An interactive discussion on how a business case should be constructed:
|
|
|
- Dylan Shaw
- 10 years ago
- Views:
Transcription
1
2 An interactive discussion on how a business case should be constructed: Hettie Booysen, head: operational risk, IT Risk Standard Bank Lynette Botha, senior manager information security and compliance, MTN Vernon Fryer, chief technology security officer, Vodacom SA Shamalan Soobiah, former chief information officer, Standard Bank SA
3 The Communicator The vote only opens once you hear and see the countdown clock. When the vote is open, please press the number that corresponds with the option of your choice. 6/22/12
4 We are THE number 1 nation on the planet Go bokka! 53% Go Proteas! 21% Go Bafana Bafana! 10% 16% USA USA USA!
5 By your company having an interest in SIEM you mean? It helps me with my audit exceptions 43% I heard some BU's showing interest in SIEM 2% 23% Everyone goes SIEM - I go SIEM SIEM is the solution to most of my problems 32%
6 In order to have a business case I will: Have a workshop 39% Have long nights 1% Have a team working on it 52% Let the partner write it 8%
7 When building a business case the following is important to my organisation: To already have a budget 13% To have executive buy-in 79% To base it on negative past experience 8%
8 When I choose the right technology the following two are the most important: Requirements and integration into existing landscape must be well-defined Local partner that can deliver 5% 7% 8% 11% Internal skills to implement and run Cost effective technology 14% Top-right Gartner quadrant Ease-of-use Ease of deployment 17% 38%
9 When I technically scope the project I usually involve (Order of importance): CIO/CISO Security architect Security operations Fraud and Forensics Auditors/ Risk and Compliance st choice 2nd choice 3rd choice 4th choice 5th choice
10 Once choosing a SIEM technology: I'll do everything internally with my existing resources. 18% I'll partner and make sure there is skills transfer. 73% I'll outsource it completely. 9%
11 In my organisation the MAIN beneficiary for a SIEM project is: Risk and Compliance 24% Business & Board of Directors 33% Technical management team 9% Security and CIRT response team 34%
12 To show success on a project: I go Big Bang. This is the only way we get traction here. 2% I go big. This way I do not need to do multiple convincing and internal selling. 8% I go phased approach. Step by step. Starting small and then going big. 87% I start small. Then at least it is not my neck on the line if it fails. 3%
13 I research a SIEM technology and eventually decide based on: What my peers do 9% What "Group" recommends 21% Go with the flavour of the day 0% Gartner/ Industry Reference sites 34% RFI 36%
14 In my organisation SIEM is owned by: IT Security 52% Business 7% IT Operations 17% Forensics & Fraud 1% Risk and compliance 22% Auditors 1%
15 When I decide to motivate for SIEM I: Consult with Risk/ take Legislation into consideration. 38% Use known sales tactics that are applicable to my company. 5% Lobby with all parties involved beforehand. 43% Learn from other organisations how they did it and apply exactly the same. 14%
16 When I deploy SIEM a project plan agreed and signed by all parties: Is always prepared. That's the ONLY way! 37% It is partial. We leave 20% for future and unknown. 38% It is a plan. Anyway it is a massive project. 18% Plan? You must be kidding me! 7%
17 When I deploy SIEM I report on progress to: My manager 30% Steering committee 66% No need to report. It is internal anyway. 3% How should I know? 1%
18 To guarantee success of the SIEM project I will: Set KPA/ KPI measurements. 54% Set reports fitting all levels. 11% Keep business constantly engaged. 19% Automate SIEM. 16%
19 A SIEM project is finished when: Budget is over. 4% Business is engaged. 21% Response Team (CIRT) is fully operational. 67% Technical stuff is installed. 8%
20 Who should run the SIEM project? Me! Only I can deliver the best project. 4% A project manager or project office. 61% Risk and compliance. 17% Affected Business Units. 18%
21 Is Security Operations Centre (SOC) part of my project? Never! Who needs one 4% Absolutely! 63% Only once SIEM is implemented 28% Only once we have our first major incident 5%
22 Business Case process to completion 1. Client expresses interest in SIEM 2. Initial workshop to gauge interest in solution showcase approach to SIEM implementation 3. Identify budget and C-level engagement 4. Determine whether compliance driven or fraud driven 5. Determine competitors pitching 6. Determine the key players within customer and their respective roles esp. main driver 7. Scope initial solution technically 8. Workshop proposal with customer and refine solution 9. Prepare draft BOM with technical solution 10.Pitch solution to key players.
