How To Learn About Next Generation Attacks
|
|
|
- Roy Allen
- 5 years ago
- Views:
Transcription
1 ISACA GREATER HOUSTON CHAPTER - NEWSLETTER AUGUST 2015 PRESIDENT S MESSAGE Dear ISACA Greater Houston Chapter Members and Friends, It has been a typical hot, steamy August in Houston and the chapter! We concluded our 2nd Annual Cyber Security Conference & 1st Annual Analytics/GRC Conference on August 17 with over 180 members and guests attending and sponsorships with great prizes from Accretive Solutions, Audimation Services, Berkeley Research Group, Coalfire, Identity Automation, and University of Texas Masters Program in Identity Management. It was a successful conference that we know will be bigger, better, and more value-added next year. To do so, we need to begin planning soon. If you would be interested in serving on the 3rd Annual Cyber Security Conference planning committee, please send me an at [email protected] Our new website is live! Same great URL: or you can access the chapter website from your MyISACA tab at Great thanks to our own Mary Hall for her dedication and diligence in this project. The new website has richer features than our old website and more integration with ISACA s main website allowing members to efficiently navigate for news, events, tools, and resources between the international website, your profile on MyISACA, and our local chapter website when you login with your member credentials. Join us for a premiere event within the Houston Information Security Community through a combination of ISACA, ISC2, ISSA, HTCIA, and InfraGard Chapters featuring Stuart McClure, CEO at Cylance discussing Next Generation Attacks. Stuart has been visionary for a new approach to threat detection, protection and response. His leadership sets the strategic direction, operational execution, and fiscal investments of the company. Stuart is one of the leading experts and practical thinkers in the computer security industry today. With a highly regarded 25-year history in the security industry, Stuart has led some of the most notable companies in the space. Prior to Cylance, Stuart was EVP, Global CTO and General Manager of the Security Management Business Unit for McAfee/Intel where CHAPTER LEADERS Norman Lee Comstock, Jr., CISA,CGEIT Chapter President & Membership Director Harvey H. Nusz, CISA,CRISC Vice President Richard Kenneth Hare, CISA,CRISC Secretary Glenn Melvin McQueary, II, CISA,CISM Treasurer Muhammad Akhtar Siraj, CISA Immediate Past President Susana Duran-Oliver Board Member & Certification Coordinator Mary C. Hall, CISA,CRISC Board Member & Webmaster Paul Vanek, CISA Board Member & Audit Committee Chair Joseph Ponnoly, CISA,CISM,CGEIT Board Member- Communications & Newsletter Editor August 31, 2015: Volume 3: 2015
2 he was responsible for a $3 billion consumer and corporate security products business. During his tenure at McAfee, Stuart established an elite team of security researchers called TRACE, which frequently discovered 0- day vulnerabilities and emerging threats in embedded and critical infrastructure. Before McAfee, Stuart helped formalize the cyber security program at Kaiser Permanente, a $34 billion healthcare company. In 1999, Stuart started Foundstone, Inc., a global consulting and products company, which was acquired by McAfee in Stuart is the founding creator and lead-author of the most successful security book series of all time: Hacking Exposed. This book is now on version 7. He is widely recognized for his extensive and in-depth knowledge of security, and is one of the industry's leading authorities in information security today. Members of ISACA can sign up under the member rate. Registration is active for the September 10th event at Our friends at HOU.SEC.CON greatly value the relationships that they have with ISACA and are offering our members a discount on access to the conference taking place on October 15, This will be the only ISACA event in October. The ticket sales website is at There is a link towards the bottom right of the page that is labeled Enter promotional code. Please click on that link, a box will appear. Enter 0NonProfit6.0 in that box and click Apply to get a $15 discount on your Attendee ticket. The discount is not applicable for a VIP ticket. If you plan to attend, please register as soon as possible. Ticket sales will be closing on Oct 1, and they will likely sell out before then. Norman Lee Comstock, Jr. Chapter President (Managing Director, Berkeley Research Group ) Page2
3 UPCOMING EVENTS Joint Meeting of ISACA, ISC2, ISSA, HTCIA, and InfraGard Chapters of Houston TX Thursday, September 10th, 2015, AM to 1:00 PM Next Generation Attacks COMMITTEES Education Committee: Chair: Harvey H Nusz Certification Committee Chair: Susana Duran-Oliver Speaker: Stuart McClure, CEO Cylance Stuart McClure is well known globally as a leading information security expert, as the founder of Foundstone Inc and as co-author of Hacking Exposed, now in its 7 th volume. Currently he is CEO of Cylance, focusing on threat detection, protection and response. Prior to Cylance, Stuart was EVP, Global CTO and General Manager of the Security Management Business Unit for McAfee/Intel. During his tenure at McAfee, Stuart established an elite team of security researchers called TRACE, who have to their credit discovery of several zero-day vulnerabilities and emerging threats in embedded and critical infrastructure. Before McAfee, Stuart oversaw the cyber security program at Kaiser Permanente. In 1999, Stuart started Foundstone, Inc., which was later acquired by McAfee in Time AM to 1:00 PM with lunch Location: HESS - Houston Engineering and Scientific Society Club 5430 Westheimer at Yorktown (near Gallaria) (Free Garage Parking) Research Committee Chair: Dr Ken Stavinoha Event Management Committee Chair: Rich Hare Sponsorships Committee Chair: Carlos Lozano Audit Committee Chair: Paul Vanek Professional Growth & Networking Committee Chair: Denise Hester Membership Committee Chair: Norman Comstock Register for the event on our website or at Page3
