CYBERBOK Cyber Crime Security Essential Body of Knowledge: A Competency and Functional Framework for Cyber Crime Management



Similar documents
Bellevue University Cybersecurity Programs & Courses

An Overview of Large US Military Cybersecurity Organizations

(Instructor-led; 3 Days)

The Next Generation of Security Leaders

April 8, Ms. Diane Honeycutt National Institute of Standards and Technology 100 Bureau Drive, Stop 8930 Gaithersburg, MD 20899

Stepping Through the Info Security Program. Jennifer Bayuk, CISA, CISM

InfoSec Academy Application & Secure Code Track

Utica College. Information Security Plan

Information Security Specialist Training on the Basis of ISO/IEC 27002

State of Minnesota. Enterprise Security Strategic Plan. Fiscal Years

Bachelor of Science Degree Cyber Security Advancing the nation s workforce one graduate at a time

Information Security Program CHARTER

An Overview of Information Security Frameworks. Presented to TIF September 25, 2013

OCCUPATIONAL GROUP: Information Technology. CLASS FAMILY: Security CLASS FAMILY DESCRIPTION:

Certification and Training

Introduction to Cyber Security / Information Security

Executive Management of Information Security

InfoSec Academy Forensics Track

National Initiative for Cyber Security Education

Submission of the.au Domain Administration Ltd (auda) to the Australian Government's Cyber Security Review

Cybersecurity in the States 2012: Priorities, Issues and Trends

Course Content Summary ITN 267 Legal Topics in Network Security (3 Credits)

Newcastle University Information Security Procedures Version 3

Release: 1. ICA60308 Advanced Diploma of Information Technology (E-Security)

JOB ANNOUNCEMENT. Chief Security Officer, Cheniere Energy, Inc.

Cloud Security Trust Cisco to Protect Your Data

NHS Commissioning Board: Information governance policy

Privacy and Security Framework, February 2010

Assessing the strength of your security operating model

The Emergence of the ISO in Community Banking Patrick H. Whelan CISA IT Security & Compliance Consultant

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility

Compliance. Review. Our Compliance Review is based on an in-depth analysis and evaluation of your organization's:

Information Security Program

FFIEC Cybersecurity Assessment Tool

State Agency Cyber Security Survey v October State Agency Cybersecurity Survey v 3.4

Building Blocks of a Cyber Resilience Program. Monika Josi monika.josi@safis.ch

DIVISION OF INFORMATION SECURITY (DIS)

Cyber Security solutions

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

National Cyber Security Policy -2013

Developing a robust cyber security governance framework 16 April 2015

How to use the National Cybersecurity Workforce Framework. Your Implementation Guide

DOE CYBER SECURITY EBK: CORE COMPETENCY TRAINING REQUIREMENTS Key Cyber Security Role: Authorizing Official (AO)

The New Zealand Human Services Quality Framework - ISO9002:2008 to 2012

Work Toward Your Bachelor s Degree

Cisco Cloud Assessments. Justin Tang

Information Security Workforce Development Matrix Initiative. FISSEA 23 rd Annual Conference March 23, 2010

ASTRAZENECA GLOBAL POLICY SAFEGUARDING COMPANY ASSETS AND RESOURCES

Executive Cyber Security Training. One Day Training Course

INFORMATION SECURITY STRATEGIC PLAN

State of South Carolina Initial Security Assessment

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft

FFIEC Cybersecurity Assessment Tool Overview for Chief Executive Officers and Boards of Directors

NASCIO 2014 State IT Recognition Awards

North Texas ISSA CISO Roundtable

Mitigating and managing cyber risk: ten issues to consider

CESG Certification of Cyber Security Training Courses

Anthony J. Albanese, Acting Superintendent of Financial Services. Financial and Banking Information Infrastructure Committee (FBIIC) Members:

Department of Homeland Security Information Sharing Strategy

An Introduction to the DHS EBK: Competency and Functional Framework for IT Security Workforce Development

Protecting Official Records as Evidence in the Cloud Environment. Anne Thurston

Information Security Program Management Standard

Program Overview. CDP is a registered certification designed and administered by Identity Management Institute (IMI).

