Super CISO 2020: How to Keep Your Job



Similar documents
So Why on Earth Would You WANT To be a CISO?

A Privacy Primer for Security Officers

I, (MR. TECHIE) GOT THE CISO JOB! SHOULD I PREPARE 3 ENVELOPES?

Securing Boomers, Gen Xers, and Gen Yers, OMG We Are So Different!

Developing National Frameworks & Engaging the Private Sector

Italy. EY s Global Information Security Survey 2013

Cybersecurity Audit Why are we still Vulnerable? November 30, 2015

CISM (Certified Information Security Manager) Document version:

Security Transcends Technology

Top Ten Technology Risks Facing Colleges and Universities

Vendor Risk Management Financial Organizations

DEVELOPING A CYBERSECURITY POLICY ARCHITECTURE

Executive Management of Information Security

Personal Security Practices of the CAO

Information Security Officer (# 1773) Salary: Grade 25 ($81,808-$102,167) / Grade 27 ($90,595 to $113,141) Summary of Duties. Minimum Qualifications

HOW SECURE IS YOUR PAYMENT CARD DATA?

Feature. Developing an Information Security and Risk Management Strategy

Think like an MBA not a CISSP

Data Security: Fight Insider Threats & Protect Your Sensitive Data

I n f o r m a t i o n S e c u r i t y

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

The Emergence of the ISO in Community Banking Patrick H. Whelan CISA IT Security & Compliance Consultant

How To Protect Yourself From A Hacker Attack

ISE Northeast Executive Forum and Awards

Question: 1 Which of the following should be the FIRST step in developing an information security plan?

INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION

Information & Asset Protection with SIEM and DLP

Office of the Chief Information Officer

Over 20 years experience in Information Security Management, Risk Management, Third Party Oversight and IT Audit.

Stepping Through the Info Security Program. Jennifer Bayuk, CISA, CISM

Secure360. Measuring the Maturity of your Information Security Program Impossible? Presented by: Mark Carney, VP of Strategic Services

Key Considerations of Regulatory Compliance in the Public Cloud

CYBERSECURITY: ISSUES AND ISACA S RESPONSE

U.S. Office of Personnel Management. Actions to Strengthen Cybersecurity and Protect Critical IT Systems

State of Information Security

Personal Information Threats & Risks: Responding to an Evolving Landscape with an Integrated Data Protection Approach

IT Vendor Due Diligence. Jennifer McGill CIA, CISA, CGEIT IT Audit Director Carolinas HealthCare System December 9, 2014

Cybersecurity in the States 2012: Priorities, Issues and Trends

KEY TRENDS AND DRIVERS OF SECURITY

Information Security Governance:

Information Security Policy and Handbook Overview. ITSS Information Security June 2015

VENDOR RISK MANAGEMENT UPDATE- ARE YOU AT RISK? Larry L. Llirán, CISA, CISM December 10, 2015 ISACA Puerto Rico Symposium

CLASSIFICATION SPECIFICATION FORM

Achieving Security through Compliance

How to Lead the People in a Program Based Environment

PCI DSS READINESS AND RESPONSE

11/27/2015. Cyber Risk as a Component of Business Risk: Communicating with the C-Suite. Conflict of interest. Learning Objectives

San Francisco Chapter. Presented by Mike O. Villegas, CISA, CISSP

Cyber Risks in the Boardroom

Director, IT Security District Office Kern Community College District JOB DESCRIPTION

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft

TERMS OF REFERENCE (TORs) OF CONSULTANTS - (EAG) 1. Reporting Function. The Applications Consultant reports directly to the CIO

Maintaining PCI-DSS compliance. Daniele Bertolotti Antonio Ricci

HP Cyber Security Control Cyber Insight & Defence

COBIT 5 For Cyber Security Governance and Management. Nasser El-Hout Managing Director Service Management Centre of Excellence (SMCE)

JOB ANNOUNCEMENT. Chief Security Officer, Cheniere Energy, Inc.