4 Monthly Luncheon meetings ISACA Greater Houston Chapter - NEWSLETTER We meet on 3 rd Thursday of every month from 10:30 am until 1:30 PM. Location: Our luncheon meetings are normally at Hess Club. But one-day conferences are held at Crown- Plaza Hotel and other locations. 1. Hess Club, 5430, Westheimer Rd, Houston (Galleria Area) 2. Crowne Plaza Hotel, 1700 Smith Street, Houston TX (downtown) To register for the meetings or events, please register on-line using C-Event. Meeting date September 17, 2015 (Thursday) 10:30 to 2 PM (3 CPEs) Topic, Speaker & Location 10:30-11:30AM Morning Session: "Why You Absolutely Must Utilize a Framework in Auditing Disaster Recovery" Speaker: Harvey Nusz This presentation will review the DRII Framework at a high level and give you auditable steps in each of the 10 domains, focusing on the top 10 mistakes to avoid in DR. It will also discuss DR aspects of virtualization, cloud computing and IAM in various corporations. Harvey Nusz has been enamored with BCP/DR before he took a three day class in DR and recommended as an auditor that Sundstrand and Falk plan to back each other up before that was popular. He has been on both sides of the equation, having audited a large bank s annual test and that of other companies, and having created or managed the creation and testing of 15 plans. He has led approximately 50 tests, ranging from table top to full DR Tests, and has experience in 8 of the 10 DRII domains. Harvey was also one of the regular DR Domain instructors of ISSA, South Texas Chapter, in the previous version of the CISSP Body of Knowledge, and marveled at how that domain mimicked DRII s 10 domains. Harvey has noticed over the years that while many fine professionals have their CISA, a fair number appear to have difficulty auditing a BCP/DR Program, not knowing what to look for. This session is a small effort to assist in building that knowledge amongst fellow CISAs. Harvey, whose company is 4IT Security, Governance & Compliance, just completed a project to implement an IAM Product, and is now assisting a client of Insight Global as a Data Privacy Compliance Analyst. While he enjoyed his time in north Texas, Harvey is very glad to be back in Houston. Concurrent Morning Session: "Using Report Reader to Import Data From PDF Files" ISACA IDEA SIG hosted by Audimation Services Speaker: Christian Tan 12:00-1:00 PM Luncheon Session Topic: "Agile Software Security Assurance" Speaker: Mark Feferman (Vaunted Group) 1:00-2:00 PM Afternoon Session: "The Use of ACL Analytics at Hess Corporation" ISACA ACL SIG Speaker: Tenleigh Sweeney (Hess Corporation) Total 3 CPEs offered Early Registration: $25 Members, $30 Non-Members, $10 Students (for morning session, lunch and ACL SIG) Location: Crowne Plaza Downtown, 1700 Smith Street, Houston, Texas Page4
5 OCTOBER 2015 ISACA event is clubbed with HOU.SEC.CON 2015 THE HOUSTON SECURITY CONFERENCE OCTOBER 14-15, 2015 Details are at: Register at: CERTIFICATION TRAINING CLASSES CISA FALL REVIEW CLASSES CISA Fall Review Classes will be held on Saturdays Oct 24, Oct 31, Nov 7, Nov 14 and Nov 21, 2015 in St. Thomas University, Houston TX. The sessions are from 8:00 am 3:00 pm. Those who already have the books can register just for the class with no book cost. Those interested may please contact Susana Duran-Oliver, Certification Coordinator. Her mail id is: Class schedules are as given below: Dates Time (8:00-3:00) Building Classroom Oct 24, Saturday The Process of Auditing Information System Hughes House Room: 108 (Chapter 1) Oct 31, Saturday IT Governance and Management of IT (Chapter 2) Hughes House Room: 108 Nov 7, Saturday Information System, Acquisition, Development & Hughes House Room: 108 Implementation (Chapter 3) Nov 14, Saturday Information Systems, Operations, Maintenance and Hughes House Room: 108 Support (Chapter 4) Nov 21, Saturday Protection and Information (Chapter 5) Hughes House Room: 108 For registration for the exams, please visit for details Page5
6 CPEs FOR ATTENDING ISACA MEETINGS AND EDUCATIONAL EVENTS We have created a website which displays your earned CPE: 1. Please follow the below instructions to access the site. 2. Copy link to your browser: First time members will need to register: Enter your first and last name as listed with ISACA Enter your address as listed with ISACA Click on the sign-up button You will receive an within a few minutes asking you to log in and update your password. Use the link on the to update your password. Note: If the information submitted does not match our records you will receive and error message.. Page6
7 Page7
8 JOB POSTINGS OVER 50 NEW CYBERSECURITY JOBS AT THE DEPARTMENT OF HOMELAND SECURITY (DHS) THE DEPARTMENT OF HOMELAND SECURITY (DHS) IS RESPONSIBLE FOR SAFEGUARDING OUR NATION S CRITICAL INFRASTRUCTURE FROM PHYSICAL AND CYBER THREATS THAT CAN AFFECT NATIONAL SECURITY, PUBLIC SAFETY, AND ECONOMIC PROSPERITY. DHS IS ACTIVELY RECRUITING ( CYBERSECURITY ) DYNAMIC CYBERSECURITY PROFESSIONALS IN ITS NATIONAL CYBERSECURITY AND COMMUNICATIONS INTEGRATION CENTER (NCCIC) TO HELP PROTECT THE NATION S CYBERSPACE. HOW TO APPLY EMPLOYMENT OPPORTUNITIES ARE POSTED ON USAJOBS AT DHS.USAJOBS.GOV. KEYWORD NCCIC, OR SEARCH/VISIT FOLLOWING VACANCY ANNOUNCEMENTS OR VISIT ABOUT NCCIC NCCIC IS A 24X7 CYBER SITUATIONAL AWARENESS, INCIDENT RESPONSE, AND MANAGEMENT CENTER THAT IS A NATIONAL NEXUS OF CYBER AND COMMUNICATIONS INTEGRATION FOR THE FEDERAL, STATE, LOCAL, TERRITORIAL, AND TRIBAL GOVERNMENTS, THE INTELLIGENCE COMMUNITY, LAW ENFORCEMENT, THE PRIVATE SECTOR, AND INTERNATIONAL ENTITIES. QUALIFIED CANDIDATES MUST HAVE KNOWLEDGE, SKILLS, AND EXPERIENCE IN, BUT NOT LIMITED TO: INFORMATION SYSTEMS AND ARCHITECTURE DESIGN INCIDENT RESPONSE MALWARE AND FORENSIC INCIDENT ANALYSIS INFORMATION SECURITY PROGRAM AND PROJECT MANAGEMENT INFORMATION ASSURANCE GATHERING AND ANALYZING INCIDENT DATA DEVELOPING AND IMPLEMENTING INFORMATION SYSTEMS SECURITY PROGRAMS, POLICES, AND PROCEDURES LEADING TEAMS IN CYBER INCIDENTS AND RESPONSES IDENTIFYING AND ANALYZING CYBER SECURITY THREATS AND PROVIDING MITIGATION STRATEGIES IDENTIFYING AND EXPLOITING VULNERABILITIES, VULNERABILITY SCANNING AND PENETRATION TESTING EVALUATING SECURITY INCIDENT RESPONSE POLICIES REVIEWING PROPOSED NEW SYSTEMS, NETWORKS, AND SOFTWARE DESIGNS FOR POTENTIAL SECURITY RISKS TO LEARN MORE ABOUT THE NCCIC VISIT: ABOUT-NATIONAL-CYBERSECURITY-COMMUNICATIONS-INTEGRATION-CENTER MISSION CRITICAL VACANCIES THAT YOU CAN SHARE WITH THOSE IN YOUR NETWORK WHO WOULD BE INTERESTED IN COMPLETING AN APPLICATION. PLEASE HELP RAISE AWARENESS ABOUT THESE GREAT OPPORTUNITIES BY POSTING ON SOCIAL MEDIA, BLOGS, IN E- NEWSLETTERS, AND SENDING OUT S. PLEASE SPREAD THE WORD BY USING THIS LINK: AND THE HASHTAG #DHSCYBER OR THE Local Job Postings For details, visit our website: Page8
9 CONTACT US Our new website is live. Accessible using the same URL: Please sign in using your ISACA credentials. You can also access it from by clicking on MyISACA tab, logging in and then clicking Visit Chapter website. The website is hosted by ISACA and is linked to ISACA International website. You can easily access ISACA International information from our website. It also has a members only section. Chapter presentations and newsletters (archived) will also be posted on the website. Members also can register for Chapter Events directly from the website. Members can also access LinkedIn and Twitter groups (of the Chapter) directly from the website. Special thanks to Mary Hall, our webmaster. The GHC Board would also like to acknowledge Nancy Taubin's (ISACA International) continued assistance in our website development. Please also join our Twitter and LinkedIn groups for social and professional interaction among the members of the Chapter: LinkedIn: ISACA-Houston Chapter Page9
