SlideShare a Scribd company logo
CISO Platform Security Strategy
Model ( CP-SSM )
Bikash Barai
CISO Platform Security Maturity Model
Challenges with existing models
• Too heavy to be intimidating - Too many steps
• Cannot be done incrementally – Needs big
bang approach
• Very few SABSA professionals and very few
implementation
• Does not produce a prioritized list of security
activities
Goodness Criteria
• Should help to eliminate
• Should help to focus
• Should be simple
• Should be easy to remember
Introducing CP-SSM
Goals of CP-SSM
• Light
• Minimalist
• Focused
Steps
• Create Business Architecture (High Level)
• Strategic Threat Modeling
• Elimination: Bucket and Prune
• Mapping: Threats to 4 types of controls
• Priority Bucketing of Activities
Key Elements
• CP- Threat Repository
• Threat Prioritization Guideline – Available
– Benchmark, Risk Management Model
• CP - Control Repository – Not available
• CP- Threat to Control Map – Not available
• CP- Activity/Control Priority Map
Threat Repository
• Taxonomy
– Software (26 sub class)
– Hardware (3)
– Physical Security (3)
– Supply Chain (2)
– Human (3)
• Industry or vertical specific top N listing
CISO Platform Threat – Control Map
• Threat: SQL Injection Attack
– Detection: WAF, SAST, DAST, IAST, RASP
– Prevention: Secure Coding, WAF, RASP
– Response: SIEM, SOC Response Process
– Prediction: TI (External and Internal)
Prioritization Matrix
Prevention Detection Response Prediction
High Risk 1 1 2 3
Medium
Risk
2 2 2 3
Low Risk 3 3 3 3
Next Steps
• Utilize the model (loosely) for building an
Appsec Program - Post Lunch
• Create Community Projects
– Threat Repository (Comprehensive + Top N)
– Threat Control
Thank You
@bikashbarai1

More Related Content

PPTX
Enterprise Security Architecture Design
PDF
SACON Orientation
PDF
Zachman Enterprise Security Architecture
PPTX
Enterprise Security Architecture
PDF
Enterprise Security Architecture for Cyber Security
PPTX
Risk Management Strategy (RMF v2)
PDF
SABSA vs. TOGAF in a RMF NIST 800-30 context
PDF
Enterprise Security Architecture
Enterprise Security Architecture Design
SACON Orientation
Zachman Enterprise Security Architecture
Enterprise Security Architecture
Enterprise Security Architecture for Cyber Security
Risk Management Strategy (RMF v2)
SABSA vs. TOGAF in a RMF NIST 800-30 context
Enterprise Security Architecture

What's hot (20)

PPTX
Conceptual security architecture
PPTX
A Practical Example to Using SABSA Extended Security-in-Depth Strategy
PPTX
SABSA Implementation(Part II)_ver1-0
PPTX
Manoj purandare - Stratergy towards an Effective Security Operations Centre -...
PDF
RISK MANAGEMENT: 4 ESSENTIAL FRAMEWORKS
PPTX
Security architecture frameworks
PPTX
Does Anyone Remember Enterprise Security Architecture?
PDF
Security Patterns How To Make Security Arch Easy To Consume
PPT
SLVA - Security monitoring and reporting itweb workshop
PDF
Security services mind map
PPTX
Building a SOC - hackmiami 2018
PPTX
PPTX
Chapter 1 Security Framework
PPT
Uac sales pres_20_apr09-2
PDF
Security operations center-SOC Presentation-مرکز عملیات امنیت
PPTX
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
PDF
Chapter 10 security standart
PPTX
SABSA overview
PPTX
Secure Design: Threat Modeling
Conceptual security architecture
A Practical Example to Using SABSA Extended Security-in-Depth Strategy
SABSA Implementation(Part II)_ver1-0
Manoj purandare - Stratergy towards an Effective Security Operations Centre -...
RISK MANAGEMENT: 4 ESSENTIAL FRAMEWORKS
Security architecture frameworks
Does Anyone Remember Enterprise Security Architecture?
Security Patterns How To Make Security Arch Easy To Consume
SLVA - Security monitoring and reporting itweb workshop
Security services mind map
Building a SOC - hackmiami 2018
Chapter 1 Security Framework
Uac sales pres_20_apr09-2
Security operations center-SOC Presentation-مرکز عملیات امنیت
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
Chapter 10 security standart
SABSA overview
Secure Design: Threat Modeling
Ad

Similar to CISO Platform Security Maturity Model (20)