State of South Carolina InfoSec and Privacy Career Path Model

Building Security In:

Four Top Emagined Security Services

Information Security Risk Management

Security Controls What Works. Southside Virginia Community College: Security Awareness

Chief Information Security Officer

Small Firm Focus: A Practical Approach to Cybersecurity Friday, May 29 9:00 a.m. 10:15 a.m.

SECURITY 2.0 LUNCHEON

Supporting information technology risk management

Governance and Management of Information Security

ISACA Tools Help Develop Cybersecurity Expertise

11th AMC Conference The Privacy Security Partnership in Managing Risk June 22, 2015 Angel Hoffman, Dennis Schmidt, Jay Trinckes

ISACA Privacy Principles and Program Management Guide Preview Yves LE ROUX Principal consultant

Data Privacy and Cybersecurity Task Force

Achieving Security through Compliance

Domain 1 The Process of Auditing Information Systems

Cybersecurity: The Legal, Legislative and Regulatory Outlook

Industrial Cyber Security Risk Manager. Proactively Monitor, Measure and Manage Industrial Cyber Security Risk

Welcome to Modulo Risk Manager Next Generation. Solutions for GRC

ONE DEVICE TO RULE THEM ALL! AUDITING MOBILE DEVICES / BYOD NSAA IT CONFERENCE OCTOBER 2, 2014

Click to edit Master title style

THE CYBERSECURITY SKILL GAP: WHAT EMPLOYERS WANT YOU TO KNOW

Nine Network Considerations in the New HIPAA Landscape

INFORMATION SECURITY STRATEGIC PLAN

Exam Name: Certified Information Security Manager

Domain 5 Information Security Governance and Risk Management

Bridging the HIPAA/HITECH Compliance Gap

Corporate Overview. MindPoint Group, LLC 8078 Edinburgh Drive, Springfield, VA Office: Fax:

Canadian ISO User Group Conference. Sun Life Financial s Experience with Security Governance & ISO 17799

State Governments at Risk: The Data Breach Reality

Amid Ongoing Transformation and Compliance Challenges, Cybersecurity Represents Top IT Concern in Financial Services Industry

FINRA Publishes its 2015 Report on Cybersecurity Practices

Defending Against Data Beaches: Internal Controls for Cybersecurity

Position Description: Chief Information Officer Department: Information Technology Information Technology FLSA Status: Exempt. Revised: October, 2014

January IIA / ISACA Joint Meeting Pre-meeting. Cybersecurity Update for Internal Auditors. Matt Wilson, PwC Risk Assurance Director

Data Breach and Senior Living Communities May 29, 2015

EMC CONSULTING SECURITY STANDARDS AND COMPLIANCE SERVICES

Top 10 Tips and Tools for Meeting Regulatory Requirements and Managing Cloud Computing Providers in the United States and Around the World

fmswhitepaper Why community-based financial institutions should practice enterprise risk management.

Enterprise SM VOLUME 1, SECTION 5.1: MANAGED TIERED SECURITY SERVICES

3 rd -party Security Risk Assessment

CASRO Digital Research Conference Data Security: Don t Risk Being the Weak Link

FFIEC Cybersecurity Assessment Tool

Achieving Governance, Risk and Compliance Requirements with HISP Certification Course

Transcription:

SESSION ID: CXO F01 Super CISO 2020: How to Keep Your Job Todd Fitzgerald, CISSP, CISA, CISM, CIPP, CIPP/US, CIPP/E, PMP, ISO27001, CGEIT, CRISC, CIPM Global Director Information Security Grant Thornton International, Ltd Oak Brook Terrace, IL @securityfitz

Disclaimer Todd Fitzgerald is a Director of Information Security with Grant Thornton International Ltd. The views expressed in this presentation are solely Todd Fitzgerald's personal views and do not necessarily represent the views of Grant Thornton or its clients or its related entities. The information provided with respect to Todd Fitzgerald's affiliation with Grant Thornton is solely for identification purposes and may not and should not be construed to imply endorsement or support by Grant Thornton of the views expressed herein.