10 Mailing Address: ISACA Houston Chapter P.O. Box 2424Houston, TX For details of our Board Members and Committees : see Page10
11 NEWS & NOTES Implementing NIST Cybersecurity Framework for Critical Infrastructures using COBIT 5 - Part II -Joseph Ponnoly CISM, CISA, CGEIT, CISSP, MBA, MS NIST Cybersecurity Framework (CSF) 2014 for critical infrastructures, as described in Part I, defined high level security functions and security control activities and their categories and sub-categories, to protect critical infratructure services from identified risks and for detectng, responding to and recovering from cyber security incidents. Part II of this article will discuss how NIST CSF can be implemented using COBIT 5 framework based on the governance and management of IT and the relevant business processes and associated risks. Framework Core Functions and Categories (Courtesy: NIST, USA) Why COBIT 5.0? COBIT 5.0 is referred to in NIST CSF as one of the standards/ frameworks to implement the cybersecurity functons and activities (outcomes) listed by CSF. It is listed along with CCS CSC Fig 1: NIST Cyber Security (SANS Critical Security Controls), ISA Standard for security of industrial automation and critical control systems, ISO 27001/27002 and NIST SP A. We will see how COBIT 5.0 is an overarching framework that supports and includes these standards and best practices. COBIT Page11
12 5.0 does not exclude them, and relies on them for detailed implementation guidelines and gives these standards the business perspective to make them more effective. COBIT is a business governance framework developed by ISACA. It integrates various frameworks and standards such as ISO (for Enterprise Risk Management), ISO 27001/27002/27005 (for Information Security Management), ITIL for IT Service Management, PMBOK / PRINCE 2 (Project Management), Zachman Framework / TOGAF for IT Architecture, ISO 38500:2008 (for Governance of Enterprise IT) and NIST SP and A dealing with risk assessments and IT controls to mitigate risk. COBIT, thus, is an integrated framework and adopts a risk-based approach to governing and managing IT in Enterprises and is ideally suited for implementing NIST CSF. Fig 2: COBIT 5 coverage of other standards and frameworks (Courtesy: ISACA) Page12
13 Governance & Management of Enterprise IT COBIT 5 makes a clear distinction between governance and management of Enterprise IT. Enterprise Governance is the responsibility and function of the Governance Board (Board of Directors) or Senior Executives and focuses on defining the organizational mission and vision and setting directions for achieving them. Operational Management focuses on operational activities involving planning, building, operating and monitoring business processes and applications, aligning them with organizational/enterprise objectives and enabling them using IT for achieving effectiveness and efficiency. COBIT framework and standards can easily be tailored to meet the needs of Enterprise IT Fig 3: COBIT 5 Governance and Management Key Areas (Courtesy: ISACA) governance and management and for managing cybersecurity risks of any enterprise including critical infrastructures (as defined in Part I of this article). COBIT 5 thus takes a holistic view of Enterprise IT and considers seven categories of enablers for effective governance and management of Enterprise IT to optimize value from IT while managing risk.. The business enabler functions listed by COBIT are: Principles, policies and frameworks Processes Organizational structures Culture, ethics and behavior Information Services, infrastructure and applications People, skills and competencies. Page13
14 COBIT 5.0 and Cyber-risk management ISACA Greater Houston Chapter - NEWSLETTER Fig 4: Scope of COBIT 5 for Risk (Courtesy: ISACA) The risk function is considered from the perspective of the seven business enablers, described above. Enterprise Risk management or ERM standards (based on COSO ERM, ISO 31000, ISO/IEC and other standards) are considered as an integral part of governance and management of IT. They support and expand the these business enabler functions and provide a business perspective to enterprise risk. The business risk function provides input to the Risk Management function. Risk Management relies on the core risk business processes and the risk scenarios that are mapped to these risk function enablers. Risk Management is implemented by the COBIT process reference model that can be expanded by the inputs or detailed guidelines from IT Management frameworks and standards such as ITIL, ISO 27001/27002, PMBOK / PRINCE2 and TOGAF. COBIT Process Reference Model The process reference model in COBIT lists a number of governance and management processes that relate to IT activities within the enterprise. It also provides a framework for measuring and monitoring IT performance. Page14
15 Fig 5: COBIT 5 Process Reference Model (Courtesy: ISACA) Organizations would need to adapt COBIT processes to suit their unique environments for managing IT processes and risk. Risk Management Risk Management, as mentioned above, is a key component of NIST Cybersecurity Framework (CSF). These are specifically described in COBIT by the processes listed below: Sr Executive Level EDM (Evaluate, Direct & Monitor) o EDM03- Ensure Risk Optimization Business Management / Process Level APO (Align, Plan & Organize) o APO-012 Manage Risk o APO 013 Manage Security MEA (Monitor Evaluate & Assess) o MEA 02- Monitor Evaluate & Assess System of Internal Controls o MEA 03- Compliance with External Regulations Page15
16 Operational Management Level: BAI (Build, Acquire & Implement) o BAI-09 Manage Assets o BAI-10 Manage Configuration DSS (Deliver, Service & Support) o DSS 04- Manage Continuity o DSS 05 Manage Security Services o DSS-06 - Manage Business Process Controls The Risk Management process as defined by NIST CSF and the associated COBIT processes and enablers are illustrated in the graphics below: Senior Executive Level would focus on organizational/enterprise/business risk. Business Process owners would focus on critical infrastructure risk management dealing with asset management and vulnerability and threat management. Operational level implementation would focus on security operations for securing the critical infrastructure and assets. Fig 6: Risk Management Implementation (Courtesy: NIST, USA) The Risk Management Process (APO-12) in COBIT 5 relies on the seven business enablers and considers various risk factors internal, external and IT-related and also takes into account risk Page16