Policy Document Control Page

RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY 229 Information Security Fundamentals

National Approach to Information Assurance

70250 Graduate Certificate in Digital Forensics

VENDOR MANAGEMENT. General Overview

Information Governance Policy

NICE and Framework Overview

NSW Government Digital Information Security Policy

Information Security Management System Policy

Information Security Management System Information Security Policy

Data Security and Privacy Principles for IBM SaaS How IBM Software as a Service is protected by IBM s security-driven culture

Securing the Microsoft Cloud

ICASAS505A Review and update disaster recovery and contingency plans

Protecting critical infrastructure from Cyber-attack

CYBER SECURITY TRAINING SAFE AND SECURE

Cyber Security and the Board of Directors

Organizational Structure What Works

e-discovery Forensics Incident Response

ISO COMPLIANCE WITH OBSERVEIT

Risk Management Guide for Information Technology Systems. NIST SP Overview

USF Graduate Catalog SECTION 23.

Cyber Incident Response Management: Breaking Glass. Presented by Darrell Switzer Sr. Director Incident Response Services BAE Systems

ITM 641: Information Security Policies Syllabus Sanjay Goel School of Business University at Albany, State University of New York

Service Definition Document

Question: 1 Which of the following should be the FIRST step in developing an information security plan?

University of Central Florida Class Specification Administrative and Professional. Information Security Officer

ISO Information Security Management Services (Lot 4)

Secure your cloud applications by building solid foundations with enterprise (security ) architecture

No. 33 February 19, The President

Department of Defense DIRECTIVE

OVERVIEW. In all, this report makes recommendations in 14 areas, such as. Page iii

Transcription:

CYBERBOK Security Essential Body of Knowledge: A Competency and Functional Framework for Security Workforce Development aligned with ISO 31000* risk management principles and guidelines. *Note : ISO 31000 is the internationally-adopted risk management standard recognized by over 60 countries. More information : http://www.iso.org/iso/home/standards/iso31000.htm Ver 1.00

Training & Education: Program Goals and Objectives Improve cyber crime awareness and management education for cyber professionals in both law enforcement and corporate domain Increase efficiency of existing cyber security training programs to comply with ISO 31000 Promote vendor-neutral cyber security certifications and compliance standards

CYBERBOK Definition = unlawful act using any active or non active electronic device affecting the objectives of any type of networks or critical infrastructure.

CYBERBOK 11 Cyber Risks Domains Cyber management practices Cyber Security management practices Cyber systems and methodology Cyber Telecommunications and networking security Cyber Cryptography Cyber Security architecture and models Cyber Operations security Cyber Application and systems development and security Cyber Security Business continuity and disaster recovery planning Laws, investigation, and ethics

CYBERBOK CYBERBOK Cyber crime management focuses on cyber crime information management and containment. CYBERBOK cyber crime management objectives are: Manage and containment of cyber threats Awareness of cyber crime in the IT workforce arena Protecting cyber assist against cyber crime

CYBERBOK Cyber Risks Cyber risk management and ISO 31000 Nature and impact of Cyber Risk / Principles of Cyber risk management Alignment with ISO 31000 Achieving the benefits of CRM (Cyber Risks )

CYBERBOK Practices Need to know what to do /act in time -Subjects should know objects that enables them to perform basic risk assessment and management during cyber online functions. Secure IT environment -Subjects should know how to work on a secure environment online what to do and what not to do IT administrative controls -Subjects should know Policies, Standards, Processes, Procedures, & Guidelines in their IT work environment Risk awareness -Subjects should know cyber risk awareness, good practices, Procedures, & Guidelines in their IT work environment when online