The CISO Job Subhead if needed

The CISO Job Description Job description: This position will represent the information protection program of the region and requires the ability to understand business issues and processes and articulate appropriate security models to protect the assets of and entrusted to. A strong understanding of information security is necessary to manage, coordinate, plan, implement and organize the information protection and security objectives of the region. This position is a senior technical role within our information protection and security department. A high-level of technical and security expertise is required and will be responsible for managing information security professionals. This position will play a key role in defining acceptable and appropriate security models for protecting information and enabling secure business operations. This person must be knowledgeable of current data protection best practices, standards and applicable legislation and familiar with principles and techniques of security risk analysis, disaster recovery planning and business continuity processes and must demonstrate an understanding of the management issues involved in implementing security processes and security-aware culture in a large, global corporate environment. He or she will work with a wide variety of people from different internal organizational units, and bring them together to manifest information security controls that reflect workable compromises as well as proactive responses to current and future business risks to enable ongoing operations and protection of corporate assets. RESPONSIBILITIES INCLUDE: Manage a cost-effective information security program for the Americas region; aligned with the global information security program, business goals and objectives Assist with RFP and Information Security responses for clients Implementing and maintaining documentation, policies, procedures, guidelines and processes related to ISO 9000, ISO 27000, ISO 20000, European Union Safe Harbor Framework, Payment Card Industry Data Protection Standards (PCI), SAS-70, General Computer Controls and client requirements Performing information security risk assessments Ensuring disaster recovery and business continuity plans for information systems are documented and tested Participate in the system development process to ensure that applications adhere to an appropriate security model and are properly tested prior to production Ensure appropriate and adequate information security training for employees, contractors, partners and other third parties Manage information protection support desk and assist with resolution Manage security incident response including performing investigative follow-up, assigning responsibility for corrective action, and auditing for effective completion Manage the change control program Monitor the compliance and effectiveness of Americas region information protection program Develop and enhance the security skills and experience of infrastructure, development, information security and operational staff to improve the security of applications, systems, procedures and processes

Continued Direct senior security personnel in order to achieve the security initiatives Participate in the information security steering and advisory committees to address organization-wide issues involving information security matters and concerns, establish objectives and set priorities for the information security initiatives Work closely with different departments and regions on information security issues Consult with and advise senior management on all major information security related issues, incidents and violations Update senior management regarding the security posture and initiative progress Provide advice and assistance concerning the security of sensitive information and the processing of that information Participate in security planning for future application system implementations Stay current with industry trends relating to Information Security Monitor changes in legislation and standards that affect information security Monitor and review new technologies Performs other Information Security projects / duties as needed MINIMUM QUALIFICATIONS: Transferable Skills (Competencies) Strong communication and interpersonal skills Strong understanding of computer networking technologies, architectures and protocols Strong understanding of client and server technologies, architectures and systems Strong understanding of database technologies Strong knowledge of information security best practices, tools and techniques Strong conceptual understanding of Information Security theory Strong working knowledge of security architecture and recovery methods and concepts including encryption, firewalls, and VPNs Knowledge of business, security and privacy requirements related to international standards and legislation (including ISO 9001, ISO 27001, ISO 20000, Payment Card Industry data protection standard (PCI), HIPPA, European Union Data Protection Directive, Canada s Personal Information Protection and Electronic Documents Act, SAS-70 Type II, US state privacy legislation and Mexico s E-Commerce Act) Knowledge of risk analysis and security techniques Working knowledge of BCP and DR plan requirements and testing procedures Working knowledge of Windows XP/2000/2003, Active Directory, and IT Infrastructure security and recovery methods and concepts Working knowledge of Web-based application security and recovery methods and concepts Working knowledge of AS400 security and recovery methods and concepts Working knowledge of PeopleSoft security and recovery methods and concepts Working Knowledge of anti-virus systems, vulnerability management, and violation monitoring Strong multi-tasking and analytical/troubleshooting skills Knowledge of audit and control methods and concepts a plus Knowledge of SAS-70 audit requirements a plus Knowledge of ISO 9001 requirements a plus Knowledge of ISO 27001 requirements a plus Knowledge of ISO 20001 requirements a plus Knowledge of COBIT requirements a plus Knowledge of EU / Safe Harbor requirements a plus Knowledge of Linux security a plus Knowledge of VB.NET, C++, JAVA, or similar programming languages a plus Proficient in MS-Office suite of products Professional, team oriented Qualifications Bachelor s Degree (B.A., B.S.), or equivalent combination of education and experience in Information Security, Information Technology, Computer Science, Management Information Systems or similar curriculum 7+ years of Information Technology or Information Security experience, including at least 5 years dedicated to Information Security 2+ years of Travel Industry experience preferred Must be a Certified Information Systems Security Professional (CISSP) Certified Information Security Manager (CISM) preferred Strong organizational, time management, decision making, and problem solving skills Strong initiative and self motivated professional Professional certifications from ISACA, (ISC)2, or SANS preferred Experience with ISO certified systems a plus