17 scenarios that can be considered in the business context. The process would involve collecting relevant risk data, in analyzing risk and in responding to risk. Fig 7: The Risk Management Process (APO 012) (Courtesy: ISACA) PART III - NIST CYBERSECURITY FRAMEWORK IMPLEMENTATION STEPS The seven step implementation process as specified by NIST CSF can now be considered from a COBIT perspective. 1. Prioritize and Scope The organizational mission and drivers and stakeholder needs are identified and listed. Information security governance must be considered as the responsibility of the Board of Directors and Senior Executives. The relevant COBIT processes and guidelines are: EDM Evaluate the governance system APO 01 - Consistent management approach, organizational roles and responsibilities, skills and competencies APO Enterprise direction, strategy and objectives APO Enterprise architecture Some other factors to be considered are: - Risk architecture - Business drivers Page17
18 - Compliance requirements (as defined by MEA 03- compliance with external regulations process) 2. Orient: Identify related systems, assets, regulatory requirements and overall risk approach. Identify threats to and vulnerabilities of the critical systems, assets, applications and data identified. The COBIT processes that contain detailed guidelines are: APO (Align, Plan and Organize) o APO 01- Manage the IT management Framework o APO 03 Manage Enterprise Architecture o APO 07 Manage Human Resources o APO 09 Manage Service Agreements o APO-012 Manage Risk o APO 013 Manage Security BAI (Build, Acquire and Implement) o BAI-03 Manage Solutions Identification and Build o BAI 06 Manage Changes o BAI-09 Manage Assets o BAI-10 Manage Configuration DSS (Deliver, Service and Support) o DSS 01- Manage Operations o DSS 02 Manage Service Requests and Incidents o DSS 03 Manage Problems o DSS 02 Manage Service Requests and Incidents o DSS 04- Manage Continuity o DSS 05 Manage Security Services o DSS-06- Manage Business Process Controls MEA (Monitor, Evaluate and Assess) o MEA 02- Monitor Evaluate & Assess System of Internal Controls o MEA 03- Monitor Evaluate & Assess Compliance with External Regulations CSF Profile for the Enterprise 3. Create a current Profile CSF Profile is created for an organization or Enterprise by selecting the core CSF categories (ID, PR, DE, RS, RC) and subcategories of security function activities based on the organization s business needs, business drivers and risk assessment. The current profile shows the as is state. NIST CSF Implementation Guide maps the categories and subcategories to COBIT 5 framework and also to other implementation frameworks. (Please see Appendix A). 4. Conduct risk assessment (on a continuing basis) Risk Assessment is an important step in the cyber security management process. Risk assessments involve identification of critical assets and identification of vulnerabiltiies of systems, networks and applications that could be exploited to compromise data and IT resources. Risk assessments have to consider the threat / loss event frequencies or their Page18
19 likelihood and likely impact to the business or enterprise, described in dollar terms or on a high/medium/low rating scale. IT risk is a combination of the probability of the threat event (threat event frequency) and its impact (probable loss magnitude). If the risk is aove the risk threshold (or risk tolerance level determined by Sr Management), then countermeasures including controls will have to be implemented to reduce risk and bring it to an acceptable level as defined by the enterprise. 5. Create target profile The target profile is the to be state based on the CSF Profile categories and subcategories selected (see Appendix A). This will also consider the result of risk assessments and the control gaps identified. CONTROLS IMPLEMENTATION & MONITORING 6. Determine, analyze and prioritize gaps & Action Plan The control gaps identified must be analyzed and prioritized with reference to the target profile created. This will lead to an action plan. Since COBIT has a business focus, the control categories must be defined within the risk function business perspective as defined by the the seven business enablers mentioned earlier. 7. Implement action plan for countermeasures and controls to reduce risk. Road map, timelines and associated project plans must be created to implement the action plan. This may also involve identification of required GRC tools for implementation. Hardware, software, tools and skilled resources for implementation, may have to be identified and documented for management approval and impleementation roll-out. IMPLEMENTATION TIERS (MATURITY MODEL) CSF Implementation Tiers are associated with the risk management process maturity, integrated risk management program and external participation, as specified by the framework. For example, in a tier 3 repeatable process, risk management practices are formally approved and formulated as policy directives, as against ad-hoc practices in tier 1 and absence of policies in tier 2. In tier 3, there would be an organization-wide approach to managing cyber security risk. Consistent methods are in place to respond effectively to changes in risk. Risk-based management decisions are made particularly in sharing of information with external entities. In Tier 4 these practices are optimized. COBIT also has a tiered approach to risk management as described in EDM 03- risk optimization governance process. There are process capability levels (PCLs) defined in COBIT. Thes are similar to the CSF s implementation tiers. They can be mapped as listed below: CSF Tier 1 (Partial) -> PCL 0 (incomplete) and PCL 1 (performed) CSF Tier 2 (Risk Informed) -> PCL 2 (Managed) CSF Tier 3 (Repeatable) -> PCL 3 (Established) CSF Tier 4 (Adaptive) -> PCL 4 (Predictable) and PCL 5 (Optimizing). Page19
20 Process Capability Assessments can be performed using ISO standard using a rating scale as listed below, and these are adopted by COBIT for each process: N- Not achieved (0 to 15%) P- Partially achieved (15 to 50%) L Largely Achieved (50 to 85%) F- Fully Achieved (85 to 100%) CONCLUSION NIST CSF can be implemented using COBIT 5 framework, as it is an integrated framework, giving the business perspective to governance and management of IT. Since COBIT does not exclude but brings within its umbrella the various Enterprise Risk Management and IT Management frameworks and standards, enterprises would benefit and see business value in implementing the cyber security framework of NIST for critical infrastructures using COBIT 5 framework, business enablers and process reference model. References 1. Executive Order no , Improving Critical Infrastructure Cybersecurity, DCPD , February 12, The DHS Critical Infrastructure program provides a listing of the sectors and their associated critical functions and value chains NIST Cybersecurity Framework SANS Critical Security Controls 5.NIST Cyber security framework implementation Guide, ISACA Page20
