States at Risk: Cyber Threat Sophistication, Inadequate Budget and Talent
|
|
|
- Raymond Farmer
- 9 years ago
- Views:
Transcription
1 SESSION ID: PNG-R04 States at Risk: Cyber Threat Sophistication, Inadequate Budget and Talent MODERATOR: Christopher Ipsen CIO Nevada Desert Research Institute PANELISTS: Tim Hastings Chief Information Security Officer (CISO) State of Utah Srini Subramanian State Sector Risk Advisory Leader Deloitte & Touche LLP Thomas MacLellan Homeland Security and Public Safety Division Director National Governors Association, Center for Best Practices
2 Panel Christopher Ipsen CIO, Nevada Desert Research Institute Moderator Tim Hastings Chief Information Security Officer (CISO), State of Utah Thomas MacLellan Homeland Security and Public Safety Division Director, National Governors Association, Center for Best Practices Srini Subramanian State Sector Risk Advisory Leader, Deloitte & Touche LLP 2
3 Agenda Introduction The maturing role of the CISO Budget-strategy disconnect Cyber security complexity Talent crisis Q&A 3
4 State governments are a target, citizen trust ` impact is top concern States collect, share and use large volumes of the most comprehensive citizen information. Makes states an attractive target for both organized cyber criminals and hactivists. Cybersecurity needs to be a governor and a business executive level issue. 4
5 The Third biennial study The study is based on surveys and comparisons, and offers suggestions to: Provide state leadership with insights and identify trends to help states set informed and strategic cybersecurity direction Assess elected and appointed business leader input with a state officials survey Compare responses from CISOs and state officials, along with relevant results from the 2010 and 2012 studies 5
6 An outstanding response and result State CISO Survey: 49 state CISOs responded to an online survey containing 58 questions State Officials Survey: 186 elected and appointed officials from 14 affiliated organizations answered 14 questions: Results 1. Cybersecurity Study 1. National Association of State Auditors, Controllers & Treasurers (NASACT) 2. National Association of Attorneys General (NAAG) 3. National Association of Secretaries of State (NASS) 4. National Association of State Personnel Executives (NASPE) 5. National Association of State Chief Administrators (NASCA) 6. National Association of State Budget Officers (NASBO) 7. National Association of State Procurement Officials (NASPO) 2. Benchmark Report 8. American Association of Motor Vehicle Administrators (AAMVA) 9. National Association of Medicaid Directors (NAMD) 10.National Emergency Management Association (NEMA) 11.Adjutant General Association of the United States (AGAUS) 12.Governors Homeland Security Advisors Council (GHSAC) 13.Federation of Tax Administrators (FTA) 14.International Association of Chiefs of Police (IACP) Division of State & Provincial Police (S&P) 6
7 Findings from the study
8 Key themes from the study Maturing role of the CISO Budget-strategy disconnect Cyber complexity challenge Talent crisis 8
9 I. Maturing role of the CISO
10 Maturing role of the CISO 98.0% Of states have a CISO The CISO role is gaining legitimacy 89.8% CISOs report to CIOs 49.0% CISO authority established by statue or law 55.1% CISO authority established by secretary or CIO 10
11 Maturing role of the CISO 39.6% Governors Communication to business leaders is mostly ad hoc 25.0% Secretary/ deputy secretary 40.4% State legislature 43.8% Business stakeholders 98.0% Of states have a CISO 49.0% CISO authority established by statue or law 89.8% CISO report to CIO 55.1% CISO authority established by secretary or CIO 11
12 Maturing role of the CISO 100% Awareness and training Top CISO function have standardized 100% Strategy and planning 95.9% Risk assessment and management 98.0% Incident management 98.0% Of states have a CISO 49.0% CISO authority established by statue or law 89.8% CISO report to CIO 55.1% CISO authority established by secretary or CIO 98.0% Governance (architecture, policies, and standards) 12
