New InfoSec Leader The First 90 Days. John Bruce CEO
|
|
|
- Eugene Simmons
- 10 years ago
- Views:
Transcription
1 New InfoSec Leader The First 90 Days John Bruce CEO
2 Agenda Introduction Co3 Systems Role of the CISO Three critical changes Suggestions Page 2 of 39
3 The next challenge in security PRODUCTS PREVENTION DETECTION RESPONSE SERVICES Page 3 of 39
4 SSAE 16 TYPE II CERTIFIED Connecting people, process and technology for times of crisis AUTOMATED ESCALATION WEB FORM TROUBLE TICKETING ENTRY WIZARD SIEM I N C I D E N T R E S P O N S E P L A N INSTANT CREATION & STREAMLINED COLLABORATION HR IT PLAN SYNTHESIS INDUSTRY CONTRACTUAL STANDARD REQUIREMENTS FRAMEWORKS COMMUNITY BEST PRACTICES ORGANIZATIONAL GLOBAL PRIVACY SOPS BREACH REGULATIONS INTEGRATED INTELLIGENCE ARTIFACT CORRELATION DASHBOARDS & REPORTING LEGAL/ COMPLIANCE MARKETING ACCELERATED MITIGATION TROUBLE TICKETING GRC SIEM Page 4 of 39
5 Co3 makes the process of planning for a nightmare scenario as painless as possible, making it an Editors Choice. PC Magazine, Editor s Choice One of the most important startups in security Business Insider One of the hottest products at RSA Network World...an invaluable weapon when responding to security incidents. Government Computer News Co3 has done better than a home-run... it has knocked one out of the park. SC Magazine Platform is comprehensive, user friendly, and very well designed. Ponemon Institute Co3 defines what software packages for privacy look like. Gartner Most Innovative Company 2014 Top 10 RSA Conference Page 5 of 39
6 Today s goal Prescription prior to diagnosis is malpractice. Page 6 of 39
7 What we will cover today Defining Chief Information Security Officer Your New Context: Getting a handle on what s around you, including three major changes you ll see as a new CISO Recommendations: Getting started quickly in your new role Page 7 of 39
8 DEFINING CISO
9 CISOs can come in multiple flavors Traditional Most senior manager specifically dedicated to InfoSec Is no more than two steps away from the CEO Has a staff of SMEs covering each of the areas of responsibility Has dedicated administrative support Other Scope may be limited to a division, business unit or geography May be a collateral duty May be buried deeper in the hierarchy Page 9 of 39
10 What s a Chief Information Security Officer? A Chief Information Security Officer (CISO) is the senior-level executive within an organization responsible for establishing and maintaining the enterprise vision, strategy and program to ensure information assets and technologies are adequately protected. The CISO directs staff in identifying, developing, implementing and maintaining processes across the organization to reduce information and information technology (IT) risks. They respond to incidents, establish appropriate standards and controls, manage security technologies, and direct the establishment and implementation of policies and procedures. The CISO is also usually responsible for information-related compliance. Scope of Authority Scope of Responsibilities (wikipedia.org) Page 10 of 39
11 CISO, how are you enjoying the job? 33% good job but not the best 32% bad job but not the worst 24% worst job I ever had 11% best job I ever had Page 11 of 39
12 Average tenure of a CISO 2010, Per Gartner 4.1 years 2013, Per Ponemon 2.1 years 2014 per Veracode 18 months Chief Information Scapegoat Officer Career Is Shortly Over Page 12 of 39
13 So, why are you getting the job? 52% ex-post response to a security incident or breach. 21% ex-post response to compliance and regulatory snafus Balance is the natural movement of people, places and prospects Page 13 of 39
14 Ranking of critical success factors Adequate funding Preparedness Support structures Leadership Organizational structure Domain expertise or knowledge Agility Page 14 of 39
15 3 IMPORTANT CHANGES
16 Three important changes (?) Executive Sponsorship Expanded Scope Broader Relationships Page 16 of 39
17 Expanded scope Executive Sponsorship Expanded Scope Broader Relationships Page 17 of 39
18 YOUR path to CISO? Engineering Legal CISO Compliance Other? Page 18 of 39
19 I m FAMILIAR with it, so it must be the RIGHT solution Page 19 of 39
