Don t Get Left in the Dust: How to Evolve from CISO to CIRO



Similar documents
FFIEC Cybersecurity Assessment Tool Overview for Chief Executive Officers and Boards of Directors

Connecting the dots: A proactive approach to cybersecurity oversight in the boardroom. kpmg.bm

Cyber Risk Managemet Next? What Board Members, Shareholders, Government, Auditors and Others Will be Asking from the CIO Next:

Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model

The Changing IT Risk Landscape Understanding and managing existing and emerging risks

Feature. Developing an Information Security and Risk Management Strategy

Addressing Cyber Risk Building robust cyber governance

Third-Party Cybersecurity and Data Loss Prevention

FFIEC Cybersecurity Assessment Tool

Cybersecurity in the States 2012: Priorities, Issues and Trends

Accenture Risk Management. Industry Report. Life Sciences

Managing cyber risks with insurance

The data breach lifecycle: From prevention to response IAPP global privacy summit March 6, 2014 (4:30-5:30) Draft v

Developing a robust cyber security governance framework 16 April 2015

Consumer Goods and Services

PwC Cybersecurity Briefing

Vendor Risk Management Financial Organizations

Defending Against Data Beaches: Internal Controls for Cybersecurity

Cyber security: everybody s imperative. A guide for the C-suite and boards on guarding against cyber risks

Address C-level Cybersecurity issues to enable and secure Digital transformation

INFOCUS. Five Questions to Guide Cybersecurity Risk Management BY EARL CRANE

The NIST Cybersecurity Framework

Sarbanes-Oxley Compliance for Cloud Applications

Cybersecurity The role of Internal Audit

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES

fs viewpoint

THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS

Intel Security Professional Services Leveraging NIST Cybersecurity Framework (CSF): Complexity is the enemy of security

CFO Changing the CFO Mindset on Cybersecurity

Understanding Enterprise Risk Management. Presented by Dorothy Gjerdrum Arthur J Gallagher

PRIORITIZING CYBERSECURITY

WSECU Cyber Security Journey. David Luchtel VP IT Infrastructure & Opera:ons

CISM (Certified Information Security Manager) Document version:

Cybersecurity: You re Doing IT Wrong

Experience the commitment WHITE PAPER. Information Security Continuous Monitoring. Charting the Right Course. cgi.com 2014 CGI GROUP INC.

Rethinking Information Security for Advanced Threats. CEB Information Risk Leadership Council

Blending Corporate Governance with. Information Security

How To Transform It Risk Management

The CIPM certification is comprised of two domains: Privacy Program Governance (I) and Privacy Program Operational Life Cycle (II).

Key Cyber Risks at the ERP Level

CISM ITEM DEVELOPMENT GUIDE

IT AUDIT WHO WE ARE. Current Trends and Top Risks of /9/2015. Eric Vyverberg. Randy Armknecht. David Kupinski

Securing your Corporate Infrastructure What is really needed to keep your assets protected

Independent Evaluation of NRC s Implementation of the Federal Information Security Modernization Act of 2014 for Fiscal Year 2015

SUSTAINING COMPETITIVE DIFFERENTIATION

Defending yesterday. Financial Services. Key findings from The Global State of Information Security Survey 2014

Adopting a Cybersecurity Framework for Governance and Risk Management

Executive Management of Information Security

What can HITRUST do for me?

Enterprise Risk Management & Information Technology

Tying It All Together: Practical ERM Integration. Richard Scanlon Vice President Enterprise Risk Management CIGNA Corporation

The College of New Jersey Enterprise Risk Management and Higher Education For Discussion Purposes Only January 2012

Cyber threat intelligence and the lessons from law enforcement. kpmg.com/cybersecurity

Breaking Down the Silos: A 21st Century Approach to Information Governance. May 2015

KPMG Internal Audit 2015: Top 10 considerations for private equity firms. kpmg.com

Best practices for planning and budgeting. A white paper prepared by Prophix

Risk Considerations for Internal Audit

Linking Risk Management to Business Strategy, Processes, Operations and Reporting

Making Data Work. Florida Department of Transportation October 24, 2014

Bridging the HIPAA/HITECH Compliance Gap

White Paper Achieving GLBA Compliance through Security Information Management. White Paper / GLBA

Healthcare Internal Audit: In a Time of Transition

Strategic Meetings Management Program (SMMP) Implementation and Idea Guide

Data Governance. Unlocking Value and Controlling Risk. Data Governance.

the evolving governance Model for CYBERSECURITY RISK By Gary owen, Director, Promontory Financial Group

IT Cost Reduction. Doing More with Less. Anita Ballaney, Vishwanath Shenoy, Michael Gavigan. Strategic IT cost reduction - Doing More with Less

State of Security Survey GLOBAL FINDINGS

IMPROVING RISK VISIBILITY AND SECURITY POSTURE WITH IDENTITY INTELLIGENCE

Enterprise Risk Management in Colleges and Universities

ENTERPRISE RISK MANAGEMENT FRAMEWORK

Cyber Security and your Financial Institution: Are you ready for the increased scrutiny related to cyber risks?