13 Moving forward Role and governance Governance, Risk and Compliance: CISOs could continue to manage the strategic, risk management, and regulatory/compliance functions Privacy: Enterprise-level privacy officers can help determine which data needs to be protected and why Security technology and operations: A security executive could manage technical and operational aspects of security 13
14 II. Budget-strategy disconnect
15 Budget-strategy disconnect Cybersecurity budgets are increasing year over year 47.9% 14.0% Additional funding sources are helping with the increase Percentage of CISO respondents % 32.7% U.S. Department of Homeland Security Business/program stakeholders 15
16 Budget-strategy disconnect Funding is still the #1 barrier to effective cybersecurity Security allocation as part of IT budget remains unchanged 75.5% Lack of sufficient funding Senior Executive commitment is there, but funding still insufficient IT budget 46.8% of states have only 1-2% of IT budget for cybersecurity 65.3% 16
17 Budget-strategy disconnect Approved strategies are still largely missing Absence of businessaligned metrics 45% Absence of approved strategy 47.9% Majority of CISOs continue to work on establishing business-aligned metrics 17
18 Moving forward Strategize & achieve appropriate funding Communicate and collaborate with legislators and state business/program leadership to build a business case for security as a line item in the budget Effectively collaborate with agency-level program and business leaders to get cybersecurity included in program budgets Work with CIOs to: Allocate a reasonable percentage of new business and technology initiatives for cybersecurity Identify creative ways to include cybersecurity as a critical part of enterprise data center consolidation initiatives 18
19 III. Cyber complexity challenge
20 Cyber complexity challenge Confidence Gap Ability to protect against external attacks; Only 24% CISOs vs. 60% State officials Top barriers State officials and CISOs agree #1 Funding State officials CISOs #2 Sophistication of threats 20
21 Moving forward Unravel the complexity Use both increasing regulatory requirements and audit findings to gain the attention of business and agency/program leaders Clearly communicate the nature and severity of cyber risks and impacts to business stakeholders, agency/program leaders and legislative leaders State cybersecurity approach needs to evolve can t rely on protection or securing efforts alone 23
22 IV. Talent crisis
23 Talent crisis FTE counts are increasing 49% 6 to 15 FTEs Competencies have increased, training has improved 7 out of 10 states agree Inadequate availability of cybersecurity professionals 25 Barrier #3 59%
24 Talent crisis Top challenge is staffing Salary 9 out of 10 CISOs Collaboration needed with HR to define cybersecurity career path 25% States with appropriate job descriptions documented by HR Leading challenge in workforce development 67.3% CISOs choose "Lack of a defined cybersecurity career path" 26
25 Talent crisis Top three actions to improve workforce Top functions outsourced 57.1% 46.9% 42.9% Non-salary benefit Cross-train IT workforce NICE framework University relations 38.8% Forensics/ legal support 36.7% Threat management and monitoring services 36.7% Threat risk assessments 35.4% CISOs are reviewing 27
26 Moving forward Get creative & gain on talent Attracting Millennials is a whole new ballgame: Millennial are likely to be an important source of talent in the cybersecurity arena Partner with Human Resources: States need a career development path for cybersecurity talent Partner with private sector to supplement cybersecurity teams: CISOs should provide training to their staff to effectively manage teams that may include members from third parties 28
27 Questions & answers