21 ISACA Greater Houston Chapter Joseph Ponnoly ISACA Greater Houston Chapter - NEWSLETTER Page21
Cybersecurity Audit Why are we still Vulnerable? November 30, 2015
Cybersecurity Audit Why are we still Vulnerable? November 30, 2015 John R. Robles, CISA, CISM, CRISC www.johnrrobles.com [email protected] 787-647-3961 John R. Robles- 787-647-3961 1 9/11-2001 The event
Ed McMurray, CISA, CISSP, CTGA CoNetrix
Ed McMurray, CISA, CISSP, CTGA CoNetrix AGENDA Introduction Cybersecurity Recent News Regulatory Statements NIST Cybersecurity Framework FFIEC Cybersecurity Assessment Questions Information Security Stats
Building Security In:
#CACyberSS2015 Building Security In: Intelligent Security Design, Development and Acquisition Steve Caimi Industry Solutions Specialist, US Public Sector Cybersecurity September 2015 A Little About Me
Framework for Improving Critical Infrastructure Cybersecurity
Framework for Improving Critical Infrastructure Cybersecurity Version 1.0 National Institute of Standards and Technology February 12, 2014 Table of Contents Executive Summary...1 1.0 Framework Introduction...3
Designing & Building a Cybersecurity Program. Based on the NIST Cybersecurity Framework (CSF)
Designing & Building a Cybersecurity Program Based on the NIST Cybersecurity Framework (CSF) Larry Wilson Lesson 1 June, 2015 1 About the Class This course covers the essential elements for planning, building
CRR-NIST CSF Crosswalk 1
IDENTIFY (ID) Asset Management (AM): The data, personnel, devices, systems, and facilities that enable the organization to achieve business purposes are identified and managed consistent with their relative
Framework for Improving Critical Infrastructure Cybersecurity
Framework for Improving Critical Infrastructure Cybersecurity Version 1.0 National Institute of Standards and Technology February 12, 2014 Table of Contents Executive Summary...1 1.0 Framework Introduction...3
Cybersecurity Framework: Current Status and Next Steps
Cybersecurity Framework: Current Status and Next Steps Federal Advisory Committee on Insurance November 6, 2014 Adam Sedgewick Senior IT Policy Advisor [email protected] National Institute of Standards
Cybersecurity: What CFO s Need to Know
Cybersecurity: What CFO s Need to Know William J. Nowik, CISA, CISSP, QSA PCIP MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2014 Wolf & Company, P.C. Today s Agenda Introduction
By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015
Community Bank Auditors Group Cybersecurity What you need to do now June 9, 2015 By: Gerald Gagne MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2015 Wolf & Company, P.C. Cybersecurity
Cybersecurity The role of Internal Audit
Cybersecurity The role of Internal Audit Cyber risk High on the agenda Audit committees and board members are seeing cybersecurity as a top risk, underscored by recent headlines and increased government
Chayuth Singtongthumrongkul
IT is complicated. IT Governance doesn t have to be. Chayuth Singtongthumrongkul CISSP, CISA, ITIL Intermediate, PMP, IRCA ISMS (ISO/IEC 27001) Director of International Academic Alliance, ACIS Professional
Information Security and Risk Management
Information Security and Risk Management COSO and COBIT Standards and Requirements Page 1 Topics Information Security Industry Standards and COBIT Framework Relation to COSO Internal Control Risk Management
Re: Experience with the Framework for Improving Critical Infrastructure Cybersecurity ( Framework )
10 October 2014 Ms. Diane Honeycutt National Institute of Standards and Technology 100 Bureau Drive, Stop 8930 Gaithersburg, MD 20899 Re: Experience with the Framework for Improving Critical Infrastructure
COBIT 5 For Cyber Security Governance and Management. Nasser El-Hout Managing Director Service Management Centre of Excellence (SMCE)
COBIT 5 For Cyber Security Governance and Management Nasser El-Hout Managing Director Service Management Centre of Excellence (SMCE) Cybersecurity Governance using COBIT5 Cyber Defence Summit Riyadh, KSA
INSIGHTS AND RESOURCES FOR THE CYBERSECURITY PROFESSIONAL
INSIGHTS AND RESOURCES FOR THE CYBERSECURITY PROFESSIONAL BY 2 In enterprise IT, there is a single point where everything that matters in information, technology and business converges: Cybersecurity Nexus
White Paper. COBIT 5 & BiSL
White Paper COBIT 5 & BiSL This paper compares the scope and perspective of COBIT 5 and BiSL and shows how these two frameworks can be used in conjunction to assure that business information management
FedVTE Training Catalog SPRING 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov
FedVTE Training Catalog SPRING 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov If you need any assistance please contact the FedVTE Help Desk here or email the
The Emergence of the ISO in Community Banking Patrick H. Whelan CISA IT Security & Compliance Consultant
THE MARKET LEADER IN IT, SECURITY AND COMPLIANCE SERVICES FOR COMMUNITY FINANCIAL INSTITUTIONS The Emergence of the ISO in Community Banking Patrick H. Whelan CISA IT Security & Compliance Consultant Agenda
Domain 1 The Process of Auditing Information Systems
Certified Information Systems Auditor (CISA ) Certification Course Description Our 5-day ISACA Certified Information Systems Auditor (CISA) training course equips information professionals with the knowledge
Impact of New Internal Control Frameworks
Impact of New Internal Control Frameworks Webcast: Tuesday, February 25, 2014 CPE Credit: 1 0 With You Today Bob Jacobson Principal, Risk Advisory Services Consulting Leader West Region [email protected]
Intel Security Professional Services Leveraging NIST Cybersecurity Framework (CSF): Complexity is the enemy of security
Intel Security Professional Services Leveraging NIST Cybersecurity Framework (CSF): Complexity is the enemy of security David Brezinski, Professional Services, Enterprise Security Architect Agenda Overview
FedVTE Training Catalog SUMMER 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov
FedVTE Training Catalog SUMMER 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov Access FedVTE online at: fedvte.usalearning.gov If you need any assistance please
SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Job Profiles
PNNL-24138 SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Job Profiles March 2015 LR O Neil TJ Conway DH Tobey FL Greitzer AC Dalton PK Pusey Prepared for the
Implementing the U.S. Cybersecurity Framework at Intel A Case Study
SESSION ID: STR-W01 Implementing the U.S. Cybersecurity Framework at Intel A Case Study Tim Casey Senior Strategic Risk Analyst Intel Information Security @timcaseycyber How would you represent your entire