20 Embracing the familiar may/may not be good Replicating your familiar technology kit? Conducting an audit? Reviewing regulatory requirements? Writing new policies? Conducting tests (DR, penetration, etc.)? Rational alternative: examine the unfamiliar aspects of your new role, which may reveal shortfalls in your own abilities, your team s abilities, your management s abilities. Page 20 of 39
21 Internal expansion of responsibilities Disaster Recovery/Business Continuity Awareness and Training Audit and Certification (performing and responding) Engineering/Development Policy Physical Security Sales and Marketing CISO AA?? Page 21 of 39
22 Broader relationships Executive Sponsorship Expanded Scope Broader Relationships Page 22 of 39
23 What s a Relationship? Known personality, agenda Tailored communication, requests You Maximum probability of success Your Counterpart Page 23 of 39
24 Cultivating new relationships Auditors and auditor-like* entities Upper management and the BoD The staff and management of the security department(s) reporting to the CISO Other stakeholders in the business (managers of other groups that provide or receive services from the security group) including Sales and Marketing Vendors Colleagues and Counterparts (in other companies) Law Enforcement * Internal and external auditors, inspectors, examiners, certification authorities, etc. Page 24 of 39
25 Executive sponsorship Executive Sponsorship Expanded Scope Broader Relationships Page 25 of 39
26 Assessing executive Involvement vs. Commitment Two Key Indicators: Deployment and use of appropriate technologies (which is a reflection of substantial and judicious investment) Employee behaviors (which are a reflection of executive willingness to enforce good policies) Involved Committed Page 26 of 39
27 Walk vs. Talk (Magic Quadrant) Underachiever Leaders Walk Incompetent Blowhards Different strategies required for CISO! Talk Page 27 of 39
28 Two options Option 1 Option 2 Page 28 of 39
29 Consciousness & Competence model Conscious Incompetent Conscious Competent Most important step. Your job #1??? Consciousness Unconscious Incompetent Unconscious Competent Everyone starts here. Competence Page 29 of 39
30 Can you communicate with executive management? 'Twas brillig, and the slithy toves Did gyre and gimble in the wabe. Huh? Say Wut? WTF dude Well, thanks for your time. We ll be in touch. Page 30 of 39
31 A RUNNING START
32 360 view of your new role Executives, Board External Entities Your management Relationships Technology Vision, skill CISO Relationships Yourself Stakeholders Leadership Context, strategy Your Team Business Page 32 of 39
33 First 90 days: Executive sponsorship Do a quick determination of commitment: are your executives chickens or pigs? Investment in technologies Willingness to hold people accountable Your direction will be guided by the answer Education Execution Page 33 of 39
34 First 90 Days: internal concerns Develop at least a basic understanding of best practice in each of your institutional areas of responsibility, sufficient to be Your able to expertise communicate effectively with your specialists. Determine the expertise and reliability of subordinate Staff assessment leaders in each of these areas. Assess the current state of each of these areas of specialization, and evaluate whether or not the current capabilities and capacity Gap analysis is sufficient for the business context. Especially first-time managers: your value is in your ability to serve and Leadership empower your staff, not in directing them. Page 34 of 39
35 First 90 Days: external relationships Identify your auditors* right away; schedule meetings as soon as possible Identify problem children : those that have a bad history with InfoSec (which may be justified) Beware the most toxic executives: intimidators Strike a balance between humility and fortitude Precedents are easier to set at the beginning Consider vendors as friends not foes *and auditor-like entities Page 35 of 39
36 First 90 Days: Immediate Priorities (Candidates) Re-balancing prevention, detection, response? Inability to respond may be highest risk for new CISO How s your DevOps: Do you have the maturity in your development and operations processes to support security initiatives? Excessive privilege/cm: Who can change the production environment? With what approval? How s your situational awareness: Are your detection/monitoring processes sufficient to deliver actionable intelligence? What about your IT architecture: Proper segregation? Sufficient test environments? Page 36 of 39