2014 Deloitte-NASCIO Cybersecurity Study State governments at risk: Time to move forward
2014 Deloitte-NASCIO Cybersecurity Study State governments at risk: Time to move forward A publication of Deloitte and the National Association of State Chief Information Officers (NASCIO) Contents Message
Cybersecurity in the States 2012: Priorities, Issues and Trends
Cybersecurity in the States 2012: Priorities, Issues and Trends Commission on Maryland Cyber Security and Innovation June 8, 2012 Pam Walker, Director of Government Affairs National Association of State
State of South Carolina Initial Security Assessment
State of South Carolina Initial Security Assessment Deloitte & Touche LLP Date: May 1, 2013 Our services were performed in accordance with the Statement on Standards for Consulting Services that is issued
State of Minnesota. Enterprise Security Strategic Plan. Fiscal Years 2009 2013
State of Minnesota Enterprise Security Strategic Plan Fiscal Years 2009 2013 Jointly Prepared By: Office of Enterprise Technology - Enterprise Security Office Members of the Information Security Council
Into the cybersecurity breach
Into the cybersecurity breach Tim Sanouvong State Sector Cyber Risk Services Deloitte & Touche LLP April 3, 2015 Agenda Setting the stage Cyber risks in state governments Cyber attack vectors Preparing
Information Systems Security Line of Business (ISS LoB)
Information Systems Security Line of Business (ISS LoB) Information Security and Privacy Advisory Board George Washington University Washington, DC March 22, 2007 Agenda Background Status Next Steps Background
Cybersecurity The role of Internal Audit
Cybersecurity The role of Internal Audit Cyber risk High on the agenda Audit committees and board members are seeing cybersecurity as a top risk, underscored by recent headlines and increased government
State of the States: IT Trends, Priorities and Issues
State of the States: IT Trends, Priorities and Issues OSC Financial Conference 2012 Doug Robinson, Executive Director National Association of State Chief Information Officers Fiscal recovery: budgets are
The Changing IT Risk Landscape Understanding and managing existing and emerging risks
The Changing IT Risk Landscape Understanding and managing existing and emerging risks IIA @ Noon Kareem Sadek Senior Manager, Deloitte Canada Chris Close Senior Manager, Deloitte Canada December 2, 2015
State of Minnesota IT Governance Framework
State of Minnesota IT Governance Framework June 2012 Table of Contents Table of Contents... 2 Introduction... 4 IT Governance Overview... 4 Process for Developing the New Framework... 4 Management of the
How To Write A National Cybersecurity Act
ROCKEFELLER SNOWE CYBERSECURITY ACT SUBSTITUTE AMENDMENT FOR S.773 March 17, 2010 BACKGROUND & WHY THIS LEGISLATION IS IMPORTANT: Our nation is at risk. The networks that American families and businesses
NGA Paper. Act and Adjust: A Call to Action for Governors. for cybersecurity;
NGA Paper Act and Adjust: A Call to Action for Governors for Cybersecurity challenges facing the nation. Although implementing policies and practices that will make state systems and data more secure will
Office of the Auditor General AUDIT OF IT GOVERNANCE. Tabled at Audit Committee March 12, 2015
Office of the Auditor General AUDIT OF IT GOVERNANCE Tabled at Audit Committee March 12, 2015 This page has intentionally been left blank Table of Contents Executive Summary... 1 Introduction... 1 Background...
Personal Security Practices of the CAO
Personal Security Practices of the CAO 1. Do you forward your government email to your personal email account? 2. When is the last time you changed your Enterprise password? Within the last 60 days Within
Connecting the dots: A proactive approach to cybersecurity oversight in the boardroom. kpmg.bm
Connecting the dots: A proactive approach to cybersecurity oversight in the boardroom kpmg.bm Connecting the dots: A proactive approach to cybersecurity oversight in the boardroom 1 Connecting the dots:
Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft
Cyber Security and Privacy Services Working in partnership with you to protect your organisation from cyber security threats and data theft 2 Cyber Security and Privacy Services What drives your security
Addressing Cyber Risk Building robust cyber governance
Addressing Cyber Risk Building robust cyber governance Mike Maddison Partner Head of Cyber Risk Services The future of security The business environment is changing The IT environment is changing The cyber
Don t Get Left in the Dust: How to Evolve from CISO to CIRO
SESSION ID: CXO-W04 Don t Get Left in the Dust: How to Evolve from CISO to CIRO JC-JC James Christiansen VP Information Risk Management Accuvant [email protected] Bradley J. Schaufenbuel, CISSP
January IIA / ISACA Joint Meeting Pre-meeting. Cybersecurity Update for Internal Auditors. Matt Wilson, PwC Risk Assurance Director
January IIA / ISACA Joint Meeting Pre-meeting Cybersecurity Update for Internal Auditors Matt Wilson, Risk Assurance Director Introduction and agenda Themes from The Global State of Information Security
FFIEC Cybersecurity Assessment Tool Overview for Chief Executive Officers and Boards of Directors
Overview for Chief Executive Officers and Boards of Directors In light of the increasing volume and sophistication of cyber threats, the Federal Financial Institutions Examination Council 1 (FFIEC) developed
Cybersecurity Audit Why are we still Vulnerable? November 30, 2015
Cybersecurity Audit Why are we still Vulnerable? November 30, 2015 John R. Robles, CISA, CISM, CRISC www.johnrrobles.com [email protected] 787-647-3961 John R. Robles- 787-647-3961 1 9/11-2001 The event
Cyber Security key emerging risk Q3 2015
Cyber Security key emerging risk Q3 2015 The study is based on interviews with CIO:s, CISO:s and Head of Security in August and September 2015. November 2015 www.pwc.se Companies falling behind are more
The Computerworld Honors Program
The Computerworld Honors Program Honoring those who use Information Technology to benefit society Status: Laureate Final Copy of Case Study Year: 2013 Organization Name: Cybersecurity and Infrastructure
Cybersecurity and the AICPA Cybersecurity Attestation Project
Cybersecurity and the AICPA Cybersecurity Attestation Project Chris Halterman Executive Director EY Chair AICPA Trust Information Integrity Task Force 2 October 2015 Increasing awareness of cybersecurity
Office of the Chief Information Officer
Office of the Chief Information Officer Business Plan: 2012 2015 Department / Ministère: Executive Council Date: November 15, 2012 1 P a g e This Page Left Intentionally Blank 2 P a g e Contents The Business
INFORMATION TECHNOLOGY GOVERNANCE IN PENNSYLVANIA. Executive Summary
INFORMATION TECHNOLOGY GOVERNANCE IN PENNSYLVANIA Executive Summary The Commonwealth of Pennsylvania has launched a comprehensive IT management transformation. This transformation is evolving the IT governance
CYBER SECURITY, A GROWING CIO PRIORITY
www.wipro.com CYBER SECURITY, A GROWING CIO PRIORITY Bivin John Verghese, Practitioner - Managed Security Services, Wipro Ltd. Contents 03 ------------------------------------- Abstract 03 -------------------------------------
Major IT Projects: Continue Expanding Oversight and Strengthen Accountability
Secretary of State Audit Report Jeanne P. Atkins, Secretary of State Gary Blackmer, Director, Audits Division Major IT Projects: Continue Expanding Oversight and Strengthen Accountability Summary Information
Seamus Reilly Director EY Information Security [email protected] 0207 951 3179 Cyber Security
Seamus Reilly Director EY Information Security [email protected] 0207 951 3179 Cyber Security An Internal Audit perspective on the threats and responses within the Retail Sector 15 th May 2014 Agenda Introductions
State of Minnesota. Enterprise Security Program Policy. Office of Enterprise Technology. Enterprise Security Office Policy. Version 1.