23 Business Case process to completion 11. Make refinements and submit 12.Begin process to hire/train identified resources 13.Build pilot/poc approach with key players/internal drivers 14.Target fraud and pain areas within the business units 15.Build targeted approach to show ROI to the above BU s 16.Build use cases with key players and BU s 17.Implement pilot/poc and use cases 18.Build presentation for C-Level board with key player 19.Present findings (non threatening) and raise awareness internally of value of solution 20.Place PO!
24 Business Case process to completion 21.Define support team 22.Define support processes and compile support documentation 23. Pick team members and place team within organisation 24. Place infrastructure orders 25. Roll-out necessary hardware and Connectors 26. Build agreed upon Use Cases 27.Commence main SIEM deployment 28. Initiate project management meetings 29. Generate reports for business units show value
25 Questions? Thank you
Location of the job: CFO Revenue Assurance
JOB PROFILE Title of position: Manager: Revenue Assurance Operations Number of subordinates: 5-10 Location of the job: CFO Revenue Assurance Level: 3 Position Code: Time span: 2-3 years Key Performance
Why Your SIEM Isn t Adding Value And Why It May Not Be The Tool s Fault. Best Practices Whitepaper June 18, 2014
Why Your SIEM Isn t Adding Value And Why It May Not Be The Tool s Fault Best Practices Whitepaper June 18, 2014 2 Table of Contents LIVING UP TO THE SALES PITCH... 3 THE INITIAL PURCHASE AND SELECTION
RSA, The Security Division of EMC. Zamanta Anguiano Sales Manager RSA
RSA, The Security Division of EMC Zamanta Anguiano Sales Manager RSA The Age of the Hyperextended Enterprise BUSINESS ISSUES IMPACT Innovation Collaboration Exploding Information Supply Chain Customer
Process-Based Business Transformation. Todd Lohr, Practice Director
Process-Based Business Transformation Todd Lohr, Practice Director Process-Based Business Transformation Business Process Management Process-Based Business Transformation Service Oriented Architecture
Protect Your Universe with ArcSight
Protect Your Universe with ArcSight The ArcSight SIEM Platform: Prevent Data Theft Enforce Compliance Defeat Cybercrime Before ArcSight, it was difficult to know in realtime what was happening from an
Don t let your SIeM become your Nightmare!
Don t let your SIeM become your Nightmare! Herwig Köck, Thomas Bleier What is SIEM? Combining Security Components Intrusion Detection Endpoint Security Service Logs Asset Management Packets Protocols IP-Adresses
Defining, building, and making use cases work
Defining, building, and making use cases work Paul Brettle Presales Manager, Americas Pacific Region What is a use case? Compliance FISMA, PCI, SOX, etc Network security firewalls, IDS, routers & switches
Attachment 16.5 SA Power Networks: Supply Chain Strategy 2015-2020
Attachment 16.5 SA Power Networks: Supply Chain Strategy 2015-2020 SA Power Networks. Supply Chain Strategy 2015 2020 Executive Summary The Future Operating Model has identified business drivers that will
Best Practices to Improve Breach Readiness
Best Practices to Improve Breach Readiness Dr. Robert W. Griffin Chief Security Architect RSA, the Security Division of EMC http://blog.emc2.de/trust-security @RobtWesGriffin 1 Security Breaches 2 Security
An Effective Approach to Transition from Risk Assessment to Enterprise Risk Management
Bridgework: An Effective Approach to Transition from Risk Assessment to Enterprise Risk Management @Copyright Cura Software. All rights reserved. No part of this document may be transmitted or copied without
How to Define SIEM Strategy, Management and Success in the Enterprise
How to Define SIEM Strategy, Management and Success in the Enterprise Security information and event management (SIEM) projects continue to challenge enterprises. The editors at SearchSecurity.com have
In house or Outsource: Exploring your Payroll
In house or Outsource: Exploring your Payroll In house or Outsource Options Whatever the size of your organisation if you employ staff, you have to run a payroll. There are, however, a range of different
I WANT EFFICIENT WORKFLOWS, HIGHER PRODUCTIVITY AND LOWER COSTS
I WANT EFFICIENT WORKFLOWS, HIGHER PRODUCTIVITY AND LOWER COSTS OPTIMISED PRINT SERVICES HOW CAN YOU BEST SOLVE THE CHALLENGES OF THE MODERN WORKING WORLD? BY WORKING TOGETHER! Everyone in the modern working
A SIEM BUYER S GUIDE for Resourced-Constrained Security. A Practical, No-Nonsense SIEM Buyer s Guide for the Tightly Resourced Security Department
A SIEM BUYER S GUIDE for Resourced-Constrained Security A Practical, No-Nonsense SIEM Buyer s Guide for the Tightly Resourced Security Department A SIEM BUYER S GUIDE for Resourced-Constrained Security
Hosting Infrastructure. Data Centre Economics
Hosting Infrastructure Data Centre Economics THE IT LIFECYCLE The IT Lifecycle is 3-5 years before a refresh is required. Data Centre infrastructure has a 5 year lifecycle before reinvestment is required.