37 Wrapping it up Leadership & Vision Strategic Focus Catalyst for Risk Mgt Effective Relationships Technical Savvy Page 37 of 39
38 Page 38 of 39
39 John Bruce CEO One Alewife Center, Suite 450 Cambridge, MA PHONE
IT Transformation for Health Care
Health Care strategy consulting to the country s leading hospitals and health systems. OVERVIEW IT Transformation for Health Care Transform IT develops a new target model to promote operational efficiency,
C21 Introduction to User Access
C21 Introduction to User Access Management Introduction to User Access Management What we'll cover today What is it? Why do I care? Current trends in Identity & Access Management How do I audit it? What
Module 6 Essentials of Enterprise Architecture Tools
Process-Centric Service-Oriented Module 6 Essentials of Enterprise Architecture Tools Capability-Driven Understand the need and necessity for a EA Tool IASA Global - India Chapter Webinar by Vinu Jade
FFIEC Cybersecurity Assessment Tool Overview for Chief Executive Officers and Boards of Directors
Overview for Chief Executive Officers and Boards of Directors In light of the increasing volume and sophistication of cyber threats, the Federal Financial Institutions Examination Council 1 (FFIEC) developed
Certified Identity and Access Manager (CIAM) Overview & Curriculum
Identity and access management (IAM) is the most important discipline of the information security field. It is the foundation of any information security program and one of the information security management
A Blueprint for: Microsoft Dynamics CRM Success
A Blueprint for: Microsoft Dynamics CRM Success An I.B.I.S., Inc. Whitepaper by Clinton Weldon VP, Professional Services Kevin Johnson VP, Professional Services I.B.I.S., Inc. 2015 All Rights Reserved.
A Blueprint for Business Software Implementation Success
A Blueprint for Business Software Implementation Success An I.B.I.S., Inc. Whitepaper by Kevin Johnson VP, Professional Services Clinton Weldon VP, Professional Services I.B.I.S., Inc. 2015 All Rights
Symantec Security Compliance Solution Symantec s automated approach to IT security compliance helps organizations minimize threats, improve security,
Symantec Security Compliance Solution Symantec s automated approach to IT security compliance helps organizations minimize threats, improve security, streamline compliance reporting, and reduce the overall
IMPROVING RISK VISIBILITY AND SECURITY POSTURE WITH IDENTITY INTELLIGENCE
IMPROVING RISK VISIBILITY AND SECURITY POSTURE WITH IDENTITY INTELLIGENCE ABSTRACT Changing regulatory requirements, increased attack surfaces and a need to more efficiently deliver access to the business
Business Case Outsourcing Information Security: The Benefits of a Managed Security Service
Business Case Outsourcing Information Security: The Benefits of a Managed Security Service seccuris.com (866) 644-8442 Contents Introduction... 3 Full- Time Experts vs. a Part- Time In- House Staff...
TECHNOLOGY SOLUTIONS FOR THE INTERNAL AUDITOR
TECHNOLOGY SOLUTIONS FOR THE INTERNAL AUDITOR (BUY VS BUILD) APRIL 17, 2015 LEVERAGING TECHNOLOGY FOR AUDIT Utilizing Software to Administrate Audit Process 40% 35% 30% 37% Tools Leveraged 32% 36% Yes
An Oracle White Paper January 2010. Access Certification: Addressing & Building on a Critical Security Control
An Oracle White Paper January 2010 Access Certification: Addressing & Building on a Critical Security Control Disclaimer The following is intended to outline our general product direction. It is intended
IBM Global Business Services Microsoft Dynamics CRM solutions from IBM
IBM Global Business Services Microsoft Dynamics CRM solutions from IBM Power your productivity 2 Microsoft Dynamics CRM solutions from IBM Highlights Win more deals by spending more time on selling and
Stepping Through the Info Security Program. Jennifer Bayuk, CISA, CISM
Stepping Through the Info Security Program Jennifer Bayuk, CISA, CISM Infosec Program How to: compose an InfoSec Program cement a relationship between InfoSec program and IT Governance design roles and
RSA Via Lifecycle and Governance 101. Getting Started with a Solid Foundation
