Become A Next-Gen CISO
Become A Next-Gen CISO
Become A Next-Gen CISO
WITH CYBERSECURITY
PROGRAM MANAGEMENT
AUTOMATION
TODD BOEHLER, VP OF PRODUCT STRATEGY, PROCESSUNITY
ED LEPPERT, CYBERSECURITY, GRC
10 SEPTEMBER 2019
WEBINAR INFO & QUICK TIPS
▪ Audio can streamed over your computer or dial- To receive your CPE Credit:
in numbers and codes are on the left. 1. Complete 3 Attendance Checkpoints
▪ International numbers can be located in the 2. Watching the On-Demand recording? Watch from
PAPERS tab the beginning to the very end.
3. Don’t forget to take the survey available in the
▪ Have a question for the speaker? Access the MyLearning Portal Transcripts Page!
Q&A tab.
▪ Technical issues? Access the HELP tab. Use the CREDITS tab to track your Checkpoints
▪ Questions or suggestions? Visit
https://support.isaca.org Use the PAPERS tab to find the following:
1. PDF Copy of today’s presentation.
2. CPE Submission Guide.
Todd Boehler
Vice President of Product Strategy, ProcessUnity
2003
FOUNDED
HQ: Concord, Massachusetts
Agenda
• The Changing Role of the CISO
• Establishing a Baseline
• What Makes Up a Good
Program
The Changing Role
of the CISO
The CISO’s Role
• The CISO role will grow and gain respect.
- PwC found that 71% of consumers studied would stop doing
business with a company for giving away their sensitive data
without permission — and 69% said they believed companies
were vulnerable to attacks.
• The CISO will become an enabler rather than a disabler.
- CISOs will transition in people's minds to enablers — key
consultants in the mandated security elements of development TIME
— rather than barriers to product launches.
Deep Technical Expertise
• Enterprises will embrace CISOs’ teaching function. Executive Management Skillset
Source: https://www.forbes.com/sites/forbestechcouncil/2019/03/18/the-state-of-the-ciso-role-how-will-it-change-in-2019/#50f953727f27
The CISO’s Organization – Wide Outreach
▪ Cross Functional
▪ Technical Depth &
Guidance
▪ Business
Recommendation &
Policy
▪ Corporate Wide
Enablement &
Testing
▪ Risk & Compliance
Focal Point
▪ Incident
Management
Analytics
CISO Supporting Tools
Source: https://foundationcapital.com/cybersecurity-next-trillion-dollar-market/
Cross Sectional Responsibility CISO MGT
Metrics
ANALYTICS
PROGRAM MANAGEMENT
Executive Management
Tools
Third
Applications Org Systems People Policy Networks
Parties
Discussion Question 1
How is the office of the CISO prioritizing their role and responsibilities?
▪ Upward visibility?
▪ Emerging threats?
▪ Tools and technologies?
▪ Awareness and accountability?
▪ What else?
Establishing a
Baseline
Defining your Cybersecurity Program
Supporting Systems
Third Party
NIST Controls
• Maturity is based on
achieving all
requirements within a
maturity level before
advancing.
• Each company can
evaluate their maturity
differently; however it is
important to cover all
aspects.
Assess Current State
(Cybersecurity Assessment Tool example)
▪ Maturity Assessment
▪ Systems
Identification
▪ Threat Assessment
▪ Risk Assessment
▪ Control
Implementation
▪ Control Testing
▪ Incident
Management
Finding the Gaps
Discussion Question 2
▪ Management Buy-in?
▪ Consulting Firms?
▪ Standards and Frameworks?
▪ Committees and Focus Groups?
▪ What else?
What Makes Up a
Good Program?
Cybersecurity Program – Overview
Threat Program Risk
Management Development Management
Gaps and
Untreated Issues
Asset Management ▪ Inventory and identify key assets that need to be protected
▪ Develop a customized set of controls, organized by ISO/NIST/… domains for all major cybersecurity, business
Controls Inventory continuity and compliance (PCI/SOX) functions
Policy Management ▪ Establish and maintain formal, key policies and supporting process/standards documents
Security Awareness ▪ Security Framework- Domains, audiences, delivery mechanisms, results and evidence
▪ Risk processes which include: Risk Identification, Analysis, Evaluation, Treatment, and Reporting
Risk Management ▪ Users should also be able to select from a list of common risks
▪ Create and manage assessments – vendors, applications (assets), controls effectiveness, policy adherence,
internal/external audits.