PDF
Visualizing BI technical cyber risks. Enterprise Risk and Security
PDF
ACS-security-2821-001 Lecture Note 13.pdf
PPT
System development chapter six power point
PPSX
Introduction to the Microsoft Security Development Lifecycle (SDL).ppsx
PPTX
Becoming a better pen tester overview
PPTX
SABSA Implementation(Part III)_ver1-0
PPTX
CONTEXTUAL ARCHITECTURE.pptx
PPTX
Shah Sheik Building a CSoC v1.2 DEFCAMP.pptx
PDF
Forgotten world - Corporate Business Application Systems
PPTX
iDEAFest Enteprise InfoSec Program Lessons Learned
PPTX
DevSecOps - London Gathering : June 2018
PPTX
Threat modelling(system + enterprise)
PPTX
RMMM Plan
PPT
Risk Based Security and Self Protection Powerpoint
PPTX
Material Unwanted Events - Critical Control Mangement
PDF
Patterns (and Anti-Patterns) for Developing Machine Learning Systems
PDF
Implementing SAP security in 5 steps
PPTX
Cyber Scotland Connect: What is Security Engineering?
PPT
Ch+14
Visualizing BI technical cyber risks. Enterprise Risk and Security
ACS-security-2821-001 Lecture Note 13.pdf
System development chapter six power point
Introduction to the Microsoft Security Development Lifecycle (SDL).ppsx
Becoming a better pen tester overview
SABSA Implementation(Part III)_ver1-0
CONTEXTUAL ARCHITECTURE.pptx
Shah Sheik Building a CSoC v1.2 DEFCAMP.pptx
Forgotten world - Corporate Business Application Systems
iDEAFest Enteprise InfoSec Program Lessons Learned
DevSecOps - London Gathering : June 2018
Threat modelling(system + enterprise)
RMMM Plan
Risk Based Security and Self Protection Powerpoint
Material Unwanted Events - Critical Control Mangement
Patterns (and Anti-Patterns) for Developing Machine Learning Systems
Implementing SAP security in 5 steps
Cyber Scotland Connect: What is Security Engineering?
Ch+14
Ad

More from Priyanka Aash (20)

PPTX
AI Code Generation Risks (Ramkumar Dilli, CIO, Myridius)
PDF
From Chatbot to Destroyer of Endpoints - Can ChatGPT Automate EDR Bypasses (1...
PDF
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
PDF
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
PDF
Lessons Learned from Developing Secure AI Workflows.pdf
PDF
Cyber Defense Matrix Workshop - RSA Conference
PDF
A Constitutional Quagmire - Ethical Minefields of AI, Cyber, and Privacy.pdf
PDF
Securing AI - There Is No Try, Only Do!.pdf
PDF
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
PDF
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
PDF
10 Key Challenges for AI within the EU Data Protection Framework.pdf
PDF
Techniques for Automatic Device Identification and Network Assignment.pdf
PDF
Keynote : Presentation on SASE Technology
PDF
Keynote : AI & Future Of Offensive Security
PDF
Redefining Cybersecurity with AI Capabilities
PDF
Demystifying Neural Networks And Building Cybersecurity Applications
PDF
Finetuning GenAI For Hacking and Defending
PDF
(CISOPlatform Summit & SACON 2024) Kids Cyber Security .pdf
PDF
(CISOPlatform Summit & SACON 2024) Regulation & Response In Banks.pdf
PDF
(CISOPlatform Summit & SACON 2024) Cyber Insurance & Risk Quantification.pdf
AI Code Generation Risks (Ramkumar Dilli, CIO, Myridius)
From Chatbot to Destroyer of Endpoints - Can ChatGPT Automate EDR Bypasses (1...
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
Lessons Learned from Developing Secure AI Workflows.pdf
Cyber Defense Matrix Workshop - RSA Conference
A Constitutional Quagmire - Ethical Minefields of AI, Cyber, and Privacy.pdf
Securing AI - There Is No Try, Only Do!.pdf
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
10 Key Challenges for AI within the EU Data Protection Framework.pdf
Techniques for Automatic Device Identification and Network Assignment.pdf
Keynote : Presentation on SASE Technology
Keynote : AI & Future Of Offensive Security
Redefining Cybersecurity with AI Capabilities
Demystifying Neural Networks And Building Cybersecurity Applications
Finetuning GenAI For Hacking and Defending
(CISOPlatform Summit & SACON 2024) Kids Cyber Security .pdf
(CISOPlatform Summit & SACON 2024) Regulation & Response In Banks.pdf
(CISOPlatform Summit & SACON 2024) Cyber Insurance & Risk Quantification.pdf

Recently uploaded (20)

PPTX
Big Data Technologies - Introduction.pptx
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
KodekX | Application Modernization Development
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PPT
Teaching material agriculture food technology
PPTX
Cloud computing and distributed systems.
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Encapsulation theory and applications.pdf
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Electronic commerce courselecture one. Pdf
Big Data Technologies - Introduction.pptx
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Digital-Transformation-Roadmap-for-Companies.pptx
Building Integrated photovoltaic BIPV_UPV.pdf
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
KodekX | