The CSO/CISO Roundtable

Size: px
Start display at page:

Download "The CSO/CISO Roundtable"

Transcription

1 The CSO/CISO Roundtable 27th October Meeting notes Organised by the Security Awareness Special Interest Group in association with ASIS International and The Security Company (International) Limited Hosted by Barclays plc Business leaders are already saying to security professionals change, or we will either impose change on you or simply ignore you.

2 Debate One The Security Executive as a Business Leader Facilitator: Peter Piazza, VP Strategic Operations, ASIS International Panellists: Axel Petri, SVP Group Security Governance, Deutsche Telekom AG Sir Christopher Coville, Senior Defence and Security Advisor, EMC Michael Couzens, VP and Chief Security Officer, Baker Hughes Craig Balding, Group Head of Cybersecurity Risk, Barclays One of the greatest challenges for both CSOs and CISOs in information and physical security is effectively aligning their activities with their businesses objectives. While security practitioners talk endlessly about the importance of integrating governance and business requirements with the security function, the reality too often speaks of a different story. The phrase security as a business enabler is chanted at every opportunity within the spheres of security aficionados, but what does this actually mean? And more importantly how do we get this mantra vocalised at board level? People s awareness (at home and at work) of the dangers from security terrorism, cybercrime, identity theft, child exploitation, organised crime - is at an all-time high. Government legislation and regulations are burgeoning, and organisations are spending increasing amounts on all aspects of security and employing security executives in record numbers. Yet despite these efforts, there is an apparent disconnect between information and corporate security programmes and the business units. So, how do we create a framework enabling senior security executives to better align their protective and preventative security regimes with their organisation s business needs and objectives? How do we help security executives to become more effective as business leaders? These questions were posed to our panel of specialists and then opened to the audience. 1. The current State of the Union: what are the problems? The organisation of the security function Despite the longstanding and widely accepted understanding that physical and information security are inter-dependent, and even though both have matured to the point where their convergence is possible, there still persists in many organisations a lack of cooperation that is hindering the manageability of the security infrastructure. A myopic focus on technology instead of business Too much of a technical focus is serving to isolate the security function from key business units within the organisation. Senior and board level business executives have an insufficient understanding of the range of physical and financial risks their businesses face, and the potential impact upon operations and profit. Less tangible security risks such as loss of reputation are even less appreciated. Security is seen as a cost For the most part organisational leaders still see the security function as a cost to the business, not a key element of and contributor to the business strategy. Lack of a comprehensive risk-based approach Security programmes and operations are too often implemented with little assessment of the specific risk areas and threats to the organisation. In many organisations, technology strategies, policies and procedures are created with little understanding of how organisational culture influences and impacts the effectiveness of these programmes. Security executives across the organisation must understand the fundamentals of the business - company strategy, the operational and regulatory environment, possible threats, risk impacts, and resilience. The CSO/CISO Roundtable 1

3 2. Moving from silos to synergy A healthy security function must be designed holistically; the convergence of physical and information security domains ultimately allows for better/more cost-effective security operations and greater protection of business assets. This is a key element in aligning security with business needs. Siloed security practices ultimately impede the detection and mitigation of cross-functional risk. We must continue to work hard to combine the physical and information security frameworks, and create a collaborative security governance structure. Siloed security practices ultimately impede the detection and mitigation of cross-functional risk It was contentiously suggested that a single leader with responsibility for the entire security function may be required just as the Chief Financial Officer has responsibility for all things financial. Fostering a single point of contact within the security function could go a long way to reducing costs, improving efficiency, and encouraging the Chief Executive and Board to recognise the importance of incorporating security into the architecture of the business. It was highlighted, however, that the most important element was fostering a collaboration between all corporate risks, regardless of where they arise or who owns responsibility for them. 3. Importance of effective communication, learning the language of business and understanding the business strategy CSOs and CISOs within organisations must create security programmes aligned with enterprise objectives and priorities. These must support the ability of C-suite executives to innovate, while at the same time recognising and containing the associated security risks. In order to engage with senior executives within the enterprise, the security leader should develop a model that defines, in simple terms, what an efficient security programme comprises of, how it functions, and importantly how it relates to the business and its key objectives. Security needs to be discussed in business lexicon, not in a way dominated by technological language and security jargon. Security managers need to understand the goals, priorities and strategy of the business in order to gain access to the key decision makers Security managers need to understand the goals, priorities and strategy of the business in order to gain access to the key decision makers. It is imperative to ask the right questions and draw together a descriptive model that leading voices in the different business functions can use. By making security an essential contributor to the bottom line, the CSO and CISO will gain greater influence and have a greater chance of being included at the most senior levels of the decision-making chain. 4. Security (especially cyber) must be approached with a business back philosophy Security leaders must make conscious efforts to ensure that their staff are familiar with the business strategy and other core business functions. They must take every opportunity to interact with every part of the business, and build relationships at every level. By doing such, the security team will demonstrate how they can fit into and contribute to the business strategy and objectives. The security discipline needs to be about protecting the growth as well as preventing the downside. Value must be added beyond security the security function must move in to predictive services in addition to the reactive services that currently make up their staple diet. The security discipline needs to be about protecting the growth as well as preventing the downside. Value must be added beyond security. The CSO/CISO Roundtable 2