State of Minnesota Enterprise Security Program Policy Office of Enterprise Technology Version 1.00 Approval: Gopal Khanna (Signature on file with the ESO) 06/22/2009 State Chief Information Officer Signature
CyberSkills Management Support Initiative
CyberSkills Management Support Initiative GROWING THE PIPELINE FOR CYBERTALENT THROUGH VOLUNTEER OPPORTUNITIES November 6, 2014 November 6, 2014 Background In June 2012, Secretary Napolitano announced
Enhancing NASA Cyber Security Awareness From the C-Suite to the End-User
Enhancing NASA Cyber Security Awareness From the C-Suite to the End-User Valarie Burks Deputy Chief Information Officer, IT Security Division National Aeronautics and Space Administration (NASA) Agenda
El Camino College Homeland Security Spring 2016 Courses
El Camino College Homeland Security Spring 2016 Courses With over 250,000 federal positions in Homeland Security and associated divisions, students may find good career opportunities in this field. Explore
An Introduction to the DHS EBK: Competency and Functional Framework for IT Security Workforce Development
An Introduction to the DHS EBK: Competency and Functional Framework for IT Security Workforce Development Wm. Arthur Conklin University of Houston, College of Technology 312 Technology Bldg, Houston, TX
State CIOs, Emerging Trends and the Forces of Change
State CIOs, Emerging Trends and the Forces of Change xchange SLED Conference May 25, 2016 Doug Robinson, Executive Director National Association of State Chief Information Officers (NASCIO) About NASCIO
Cyber ROI. A practical approach to quantifying the financial benefits of cybersecurity
Cyber ROI A practical approach to quantifying the financial benefits of cybersecurity Cyber Investment Challenges In 2015, global cybersecurity spending is expected to reach an all-time high of $76.9
Information Security Program CHARTER
State of Louisiana Information Security Program CHARTER Date Published: 12, 09, 2015 Contents Executive Sponsors... 3 Program Owner... 3 Introduction... 4 Statewide Information Security Strategy... 4 Information
The Imperative for High Assurance Credentials: State Identity Credential and Access Management (SICAM) Guidance and Roadmap
The Imperative for High Assurance Credentials: State Identity Credential and Access Management (SICAM) Guidance and Roadmap AAMVA Region I Conference E-ID, DLDV, and Privacy Conducting Business Securely
Release of the Draft Cybersecurity Procurement Language for Energy Delivery Systems
Release of the Draft Cybersecurity Procurement Language for Energy Delivery Systems Energy Sector Control Systems Working Group Supporting the Electricity Sector Coordinating Council, Oil & Natural Gas
THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS
THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS Download the entire guide and follow the conversation at SecurityRoundtable.org Collaboration and communication between technical
www.pwc.com Developing a robust cyber security governance framework 16 April 2015
www.pwc.com Developing a robust cyber security governance framework 16 April 2015 Cyber attacks are ubiquitous Anonymous hacker group declares cyber war on Hong Kong government, police - SCMP, 2 October
Citation for published version (APA): Berthing, H. H. (2014). Vision for IT Audit 2020. Abstract from Nordic ISACA Conference 2014, Oslo, Norway.
Aalborg Universitet Vision for IT Audit 2020 Berthing, Hans Henrik Aabenhus Publication date: 2014 Document Version Early version, also known as pre-print Link to publication from Aalborg University Citation
Cyber Risk Managemet Next? What Board Members, Shareholders, Government, Auditors and Others Will be Asking from the CIO Next:
11 Cyber Risk Managemet Next? What Board Members, Shareholders, Government, Auditors and Others Will be Asking from the CIO Next: 1. Why the Conversation has shifted. 2. How Boards are reacting. 3. What
Session 9: 20 Questions You Should Answer About Your Cyber Security Readiness Jeff Thomas, Partner, KPMG Ivan Alcoforado, Senior Manager, KPMG