Combating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center
Combating a new generation of cybercriminal with in-depth security monitoring 1 st Advanced Data Analysis Security Operation Center The Challenge Don t leave your systems unmonitored. It takes an average
2011 NASCIO Nomination Business Improvement and Paperless Architecture Initiative. Improving State Operations: Kentucky
2011 NASCIO Nomination Business Improvement and Paperless Architecture Initiative Improving State Operations: Kentucky Kevin Moore 6/1/2011 Executive Summary: Accounts Payable was a time consuming, inefficient
Guide to Buyer Personas
Guide to Buyer Personas A primer on creating and using buyer personas. http://breakoutroom.co Breakout Room Contents 3 7 11 What are buyer personas? How to create buyer personas Incorporating buyer personas
CaaS Think as a bad guy Petr Hněvkovský, CISA, CISSP HP Enterprise Security
CaaS Think as a bad guy Petr Hněvkovský, CISA, CISSP HP Enterprise Security 1 Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
NSW Government Digital Information Security Policy
NSW Government Digital Information Security Policy Version: 1.0 Date: November 2012 CONTENTS PART 1 PRELIMINARY... 3 1.1 Scope... 3 1.2 Application... 3 1.3 Objectives... 3 PART 2 CORE REQUIREMENTS...
Specialist Motor Claims and Accident Management
Specialist Motor Claims and Accident Management A comprehensive range of core competencies Services include: First response Vehicle Recovery and collection services Repair and service deployment Repair
Organisational Change Management
Organisational Change Management The only thing that is constant is change in your business, your market, your competitors, and your technology. Remaining competitive and responsive to your customers and
www.pwc.com Next presentation starting soon Next Gen Customer Experience Enabled by PwC & Oracle s Cloud CRM & CX Applications
www.pwc.com Next presentation starting soon Next Gen Customer Experience Enabled by & Oracle s Cloud CRM & CX Applications Agenda Introductions & Customer Experience / CX Defined Why CX is Critical Today?