Assessment & Issues Management ▪ Create a questionnaire library. Add dynamic ability to auto-select based on vendor type
▪ Record/track issues from risk assessments, compliance audits, client assurance reviews
Compliance & Audit Support ▪ Manage compliance testing to meet regulatory requirements (SOX/PCI/HIPAA)
Vendor Risk Management * ▪ Identify, assess, and monitor relevant third parties
▪ Create pre-defined management dashboards to support monthly and executive level reporting and metrics
Reporting & Metrics
Getting Started – High Level Plan
• Define the Organization
• Perform Baseline Assessments
• Assign Organizational Responsibility
• Create an Annual Schedule
• Leverage External Assessments
- SOC / External Audits
- Penetration Tests
- Cybersecurity Screening
• Incorporate Change Management Triggers
23 © ProcessUnity, Inc. All Rights Reserved.
Example Annual Schedule
Program Activity Q1 Q2 Q3 Q4
Scoping and Planning ◘
Policy Reviews ◘
Risk Assessment and Mitigation ◘
Threat Analysis and Review ◘ ◘ ◘ ◘
Independent Reviews ◘
Asset/Third Party Assessments ◘ ◘
Control Rating Reviews ◘
Training and Awareness ◘ ◘ ◘ ◘
Issues & Remediation ◘ ◘ ◘ ◘
1 2 3 4
Asset/Third-
Identify Owners Reporting and
Party Review Results
and Scope Analytics
Assessment
Cyber Team Initiates Cyber Team Reviews Issues/Gaps Identified Prioritized List of
Assessments the Results for Remediation Enterprise Threats
Mapping to Threats
• Assessing key assets/third parties should rollup risk to the control
standard that is protecting against the identified threat.
Question 1
Question 5
Control Standard Risk 2 Threat
Question 1
Question 5
Practical Step: Establish a Foundation
▪ Identify Threats: Establish a baseline ▪ Know your Third Parties: Identify,
threat level based on currently known assess, and monitor third parties that
risks. expose risk through delivered services
▪ Build a Risk Register: Document your ▪ Connect Policies: Map your controls
risks (including likelihood, consequence to policies to ensure your policies are
and impact) and identify which threat(s) properly enforced
they apply to. ▪ Assess Risk: Conduct risk
▪ Inventory Controls: Identify relevant assessments against your key assets
controls that are part of your (vendors, applications, infrastructure)
Cybersecurity program (select from and tie findings to your controls
NIST, ISO, CSF, etc. control ▪ Engage your business partners in
frameworks) and associate them to the risk reporting and management:
risks and threats that they can help Collaborate with management on
detect, prevent or mitigate common language and scope
Discussion Question 3
What are you seeing with the current state of cybersecurity in large organizations?
▪ Complexity trends?
▪ Executive management acceptance?
▪ Technology landscape?
▪ Accountability and ownership?
▪ What else?
Discussion Question 4
What considerations are there regarding third parties and a Cybersecurity program?
▪ Outsourced risk?
▪ Extended assessments and remediation activities?
▪ Cybersecurity insurance coverages?
▪ Deeper involvement with Procurement and Legal departments?
QUESTIONS?
Contact ProcessUnity
Thank you for joining us today. To learn more about
ProcessUnity and our Cybersecurity Program Management
tools, contact us at [email protected]. Todd Boehler
[email protected]
Visit www.processunity.com for our latest:
You assume the entire risk for the use of the content and acknowledge that: ISACA has
designed the content primarily as an educational resource for IT professionals and
therefore the content should not be deemed either to set forth all appropriate
procedures, tests, or controls or to suggest that other procedures, tests, or controls that
are not included may not be appropriate; ISACA does not claim that use of the content
will assure a successful outcome and you are responsible for applying professional
judgement to the specific circumstances presented to determining the appropriate
procedures, tests, or controls.
Copyright © 2018 by the Information Systems Audit and Control Association, Inc. (ISACA). All rights reserved. This webinar may
not be used, copied, reproduced, modified, distributed, displayed, stored in a retrieval system, or transmitted in any form by any
means (electronic, mechanical, photocopying, recording or otherwise).
THANK YOU FOR
ATTENDING THIS
WEBINAR