RSA Via Lifecycle and Governance 101 Getting Started with a Solid Foundation Early Identity and Access Management Early IAM was all about Provisioning IT tools to solve an IT productivity problem Meet
Using Enterprise Governance, Risk, And Compliance (EGRC) Tools For Improved Management Of Security And Privacy. June 23, 2015
Using Enterprise Governance, Risk, And Compliance (EGRC) Tools For Improved Management Of Security And Privacy June 23, 2015 What is egrc? A management system for compliance requirements, policies, risk
Risk Considerations for Internal Audit
Risk Considerations for Internal Audit Cecile Galvez, Deloitte & Touche LLP Enterprise Risk Services Director Traci Mizoguchi, Deloitte & Touche LLP Enterprise Risk Services Senior Manager February 2013
Agenda Overview for Marketing Management, 2015
G00270720 Agenda Overview for Marketing Management, 2015 Published: 18 December 2014 Analyst(s): Richard Fouts Increased participation in strategic business decisions and an evolving organization put new
Real World Healthcare Security Exposures. Brian Selfridge, Partner, Meditology Services
Real World Healthcare Security Exposures Brian Selfridge, Partner, Meditology Services 2 Agenda Introduction Background and Industry Context Anatomy of a Pen Test Top 10 Healthcare Security Exposures Lessons
Deloitte Cyber Risk Services Providing trust in a digital world
Deloitte Cyber Risk Services Providing trust in a digital world June 2015 Deloitte Cyber Risk Services Providing trust in a digital world Our aim Your organization, whether functioning in the public or
Accelus Audit Manager THOMSON REUTERS ACCELUS
THOMSON REUTERS ACCELUS Accelus Audit Manager THOMSON REUTERS ACCELUS Our solutions dynamically connect business transactions, strategy, and operations to the ever-changing regulatory environment, providing
IT Governance, Risk and Compliance (GRC) : A Strategic Priority. Joerg Asma
IT Governance, Risk and Compliance (GRC) : A Strategic Priority Joerg Asma Agenda Introductions An Overview of IT Governance Risk & Compliance (IT-GRC) The Value Proposition Implementing an IT-GRC Program
Accelerate Your Enterprise Private Cloud Initiative
Cisco Cloud Comprehensive, enterprise cloud enablement services help you realize a secure, agile, and highly automated infrastructure-as-a-service (IaaS) environment for cost-effective, rapid IT service
Address C-level Cybersecurity issues to enable and secure Digital transformation
Home Overview Challenges Global Resource Growth Impacting Industries Address C-level Cybersecurity issues to enable and secure Digital transformation We support cybersecurity transformations with assessments,
The IBM data governance blueprint: Leveraging best practices and proven technologies
May 2007 The IBM data governance blueprint: Leveraging best practices and proven technologies Page 2 Introduction In the past few years, dozens of high-profile incidents involving process failures and
Secure your cloud applications by building solid foundations with enterprise (security ) architecture
Supporting Business Agility Secure your cloud applications by building solid foundations with enterprise (security ) architecture Vladimir Jirasek, Managing director Jirasek Consulting Services & Research
GRC Program Best Practices & Lessons Learned
GRC Program Best Practices & Lessons Learned Steps to Establishing and Maturing a GRC program Carl Sawicki, American Express Kathleen Randall, RSA Archer 1 Abstract In today s world, few organization s
CaaS Think as a bad guy Petr Hněvkovský, CISA, CISSP HP Enterprise Security
CaaS Think as a bad guy Petr Hněvkovský, CISA, CISSP HP Enterprise Security 1 Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
RSA envision. Platform. Real-time Actionable Security Information, Streamlined Incident Handling, Effective Security Measures. RSA Solution Brief
RSA Solution Brief RSA envision Platform Real-time Actionable Information, Streamlined Incident Handling, Effective Measures RSA Solution Brief The job of Operations, whether a large organization with
Governance, Risk, and Compliance (GRC) White Paper
Governance, Risk, and Compliance (GRC) White Paper Table of Contents: Purpose page 2 Introduction _ page 3 What is GRC _ page 3 GRC Concepts _ page 4 Integrated Approach and Methodology page 4 Diagram:
The Art of Architecture Transformation. Copyright 2012, Oracle and/or its affiliates. All rights reserved.