5IMPROVE OUTBOUND WAYS TO SALES PERFORMANCE: Best practices to increase your pipeline
WAYS TO 5IMPROVE OUTBOUND SALES PERFORMANCE: Best practices to increase your pipeline table of contents Intro: A New Way of Playing the Numbers Game One: Find the decision maker all of them Two: Get ahead
Software License Management: 2012 Software License Management Benchmark Survey SOLUTION WHITE PAPER
Software License Management: 2012 Software License Management Benchmark Survey SOLUTION WHITE PAPER TABLE OF CONTENTS EXECUTIVE SUMMARY................................................ 1 WHAT IS SOFTWARE
BT Managed Services. Taking care of business, so you can take care of business
BT Managed Services Taking care of business, so you can take care of business If there s an issue, regardless of whether it s software, hardware or network, the stores have one number to call. BT Expedite
Cyber Security key emerging risk Q3 2015
Cyber Security key emerging risk Q3 2015 The study is based on interviews with CIO:s, CISO:s and Head of Security in August and September 2015. November 2015 www.pwc.se Companies falling behind are more
Telecom Expense Management
Telecom Expense Professional Cost Group Ltd. Control your costs Manage your assets Transform your business Visit us online: www.pcmg.co.uk/tem Your Challenges. For most companies, fixed and mobile communications
Handbook for municipal finance officers Performance management Section J
1. Introduction The Department of Provincial and Local Government (DPLG) defined performance management as a strategic approach to management, which equips leaders, managers, employees and stakeholders
TEN TIPS FOR A SUCCESSFUL INFOR IMPLEMENTATION
TEN TIPS FOR A SUCCESSFUL INFOR IMPLEMENTATION Copyright 2015 Panorama Consulting Solutions. All Rights Reserved. 720.515.1377 Panorama- Consulting.com Successfully implementing an Infor ERP system involves
PASTA Abstract. Process for Attack S imulation & Threat Assessment Abstract. VerSprite, LLC Copyright 2013
2013 PASTA Abstract Process for Attack S imulation & Threat Assessment Abstract VerSprite, LLC Copyright 2013 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Building a Security Operations Center (SOC)
Building a Security Operations Center (SOC) Ben Rothke, CISSP CISM Wyndham Worldwide Corp. Session ID: TECH-203 Session Classification: Advanced About me Ben Rothke, CISSP, CISM, CISA Manager - Information
A NEW APPROACH TO CYBER SECURITY
A NEW APPROACH TO CYBER SECURITY We believe cyber security should be about what you can do not what you can t. DRIVEN BY BUSINESS ASPIRATIONS We work with you to move your business forward. Positively
The CERT Top 10 List for Winning the Battle Against Insider Threats
The CERT Top 10 List for Winning the Battle Against Insider Threats Dawn Cappelli CERT Insider Threat Center Software Engineering Institute Carnegie Mellon University Session ID: STAR-203 Session Classification:
How To Get A Cloud Based Contact Centre
why contact centres are moving to cloud-based solutions 1/18 Managing a modern contact centre is tough. Technology is moving so quickly, consumer habits change overnight and regulatory requirements are
Strategy for Application Modernization A Summa White Paper
Strategy for Application Modernization A Summa White Paper Summa 925 Liberty Avenue, 6 th Floor Pittsburgh, PA 15222 (p) 412.258.3300 (f) 412.258.3299 www.summa tech.com Why Modernize? My customers want
Information & Asset Protection with SIEM and DLP
Information & Asset Protection with SIEM and DLP Keeping the Good Stuff in and the Bad Stuff Out Professional Services: Doug Crich Practice Leader Infrastructure Protection Solutions What s driving the
Strategic Guide to creating a World Class Customer Advisory Board Program
Strategic Guide to creating a World Class Customer Advisory Board Program This paper is authored from CustomerAdvisoryBoard.org industry association research including the CAB Manager Industry Surveys,
(Dev + Ops) ITSM = Calamity
(Dev + Ops) ITSM = Calamity Randy Steinberg [email protected] DevOps Defined A cultural and professional movement that stresses communication, collaboration, and integration between software developers,
Specialist Cloud Services Lot 4 Cloud EDRM Consultancy Services
Specialist Cloud Services Lot 4 Cloud EDRM Consultancy Services Page 1 1 Contents 1 Contents... 2 2 Transcend360 Introduction... 3 3 Service overview... 4 3.1 Service introduction... 4 3.2 Service description...