The CISO's Knowledge Base Must Be Very Broad Source: 2016 RSA Conference Submission Titles

Business Card Version I.M. SuperCISO This position will represent the information protection program of the region and requires the ability to understand business issues and processes and articulate appropriate security models to protect the assets of and entrusted to. A strong understanding of information security is necessary to manage, coordinate, plan, implement and organize the information protection and security objectives of the region. This position is a senior technical role within our information protection and security department. A high-level of technical and security expertise is required and will be responsible for managing information security professionals. This position will play a key role in defining acceptable and appropriate security models for protecting information and enabling secure business operations. This person must be knowledgeable of current data protection best practices, standards and applicable legislation and familiar with principles and techniques of security risk analysis, disaster recovery planning and business continuity processes and must demonstrate an understanding of the management issues involved in implementing security processes and security-aware culture in a large, global corporate environment. He or she will work with a wide variety of people from different internal organizational units, and bring them together to manifest information security controls that reflect workable compromises as well as proactive responses to current and future business risks to enable ongoing operations and protection of corporate assets. RESPONSIBILITIES INCLUDE: Manage a cost-effective information security program for the Americas region; aligned with the global information security program, business goals and objectives Assist with RFP and Information Security responses for clients Implementing and maintaining documentation, policies, procedures, guidelines and processes related to ISO 9000, ISO 27000, ISO 20000, European Union Safe Harbor Framework, Payment Card Industry Data Protection Standards (PCI), SAS-70, General Computer Controls and client requirements Performing information security risk assessments Ensuring disaster recovery and business continuity plans for information systems are documented and tested Participate in the system development process to ensure that applications adhere to an appropriate security model and are properly tested prior to production Ensure appropriate and adequate information security training for employees, contractors, partners and other third parties Manage information protection support desk and assist with resolution Manage security incident response including performing investigative follow-up, assigning responsibility for corrective action, and auditing for effective completion Manage the change control program Monitor the compliance and effectiveness of Americas region information protection program Develop and enhance the security skills and experience of infrastructure, development, information security and operational staff to improve the security of applications, systems, procedures and processes

Primary Rationale for Establishing the CISO Function Source: CISOS: The Good, The Bad, & The Ugly, Ponemon Institute, 12/13

But The CISO Is Still Viewed As Necessary Source: http://healthsystemcio.com/2014/06/26/survey/

CISOs are Very Mobile Today: Average is 2.1 years or less OR IS IT 17 Months? 18 Months? Source: CISOs: The Good, The Bad and the Ugly, Ponemon Institute, 12/2013

What Makes a "Leading Information Security Program?" Subhead if needed

"We are on the verge of a revolution that is just as profound as the change in the economy that came with the industrial revolution. Soon electronic networks will allow people to transcend the barriers of time and distance and take advantage of global markets and business opportunities not even imaginable today, opening up a new world of economic possibility and progress." Vice President Al Gore, Jr., July 1997, A Framework for Global Electronic Commerce

1998 "The Good Ol' Days" No Face book Phones No USB Sticks Y2k Blockbuster Wired VCRs No Ipods or IPad 50 inch flat screen $9K Paper Maps Gas $1.06 gal ER Top TV Saving Private Ryan Backstreet Boys M. Jordan MVP Monica Lewinsky Furby Rugrats, Teletubbies Final Seinfeld Show

Circa 1997 1998, There These Two Men.