The Art of Architecture Transformation Oracle Safe Harbor The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into
ACCELUS RISK MANAGEMENT SOLUTIONS THOMSON REUTERS ACCELUS ACCELUS RISK MANAGEMENT SOLUTIONS
ACCELUS RISK MANAGEMENT SOLUTIONS THOMSON REUTERS ACCELUS ACCELUS RISK MANAGEMENT SOLUTIONS THOMSON REUTERS ACCELUS Our solutions dynamically connect business transactions, strategy, and operations to
CISOs Share Advice on Managing Both Information Security & Risk
CISOs Share Advice on Managing Both Information Security & Risk Learn how CISOs from top companies are tackling their new dual role of information security & risk management WISEGATE COMMUNITY VIEWPOINTS
Changing the Enterprise Security Landscape
Changing the Enterprise Security Landscape Petr Hněvkovský Presales Consultant, ArcSight EMEA HP Enterprise Security Products 2012 Hewlett-Packard Development Company, L.P. The information contained herein
CIOs: How to Become the CEO s Business Partner
CIOs: How to Become the CEO s Business Partner A Best Practices ebook Nicolas Betbeder-Matibet, Managing Director, MEGA Asia - The Agenda for CIOs in 2012 According to Gartner*: CIO strategies concentrate
State of South Carolina InfoSec and Privacy Career Path Model
State of South Carolina InfoSec and Privacy Career Path Model Start Introduction This Career Path Model for the State of South Carolina (State) is designed to help define the various career options available
Domain 1 The Process of Auditing Information Systems
Certified Information Systems Auditor (CISA ) Certification Course Description Our 5-day ISACA Certified Information Systems Auditor (CISA) training course equips information professionals with the knowledge
Network Consulting Engineer
Brochure Network Consulting Engineer February, 2012 2012 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 7 The Cisco Support Center in Krakow To understand
Realizing business flexibility through integrated SOA policy management.
SOA policy management White paper April 2009 Realizing business flexibility through integrated How integrated management supports business flexibility, consistency and accountability John Falkl, distinguished
GOVERNANCE DEFINED. Governance is the practice of making enterprise-wide decisions regarding an organization s informational assets and artifacts
GOVERNANCE DEFINED Governance is the practice of making enterprise-wide decisions regarding an organization s informational assets and artifacts Governance over the use of technology assets can be seen
RSA ARCHER OPERATIONAL RISK MANAGEMENT
RSA ARCHER OPERATIONAL RISK MANAGEMENT 87% of organizations surveyed have seen the volume and complexity of risks increase over the past five years. Another 20% of these organizations have seen the volume
Information Governance Workshop. David Zanotta, Ph.D. Vice President, Global Data Management & Governance - PMO
Information Governance Workshop David Zanotta, Ph.D. Vice President, Global Data Management & Governance - PMO Recognition of Information Governance in Industry Research firms have begun to recognize the
Designing a Modern, Holistic ECM Strategy for Healthcare. How ECM consulting helps healthcare providers thrive in an atmosphere of change.
Designing a Modern, Holistic ECM Strategy for Healthcare How ECM consulting helps healthcare providers thrive in an atmosphere of change. Executive Summary Today s healthcare industry is undergoing continual
Explore the Possibilities
Explore the Possibilities 2013 HR Service Delivery Forum Best Practices in Data Management: Creating a Sustainable and Robust Repository for Reporting and Insights 2013 Towers Watson. All rights reserved.
