appendix A E January 5, 2015
Cloud Security Benchmark: Top 10 Cloud Service Providers Appendix A E January 5, 2015 2015 CloudeAssurance Page 1 Table of Contents Copyright and Disclaimer... 3 Appendix A: Introduction... 4 Appendix
Lessons from Defending Cyberspace
Lessons from Defending Cyberspace The Challenge of Addressing National Cyber Risk Andy Purdy Workshop on Cyber Security Center for American Studies, Christopher Newport College 10 28-2009 Cyber Threat
RETHINKING CYBER SECURITY
RETHINKING CYBER SECURITY Introduction Advanced Persistent Threats (APTs) and advanced malware have been plaguing IT professionals for over a decade. During that time, the traditional cyber security vendor
CONTINUITY OF OPERATIONS AUDIT PROGRAM EVALUATION AND AUDIT
CONTINUITY OF OPERATIONS AUDIT PROGRAM EVALUATION AND AUDIT April 16, 2014 INTRODUCTION Purpose The purpose of the audit is to give assurance that the development of the Metropolitan Council s Continuity
Agenda. Introduction to SCADA. Importance of SCADA security. Recommended steps
Agenda Introduction to SCADA Importance of SCADA security Recommended steps SCADA systems are usually highly complex and SCADA systems are used to control complex industries Yet.SCADA systems are actually
NASA OFFICE OF INSPECTOR GENERAL
NASA OFFICE OF INSPECTOR GENERAL OFFICE OF AUDITS SUITE 8U71, 300 E ST SW WASHINGTON, D.C. 20546-0001 April 14, 2016 TO: SUBJECT: Renee P. Wynn Chief Information Officer Final Memorandum, Review of NASA
Operationally Critical Threat, Asset, and Vulnerability Evaluation SM (OCTAVE SM ) Framework, Version 1.0
Operationally Critical Threat, Asset, and Vulnerability Evaluation SM (OCTAVE SM ) Framework, Version 1.0 Christopher J. Alberts Sandra G. Behrens Richard D. Pethia William R. Wilson June 1999 TECHNICAL
SOLUTION BRIEF. Next Generation APT Defense for Healthcare
SOLUTION BRIEF Next Generation APT Defense for Healthcare Overview Next Generation APT Defense for Healthcare Healthcare records with patients personally identifiable information (PII) combined with their
April 28, 2014. Ms. Hada Flowers Regulatory Secretariat Division General Services Administration 1800 F Street, NW, 2 nd Floor Washington, DC
April 28, 2014 Ms. Hada Flowers Regulatory Secretariat Division General Services Administration 1800 F Street, NW, 2 nd Floor Washington, DC RE: Information Technology Sector Coordinating Council (IT SCC)
JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015
JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015 The following consists of the joint explanatory statement to accompany the Cybersecurity Act of 2015. This joint explanatory statement
Application Security in the Software Development Lifecycle
Application Security in the Software Development Lifecycle Issues, Challenges and Solutions www.quotium.com 1/15 Table of Contents EXECUTIVE SUMMARY... 3 INTRODUCTION... 4 IMPACT OF SECURITY BREACHES TO
SAS. Fraud Management. Overview. Real-time scoring of all transactions for fast, accurate fraud detection. Challenges PRODUCT BRIEF
PRODUCT BRIEF SAS Fraud Management Real-time scoring of all transactions for fast, accurate fraud detection Overview Organizations around the globe lose approximately 5 percent of annual revenues to fraud,
Audit of NRC s Network Security Operations Center
Audit of NRC s Network Security Operations Center OIG-16-A-07 January 11, 2016 All publicly available OIG reports (including this report) are accessible through NRC s Web site at http://www.nrc.gov/reading-rm/doc-collections/insp-gen
Measuring Success Service Desk Evaluation Guide for the Midsized Business: How to Choose the Right Service Desk Solution and Improve Your ROI
BEST PRACTICES WHITE PAPER Measuring Success Service Desk Evaluation Guide for the Midsized Business: How to Choose the Right Service Desk Solution and Improve Your ROI Table of Contents INTRODUCTION...1
Cybersecurity: Mission integration to protect your assets
Cybersecurity: Mission integration to protect your assets C Y B E R S O L U T I O N S P O L I C Y O P E R AT I O N S P E O P L E T E C H N O L O G Y M A N A G E M E N T Ready for what s next Cyber solutions
The Advantages of ISO 9001 Certification
Standards, d Certification and Regulations Reprisal: Types of Requirements Functional requirements: requirements that specify a function that a system or system component must be able to perform The watch
Cybersecurity in the States 2012: Priorities, Issues and Trends
Cybersecurity in the States 2012: Priorities, Issues and Trends Commission on Maryland Cyber Security and Innovation June 8, 2012 Pam Walker, Director of Government Affairs National Association of State
Cyber Security Evolved
Cyber Security Evolved Aware Cyber threats are many, varied and always evolving Being aware is knowing what is going on so you can figure out what to do. The challenge is to know which cyber threats are
Security Services. A Solution for Providing BPM of Security Services within the Enterprise Environment.