4 By relating security policies directly to core business functionality, the resultant security programme will be able to demonstrate quantifiable risk reduction. Emphasising the economics of the security function and the business opportunities potentially provided by protection, offers a better chance of getting top-down sponsorship and support from the boardroom. This will then spread throughout the organisation to make it recognised as an enterprise-wide business enabler. 5. What makes a security executive a business leader? Effective security leaders must be organisational change agents, understanding how to articulate the bottomline impact of each security decision made. A security executive needs to be a business leader first and security specialist second. The language of the security executive must be one of business alignment, margins and strategy before anything else. Moral courage is key the real challenge is telling business leaders that they face real security risks, and demanding sufficient and appropriate resources. The language of the security executive must be one of business alignment, margins and strategy before anything else. 6. Should a security leader have a strong security background? Some suggested that it makes little difference whether CSOs and CISOs have a comprehensive knowledge of, and background in, the security profession. Individuals with a good business head on their shoulders, strong leadership skills, and the ability to learn quickly, delegate and prioritise can become strong security leaders. Indeed, there is growing evidence that such individuals can make better security executives than do professional security staff. However others disagreed, asserting that of course all security leaders should have these general skills but also needed a wealth of experience and specialist knowledge to manage the complex security department and its varied specialisms. Debate Two Physical and Cyber Security An Examination of Priorities Facilitator: Martin Smith, Chairman and Founder, the Security Awareness Special Interest Group Panellists: Mark Brown, Executive Director Cyber Security and Resilience, Ernst & Young LLP Alexandra Whyte, Group Security Manager, Johnson Matthey Colin Fraser, Head of Information Security, Sainsbury s Bank Robert Orr, Cyber Security Policy Manager, Nuclear Decommissioning Authority The convergence of physical and information security is increasingly succeeding at the technical level; however it is still in its infancy at the organisational level. The question was posed to the delegates: Is the strain between siloed security functions still a problem? and over 80% of the delegates seemed to agree that it was. A recent EY survey highlighted that 87% of 3000 companies surveyed did not believe that the security function within their organisation was working effectively. The CSO/CISO Roundtable: 27th October Meeting notes 3

5 1. Importance of a holistic approach There needs to be a synergetic approach between physical, information and personnel security functions. This approach must address the security profile in terms of tangible and potential combined risks, including physical, information and people, rather than individually identifiable risks within single processes. Convergence does not necessarily have to mean the physical merging of functions, but can equate to the active collaboration between functions. We need to get people with a traditional security background to have greater flexibility of mind. We must help their professional development to embrace the cyber world, and we need to change their stoically ingrained, singularly focussed perspectives. We need to get people with a traditional security background to have greater flexibility of mind. 2. Maturity information security versus physical security We are seeing that recognition of and support for physical security is still far ahead of that for information and cybersecurity. Boards and Directors understand fully the risks of physical security. Information and cyber security is still shrouded in mystery and hidden within the IT function. Greater effort must be made to align cybersecurity with business operations, and to explain more clearly in lay terms the impacts that cyber breaches can have on the business operations and reputation. A mature information security approach will have buy-in from senior executives and will be forged as part of an enterprise risk management strategy at the highest level. 3. Communication is key Make all functions of security relevant and understandable to people. Everything comes back to the holistic approach our priority is to ensure that everyone in the organisation understands the inter-dependence between physical and cyber security and the role of the Mark 1 Human Being in this matrix. 4. Will this really work? Is it an obligation for security professionals to help others from other enterprises? The supply chain is pivotal to any organisation s security does the CSO/CISO have an obligation to help here as well? But is this really going to work? Can we realistically change the old-timers, and can we sensibly merge such differing cultures and skills sets as those of the physical and IT security worlds? Will the security industry ever change? Is convergence a pipe dream? The resounding conclusion from the debate was that we must make this work. Business leaders are already saying to security professionals change, or we will either impose change on you or simply ignore you. Together with its powerful Security Awareness Special Interest Group (SASIG), The Security Company is recognised as the thought leader across Europe for the increasingly important field of cybersecurity awareness. Dean Court, Upper Dean, Huntingdon, Cambridgeshire PE28 0NL Main Office: +44(0) [email protected] 4

A NEW APPROACH TO CYBER SECURITY

A NEW APPROACH TO CYBER SECURITY A NEW APPROACH TO CYBER SECURITY We believe cyber security should be about what you can do not what you can t. DRIVEN BY BUSINESS ASPIRATIONS We work with you to move your business forward. Positively

More information

The economics of IT risk and reputation

The economics of IT risk and reputation Global Technology Services Research Report Risk Management The economics of IT risk and reputation What business continuity and IT security really mean to your organization Findings from the IBM Global

More information

Sytorus Information Security Assessment Overview

Sytorus Information Security Assessment Overview Sytorus Information Assessment Overview Contents Contents 2 Section 1: Our Understanding of the challenge 3 1 The Challenge 4 Section 2: IT-CMF 5 2 The IT-CMF 6 Section 3: Information Management (ISM)

More information

Risk Factors in Retail Buyer's Success

Risk Factors in Retail Buyer's Success Negotiation skills First Friday is a leading provider of training & development and change management services with a portfolio of 100+ clients across the UK, Europe and South Africa. Our team is unique;

More information

CIO, CISO and Practitioner Guidance IT Security Governance

CIO, CISO and Practitioner Guidance IT Security Governance CIO, CISO and Practitioner Guidance IT Security Governance June 2006 (Revision 1, August 2007) 1 CIO, CISO and Practitioner Guidance Whatever your business, security and privacy are key matters that affect

More information

Defending yesterday. Financial Services. Key findings from The Global State of Information Security Survey 2014

Defending yesterday. Financial Services. Key findings from The Global State of Information Security Survey 2014 www.pwc.com/security Defending yesterday While organizations have made significant security improvements, they have not kept pace with today s determined adversaries. As a result, many rely on yesterday

More information

CYBER RISK INTERNATIONAL COMPANY PROFILE

CYBER RISK INTERNATIONAL COMPANY PROFILE CYBER RISK INTERNATIONAL COMPANY PROFILE About Us Robert Madelin, the EU Commission s director general overseeing digital matters, has warned about a clear and present danger of cyber attacks in Europe.

More information

A New Security Publication About Risk and Security for Business Leaders. Sponsorship & Advertising Media Pack

A New Security Publication About Risk and Security for Business Leaders. Sponsorship & Advertising Media Pack A New Security Publication About Risk and Security for Business Leaders Sponsorship & Advertising Media Pack Introduction from the Team All organisations need to manage and protect their information effectively,

More information

www.pwc.co.uk Cyber security Building confidence in your digital future

www.pwc.co.uk Cyber security Building confidence in your digital future www.pwc.co.uk Cyber security Building confidence in your digital future November 2013 Contents 1 Confidence in your digital future 2 Our point of view 3 Building confidence 4 Our services Confidence in

More information

The NIST Cybersecurity Framework Encouraging NIST Adoption Via Cost/Benefit Analysis

The NIST Cybersecurity Framework Encouraging NIST Adoption Via Cost/Benefit Analysis The NIST Cybersecurity Framework Encouraging NIST Adoption Via Cost/Benefit Analysis Paul A. Ferrillo March 2015 The NIST Cybersecurity Framework Encouraging NIST Adoption Via Cost Benefit Analysis Until

More information

Seamus Reilly Director EY Information Security [email protected] 0207 951 3179 Cyber Security

Seamus Reilly Director EY Information Security sreilly@uk.ey.com 0207 951 3179 Cyber Security Seamus Reilly Director EY Information Security [email protected] 0207 951 3179 Cyber Security An Internal Audit perspective on the threats and responses within the Retail Sector 15 th May 2014 Agenda Introductions

More information

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft Cyber Security and Privacy Services Working in partnership with you to protect your organisation from cyber security threats and data theft 2 Cyber Security and Privacy Services What drives your security

More information

CREATING A LEAN BUSINESS SYSTEM

CREATING A LEAN BUSINESS SYSTEM CREATING A LEAN BUSINESS SYSTEM This white paper provides an overview of The Lean Business Model how it was developed and how it can be used by enterprises that have decided to embark on a journey to create

More information

CYBER SECURITY Audit, Test & Compliance

CYBER SECURITY Audit, Test & Compliance www.thalescyberassurance.com CYBER SECURITY Audit, Test & Compliance 02 The Threat 03 About Thales 03 Our Approach 04 Cyber Consulting 05 Vulnerability Assessment 06 Penetration Testing 07 Holistic Audit

More information

Who s next after TalkTalk?

Who s next after TalkTalk? Who s next after TalkTalk? Frequently Asked Questions on Cyber Risk Fraud threat to millions of TalkTalk customers TalkTalk cyber-attack: website hit by significant breach These are just two of the many

More information

THE ROLE OF FINANCE AND ACCOUNTING IN ENTERPRISE RISK MANAGEMENT

THE ROLE OF FINANCE AND ACCOUNTING IN ENTERPRISE RISK MANAGEMENT THE ROLE OF FINANCE AND ACCOUNTING IN ENTERPRISE RISK MANAGEMENT Let me begin by thanking Baruch College for giving me the opportunity to present this year s prestigious Emanuel Saxe Lecture in Accounting.

More information

Managing cyber risks with insurance

Managing cyber risks with insurance www.pwc.com.tr/cybersecurity Managing cyber risks with insurance Key factors to consider when evaluating how cyber insurance can enhance your security program June 2014 Managing cyber risks to sensitive

More information

The Institute of Risk Management. International Diploma in Risk Management Building excellence in risk management

The Institute of Risk Management. International Diploma in Risk Management Building excellence in risk management The Institute of Risk International Diploma in Risk Building excellence in risk management For nearly 30 years, IRM s International Diploma in Risk has been the global choice of qualification with risk

More information

From the experts: Managing mobility for the enterprise

From the experts: Managing mobility for the enterprise From the experts: Managing mobility for the enterprise Key insights around Enterprise Mobility Management Vodafone Power to you The human factor Your people are out there using their own devices already.

More information

January IIA / ISACA Joint Meeting Pre-meeting. Cybersecurity Update for Internal Auditors. Matt Wilson, PwC Risk Assurance Director

January IIA / ISACA Joint Meeting Pre-meeting. Cybersecurity Update for Internal Auditors. Matt Wilson, PwC Risk Assurance Director January IIA / ISACA Joint Meeting Pre-meeting Cybersecurity Update for Internal Auditors Matt Wilson, Risk Assurance Director Introduction and agenda Themes from The Global State of Information Security

More information

Project Risk Management

Project Risk Management Risk Advisory Services Project Risk Management James O Callaghan October 2006 RISK ADVISORY SERVICES (year) KPMG (member firm name if applicable), the (jurisdiction) member firm of KPMG International,

More information

Adapting Risk Management Principles to the Public Sector Reforms

Adapting Risk Management Principles to the Public Sector Reforms Adapting Risk Management Principles to the Public Sector Reforms Nadia Carmen ENE, University Lecturer, Ph.D Catalin Răzvan DOBREA, University Lecturer, Ph.D Department of Economic Efficiency Bucharest

More information

IT service management: resetting priorities for an uncertain economy.

IT service management: resetting priorities for an uncertain economy. Service management IT service management: resetting priorities for an uncertain economy. Smarter management for a dynamic infrastructure Richard Esposito, vice president, IT strategy and architecture services,

More information

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown Cyber Resilience Implementing the Right Strategy Grant Brown specialist, CISSP @TheGrantBrown 1 2 Network + Technology + Customers = $$ 3 Perfect Storm? 1) Increase in Bandwidth (extended reach) 2) Available

More information

Five steps to Enterprise Risk Management

Five steps to Enterprise Risk Management risk decisions 2011 Five steps to Enterprise Risk Management by Val Jonas CEO Risk Decisions Group www.riskdecisions.com management solutions Val Jonas: Five steps to Enterprise Risk Management Five steps

More information

Cyber Risk and Insurance What companies need to know

Cyber Risk and Insurance What companies need to know Supported by The Security Institute Cyber Risk and Insurance What companies need to know Organised by Produced by Central London Supported by About the Conference Who should attend Estimates as to the

More information

www.pwc.nl/cybersecurity Cyber security Building confidence in your digital future

www.pwc.nl/cybersecurity Cyber security Building confidence in your digital future www.pwc.nl/cybersecurity Cyber security Building confidence in your digital future 2015 Contents 1 Confidence in your digital future 2 Our point of view 3 Building confidence 4 Our services Confidence

More information

Chief Information Security Officer

Chief Information Security Officer Principles Vision Purpose Statement Chief Information Security Officer healthalliance Purpose, Vision and Principles healthalliance provides shared services to benefit NZ health organisations. We will

More information

Blending Corporate Governance with. Information Security

Blending Corporate Governance with. Information Security Blending Corporate Governance with Information Security WHAT IS CORPORATE GOVERNANCE? Governance has proved an issue since people began to organise themselves for a common purpose. How to ensure the power

More information

A GOOD PRACTICE GUIDE FOR EMPLOYERS

A GOOD PRACTICE GUIDE FOR EMPLOYERS MITIGATING SECURITY RISK IN THE NATIONAL INFRASTRUCTURE SUPPLY CHAIN A GOOD PRACTICE GUIDE FOR EMPLOYERS April 2015 Disclaimer: Reference to any specific commercial product, process or service by trade

More information

Do you know your privacy risks? How new technologies, changing business models, and emerging regulations are changing the data-protection landscape

Do you know your privacy risks? How new technologies, changing business models, and emerging regulations are changing the data-protection landscape January 2013 Do you know your privacy risks? How new technologies, changing business models, and emerging regulations are changing the data-protection landscape At a glance Threats to data security both

More information

developing your potential Cyber Security Training

developing your potential Cyber Security Training developing your potential Cyber Security Training The benefits of cyber security awareness The cost of a single cyber security incident can easily reach six-figure sums and any damage or loss to a company

More information

MARCH 2012. Strategic Risk Policy Update March 2012 v1.10.doc

MARCH 2012. Strategic Risk Policy Update March 2012 v1.10.doc MARCH 2012 Version 1.10 Strategic Risk Policy Update March 2012 v1.10.doc Document History Current Version Document Name Risk Management Policy Statement and Strategic Framework Last Updated By Alan Till

More information

Cyber resilience and IT service management (ITSM) working together to secure the information your business relies on. Stuart Rance. AXELOS.

Cyber resilience and IT service management (ITSM) working together to secure the information your business relies on. Stuart Rance. AXELOS. Cyber resilience and IT service management (ITSM) working together to secure the information your business relies on Stuart Rance AXELOS.com White Paper June 2015 Contents Introduction 3 What s it all

More information

Address C-level Cybersecurity issues to enable and secure Digital transformation

Address C-level Cybersecurity issues to enable and secure Digital transformation Home Overview Challenges Global Resource Growth Impacting Industries Address C-level Cybersecurity issues to enable and secure Digital transformation We support cybersecurity transformations with assessments,

More information

The European Response to the rising Cyber Threat

The European Response to the rising Cyber Threat SPEECH/12/315 Cecilia Malmström European Commissioner responsible for Home Affairs The European Response to the rising Cyber Threat Transatlantic Cyber Conference organised by the Center for Strategic

More information

Smart Security. Smart Compliance.

Smart Security. Smart Compliance. Smart Security. Smart Compliance. SRM are dedicated to helping our clients stay safe in the information environment. With a wide range of knowledge and practical experience, our consultants are ready to

More information

MANAGEMENT SYSTEMS CERTIFICATION FROM AUTOMOTIVE SPECIALISTS

MANAGEMENT SYSTEMS CERTIFICATION FROM AUTOMOTIVE SPECIALISTS MANAGEMENT SYSTEMS CERTIFICATION FROM AUTOMOTIVE SPECIALISTS VCA - Delivering a Safer Environment VCA - Delivering a Safer Environment 1 Contents Pg 2 Formal Certification Burden or Benefit? 3 Why VCA?

More information

Optimising the Business Value of IT

Optimising the Business Value of IT IBM Global Business Services June 2011 Thought Leadership White Paper Optimising the Business Value of IT Businesses can increase embedded value through recognition of cyclical behaviours in IT and making

More information

treasury risk management

treasury risk management Governance, Concise guide Risk to and Compliance treasury risk management KPMG is a leading provider of professional services including audit, tax and advisory. KPMG in Australia has over 5000 partners

More information

BUSINESS FOCUSED PROJECT MANAGEMENT

BUSINESS FOCUSED PROJECT MANAGEMENT BUSINESS FOCUSED PROJECT MANAGEMENT By Dennis Comninos & Enzo Frigenti Synopsis This article addresses the concepts and issues of business project management. It aims to assist organizations in making

More information

The Direct Employers Association

The Direct Employers Association The Direct Employers Association Membership Educate, Innovate, Cooperate About The Direct Employers Association The Direct Employers Association [DEA] is a not for profit membership organisation specifically

More information

FlyntGroup.com. Enterprise Risk Management and Business Impact Analysis: Understanding, Treating and Monitoring Risk

FlyntGroup.com. Enterprise Risk Management and Business Impact Analysis: Understanding, Treating and Monitoring Risk Enterprise Risk Management and Business Impact Analysis: Understanding, Treating and Monitoring Risk 2012 The Flynt Group, Inc., All Rights Reserved FlyntGroup.com Enterprise Risk Management and Business

More information

ASSET MANAGEMENT. John Woodhouse. The Woodhouse Partnership Ltd

ASSET MANAGEMENT. John Woodhouse. The Woodhouse Partnership Ltd ASSET MANAGEMENT John Woodhouse The Woodhouse Partnership Ltd 1 What is Asset Management? Another catch-phrase, another management initiative or just re-working of good old common sense? We have certainly

More information

P3M3 Portfolio Management Self-Assessment

P3M3 Portfolio Management Self-Assessment Procurement Programmes & Projects P3M3 v2.1 Self-Assessment Instructions and Questionnaire P3M3 Portfolio Management Self-Assessment P3M3 is a registered trade mark of AXELOS Limited Contents Introduction

More information

Business Improvement Solutions

Business Improvement Solutions Business Improvement Solutions THINKING BUSINESS > DRIVING IMPROVEMENT > ACHIEVING EXCELLENCE Assisting organizations to develop their capability to continuously improve performance in a sustainable manner.

More information

How To Save Money On Production

How To Save Money On Production White Paper Procurement Spend Management: Key Elements for Realising Cost Savings in Procurement Spend analysis creates an understanding of the organisation s spend structure and enables decisions and

More information

Protecting betting integrity

Protecting betting integrity Protecting betting integrity October 2013 1 Introduction 1.1 The UK Gambling Commission (the Commission) was set up under the Gambling Act 2005 to regulate commercial gambling in Great Britain. We are

More information

The Connected CFO a company s secret silver bullet?

The Connected CFO a company s secret silver bullet? a company s secret silver bullet? Imagine if the Chief Financial Officer (CFO) had a real-time dashboard of the business that automatically alerted him or her to specific triggers about the financial performance

More information

Operational Risk Management - The Next Frontier The Risk Management Association (RMA)

Operational Risk Management - The Next Frontier The Risk Management Association (RMA) Operational Risk Management - The Next Frontier The Risk Management Association (RMA) Operational risk is not new. In fact, it is the first risk that banks must manage, even before they make their first

More information

Cyber Security Evolved

Cyber Security Evolved Cyber Security Evolved Aware Cyber threats are many, varied and always evolving Being aware is knowing what is going on so you can figure out what to do. The challenge is to know which cyber threats are

More information

Master of Science in Cyber Security and Management

Master of Science in Cyber Security and Management Master of Science in Cyber Security and Management Introduction Realizing the importance of protecting her critical national information infrastructure, Malaysia has introduced the National Cyber Security

More information

The internet and digital technologies play an integral part

The internet and digital technologies play an integral part The Cyber challenge Adjacent Digital Politics Ltd gives an overview of the EU Commission s Cyber Security Strategy and Commissioner Ashton s priorities to increase cyber security in Europe The internet