WHITE PAPER SPLUNK SOFTWARE AS A SIEM
SPLUNK SOFTWARE AS A SIEM Improve your security posture by using Splunk as your SIEM HIGHLIGHTS Splunk software can be used to operate security operations centers (SOC) of any size (large, med, small)
Managing Open Source Code Best Practices
Managing Open Source Code Best Practices September 24, 2008 Agenda Welcome and Introduction Eran Strod Open Source Best Practices Hal Hearst Questions & Answers Next Steps About Black Duck Software Accelerate
Building a Managed Services Practice
Building a Managed Services Practice BENEFITS TO YOU Learn best practices culled from experience, feedback from successful managed service providers and industry research Miss the speed bumps on the road
04 Executive Summary. 08 What is a BI Strategy. 10 BI Strategy Overview. 24 Getting Started. 28 How SAP Can Help. 33 More Information
1 BI STRATEGY 3 04 Executive Summary 08 What is a BI Strategy 10 BI Strategy Overview 24 Getting Started 28 How SAP Can Help 33 More Information 5 EXECUTIVE SUMMARY EXECUTIVE SUMMARY TOP 10 BUSINESS PRIORITIES
FUJITSU Software Interstage Business Operations Platform: A Foundation for Smart Process Applications
FUJITSU Software Interstage Business Operations Platform: A Foundation for Smart Process Applications Keith Swenson VP R&D, Chief Architect Fujitsu America, Inc. May 30, 2013 We are a software company
CREATE A MARKETING PLAN
CREATE A MARKETING PLAN IN 10 EASY STEPS WORKING OUT A PLAN Building a marketing plan is a lot like the first time you go to a gym. There s some apprehension, some indecision, and as a whole you may not
CFIR - Finance IT 2015 Cyber security September 2015
www.pwc.dk Cyber security Audit. Tax. Consulting. Our global team and credentials Our team helps organisations understand dynamic cyber challenges, adapt and respond to risks inherent to their business
SAP Solution Brief SAP Technology SAP IT Infrastructure Management. Unify Infrastructure and Application Lifecycle Management
SAP Brief SAP Technology SAP IT Infrastructure Management Objectives Unify Infrastructure and Application Lifecycle Management Supercharge your IT infrastructure Supercharge your IT infrastructure What
Strategies and Best Practices to Implement a Successful Data Loss Prevention Program Sebastian Brenner, CISSP
Strategies and Best Practices to Implement a Successful Data Loss Prevention Program Sebastian Brenner, CISSP Principal Systems Engineer Symantec LAMC Agenda 1 What DLP is and its purpose 2 Challenges
Successful EHR Change Management
Successful EHR Change Management Roles and responsibilities White paper Table of contents Executive summary... 2 Introduction... 3 Never underestimate the power of the people... 3 People... 4 From resisting
Changing the Enterprise Security Landscape
Changing the Enterprise Security Landscape Petr Hněvkovský Presales Consultant, ArcSight EMEA HP Enterprise Security Products 2012 Hewlett-Packard Development Company, L.P. The information contained herein
Bright OpenStack. Case Studies & What s New. John Corne Senior Pre-Sales Engineer at Bright June 19, 2016
Bright OpenStack Case Studies & What s New John Corne Senior Pre-Sales Engineer at Bright June 19, 2016 Agenda Introduction 3 short Case Studies John Corne, Bright Computing What s new in Bright OpenStack
SIEM Implementation Approach Discussion. April 2012
SIEM Implementation Approach Discussion April 2012 Agenda What are we trying to solve? Summary Observations from the Security Assessments related to Logging & Monitoring Problem Statement Solution Conceptual
AN OVERVIEW OF SYSTEMS ANALYSIS: SYSTEMS ANALYSIS AND THE ROLE OF THE SYSTEMS ANALYST. Lecture 1. 21.10.2014, Tuesday
AN OVERVIEW OF SYSTEMS ANALYSIS: SYSTEMS ANALYSIS AND THE ROLE OF THE SYSTEMS ANALYST Lecture 1 21.10.2014, Tuesday 2 A Series of Lectures 1.The Role of the Systems 2.Project Planning and Project Management
Update On Smart Grid Cyber Security
Update On Smart Grid Cyber Security Kshamit Dixit Manager IT Security, Toronto Hydro, Ontario, Canada 1 Agenda Cyber Security Overview Security Framework Securing Smart Grid 2 Smart Grid Attack Threats
The Push and Pull of the Cloud. TPI Cloud Computing Overview. April 5 th 2011
0 The Push and Pull of the Cloud. TPI Cloud Computing Overview April 5 th 2011. No part of this document may be reproduced in any form or by any electronic or mechanical Copyright means, 2011 Technology
BUILDING THE NEW BUSINESS CASE FOR ITAM
BEYOND TOOLS: BUSINESS INTELLIGENCE MEETS ANALYTICS BUILDING THE NEW BUSINESS CASE FOR ITAM Frank Venezia, Siwel Consulting, Inc. Steffani Lomax, Siwel Consulting, Inc. White Paper - November 2013 SM Building
IBM QRadar as a Service
Government Efficiency through Innovative Reform IBM QRadar as a Service Service Definition Copyright IBM Corporation 2014 Table of Contents IBM Cloud Overview... 2 IBM/Sentinel PaaS... 2 QRadar... 2 Major
A Closer Look at BPM. January 2005
A Closer Look at BPM January 2005 15000 Weston Parkway Cary, NC 27513 Phone: (919) 678-0900 Fax: (919) 678-0901 E-mail: [email protected] http://www.ultimus.com The Information contained in this document
Combating a new generation of cybercriminal with in-depth security monitoring
Cybersecurity Services Combating a new generation of cybercriminal with in-depth security monitoring 1 st Advanced Data Analysis Security Operation Center The Challenge Don t leave your systems unmonitored.