Security Services A Solution for Providing BPM of Security Services within the Enterprise Environment. First steps towards Next Generations Operations (OPS) to drive Gross Margin Dear security colleagues,
Enterprise Security Tactical Plan
Enterprise Security Tactical Plan Fiscal Years 2011 2012 (July 1, 2010 to June 30, 2012) Prepared By: State Chief Information Security Officer The Information Security Council State of Minnesota Enterprise
EMERGENCY PREPAREDNESS PLAN Business Continuity Plan
EMERGENCY PREPAREDNESS PLAN Business Continuity Plan GIS Bankers Insurance Group Powered by DISASTER PREPAREDNESS Implementation Small Business Guide to Business Continuity Planning Surviving a Catastrophic
PRIORITIZING CYBERSECURITY
April 2016 PRIORITIZING CYBERSECURITY Five Investor Questions for Portfolio Company Boards Foreword As the frequency and severity of cyber attacks against global businesses continue to escalate, both companies
State of Minnesota. Enterprise Security Strategic Plan. Fiscal Years 2009 2013
State of Minnesota Enterprise Security Strategic Plan Fiscal Years 2009 2013 Jointly Prepared By: Office of Enterprise Technology - Enterprise Security Office Members of the Information Security Council
Cisco Unified Communications and Collaboration technology is changing the way we go about the business of the University.
Data Sheet Cisco Optimization s Optimize Your Solution using Cisco Expertise and Leading Practices Optimizing Your Business Architecture Today, enabling business innovation and agility is about being able
FFIEC Cybersecurity Assessment Tool
Overview In light of the increasing volume and sophistication of cyber threats, the Federal Financial Institutions Examination Council 1 (FFIEC) developed the Cybersecurity Tool (), on behalf of its members,
Cyber Threats Insights from history and current operations. Prepared by Cognitio May 5, 2015
Cyber Threats Insights from history and current operations Prepared by Cognitio May 5, 2015 About Cognitio Cognitio is a strategic consulting and engineering firm led by a team of former senior technology
Measuring Software Security
Measuring Software Security Defining Security Metrics Dr. Bill Young Department of Computer Science University of Texas at Austin Last updated: July 1, 2014 at 14:53 Dr. Bill Young: 1 Why Is CyberSecurity
Cyber Security Risk Management: A New and Holistic Approach
Cyber Security Risk Management: A New and Holistic Approach Understanding and Applying NIST SP 800-39 WebEx Hosted by: Business of Security and Federal InfoSec Forum April 12, 2011 Dr. Ron Ross Computer
How ERM programs evolve
How to achieve excellent Enterprise Risk Management series www.pwc.com/us/ermexcellenceseries Article 3: June 2015 How ERM programs evolve Overview An organization s enterprise risk management (ERM) program
S 2 ERC Project: A Review of Return on Investment for Cybersecurity. Author: Joe Stuntz, MBA EP 14, McDonough School of Business.
S 2 ERC Project: A Review of Return on Investment for Cybersecurity Author: Joe Stuntz, MBA EP 14, McDonough School of Business Date: 06 May 2014 Abstract Many organizations are looking at investing in
SYMANTEC MANAGED SECURITY SERVICES. Superior information security delivered with exceptional value.
SYMANTEC MANAGED SECURITY SERVICES Superior information security delivered with exceptional value. A strong security posture starts with a smart business decision. In today s complex enterprise environments,
Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.
Cyber Security Automation of energy systems provides attack surfaces that previously did not exist Cyber attacks have matured from teenage hackers to organized crime to nation states Centralized control
Security Engineering Best Practices. Arca Systems, Inc. 8229 Boone Blvd., Suite 750 Vienna, VA 22182 703-734-5611 [email protected].