Privacy Risk Assessments

Principled Performance & GRC

Cyber Security Auditing for Credit Unions. ACUIA Fall Meeting October 7-9, 2015

The PNC Financial Services Group, Inc. Business Continuity Program

Best Practices for Planning and Budgeting. A white paper prepared by PROPHIX Software October 2006

Partnership for Cyber Resilience

PMO Director. PMO Director

Developing a Corporate Governance Framework

Organizational Structure What Works

COBIT 5 For Cyber Security Governance and Management. Nasser El-Hout Managing Director Service Management Centre of Excellence (SMCE)

Cyber Security and the Board of Directors

Vulnerability Risk Management 2.0. Best Practices for Managing Risk in the New Digital War

RSA ARCHER OPERATIONAL RISK MANAGEMENT

Security for Financial Services: Addressing the Perception Gaps in a Dynamic Landscape

Transcription:

SESSION ID: CXO-W04 Don t Get Left in the Dust: How to Evolve from CISO to CIRO JC-JC James Christiansen VP Information Risk Management Accuvant jchristiansen@accuvant.com Bradley J. Schaufenbuel, CISSP Director of Information Security Midland States Bank bschaufenbuel@midlandsb.com

Agenda The Evolution of the Role Drivers of CIRO Emergence What Makes the CIRO Different Making the Transition How to Apply Summary CIRO JC-JC 2

Introduction The security landscape is changing. There is a disconnect between the objectives of the traditional CISO and the businesses they serve. It is time to evolve with the organizations we serve. JC-JC 3

Business Strategy The Six Forces Require a Resilient Security Strategy Global Social and Political Forces Government and Industry Regulations IT Organization, Systems and Infrastructure Organizational Culture Adversaries and Threats JC-JC 4

Progression of this Field 1990-1998 IT Security 1999-2004 Info Sec 2005-2014 IT Risk Management 2015-??? Information Risk Management? JC-JC 5

The Security Journey A business aligned strategy includes understanding the business and compliance objectives, threats, and risks AD HOC Shortcut = Failure to Pass COMPLIANCE BASED INFRASTRUCTURE BASED THREAT BASED RISK BASED INTEL DRIVEN BUSINESS ALIGNED JC-JC 6

Executive Management / Board NACD Guidance from the National Association of Corporate Directors (NACD) PRINCIPLE 1: Cybersecurity is an enterprisewide risk management issue, not just an IT issue PRINCIPLE 2: Understand Legal implications of cyber PRINCIPLE 3: Have regular updates and access to cyber security experts PRINCIPLE 4: Establish an enterprisewide cyber-risk management framework with adequate staffing and budget Guidance includes specific questions about program maturity, breach notification, situational awareness, strategy and incident response PRINCIPLE 5: Discussion of which risks to avoid, accept, mitigate, or transfer through cyber insurance JC-BS 7

Drivers of the Emergence of the CIRO 1/2 Greater expectations of boards and executive teams Increase in outsourcing (greater emphasis on third party oversight) Changing threat landscape (need for risk based remediation) BS-BS 8

Drivers of the Emergence of the CIRO 2/2 Misalignment of security spending with business risk Lack of support for taking calculated risks Divergence amongst existing information governance functions BS-BS 9

Where CISOs Fall Short 1/2 Focus on information protection at the expense of other corporate goals. Information risk is a business problem with a shared budget responsibility Focus on technology solutions in lieu of other controls (continual search for the next silver bullet) BS-BS 10

Where CISOs Fall Short 2/2 Emphasize risk elimination instead of risk optimization ( no instead of yes if we ) Even risk enlightened leaders are fixated on technology risks (focus on IT risk instead of information risk) BS-BS 11

The Ideal CIRO Traditional security knowledge (CISSP, CISM, etc.) Business savvy (MBA) Thinks like a lawyer and a hacker Leader (comfortable in front of the board) Understands risk management principles Can implement project management fundamentals BS-JC 12

The Successful Chief Information Risk Officer Information Security is a Business Imperative Enable Business to Securely Deliver Product and Services Positive Interaction With Partners, Third-parties and Regulators CIRO Information Driven Decision Making Strategic and Operational Metrics / Dashboard Information Risk Assessment and Management Integration with Enterprise Risk Management Shared Budget Responsibility Corporate and Business Unit - Balanced Risk and Cost Prioritization With Other Strategic Business Projects JC-JC 13