ISACA Tools Help Develop Cybersecurity Expertise
Volume 21, 8 October 2014 ISACA Tools Help Develop Cybersecurity Expertise Nominate Qualified Candidates for the ISACA Board of Directors Tips for Solving Data Classification Challenges Earn CPE at Professional
An Overview of Information Security Frameworks. Presented to TIF September 25, 2013
An Overview of Information Security Frameworks Presented to TIF September 25, 2013 What is a framework? A framework helps define an approach to implementing, maintaining, monitoring, and improving information
Italy. EY s Global Information Security Survey 2013
Italy EY s Global Information Security Survey 2013 EY s Global Information Security Survey 2013 This year s survey our 16th edition captures the responses of 1,909 C-suite and senior level IT and information
Defending Against Data Beaches: Internal Controls for Cybersecurity
Defending Against Data Beaches: Internal Controls for Cybersecurity Presented by: Michael Walter, Managing Director and Chris Manning, Associate Director Protiviti Atlanta Office Agenda Defining Cybersecurity
Framework for Improving Critical Infrastructure Cybersecurity
Framework for Improving Critical Infrastructure Cybersecurity 18 November 2015 [email protected] [email protected] National Institute of Standards and Technology About NIST NIST s mission is to develop
KEY TRENDS AND DRIVERS OF SECURITY
CYBERSECURITY: ISSUES AND ISACA S RESPONSE Speaker: Renato Burazer, CISA,CISM,CRISC,CGEIT,CISSP KEY TRENDS AND DRIVERS OF SECURITY Consumerization Emerging Trends Continual Regulatory and Compliance Pressures
Cybersecurity Framework. Executive Order 13636 Improving Critical Infrastructure Cybersecurity
Cybersecurity Framework Executive Order 13636 Improving Critical Infrastructure Cybersecurity National Institute of Standards and Technology (NIST) Mission To promote U.S. innovation and industrial competitiveness
Domain 5 Information Security Governance and Risk Management
Domain 5 Information Security Governance and Risk Management Security Frameworks CobiT (Control Objectives for Information and related Technology), developed by Information Systems Audit and Control Association
Improving Critical Infrastructure Cybersecurity Executive Order 13636. Preliminary Cybersecurity Framework
1 Improving Critical Infrastructure Cybersecurity Executive Order 13636 Preliminary Cybersecurity Framework 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35
What Directors need to know about Cybersecurity?
What Directors need to know about Cybersecurity? W HAT I S C YBERSECURITY? PRESENTED BY: UTAH BANKERS ASSOCIATION AND JON WALDMAN PARTNER, SENIOR IS CONSULTANT - SBS 1 Contact Information Jon Waldman Partner,
Strategy, COBIT and Vision: HOW DO THEY RELATE? Ken Vander Wal, CISA, CPA, Past President, ISACA [email protected] 11.16.2013
Strategy, COBIT and Vision: HOW DO THEY RELATE? Ken Vander Wal, CISA, CPA, Past President, ISACA [email protected] 11.16.2013 AGENDA IT s Changing Landscape ISACA s Response Vision and Mission COBIT 5
Stepping Through the Info Security Program. Jennifer Bayuk, CISA, CISM
Stepping Through the Info Security Program Jennifer Bayuk, CISA, CISM Infosec Program How to: compose an InfoSec Program cement a relationship between InfoSec program and IT Governance design roles and
Information Security Officer (# 1773) Salary: Grade 25 ($81,808-$102,167) / Grade 27 ($90,595 to $113,141) Summary of Duties. Minimum Qualifications
Thomas K. Lee, Executive Director/CIO Human Resources Department (518) 447-2906 Information Security Officer (# 1773) Salary: Grade 25 ($81,808-$102,167) / Grade 27 ($90,595 to $113,141) The New York State
Framework for Improving Critical Infrastructure Cybersecurity
Framework for Improving Critical Infrastructure Cybersecurity Executive Order 13636 Improving Critical Infrastructure Cybersecurity 2014 ISACA Pittsburgh Information Security Awareness Day Victoria Yan
CYBERSECURITY: ISSUES AND ISACA S RESPONSE
CYBERSECURITY: ISSUES AND ISACA S RESPONSE June 2014 KEY TRENDS AND DRIVERS OF SECURITY Consumerization Emerging Trends Continual Regulatory and Compliance Pressures Mobile devices Social media Cloud services
NIST Cybersecurity Framework & A Tale of Two Criticalities
NIST Cybersecurity Framework & A Tale of Two Criticalities Vendor Management & Incident Response Presented by: John H Rogers, CISSP Advisory Services Practice Manager [email protected] Presented
SECURITY RISK MANAGEMENT
SECURITY RISK MANAGEMENT ISACA Atlanta Chapter, Geek Week August 20, 2013 Scott Ritchie, Manager, HA&W Information Assurance Services Scott Ritchie CISSP, CISA, PCI QSA, ISO 27001 Auditor Manager, HA&W
Cybersecurity@RTD Program Overview and 2015 Outlook
Cybersecurity@RTD Program Overview and 2015 Outlook Finance & Administration Committee Meeting February 10, 2015 Sheri Le, Manager of Cybersecurity RTD Information Technology Department of Finance & Administration
Voluntary Cybersecurity Initiatives in Critical Infrastructure. Nadya Bartol, CISSP, SGEIT, [email protected]. 2014 Utilities Telecom Council
Voluntary Cybersecurity Initiatives in Critical Infrastructure Nadya Bartol, CISSP, SGEIT, [email protected] 2014 Utilities Telecom Council Utility cybersecurity environment is full of collaborations
NIST Cybersecurity Framework Sean Sweeney, Information Security Officer 5/20/2015
NIST Cybersecurity Framework Sean Sweeney, Information Security Officer 5/20/2015 Overview The University of Pittsburgh NIST Cybersecurity Framework Pitt NIST Cybersecurity Framework Program Wrap Up Questions
Information Technology Risk Management
Find What Matters Information Technology Risk Management Control What Counts The Cyber-Security Discussion Series for Federal Government security experts... by Carson Associates your bridge to better IT
Aalborg Universitet. Cyber Assurance - what should the IT auditor focus on? Berthing, Hans Henrik Aabenhus. Publication date: 2014
Aalborg Universitet Cyber Assurance - what should the IT auditor focus on? Berthing, Hans Henrik Aabenhus Publication date: 2014 Document Version Early version, also known as pre-print Link to publication
IT ASSET MANAGEMENT Securing Assets for the Financial Services Sector
IT ASSET MANAGEMENT Securing Assets for the Financial Services Sector V.2 Final Draft May 1, 2014 [email protected] This revision incorporates comments from the public. Page Use case 1 Comments
Revised October 2013
Revised October 2013 Version 3.0 (Live) Page 0 Owner: Chief Examiner CONTENTS: 1. Introduction..2 2. Foundation Certificate 2 2.1 The Purpose of the COBIT 5 Foundation Certificate.2 2.2 The Target Audience
The President issued an Executive Order Improving Critical Infrastructure Cybersecurity, on February 2013.