Comprehensive Security with Splunk and Cisco
Copyright 2014 Splunk Inc. Comprehensive Security with Splunk and Cisco Mario MASSARD Splunk Senior SE [email protected] Company Company (NASDAQ: SPLK) Founded 2004, first software release in 2006 HQ: San
Open call for tenders No 01/2102/12
The Court of Auditors of the European Union Directorate of Information and Technologies (DIT) Open call for tenders No 01/2102/12 Information Technology Helpdesk Services (ITHS) ANNEX 3 DRAFT SERVICE LEVEL
Digitizing Insurance. Transforming Legacy Systems to Adopt Modern and Emerging Technologies. A RapidValue Solutions Whitepaper
Digitizing Insurance Transforming Legacy Systems to Adopt Modern and Emerging Technologies A RapidValue Solutions Whitepaper Table of Contents Executive Summary... Definition of Digitalization in the Context
Specialist Cloud Services Lot 4 Cloud Printing and Imaging Consultancy Services
Specialist Cloud Services Lot 4 Cloud Printing and Imaging Consultancy Services Page 1 1 Contents 1 Contents... 2 2 Transcend360 Introduction... 3 3 Service overview... 4 3.1 Service introduction... 4
CYBER SECURITY DASHBOARD: MONITOR, ANALYSE AND TAKE CONTROL OF CYBER SECURITY
CYBER SECURITY DASHBOARD: MONITOR, ANALYSE AND TAKE CONTROL OF CYBER SECURITY INTRODUCTION Information security has evolved. As the landscape of threats increases and cyber security 1 management becomes
IT Governance and Project Governance
The PROJECT PERFECT White Paper Collection IT Governance and Project Governance Neville Turbit IT Governance Definition A definition of governance is a good place to start. Oxford dictionary describes
Splunk Company Overview
Copyright 2015 Splunk Inc. Splunk Company Overview Name Title Safe Harbor Statement During the course of this presentation, we may make forward looking statements regarding future events or the expected
Performance Management Workshop
Performance Management Workshop Stephen King Ixanos CEO Who are we? What we do? Success Stories Why are we here today? Interactive Approach to Workshop Feel Free to Share Your Business Challenges WHAT
2010 State of Virtualization Security Survey
2010 State of Virtualization Security Survey Current opinions, experiences and trends on the strategies and solutions for securing virtual environments 8815 Centre Park Drive Published: April, 2010 Columbia
How To Create Situational Awareness
SIEM: The Integralis Difference January, 2013 Avoid the SIEM Pitfalls Get it right the first time Common SIEM challenges Maintaining staffing levels 24/7 Blended skills set, continuous building of rules
GETTING MORE FOR LESS AS LOG MANAGEMENT AND SIEM CONVERGE
GETTING MORE FOR LESS AS LOG MANAGEMENT AND SIEM CONVERGE AN IANS INTERACTIVE PHONE CONFERENCE FEBRUARY 11, 2009 CHRIS PETERSON, CTO, FOUNDER, LOGRHYTHM NICK SELBY, IANS FACULTY SUMMARY OF FINDINGS Underwritten
Buyer s Guide & Workbook
SEO SOFTWARE PLATFORM Buyer s Guide & Workbook Data-Driven Insights, Monitoring and Reporting for SEO + Social + Content SEO Software Platform: Buyer s Guide & Workbook Digital marketing professionals
How Do I Choose my KPIs?
Best Practices in Dashboard Design Building a Dashboard System What tasks are involved in building the system? Building a Dashboard System What tasks are involved in building the system? Design Implementation