The RSA Solution for. infrastructure security and compliance. A GRC foundation for VMware. Solution Brief
The RSA Solution for Cloud Security and Compliance A GRC foundation for VMware infrastructure security and compliance Solution Brief The RSA Solution for Cloud Security and Compliance enables end-user
Identifying and Managing Third Party Data Security Risk
Identifying and Managing Third Party Data Security Risk Legal Counsel to the Financial Services Industry Digital Commerce & Payments Series Webinar April 29, 2015 1 Introduction & Overview Today s discussion:
Building a Roadmap to Robust Identity and Access Management
Building a Roadmap to Robust Identity and Access Management Elevating IAM from Responsive to Proactive From cases involving private retailers to government agencies, instances of organizations failing
Identity Management: Securing Information in the HIPAA Environment
Identity Management: Securing Information in the HIPAA Environment Mark Dixon Chief Identity Officer North American Software Line of Business Sun Microsystems 1 Agenda Challenges we Face Identity and Access
Policy-Based Security, Compliance, and Risk Management
Policy-Based Security, Compliance, and Risk Management Automated approach boosts agility, reduces risks of security breaches and regulatory non-compliance, and improves operating efficiency VMWARE WHITE
Enabling Data Quality
Enabling Data Quality Establishing Master Data Management (MDM) using Business Architecture supported by Information Architecture & Application Architecture (SOA) to enable Data Quality. 1 Background &
Testimony of Dan Nutkis CEO of HITRUST Alliance. Before the Oversight and Government Reform Committee, Subcommittee on Information Technology
Testimony of Dan Nutkis CEO of HITRUST Alliance Before the Oversight and Government Reform Committee, Subcommittee on Information Technology Hearing entitled: Cybersecurity: The Evolving Nature of Cyber
Riverbed Performance Management
Riverbed Performance Management Messaging Framework Market trends and context Increasingly, business performance = application performance. Users rely on applications to reach customers, build products,
Simply Sophisticated. Information Security and Compliance
Simply Sophisticated Information Security and Compliance Simple Sophistication Welcome to Your New Strategic Advantage As technology evolves at an accelerating rate, risk-based information security concerns
CLOUD 401: NAVIGATING ADVANCED TOPICS IN CLOUD COMPUTING
CLOUD 401: NAVIGATING ADVANCED TOPICS IN CLOUD COMPUTING Introduction The cloud market has matured, and many IT professionals are exploring advanced topics in cloud architecture and deployment, covering
IT Vendor Due Diligence. Jennifer McGill CIA, CISA, CGEIT IT Audit Director Carolinas HealthCare System December 9, 2014
IT Vendor Due Diligence Jennifer McGill CIA, CISA, CGEIT IT Audit Director Carolinas HealthCare System December 9, 2014 Carolinas HealthCare System (CHS) Second largest not-for-profit healthcare system
Agile Master Data Management TM : Data Governance in Action. A whitepaper by First San Francisco Partners
Agile Master Data Management TM : Data Governance in Action A whitepaper by First San Francisco Partners First San Francisco Partners Whitepaper Executive Summary What do data management, master data management,
Governance, Risk, Compliance and Beyond: The Emergence of Strategic IT Risk Management
Brochure More information from http://www.researchandmarkets.com/reports/585854/ Governance, Risk, Compliance and Beyond: The Emergence of Strategic IT Risk Management Description: In recent years, the
The Cloud Balancing Act for IT: Between Promise and Peril
The Cloud Balancing Act for IT: Between Promise and Peril Table of Contents EXECUTIVE SUMMARY...2 ONBOARDING CLOUD SERVICES...3 SYSTEMS OF RECORD: THE NEXT WAVE OF CLOUD ADOPTION...6 A CULTURE OF COMPLIANCE
Uniting IAM and data protection for greater security
E-Guide Uniting IAM and data protection for greater security There's been a new development in the information security world: content-aware identity and access management, an integration of two established,
www.pwc.com Next presentation starting soon Next Gen Customer Experience Enabled by PwC & Oracle s Cloud CRM & CX Applications
www.pwc.com Next presentation starting soon Next Gen Customer Experience Enabled by & Oracle s Cloud CRM & CX Applications Agenda Introductions & Customer Experience / CX Defined Why CX is Critical Today?
The evolution. of the IT manager
The evolution of the IT manager The move to service management Executives are turning more and more to IT to help their business swiftly adapt its processes to accommodate changing market conditions. Within
Operationalize Policies. Take Action. Establish Policies. Opportunity to use same tools and practices from desktop management in server environment
Microsoft IT Systems Strategy DATACENTER APPLICATIONS Process-Led, Model-Driven Unified and Virtualized USER-CENTRICITY ServiceEnabled Basic Standardize d Rationalized Dynamic Cost center Efficient cost
Experience the commitment WHITE PAPER. Information Security Continuous Monitoring. Charting the Right Course. cgi.com 2014 CGI GROUP INC.