More information

How do you give cybersecurity the highest priority in your organization? Cyber Protection & Resilience Solutions from CGI

How do you give cybersecurity the highest priority in your organization? Cyber Protection & Resilience Solutions from CGI How do you give cybersecurity the highest priority in your organization? Cyber Protection & Resilience Solutions from CGI CGI Cyber Protection & Resilience Solutions Optimized risk management and protection

More information

Cyber Security Strategy

Cyber Security Strategy NEW ZEALAND S Cyber Security Strategy 2015 A secure, resilient and prosperous online New Zealand Ministerial Foreword The internet and technology have become a fundamental element in our lives. We use

More information

The F Word - Why Facilities Matter

The F Word - Why Facilities Matter The F Word - Why Facilities Matter By Martin Pickard Leaders of businesses and organisations don't want to talk about Facilities. It's a dirty word associated with cleaning, maintenance and other non-core

More information

Experience the commitment WHITE PAPER. Information Security Continuous Monitoring. Charting the Right Course. cgi.com 2014 CGI GROUP INC.

Experience the commitment WHITE PAPER. Information Security Continuous Monitoring. Charting the Right Course. cgi.com 2014 CGI GROUP INC. Experience the commitment WHITE PAPER Information Security Continuous Monitoring Charting the Right Course May 2014 cgi.com 2014 CGI GROUP INC. During the last few months of 2013, six federal agencies

More information

CYBER SECURITY TRAINING SAFE AND SECURE

CYBER SECURITY TRAINING SAFE AND SECURE CYBER SECURITY TRAINING KEEPING YOU SAFE AND SECURE Experts in Cyber Security training. Hardly a day goes by without a cyber attack being reported. With this ever-increasing threat there is a growing need

More information

Cybersecurity on a Global Scale

Cybersecurity on a Global Scale Cybersecurity on a Global Scale Time-tested Leadership A global leader for more than a century with customers in 80 nations supported by offices in 19 countries worldwide, Raytheon recognizes that shared

More information

The IBM data governance blueprint: Leveraging best practices and proven technologies

The IBM data governance blueprint: Leveraging best practices and proven technologies May 2007 The IBM data governance blueprint: Leveraging best practices and proven technologies Page 2 Introduction In the past few years, dozens of high-profile incidents involving process failures and

More information

ENTERPRISE RISK MANAGEMENT POLICY

ENTERPRISE RISK MANAGEMENT POLICY ENTERPRISE RISK MANAGEMENT POLICY TITLE OF POLICY POLICY OWNER POLICY CHAMPION DOCUMENT HISTORY: Policy Title Status Enterprise Risk Management Policy (current, revised, no change, redundant) Approving

More information

www.pwc.com Developing a robust cyber security governance framework 16 April 2015

www.pwc.com Developing a robust cyber security governance framework 16 April 2015 www.pwc.com Developing a robust cyber security governance framework 16 April 2015 Cyber attacks are ubiquitous Anonymous hacker group declares cyber war on Hong Kong government, police - SCMP, 2 October

More information

Certified Identity and Access Manager (CIAM) Overview & Curriculum

Certified Identity and Access Manager (CIAM) Overview & Curriculum Identity and access management (IAM) is the most important discipline of the information security field. It is the foundation of any information security program and one of the information security management

More information

Cybersecurity Management Programs

Cybersecurity Management Programs Cybersecurity Management Programs Dr. J. Stuart Broderick, CISM, CRISC, CCSK Principal Cisco Security Solutions June 2015 Most organizations cybersecurity teams (or information security teams as they are

More information

Procurement Programmes & Projects P3M3 v2.1 Self-Assessment Instructions and Questionnaire. P3M3 Project Management Self-Assessment

Procurement Programmes & Projects P3M3 v2.1 Self-Assessment Instructions and Questionnaire. P3M3 Project Management Self-Assessment Procurement Programmes & Projects P3M3 v2.1 Self-Assessment Instructions and Questionnaire P3M3 Project Management Self-Assessment Contents Introduction 3 User Guidance 4 P3M3 Self-Assessment Questionnaire

More information

Business Continuity Management Policy

Business Continuity Management Policy Governance 1 Purpose The purpose of this policy is to communicate Business Continuity Management (BCM) framework, responsibilities and guiding principles for Victoria to effectively prepare for and achieve