The President issued an Executive Order Improving Critical Infrastructure Cybersecurity, on February 2013. The Executive Order calls for the development of a voluntary risk based Cybersecurity Framework
All about CPEs. David Gittens CISA CISM CISSP CRISC HISP
All about CPEs David Gittens CISA CISM CISSP CRISC HISP The Designer David Gittens ISSA Barbados Past President Certified in ethical hacking and computer forensics Certified in security management and
COBIT Helps Organizations Meet Performance and Compliance Requirements
DISCUSS THIS ARTICLE COBIT Helps Organizations Meet Performance and Compliance Requirements By Sreechith Radhakrishnan, COBIT Certified Assessor, ISO/IEC 20000 LA, ISO/IEC 27001 LA, ISO22301 LA, ITIL Expert,
ISSA SOUTH TEXAS CHAPTER
Page 1 of 5 ISSA SOUTH TEXAS CHAPTER ISSA News Letter For November 2012 Voted "Outstanding Chapter of 2007" by ISSA International As always, please feel free to contact me with any suggestions or requests
Developing National Frameworks & Engaging the Private Sector
www.pwc.com Developing National Frameworks & Engaging the Private Sector Focus on Information/Cyber Security Risk Management American Red Cross Disaster Preparedness Summit Chicago, IL September 19, 2012
Over 20 years experience in Information Security Management, Risk Management, Third Party Oversight and IT Audit.
CYBERSECURITY: ISSUES AND ISACA S RESPONSE June 2014 BILL S BIO Over 20 years experience in Information Security Management, Risk Management, Third Party Oversight and IT Audit. Vice President Controls
Enterprise Security Tactical Plan
Enterprise Security Tactical Plan Fiscal Years 2011 2012 (July 1, 2010 to June 30, 2012) Prepared By: State Chief Information Security Officer The Information Security Council State of Minnesota Enterprise
NIST CYBERSECURITY FRAMEWORK COMPLIANCE WITH OBSERVEIT
NIST CYBERSECURITY FRAMEWORK COMPLIANCE WITH OBSERVEIT OVERVIEW The National Institute of Standards of Technology Framework for Improving Critical Infrastructure Cybersecurity (The NIST Framework) is a
Happy First Anniversary NIST Cybersecurity Framework:
Happy First Anniversary NIST Cybersecurity Framework: We ve Hardly Known Ya Chad Stowe, CISSP, CISA, MBA Who is your organization on Cybersecurity? Problem Statement Management has not been given the correct
CYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES
CYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES The information provided in this document is presented as a courtesy to be used for informational purposes only. This information
Which cybersecurity standard is most relevant for a water utility?
Which cybersecurity standard is most relevant for a water utility? Don Dickinson 1 * 1 Don Dickinson, Phoenix Contact USA, 586 Fulling Mill Road, Middletown, Pennsylvania, USA, 17057 (*correspondence:
FINRA Publishes its 2015 Report on Cybersecurity Practices
Securities Litigation & Enforcement Client Service Group and Data Privacy & Security Team To: Our Clients and Friends February 12, 2015 FINRA Publishes its 2015 Report on Cybersecurity Practices On February
IT Security Risk Management Model for Cloud Computing: A Need for a New Escalation Approach.
IT Security Risk Management Model for Cloud Computing: A Need for a New Escalation Approach. Gunnar Wahlgren 1, Stewart Kowalski 2 Stockholm University 1: ([email protected]), 2: ([email protected]) ABSTRACT
ACCESS RIGHTS MANAGEMENT Securing Assets for the Financial Services Sector
ACCESS RIGHTS MANAGEMENT Securing Assets for the Financial Services Sector V.2 Final Draft May 1, 2014 [email protected] This revision incorporates comments from the public. Page Use case 1 Comments
CISM ITEM DEVELOPMENT GUIDE
CISM ITEM DEVELOPMENT GUIDE Updated January 2015 TABLE OF CONTENTS Content Page Purpose of the CISM Item Development Guide 3 CISM Exam Structure 3 Writing Quality Items 3 Multiple-Choice Items 4 Steps
A Guide to Successfully Implementing the NIST Cybersecurity Framework. Jerry Beasley CISM and TraceSecurity Information Security Analyst
TRACESECURITY WHITE PAPER GRC Simplified... Finally. A Guide to Successfully Implementing the NIST Cybersecurity Framework Jerry Beasley CISM and TraceSecurity Information Security Analyst TRACESECURITY
IT AUDIT WHO WE ARE. Current Trends and Top Risks of 2015 10/9/2015. Eric Vyverberg. Randy Armknecht. David Kupinski
IT AUDIT Current Trends and Top Risks of 2015 2 02 Eric Vyverberg WHO WE ARE David Kupinski Randy Armknecht Associate Director Internal Audit Protiviti 317.510.4661 [email protected] Managing
Cybersecurity in the Utilities Sector Best Practices and Implementation 2014 Canadian Utilities IT & Telecom Conference September 24, 2014
Cybersecurity in the Utilities Sector Best Practices and Implementation 2014 Canadian Utilities IT & Telecom Conference September 24, 2014 Victoria Yan Pillitteri Advisor for Information Systems Security
Mapping COBIT 5 with IT Governance, Risk and Compliance at Ecopetrol S.A. By Alberto León Lozano, CISA, CGEIT, CIA, CRMA
Volume 3, July 2014 Come join the discussion! Alberto León Lozano will respond to questions in the discussion area of the COBIT 5 Use It Effectively topic beginning 21 July 2014. Mapping COBIT 5 with IT
The Next Generation of Security Leaders
The Next Generation of Security Leaders In an increasingly complex cyber world, there is a growing need for information security leaders who possess the breadth and depth of expertise necessary to establish
Enabling Information PREVIEW VERSION
Enabling Information These following pages provide a preview of the information contained in COBIT 5: Enabling Information. The main benefit of this publication is that it provides COBIT 5 users with a
NIST Cybersecurity Framework What It Means for Energy Companies
Daniel E. Frank J.J. Herbert Mark Thibodeaux NIST Cybersecurity Framework What It Means for Energy Companies November 14, 2013 Your Panelists Dan Frank J.J. Herbert Mark Thibodeaux 2 Overview The Cyber
Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown
Cyber Resilience Implementing the Right Strategy Grant Brown specialist, CISSP @TheGrantBrown 1 2 Network + Technology + Customers = $$ 3 Perfect Storm? 1) Increase in Bandwidth (extended reach) 2) Available
Altius IT Policy Collection Compliance and Standards Matrix
Governance IT Governance Policy Mergers and Acquisitions Policy Terms and Definitions Policy 164.308 12.4 12.5 EDM01 EDM02 EDM03 Information Security Privacy Policy Securing Information Systems Policy
Understanding the NIST Cybersecurity Framework September 30, 2014
Understanding the NIST Cybersecurity Framework September 30, 2014 Earlier this year the National Institute of Standard and Technology released the Framework for Improving Critical Infrastructure Cybersecurity
CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility
CYBER SECURITY AND RISK MANAGEMENT An Executive level responsibility Cyberspace poses risks as well as opportunities Cyber security risks are a constantly evolving threat to an organisation s ability to
Perspectives on Navigating the Challenges of Cybersecurity in Healthcare
Perspectives on Navigating the Challenges of Cybersecurity in Healthcare May 2015 1 Agenda 1. Why the Healthcare Industry Established HITRUST 2. What We Are and What We Do 3. How We Can Help Health Plans
Geoff Harmer PhD, CEng, FBCS, CITP, CGEIT Maat Consulting Reading, UK www.maatconsulting.com
COBIT 5 All together now! Geoff Harmer PhD, CEng, FBCS, CITP, CGEIT Maat Consulting Reading, UK www.maatconsulting.com 1 Copyright Notice COBIT is 1996, 1998, 2000, 2005 2012 ISACA and IT Governance Institute.
