An interactive discussion on how a business case should be constructed:



Similar documents
Location of the job: CFO Revenue Assurance

Why Your SIEM Isn t Adding Value And Why It May Not Be The Tool s Fault. Best Practices Whitepaper June 18, 2014

RSA, The Security Division of EMC. Zamanta Anguiano Sales Manager RSA

Process-Based Business Transformation. Todd Lohr, Practice Director

Protect Your Universe with ArcSight

Don t let your SIeM become your Nightmare!

Defining, building, and making use cases work

Attachment 16.5 SA Power Networks: Supply Chain Strategy

Best Practices to Improve Breach Readiness

An Effective Approach to Transition from Risk Assessment to Enterprise Risk Management

How to Define SIEM Strategy, Management and Success in the Enterprise

In house or Outsource: Exploring your Payroll

I WANT EFFICIENT WORKFLOWS, HIGHER PRODUCTIVITY AND LOWER COSTS

A SIEM BUYER S GUIDE for Resourced-Constrained Security. A Practical, No-Nonsense SIEM Buyer s Guide for the Tightly Resourced Security Department

Hosting Infrastructure. Data Centre Economics

Combating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center

2011 NASCIO Nomination Business Improvement and Paperless Architecture Initiative. Improving State Operations: Kentucky

Guide to Buyer Personas

CaaS Think as a bad guy Petr Hněvkovský, CISA, CISSP HP Enterprise Security

NSW Government Digital Information Security Policy

Specialist Motor Claims and Accident Management

Organisational Change Management

Next presentation starting soon Next Gen Customer Experience Enabled by PwC & Oracle s Cloud CRM & CX Applications

5IMPROVE OUTBOUND WAYS TO SALES PERFORMANCE: Best practices to increase your pipeline

Software License Management: 2012 Software License Management Benchmark Survey SOLUTION WHITE PAPER

BT Managed Services. Taking care of business, so you can take care of business

Cyber Security key emerging risk Q3 2015

Telecom Expense Management

Handbook for municipal finance officers Performance management Section J

TEN TIPS FOR A SUCCESSFUL INFOR IMPLEMENTATION

PASTA Abstract. Process for Attack S imulation & Threat Assessment Abstract. VerSprite, LLC Copyright 2013

Building a Security Operations Center (SOC)

A NEW APPROACH TO CYBER SECURITY

The CERT Top 10 List for Winning the Battle Against Insider Threats

How To Get A Cloud Based Contact Centre

Strategy for Application Modernization A Summa White Paper

Information & Asset Protection with SIEM and DLP

Strategic Guide to creating a World Class Customer Advisory Board Program

(Dev + Ops) ITSM = Calamity

Specialist Cloud Services Lot 4 Cloud EDRM Consultancy Services

WHITE PAPER SPLUNK SOFTWARE AS A SIEM

Managing Open Source Code Best Practices

Building a Managed Services Practice

04 Executive Summary. 08 What is a BI Strategy. 10 BI Strategy Overview. 24 Getting Started. 28 How SAP Can Help. 33 More Information

FUJITSU Software Interstage Business Operations Platform: A Foundation for Smart Process Applications

CREATE A MARKETING PLAN

CFIR - Finance IT 2015 Cyber security September 2015

SAP Solution Brief SAP Technology SAP IT Infrastructure Management. Unify Infrastructure and Application Lifecycle Management

Strategies and Best Practices to Implement a Successful Data Loss Prevention Program Sebastian Brenner, CISSP

Successful EHR Change Management

Changing the Enterprise Security Landscape

Bright OpenStack. Case Studies & What s New. John Corne Senior Pre-Sales Engineer at Bright June 19, 2016

SIEM Implementation Approach Discussion. April 2012

AN OVERVIEW OF SYSTEMS ANALYSIS: SYSTEMS ANALYSIS AND THE ROLE OF THE SYSTEMS ANALYST. Lecture , Tuesday

Update On Smart Grid Cyber Security

The Push and Pull of the Cloud. TPI Cloud Computing Overview. April 5 th 2011

BUILDING THE NEW BUSINESS CASE FOR ITAM

IBM QRadar as a Service

A Closer Look at BPM. January 2005

Combating a new generation of cybercriminal with in-depth security monitoring

Comprehensive Security with Splunk and Cisco

Open call for tenders No 01/2102/12

Digitizing Insurance. Transforming Legacy Systems to Adopt Modern and Emerging Technologies. A RapidValue Solutions Whitepaper

Specialist Cloud Services Lot 4 Cloud Printing and Imaging Consultancy Services

CYBER SECURITY DASHBOARD: MONITOR, ANALYSE AND TAKE CONTROL OF CYBER SECURITY

IT Governance and Project Governance

Splunk Company Overview

Performance Management Workshop

2010 State of Virtualization Security Survey

How To Create Situational Awareness

GETTING MORE FOR LESS AS LOG MANAGEMENT AND SIEM CONVERGE

Buyer s Guide & Workbook

How Do I Choose my KPIs?