Resulting in Security Leadership In Leading Organizations 1998 Style Implement policies and controls Assess risk and determine needs Centrally Managed Monitor and evaluate Promote awareness Source: US GAO, 1998 Executive Guide: Information Security Management: Learning from leading organizations

The Evolution of The Chief Information Security Officer (CISO) Role Pre 2000 to Present Dimension Pre 2000 2000 2003 2004 2008 2008 2016 Technology Firewalls Anti Virus GRC Tools Identity Management Social Media Ipads/Tablets File sharing Virtualization Organization Data Center Committee CISO in IT CISO outside IT Laws/Regs EU Directive HIPAA, GLBA, PCI, FISMA NIST Regs, ISO27001:05 Privacy Law Focus Media Incidents Infrequent Breach Notification Few companies, big attention Many companies, large ones noticed Security Issue Technology Technology Compliance Risk Vendor Consumer

2016 2020 Information Security Subhead if needed

Assess risk and determine needs Implement policies and controls Promote awareness Monitor and evaluate

Security Leadership In Leading Organizations 2016 Style POLICY/CONTROLS ISO27001/2:2013 NIST Framework/800 53 Cobit 5 for Security PCI/FISMA/HIPAA/ETC CVE Vuln DB/OWASP 10 SANS 20 RISK Reputation Privacy Compliance/Regulation Cyber insurance 3 rd Party Vendors Centrally Managed AWARENESS Phishing Campaigns User Pre testing Migration to Online Certifications MONITOR Internal/External Scanning Web Applications Threat Intelligence SIEM Managed Services

Security Leadership In Leading Organizations 2016 Style POLICY/CONTROLS ISO27001/2:2013 NIST Framework/800 53 Cobit 5 for Security PCI/FISMA/HIPAA/ETC CVE Vuln DB/OWASP 10 SANS 20 RISK Reputation Privacy Compliance/Regulation Cyber insurance 3 rd Party Vendors Centrally Managed AWARENESS Phishing Campaigns User Pre testing Migration to Online Certifications MONITOR Internal/External Scanning Web Applications Threat Intelligence SIEM Managed Services

The 2016 2020 CISO Will Need to Balance The Needs of Multiple C Level Stakeholders CEO C_O CRO CMO CPO COO CFO CIO CLO

The "Security Language" May Not Be Easily Understood By The C Suite and Board Information Security Governance Benefits Increase in share value for good governance Increased predictability of business operations Protection from civil or legal liability as a result of absence of due care Critical decisions not based on faulty information

To Whom Should The CISO Report? GENERAL COUNSEL Compliance focused Legal Expertise Access Lack of technical understanding Underestimation of costs RISK OFFICER Risk advocate Security may not get attention Clout with senior management Lack of business metrics CEO Lack of time for security Raises visibility of security May provide aid short term Too many details for CEO PHYSICAL SECURITY Guns Guards vs IT culture Increased incident comms "Police Mentality" Law enforcement connections

Oh, yeah we missed the CIO!! (Where 56% of CISOs report today ) Source: CISO's Today: The good. bad and the ugly, CISO Summit, Larry Ponemon Dec 2013

+++ Reporting to Various Oversight Committees LEGAL RISK COMPLIANCE HUMAN RESOURCES FINANCE PHYSICAL SECURITY/FACILITIES BUSINESS UNITS MARKETING INFORMATION TECHNOLOGY

Each generation approaches work differently, shaped by the economic, social and political forces of their time ultimately forming their individual preferences. Boomer 1946-64 Gen Y 1980-95 Traditionalist 1928-45 Gen X 1965-79 Gen Z 1996-? 2011 Tamara J. Erickson and Moxie Insight. U.S. Dept of Labor (Date Range 1946-64, 1965-79

The Workforce is Changing Dramatically Source: Hot Spots Movement, 2011 The Future of Work