Experience the commitment WHITE PAPER Information Security Continuous Monitoring Charting the Right Course May 2014 cgi.com 2014 CGI GROUP INC. During the last few months of 2013, six federal agencies
IT Service Management tools - Acquisition and implementation
IT Service Management tools - and implementation Christian F. Nissen, CFN People A/S ITIL and PRINCE2 are Registered Trade Marks of Axelos in the United Kingdom and other countries COBIT is a registered
IT AUDIT WHO WE ARE. Current Trends and Top Risks of 2015 10/9/2015. Eric Vyverberg. Randy Armknecht. David Kupinski
IT AUDIT Current Trends and Top Risks of 2015 2 02 Eric Vyverberg WHO WE ARE David Kupinski Randy Armknecht Associate Director Internal Audit Protiviti 317.510.4661 [email protected] Managing
An Evaluation Framework for Selecting an Enterprise Cloud Provider
An Evaluation Framework for Selecting an Enterprise Cloud Provider WHITE PAPER This White Paper is intended for senior IT leaders of global enterprises considering a new cloud solution or expanding an
Understanding changes to the Trust Services Principles for SOC 2 reporting
Baker Tilly refers to Baker Tilly Virchow Krause, LLP, an independently owned and managed member of Baker Tilly International. Understanding changes to the Trust Services Principles for SOC 2 reporting
Experience Business Success Invest in Microsoft CRM Today
Experience Business Success Invest in Microsoft CRM Today Published: August 2005 The information contained in this document represents the current view of Microsoft Corporation on the issues discussed
SDLC- Key Areas to Audit in IT Projects ISACA Geek Week 2013 8/21/2013. PwC
SDLC- Key Areas to Audit in IT Projects ISACA Geek Week 2013 8/21/2013 1 Introductions and Projects Overview Presenters Charlie Miller and Andrew Gerndt The Coca-Cola Company Principal IT Auditors Atlanta,
How to start a software security initiative within your organization: a maturity based and metrics driven approach OWASP
How to start a software security initiative within your organization: a maturity based and metrics driven approach Marco Morana OWASP Lead/ TISO Citigroup OWASP Application Security For E-Government Copyright
Third-Party Cybersecurity and Data Loss Prevention
Third-Party Cybersecurity and Data Loss Prevention SESSION ID: DSP-W04A Brad Keller Sr. Vice President Santa Fe Group Jonathan Dambrot, CISSP CEO, Co-Founder Prevalent Networks 3rd Party Risk Management
Demystifying succession in a consulting engineering firm. Make transitioning your equity a smooth and painless process
Demystifying succession in a consulting engineering firm Make transitioning your equity a smooth and painless process CONTENTS Succession is a complex process... 4 Traditional succession plans they may
Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA. Cyber: The Catalyst to Transform the Security Program
Cyber: The Catalyst to Transform the Security Program Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA A Common Language? Hyper Connected World Rapid IT Evolution Agile Targeted Threat
Continuous Network Monitoring
Continuous Network Monitoring Eliminate periodic assessment processes that expose security and compliance programs to failure Continuous Network Monitoring Continuous network monitoring and assessment
Close Brothers Graduate Programme
1 02 Financial expertise About us was established in 1878 and since then has held true to the principles of merchant banking supporting small businesses and individuals through all conditions. today employs
Software as a Service: Guiding Principles
Software as a Service: Guiding Principles As the Office of Information Technology (OIT) works in partnership with colleges and business units across the University, its common goals are to: substantially
OPTIMUS SBR. Optimizing Results with Business Intelligence Governance CHOICE TOOLS. PRECISION AIM. BOLD ATTITUDE.
OPTIMUS SBR CHOICE TOOLS. PRECISION AIM. BOLD ATTITUDE. Optimizing Results with Business Intelligence Governance This paper investigates the importance of establishing a robust Business Intelligence (BI)
BIG DATA KICK START. Troy Christensen December 2013
BIG DATA KICK START Troy Christensen December 2013 Big Data Roadmap 1 Define the Target Operating Model 2 Develop Implementation Scope and Approach 3 Progress Key Data Management Capabilities 4 Transition
Regulatory Compliance Management for Energy and Utilities
Regulatory Compliance Management for Energy and Utilities The Energy and Utility (E&U) sector is transforming as enterprises are looking for ways to replace aging infrastructure and create clean, sustainable
2014 HIMSS Analytics Cloud Survey
2014 HIMSS Analytics Cloud Survey June 2014 2 Introduction Cloud services have been touted as a viable approach to reduce operating expenses for healthcare organizations. Yet, engage in any conversation