11:30 am -12:15 pm Session 9: 20 Questions You Should Answer About Your Cyber Security Readiness Jeff Thomas, Partner, KPMG Ivan Alcoforado, Senior Manager, KPMG Agenda Introduction 20 Questions you should
Governmental Oversight and Accountability Committee
The Florida Senate BILL ANALYSIS AND FISCAL IMPACT STATEMENT (This document is based on the provisions contained in the legislation as of the latest date listed below.) Prepared By: The Professional Staff
The Role of Internal Audit in Risk Governance
The Role of Internal Audit in Risk Governance How Organizations Are Positioning the Internal Audit Function to Support Their Approach to Risk Management Executive summary Risk is inherent in running any
NIST Cybersecurity Framework Impacting Your Company? April 24, 2014 Presented By Sheila FitzPatrick, NetApp Jeff Greene, Symantec Andy Serwin, MoFo
2014 Morrison & Foerster LLP All Rights Reserved mofo.com NIST Cybersecurity Framework Impacting Your Company? April 24, 2014 Presented By Sheila FitzPatrick, NetApp Jeff Greene, Symantec Andy Serwin,
MICHIGAN AUDIT REPORT OFFICE OF THE AUDITOR GENERAL THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL
MICHIGAN OFFICE OF THE AUDITOR GENERAL AUDIT REPORT THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL The auditor general shall conduct post audits of financial transactions and accounts of the state and of all
NASCIO 2014 State IT Recognition Awards
NASCIO 2014 State IT Recognition Awards Project: California Cybersecurity Task Force Category: Cybersecurity Initiatives Project Initiation Date: September, 2012 Project Completion Date: May 2013 Carlos
Feature. Developing an Information Security and Risk Management Strategy
Feature Developing an Information Security and Risk Management Strategy John P. Pironti, CISA, CISM, CGEIT, CISSP, ISSAP, ISSMP, is the president of IP Architects LLC. He has designed and implemented enterprisewide
All Eyes: A Security Breach Exercise. Disaster Recovery/Security and Business Continuity Readiness
All Eyes: A Security Breach Exercise Disaster Recovery/Security and Business Continuity Readiness Commonwealth of Pennsylvania Molly Dougherty, Director Continuity of Government and Records Information
The Internal Audit fraud challenge Prevention, protection, detection
The Internal Audit fraud challenge Prevention, protection, detection Contents Introduction to survey 1 Key findings 2 What are the views of senior management? 3 Adequately resourced? 6 Current trends and
Internal audit value optimization for insurance organizations
Internal audit value optimization for insurance organizations Webinar May 13, 2015 Baker Tilly refers to Baker Tilly Virchow Krause, LLP, an independently owned and managed member of Baker Tilly International.
Michigan Cyber Summit 2013 Hosted by Michigan Governor Rick Snyder
Michigan Cyber Summit 2013 Hosted by Michigan Governor Rick Snyder Friday, October 25, 2013 The Suburban Collection Showplace - Novi, Michigan Tentative Agenda as of October 4, 2013 Friday, October 25,
FFIEC Cybersecurity Assessment Tool
Overview In light of the increasing volume and sophistication of cyber threats, the Federal Financial Institutions Examination Council 1 (FFIEC) developed the Cybersecurity Tool (), on behalf of its members,
Risk Considerations for Internal Audit
Risk Considerations for Internal Audit Cecile Galvez, Deloitte & Touche LLP Enterprise Risk Services Director Traci Mizoguchi, Deloitte & Touche LLP Enterprise Risk Services Senior Manager February 2013
Key Cyber Risks at the ERP Level
Key Cyber Risks at the ERP Level Process & Industrial Products (P&IP) Sector December, 2014 Today s presenters Bhavin Barot, Sr. Manager Deloitte & Touche LLP Goran Ristovski, Manager Deloitte & Touche
Vendor Risk Management Financial Organizations
Webinar Series Vendor Risk Management Financial Organizations Bob Justus Chief Security Officer Allgress Randy Potts Managing Consultant FishNet Security Bob Justus Chief Security Officer, Allgress Current
North Texas ISSA CISO Roundtable
North Texas ISSA CISO Roundtable Roundtable Topic Threat Against Our Well Being The Most Effective Methods in Combating and Responding to the Cyber Attack Event Sponsor Moderator and Panelists David Stanton