CISOs Must Be Aware of Changes In the Way We Work Security Policy/Trend Influenced Logon Id/Password Smartphone, biometric, near field communication Secure File Sharing Off premise working, cloud storage, large file collaboration BYOD/BYOC/BYO? Want latest tech, recruiting tool

and Also the "Behavioral" Trends Security Policy/Trend Influenced Cloud Applications Risks need to be communicated, many will 'just try it' Security Careers Multiple career paths, must be challenging, socially responsible, flexible Awareness Training Interactive, bit sized, game based, relevant learning Social Media Company information leaks, need to communicate regularly, value of privacy Enterprise Security's Overlooked Factor: The End User's Age, T.Fitzgerald, Darkreading.com, Oct 2013

CISO Needs To Know What Is Coming: 2016 Top 10 Strategic Technology Trends (Gartner) 87% of Senior Managers Send work to a home computer or cloud to work on remotely

Top 2016 Information Security Trends 1. Unintended consequences of State Intervention 2. Big Data will lead to big problems 3. Mobile applications and IoT 4. Cybercrime causes perfect threat storm 5. Skills gaps becomes an abyss for information security Source: CIO Magazine, ISF Forum, December 2015

The security officer is increasingly dealing with privacy concerns beyond the 'privacy principles' Inconsistent application Lack of global trust Data Governance/location Controller/Processor responsibilities Location of data Retention, record correction, right to be forgotten Location tracking Regulatory fines for privacy notice violation

The CISO 2016 2020 The 2018 CISO Evolution Leadership Strategic Thinking Business Knowledge Risk Management Communication Relationship Management Security Expertise Technical Expertise Source: Forrester Research: Evolve to become 2018 CISO or Face Extinction Plan path away from operations Refine risk management processes to business language Widen vision to privacy, data management and compliance Build support network Create focus and attention of business leaders

The 25 year CISO Profession Evolution 1995 2020 Regulatory Compliance Era Must hire security officer The Threat aware Cybersecurity, Socially Mobile CISO 1990s-2000 2000-2003 2004-2008 2008-2015 2015-20+ Non Existent Security=Logon & Password FIRST CISO 1995 The Risk oriented CISO emerges The Privacy and Data aware CISO

Are You Prepared for 2020? Let's Take a Test Security Risk Management Global Privacy Knowledge Managed Security Services/Remote Teams Boardroom Acumen/Building Strategies Threat Intelligence/Analytics Data Governance Knowing how IOT, Mobile, Social, Cloud, 3D printing fits your business

Final Thoughts Subhead if needed

A sign on a taxicab credit card device Do You have a Disclaimer on Your Security Program? Will it prevent the CISO Pink slip Process?

One Security Officer's Prediction (Mine!) for the CISO of 2020 1. Must have a 2-3 year roadmap tied to new business opportunities/technologies 2. Incidents expected, controlled response expected 3. Controls compliance with control framework expected pick one and go, all industry-mapped 4. Reports outside of IT, 'IT security' resides under infrastructure group 5. SIEM, threat intelligence performed by cloud-providers 6. More CISOs sourced from the business 7. Focus on risk, where the data is and knows countryspecific privacy laws

Apply What You Have Learned Today Next week you should: Identify stakeholders with whom you have a limited relationship In the first three months following this presentation you should: Build stronger relationships with legal, risk, IT, compliance, HR, marketing, etc. Identify the emerging trends impacting your company/industry Pursue a certification of at least one new skill area each year Within six months you should: Complete independent study/training/certification in a leadership, business, risk, or privacy area Draft a 2016 2020 security plan for the organization 41

Today We Explored The breadth of the CISO Job What makes a "Leading Information Security Program" The historical view of the CISO leader Trends impacting 2016 2020 Information Security Soft skill areas, relationships, technologies, approaches to be successful 42

Resources Contributed To By Presenter (Books Available in RSA Bookstore) Information Security Handbook Series Since 2004 43

I Leave You With This Final 60 Second View of Your Next Few Years as a CISO 44

Thank You For Your Participation! Todd Fitzgerald Global Information Security Director Grant Thornton International, Ltd. Oak Brook Terrace, IL todd.fitzgerald@gti.gt.com Todd_fitzgerald@yahoo.com linkedin.com/in/toddfitzgerald 45