Categories of Cyber Risk Controls Cyber crime risk assessment online -Online Policies, standards procedures and processes together with guideline of online access during work and out of work. Cyber access control online -Service providers, firewalls, Infosec controls and identification control online in workforce or offline Cyber crime preventive controls online -Prevention policies, guidelines, ID visibility and program security online Cyber threat assessment online - Knowledge awareness of hacking, privacy, types of threats, trends of threats and impact,

CYBERBOK Security: Objectives Ensure that all government officials and corporate staff who have access to the online web has a good knowledge of cyber crime management when on the world wide web. Establish a international baseline representing the essential knowledge and cyber skills when confronted with Cyber crime online in alignment with ISO 31000 risk management tools. Advance the cyber security landscape by promoting cyber crime risk management competency guideline aligned with ISO 31000

CYBERBOK Security: Framework Model

CYBERBOK Security: Methodology Develop notional cyber crime management competencies using ISO 31000 Standard Identify functions from resources and critical infrastructure work functions (CIWFs) and map to crime management competencies Identify key terms and concepts for each cyber crime risk management competency area Identify theoretical cyber security roles Categorize functions as: evaluate risk type - manage Map roles to Key competencies to functional perspectives

CYBERBOK Security: Functional Perspectives Evaluate Risk Type Key Competencies Manage

CYBERBOK Security: Functional Perspectives Evaluate - Assessing the potential risks, threats and the policy or processes to effective achieve objectives Risk - Scope of cyber threat risks and developing procedure guidelines to effectively asses the cyber risk. Type - Putting policies, programs in action to determine the type of Cyber risk at hand to categorize it within the guidance of the work framework Manage - Overseeing and managing technical aspects of the cyber security risk at low, medium or high level to change the risk and threat levels providing maximum cover in incident management possible.

CYBERBOK Security: The Framework Key Competency Areas (11) Regulatory and Standards such as ISO 31000 Guidelines 17 Function-Based Cyber Security Roles

CYBERBOK Security: Key Competency Areas IT systems and operations Network systems and operations Cyber incident management Critical infrastructures point of access Enterprise permanence Digital management Data System and application management IT access and management Information management Information access

CYBERBOK Security: Regulatory and Standards Refers to the application of the ISO 31000 risk management principles, framework and process that enable an enterprise to meet applicable information security CRM, regulations, standards, and policies to satisfy statutory requirements, perform industry-wide best practices, and achieve its information security program goals.

CYBERBOK Security: 17 Function-Based Cyber Security Roles IT access and control Chief Information Officer Digital Forensics Professional Information Security Officer/Chief Security Officer IT Security Compliance Professional IT Security Engineer IT Systems Operations and Maintenance Professional IT Security Professional Physical Security Professional Privacy Professional Procurement Professional Law Enforcement officials Intelligence officers Military and flagship officers

CYBERBOK Security: Cyber Security Compliance Professional Role Description: The Risk Security Compliance Professional is responsible for overseeing, evaluating, and supporting cyber risk compliance issues pertinent to the organization or government. Individuals in this role perform a variety of activities, encompassing cyber crime risk management compliance from an internal and external perspective. Such activities include leading and conducting internal investigations, assisting employees comply with internal cyber threat policies and procedures, and serving as a resource to external compliance officers during independent assessments. The Cyber Crime Risk Security Compliance Professional provides guidance and autonomous evaluation of the organization risk to Cyber crime and its management.

CYBERBOK Security: Support the Cyber Workforce TRAINING EXPERIENCE CYBERBOK COMPLIANCE

Contact Information: Program Director Training and Education -National Cyber Security Division training@cyberpol.co.uk

CYBERBOK Security: Testimonials & Feedback Aligned with our mandate to promote the internationally-recognized ISO 31000 risk management standard, we are strongly supporting the initiative of to provide a structured and robust foundation for. The CYBERBOK - Security Essential Body of Knowledge should become an extremely valuable source of knowledge for anyone involved or confronted to, especially since the publication will be aligned with the ISO 31000 risk management standard. Alex Dali, MBA, ARM, CT31000 President : The Global Institute for Risk management Standards G31000