Report on CAP Cybersecurity November 5, 2015
Agenda Number 7. Report on CAP Cybersecurity November 5, 2015 Phil Cook CISSP, CISM Manager, Information Technologies Risk #1 External Attacks PR 81 Protect and secure CAP's Information Technology assets
Bellevue University Cybersecurity Programs & Courses
Undergraduate Course List Core Courses: CYBR 250 Introduction to Cyber Threats, Technologies and Security CIS 311 Network Security CIS 312 Securing Access Control CIS 411 Assessments and Audits CYBR 320
Logging In: Auditing Cybersecurity in an Unsecure World
About This Course Logging In: Auditing Cybersecurity in an Unsecure World Course Description $5.4 million that s the average cost of a data breach to a U.S.-based company. It s no surprise, then, that
NICE and Framework Overview
NICE and Framework Overview Bill Newhouse NIST NICE Leadership Team Computer Security Division Information Technology Lab National Institute of Standards and Technology TABLE OF CONTENTS Introduction to
El Camino College Homeland Security Spring 2016 Courses
El Camino College Homeland Security Spring 2016 Courses With over 250,000 federal positions in Homeland Security and associated divisions, students may find good career opportunities in this field. Explore
Risk Management in Practice A Guide for the Electric Sector
Risk Management in Practice A Guide for the Electric Sector Annabelle Lee Senior Technical Executive ICCS European Engagement Summit April 28, 2015 Before we continue let s get over our fears and myths
for Information Security
for Information Security The following pages provide a preview of the information contained in COBIT 5 for Information Security. The publication provides guidance to help IT and Security professionals
COBIT 5 for Risk. CS 3-7: Monday, July 6 4:00-5:00. Presented by: Nelson Gibbs CIA, CRMA, CISA, CISM, CGEIT, CRISC, CISSP ngibbs@pacbell.
COBIT 5 for Risk CS 3-7: Monday, July 6 4:00-5:00 Presented by: Nelson Gibbs CIA, CRMA, CISA, CISM, CGEIT, CRISC, CISSP [email protected] Disclaimer of Use and Association Note: It is understood that
CLOUD SECURITY THROUGH COBIT, ISO 27001 ISMS CONTROLS, ASSURANCE AND COMPLIANCE
CLOUD SECURITY THROUGH COBIT, ISO 27001 ISMS CONTROLS, ASSURANCE AND COMPLIANCE Indranil Mukherjee Singapore ISC Pte Ltd Session ID: CLD T02 Session Classification: Intermediate Cloud Computing from a
Framework for Improving Critical Infrastructure Cybersecurity
Framework for Improving Critical Infrastructure Cybersecurity Implementation of Executive Order 13636 8 April 2015 [email protected] Agenda Mission of NIST Cybersecurity at NIST Cybersecurity Framework
State Agency Cyber Security Survey v 3.4 2 October 2014. State Agency Cybersecurity Survey v 3.4
State Agency Cybersecurity Survey v 3.4 The purpose of this survey is to identify your agencies current capabilities with respect to information systems/cyber security and any challenges and/or successes
Information Security Specialist Training on the Basis of ISO/IEC 27002
Information Security Specialist Training on the Basis of ISO/IEC 27002 Natalia Miloslavskaya, Alexander Tolstoy Moscow Engineering Physics Institute (State University), Russia, {milmur, ait}@mephi.edu
NIST Cybersecurity Framework. ARC World Industry Forum 2014
NIST Cybersecurity Framework Vicky Yan Pillitteri NIST ARC World Industry Forum 2014 February 10-13, 2014 Orlando, FL Executive Order 13636 Improving Critical Infrastructure Cybersecurity It is the policy
Looking at the SANS 20 Critical Security Controls
Looking at the SANS 20 Critical Security Controls Mapping the SANS 20 to NIST 800-53 to ISO 27002 by Brad C. Johnson The SANS 20 Overview SANS has created the 20 Critical Security Controls as a way of
Cybersecurity and internal audit. August 15, 2014
Cybersecurity and internal audit August 15, 2014 arket insights: what we are seeing so far? 60% of organizations see increased risk from using social networking, cloud computing and personal mobile devices
Certified Information Security Manager (CISM)
Certified Information Security Manager (CISM) Course Introduction Course Introduction Domain 01 - Information Security Governance Lesson 1: Information Security Governance Overview Information Security
Cyber Security Metrics Dashboards & Analytics
Cyber Security Metrics Dashboards & Analytics Feb, 2014 Robert J. Michalsky Principal, Cyber Security NJVC, LLC Proprietary Data UNCLASSIFIED Agenda Healthcare Sector Threats Recent History Security Metrics