Transcription:

An interactive discussion on how a business case should be constructed: Hettie Booysen, head: operational risk, IT Risk Standard Bank Lynette Botha, senior manager information security and compliance, MTN Vernon Fryer, chief technology security officer, Vodacom SA Shamalan Soobiah, former chief information officer, Standard Bank SA

The Communicator The vote only opens once you hear and see the countdown clock. When the vote is open, please press the number that corresponds with the option of your choice. 6/22/12

We are THE number 1 nation on the planet Go bokka! 53% Go Proteas! 21% Go Bafana Bafana! 10% 16% USA USA USA!

By your company having an interest in SIEM you mean? It helps me with my audit exceptions 43% I heard some BU's showing interest in SIEM 2% 23% Everyone goes SIEM - I go SIEM SIEM is the solution to most of my problems 32%

In order to have a business case I will: Have a workshop 39% Have long nights 1% Have a team working on it 52% Let the partner write it 8%

When building a business case the following is important to my organisation: To already have a budget 13% To have executive buy-in 79% To base it on negative past experience 8%

When I choose the right technology the following two are the most important: Requirements and integration into existing landscape must be well-defined Local partner that can deliver 5% 7% 8% 11% Internal skills to implement and run Cost effective technology 14% Top-right Gartner quadrant Ease-of-use Ease of deployment 17% 38%

When I technically scope the project I usually involve (Order of importance): CIO/CISO Security architect 34 4 13 6 10 26 21 7 10 6 Security operations 8 20 15 11 10 Fraud and Forensics 3 9 14 18 16 Auditors/ Risk and Compliance 9 18 14 13 12 1st choice 2nd choice 3rd choice 4th choice 5th choice

Once choosing a SIEM technology: I'll do everything internally with my existing resources. 18% I'll partner and make sure there is skills transfer. 73% I'll outsource it completely. 9%

In my organisation the MAIN beneficiary for a SIEM project is: Risk and Compliance 24% Business & Board of Directors 33% Technical management team 9% Security and CIRT response team 34%

To show success on a project: I go Big Bang. This is the only way we get traction here. 2% I go big. This way I do not need to do multiple convincing and internal selling. 8% I go phased approach. Step by step. Starting small and then going big. 87% I start small. Then at least it is not my neck on the line if it fails. 3%

I research a SIEM technology and eventually decide based on: What my peers do 9% What "Group" recommends 21% Go with the flavour of the day 0% Gartner/ Industry Reference sites 34% RFI 36%

In my organisation SIEM is owned by: IT Security 52% Business 7% IT Operations 17% Forensics & Fraud 1% Risk and compliance 22% Auditors 1%

When I decide to motivate for SIEM I: Consult with Risk/ take Legislation into consideration. 38% Use known sales tactics that are applicable to my company. 5% Lobby with all parties involved beforehand. 43% Learn from other organisations how they did it and apply exactly the same. 14%

When I deploy SIEM a project plan agreed and signed by all parties: Is always prepared. That's the ONLY way! 37% It is partial. We leave 20% for future and unknown. 38% It is a 50-50 plan. Anyway it is a massive project. 18% Plan? You must be kidding me! 7%

When I deploy SIEM I report on progress to: My manager 30% Steering committee 66% No need to report. It is internal anyway. 3% How should I know? 1%

To guarantee success of the SIEM project I will: Set KPA/ KPI measurements. 54% Set reports fitting all levels. 11% Keep business constantly engaged. 19% Automate SIEM. 16%

A SIEM project is finished when: Budget is over. 4% Business is engaged. 21% Response Team (CIRT) is fully operational. 67% Technical stuff is installed. 8%

Who should run the SIEM project? Me! Only I can deliver the best project. 4% A project manager or project office. 61% Risk and compliance. 17% Affected Business Units. 18%

Is Security Operations Centre (SOC) part of my project? Never! Who needs one 4% Absolutely! 63% Only once SIEM is implemented 28% Only once we have our first major incident 5%

Business Case process to completion 1. Client expresses interest in SIEM 2. Initial workshop to gauge interest in solution showcase approach to SIEM implementation 3. Identify budget and C-level engagement 4. Determine whether compliance driven or fraud driven 5. Determine competitors pitching 6. Determine the key players within customer and their respective roles esp. main driver 7. Scope initial solution technically 8. Workshop proposal with customer and refine solution 9. Prepare draft BOM with technical solution 10.Pitch solution to key players.

Business Case process to completion 11. Make refinements and submit 12.Begin process to hire/train identified resources 13.Build pilot/poc approach with key players/internal drivers 14.Target fraud and pain areas within the business units 15.Build targeted approach to show ROI to the above BU s 16.Build use cases with key players and BU s 17.Implement pilot/poc and use cases 18.Build presentation for C-Level board with key player 19.Present findings (non threatening) and raise awareness internally of value of solution 20.Place PO!

Business Case process to completion 21.Define support team 22.Define support processes and compile support documentation 23. Pick team members and place team within organisation 24. Place infrastructure orders 25. Roll-out necessary hardware and Connectors 26. Build agreed upon Use Cases 27.Commence main SIEM deployment 28. Initiate project management meetings 29. Generate reports for business units show value

Questions? Thank you