The Human Capital Management Systems Business Case A Checklist to assist agencies developing a business case
The Human Capital Management Systems Business Case A Checklist to assist agencies developing a business case Final version for release Human Capital Management See more at psc.nsw.gov.au/hcm Index - Business
ADVISORY SERVICES. Risk management in an evolving world. Making the case for social media governance. kpmg.com
ADVISORY SERVICES Risk management in an evolving world Making the case for social media governance kpmg.com Risk management in an evolving world 3 Why good governance should be the foundation of your social
Presidential Summit Reveals Cybersecurity Concerns, Trends
Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 [email protected] Presidential Summit Reveals Cybersecurity Concerns,
658 Cedar Street Saint Paul, MN 55155 www.oet.state.mn.us
Legislative Report Consolidation of Information Technology Systems and Services January 19, 2012 658 Cedar Street Saint Paul, MN 55155 www.oet.state.mn.us PROVIDING THE LEADERSHIP AND SERVICES THAT IMPROVE
Tim Turner Tim Turner & Associates, LLC TEXAS. Health Information Technology Advisory Committee (HITAC)
Tim Turner Tim Turner & Associates, LLC TEXAS Health Information Technology Advisory Committee (HITAC) Track 1: Getting Started, Organization and Governance Texas Health Information Technology Advisory
Cybersecurity Awareness for Executives
SESSION ID: SOP-R04 Cybersecurity Awareness for Executives Rob Sloan Head of Cyber Content and Data Dow Jones @_rob_sloan Session Overview Aim: Provide a high level overview of an effective cybersecurity
Threat Intelligence is Like Three Day Potty Training
SESSION ID: CXO-T08R Threat Intelligence is Like Three Day Potty Training Rick Holland Principal Analyst Forrester Research @rickhholland Potty training method that guarantees success so you can say goodbye
Cybersecurity in the Utilities Sector Best Practices and Implementation 2014 Canadian Utilities IT & Telecom Conference September 24, 2014
Cybersecurity in the Utilities Sector Best Practices and Implementation 2014 Canadian Utilities IT & Telecom Conference September 24, 2014 Victoria Yan Pillitteri Advisor for Information Systems Security
COPYRIGHTED MATERIAL. Contents. Acknowledgments Introduction
Contents Acknowledgments Introduction 1. Governance Overview How Do We Do It? What Do We 1 Get Out of It? 1.1 What Is It? 1 1.2 Back to Basics 2 1.3 Origins of Governance 3 1.4 Governance Definition 5
IT Governance. What is it and how to audit it. 21 April 2009
What is it and how to audit it 21 April 2009 Agenda Can you define What are the key objectives of How should be structured Roles and responsibilities Key challenges and barriers Auditing Scope Test procedures
Information Management & Technology (IM&T) Strategic Plan 2013-2016
Information Management & Technology (IM&T) Strategic Plan 2013-2016 DSTO: Science and Technology for Safeguarding Australia Introduction This document sets out a four-year strategy for information management
Cybersecurity: You re Doing IT Wrong
SESSION ID: CXO-F01 Cybersecurity: You re Doing IT Wrong Jared Carstensen Chief Information Security Officer (CISO), CRH Plc @jaredcarstensen Introduction My Journey Every kid has dream jobs growing up
Statement of Danny Harris, Ph.D. Chief Information Officer U.S. Department of Education
Statement of Danny Harris, Ph.D. Chief Information Officer U.S. Department of Education Before the U.S. House Oversight and Government Reform Committee Hearing on Agency Compliance with the Federal Information
TAUHEEDUL EDUCATION TRUST
TAUHEEDUL EDUCATION TRUST JOB DESCRIPTION Job Title: Base: Head of Human Resources Tauheedul Education Trust Central Office Reports to: Chief Executive Grade: TSM4 Sc 54-59 Staff Responsibility for: As
Experience the commitment WHITE PAPER. Information Security Continuous Monitoring. Charting the Right Course. cgi.com 2014 CGI GROUP INC.
Experience the commitment WHITE PAPER Information Security Continuous Monitoring Charting the Right Course May 2014 cgi.com 2014 CGI GROUP INC. During the last few months of 2013, six federal agencies