What Makes the CIRO Different? Organizational profile Executive team member with board access Organizational alignment Strategy dovetails with organization s Depth and breadth of skills Business risk based approach Leadership JC-JC 14

Not Just Context, but Also Content Not just protection, but also: Optimization of use: Are we extracting value from information? Collection practices: Do we even need to obtain the information? Timely destruction: What is the risk of keeping information too long or not long enough? JC-JC 15

What Functions Fall Under CIRO? May include parts of: Traditional Information Security Legal and Regulatory Compliance Privacy Third Party Oversight Business Resilience Physical Security JC-JC 16

Reporting Structures, Old and New JC-BS 17

Advantages of New Organizational Structure Aligns information risk with business priorities Visibility into organizational or product changes Supports shared responsibility for information risk Ensures that all types of information risk are addressed Able to address board, executive management and customers BS-BS 18

Do We Need Another C-Level Position? Value of information (and associated risk) rising. Executive composition should parallel board s fiduciary duties. Consolidation of existing C-level positions (CPO, CISO / CSO, etc.) BS-BS 19

Skills Required to Make the CIRO Transition Thorough understanding of risk management concepts Factor Analysis of Information Risk (FAIR) 1 Thorough understanding of your organization s business, objectives and growth plans Regular meetings with business executives Executive level communication skills Presentation Skills Toastmasters Written Skills College & Editors / Colleagues 1 Source: Risk Management Insight (riskmanagementinsight.com) BS-BS 20

The Information Risk Transformation Transition yourself from law enforcement / military mindset to that of a business risk manager Add risk management skill set to staff (through training or hiring) Don t forget about information in nonelectronic format BS-BS 21

How? Understanding Regulations: Translate legal regulations to internal activities to meet spirit (legislative intent) and letter of the law. Establish a good working relationship with your attorneys. Participate in standard setting and regulatory rulemaking processes (i.e., help shape the rules). Threat Landscape: Implement threat analytics maturity model Understand the corporate culture: Risk aversion, rate of change, cultural differences, countries of operation BS-JC 22

Evolution of the CISO to the CIRO CISO Securing the Organization CIRO Information Security Third-Party Risk Management Regulatory Compliance Management Business Acumen Secure the internal organization Manage the risk of third parties Manage regulatory risks Communicate current status and risks to board JC-JC 23

Executive Management / Board Tips Keep it short and concise Typically they will want pre-materials Never guess at an answer They read people very well! Information Risk Dashboard Include areas of risk inside and outside the organization Trends What areas of risk are increasing and decreasing New risk highlights Overall goal Demonstrate the effectiveness of your information risk management program over time. JC-BS 24 Source: NACD, Cyber-Risk Oversight, Directors Handbook 2014

Using Existing Enterprise Risk Management (ERM) Program (or Create One) Leverage the existing enterprise risk management (ERM) program (if one exists). Information risk is a subset of enterprise risk. If there isn t an enterprise risk management program, sponsor one (position yourself to be CRO). BS-BS 25

Leveraging Information Risk to Drive Value Concrete Examples: Factoring in an information risk discount on an acquisition valuation / purchase price Leveraging fraud and security data to improve customer experience BS-JC 26

Contributing to the Organization s Success Revenue Contribution Enable Business Efficiency Product Delivery Brand Name Confidence Earnings Contribution Reduced Operating Expenses Related to Security Failure Long Term Reduction of Security Program Costs Circumvent Costs of Regulatory Non-compliance JC-JC 27

Managing Information Risk Information Risk Management Information Security Regulatory Compliance Third Party Risk People Information Technology Governance Effective Compliance Ease of Doing Business Process Improvement Enhanced Security Global Execution Regulations Third Parties JC-JC 28

The Reward Earned respect from organizational peers Inclusion in your organization s strategic decision making processes and forums Perception shifts from marginal cost center to value adding unit JC-BS 29

Summary We have established: The current CISO role is not meeting organizational needs CISO must adapt or go the way of the Dodo bird A focus on managing information risk offers a superior alignment to the organization s objectives There are steps you can take to position yourself for this transition BS-BS 30

Apply It TODAY Immediate actions: Assess you and your program s readiness to make the CIRO transition 90 DAYS Establish YOUR plan to gain and implement necessary skills +90 DAYS Take steps to realign skill sets, focus, and organizational structure to an information risk based approach BS-BS 31

Resources The Evolution of the CISO (accuvant.com/resources/risk-and-the-cisorole#sthash.tumiwwv7.dpuf) NACD Cyber-Risk Oversight Handbook (nacdonline.org/cyber) Introduction to Factor Analysis of Information Risk (FAIR) (riskmanagementinsight.com) Six Forces of Security Strategy (accuvant.com/resources/accuvants-sixforces-of-security-strategy) BS-BS 32

Questions? jchristiansen@accuvant.com bschaufenbuel@midlandsb.com 33