More information

Abstract. Glue Reply works with Sainsbury s to achieve the Holy Grail in Business Driven IT. Scenario. The project

Abstract. Glue Reply works with Sainsbury s to achieve the Holy Grail in Business Driven IT. Scenario. The project Glue Reply works with Sainsbury s to achieve the Holy Grail in Business Driven IT Abstract Sainsbury s embarked on a project to create one IT plan or road map that would cover the entire enterprise. This

More information

Cybersecurity. Considerations for the audit committee

Cybersecurity. Considerations for the audit committee Cybersecurity Considerations for the audit committee Insights on November 2012 governance, risk and compliance Fighting to close the gap Ernst & Young s 2012 Global Information Security Survey 2012 Global

More information

The IBM Data Governance Council Maturity Model: Building a roadmap for effective data governance

The IBM Data Governance Council Maturity Model: Building a roadmap for effective data governance October 2007 The IBM Data Governance Council Maturity Model: Building a roadmap for effective data governance Page 2 Introduction It s been said that IT is the engine for growth and business innovation

More information

The Future of Stakeholder Engagement

The Future of Stakeholder Engagement The Future of Stakeholder Engagement Views of Senior European Communicators on Current and Future Best Practice February 2013 Table of contents 3 4 6 11 18 25 28 29 Introduction Key findings The current

More information

Reputation and the Board. Guidance for PR Consultants and Board Directors

Reputation and the Board. Guidance for PR Consultants and Board Directors Reputation and the Board Guidance for PR Consultants and Board Directors Contents Foreword... 3 About This Guidance... 4 What is Reputation?... 4 Why is Reputation Important?... 4 Reputation: A Board s

More information

Cyber Security: from threat to opportunity

Cyber Security: from threat to opportunity IT ADVISORY Cyber Security: from threat to opportunity www.kpmg.com/nl/cybersecurity From threat to opportunity / Cyber security / 1 FOREWORD OPPORTUNITY-DRIVEN CYBER SECURITY Cyber security (also known

More information

Australian Safety and Quality Framework for Health Care

Australian Safety and Quality Framework for Health Care Activities for HEALTH SERVICE EXECUTIVES and BOARDS Australian Safety and Quality Framework for Health Care Putting the Framework into action: Getting started Contents Principle: Consumer centred Area

More information

Chairman s Statement. Contents & Introduction. Introduction

Chairman s Statement. Contents & Introduction. Introduction Business Plan 2016 Contents Chairman s & Introduction Statement Introduction Chairman s Statement About the Commission Our major priorities for 2016 Facilitating market access & other benefits to industry

More information

the Defence Leadership framework

the Defence Leadership framework the Defence Leadership framework Growing Leaders at all Levels Professionalism Loyalty Integrity Courage Innovation Teamwork Foreword One of the founding elements of Building Force 2030, as outlined in

More information

Taking Your PMO to the Next Level:

Taking Your PMO to the Next Level: Taking Your PMO to the Next Level: Four Steps to Value Improvement An ESI International White Paper +44 (0)20 7017 7100 www.esi-emea.com Contents Abstract...3 Introduction...4 Key Functions of the PMO...5

More information

CIO, CISO and Practitioner Guidance IT Security Governance

CIO, CISO and Practitioner Guidance IT Security Governance June 2006 (Revision 1, August 2007) () 1 CIO, CISO and Practitioner Guidance Whatever your business, security and privacy are key matters that affect your enterprise and those dependent upon you. There

More information

Performance Improvement Consulting. What would you like to change? Strategic cost management

Performance Improvement Consulting. What would you like to change? Strategic cost management Performance Improvement Consulting What would you like to change? Strategic cost management What makes us different? By making change personal to those it affects, starting with asking them What would

More information

Pulling it all together: Integrated Solutions for Governance, Risk and Compliance

Pulling it all together: Integrated Solutions for Governance, Risk and Compliance Customer Practice Profile Pulling it all together: Integrated Solutions for Governance, Risk and Compliance The business case for a new enterprise approach to GRC Integrated solutions for Governance, Risk

More information

Key Components of a Risk-Based Security Plan

Key Components of a Risk-Based Security Plan Key Components of a Risk-Based Security Plan How to Create a Plan That Works Authors: Vivek Chudgar Principal Consultant Foundstone Professional Services Jason Bevis Director Foundstone Professional Services

More information