Tutorial: Instructor: Topics: Biography: Security Engineering Best Practices Karen Ferraiolo, Arca Systems, Inc. 8229 Boone Blvd., Suite 750 Vienna, VA 22182 703-734-5611 [email protected] This tutorial
Achieve Economic Synergies by Managing Your Human Capital In The Cloud
Achieve Economic Synergies by Managing Your Human Capital In The Cloud By Orblogic, March 12, 2014 KEY POINTS TO CONSIDER C LOUD S OLUTIONS A RE P RACTICAL AND E ASY TO I MPLEMENT Time to market and rapid
BlacKnight. Cyber Security international A BUSINESS / MARKETING PRESENTATION
BlacKnight Cyber Security international A BUSINESS / MARKETING PRESENTATION The BlacKnight Mission To provide proven techniques and innovative learning services to help organizations detect, deter and
Overcoming Five Critical Cybersecurity Gaps
Overcoming Five Critical Cybersecurity Gaps How Active Threat Protection Addresses the Problems that Security Technology Doesn t Solve An esentire White Paper Copyright 2015 esentire, Inc. All rights reserved.
Board oversight of risk: Defining risk appetite in plain English
www.pwc.com/us/centerforboardgovernance Board oversight of risk: Defining risk appetite in plain English May 2014 Defining risk appetite in plain English Risk oversight continues to be top-of-mind for
The Role of Business Capabilities in Strategic Planning. Sneaking up on Quality Using Business Architecture in a learning corporation
The Role of Business Capabilities in Strategic Planning Sneaking up on Quality Using Business Architecture in a learning corporation 2 Credits The Open Management Group, Business Architecture Special Interest
INFORMATION SECURITY STRATEGIC PLAN
INFORMATION SECURITY STRATEGIC PLAN UNIVERSITY OF CONNECTICUT INFORMATION SECURITY OFFICE 4/20/10 University of Connecticut / Jason Pufahl, CISSP, CISM 1 1 MISSION STATEMENT The mission of the Information
Developing and Implementing a Strategy for Technology Deployment
TechTrends Developing and Implementing a Strategy for Technology Deployment Successfully deploying information technology requires executive-level support, a structured decision-making process, and a strategy
Introduction to the CMMI Acquisition Module (CMMI-AM)
Pittsburgh, PA 15213-3890 Introduction to the CMMI Acquisition Module (CMMI-AM) Module 2: CMMI-AM and Project Management SM CMM Integration, IDEAL, and SCAMPI are service marks of Carnegie Mellon University.
ICBA Summary of FFIEC Cybersecurity Assessment Tool
ICBA Summary of FFIEC Cybersecurity Assessment Tool July 2015 Contact: Jeremy Dalpiaz Assistant Vice President Cyber Security and Data Security Policy [email protected] www.icba.org ICBA Summary
The Changing IT Risk Landscape Understanding and managing existing and emerging risks
The Changing IT Risk Landscape Understanding and managing existing and emerging risks IIA @ Noon Kareem Sadek Senior Manager, Deloitte Canada Chris Close Senior Manager, Deloitte Canada December 2, 2015
A Risk Assessment Methodology (RAM) for Physical Security
A Risk Assessment Methodology (RAM) for Physical Security Violence, vandalism, and terrorism are prevalent in the world today. Managers and decision-makers must have a reliable way of estimating risk to
IT Security Risk Management Model for Cloud Computing: A Need for a New Escalation Approach.
IT Security Risk Management Model for Cloud Computing: A Need for a New Escalation Approach. Gunnar Wahlgren 1, Stewart Kowalski 2 Stockholm University 1: ([email protected]), 2: ([email protected]) ABSTRACT
Advancing the U.S. Air Force Mission
Advancing the U.S. Air Force Mission IT Solutions, Professional & Technical Services Agile Support for Today s Operations, Reliable Innovation for Tomorrow s Missions An F-22 in Nevada returns to the
Enterprise Risk Management in Colleges and Universities
Enterprise Risk Management in Colleges and Universities Cherry Bekaert & Holland, L.L.P. Neal Beggan, CISA, CRISC Shane Hester, CPA, CISA Cherry, Bekaert & Holland, L.L.P. The Firm of Choice. 1 Cherry,
Entire contents 2011 Praetorian. All rights reserved. Information Security Provider and Research Center www.praetorian.com
Entire contents 2011 Praetorian. All rights reserved. Information Security Provider and Research Center www.praetorian.com Threat Modeling "Threat modeling at the design phase is really the only way to
NIST Cybersecurity Framework & A Tale of Two Criticalities
NIST Cybersecurity Framework & A Tale of Two Criticalities Vendor Management & Incident Response Presented by: John H Rogers, CISSP Advisory Services Practice Manager [email protected] Presented
The 5 Cybersecurity Concerns You Can t Overlook
The 5 Cybersecurity Concerns You Can t Overlook and how to address them 2014 SimSpace Corporation The 5 Cybersecurity Concerns You Can t Overlook CONCERN 1 You don t know how good your cybersecurity team
U.S. Office of Personnel Management. Actions to Strengthen Cybersecurity and Protect Critical IT Systems
U.S. Office of Personnel Management Actions to Strengthen Cybersecurity and Protect Critical IT Systems June 2015 1 I. Introduction The recent intrusions into U.S. Office of Personnel Management (OPM)
Advanced Risk Analysis for High-Performing Organizations
Pittsburgh, PA 15213-3890 Advanced Risk Analysis for High-Performing Organizations Christopher Alberts Audrey Dorofee Sponsored by the U.S. Department of Defense 2006 by Carnegie Mellon University page
STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE
STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE HOUSE OVERSIGHT AND GOVERNMENT REFORM COMMITTEE S INFORMATION TECHNOLOGY SUBCOMMITTEE AND THE VETERANS
Threat Intelligence is Like Three Day Potty Training
SESSION ID: CXO-T08R Threat Intelligence is Like Three Day Potty Training Rick Holland Principal Analyst Forrester Research @rickhholland Potty training method that guarantees success so you can say goodbye
Cybersecurity Capability Maturity Model
National Initiative for Cybersecurity Education Cybersecurity Capability Maturity Model White Paper Version.0 Last Updated: October 0, 0 0 0 Executive Summary Cybersecurity is one of the leading national
DEFENSE INFORMATION SYSTEMS AGENCY STRATEGIC PLAN UNITED IN SERVICE TO OUR NATION
DEFENSE INFORMATION SYSTEMS AGENCY STRATEGIC PLAN 2015 2020 UNITED IN SERVICE TO OUR NATION DIRECTOR S STATEMENT We are at an operational crossroads. We continue to operate in a contested battlespace,
Connecting the dots: A proactive approach to cybersecurity oversight in the boardroom. kpmg.bm
Connecting the dots: A proactive approach to cybersecurity oversight in the boardroom kpmg.bm Connecting the dots: A proactive approach to cybersecurity oversight in the boardroom 1 Connecting the dots:
THE CHALLENGES OF CYBERSECURITY TRAINING
THE CHALLENGES OF CYBERSECURITY TRAINING DR. JORGE LÓPEZ HERNÁNDEZ ARDIETA DR. MARINA SOLEDAD EGEA GONZÁLEZ Cybersecurity Research Group Cybersecurity& Privacy Innovation Forum Brussels Belgium 28-29 April
Cybersecurity Management Programs
Cybersecurity Management Programs Dr. J. Stuart Broderick, CISM, CRISC, CCSK Principal Cisco Security Solutions June 2015 Most organizations cybersecurity teams (or information security teams as they are
PASTA Abstract. Process for Attack S imulation & Threat Assessment Abstract. VerSprite, LLC Copyright 2013
2013 PASTA Abstract Process for Attack S imulation & Threat Assessment Abstract VerSprite, LLC Copyright 2013 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Integrating Continuity of Operations (COOP) into the Enterprise Architecture
Volume 1, Issue 2 August 2007 Continuity of Operations Leadership Series for Government Integrating Continuity of Operations (COOP) into the Enterprise Architecture Pillar COOP Leadership Series for Government
ENTERPRISE COMPUTING ENVIRONMENT. Creating connections THROUGH SERVICE & WORKFORCE EXCELLENCE
ITA Strategic Plan FY 2011 - FY 2016 U.S. Army Information Technology Agency REALIZING The DoD ENTERPRISE COMPUTING ENVIRONMENT Creating connections THROUGH SERVICE & WORKFORCE EXCELLENCE Provide Quality
ISO, CMMI and PMBOK Risk Management: a Comparative Analysis
ISO, CMMI and PMBOK Risk Management: a Comparative Analysis Cristine Martins Gomes de Gusmão Federal University of Pernambuco / Informatics Center Hermano Perrelli de Moura Federal University of Pernambuco
E-SECURITY REVIEW 2008 DISCUSSION PAPER FOR PUBLIC CONSULTATION
1. Introduction E-SECURITY REVIEW 2008 DISCUSSION PAPER FOR PUBLIC CONSULTATION Australia s national security and economic and social well-being rely upon the use and availability of a range of Information
Information Security Management System for Microsoft s Cloud Infrastructure
Information Security Management System for Microsoft s Cloud Infrastructure Online Services Security and Compliance Executive summary Contents Executive summary 1 Information Security Management System
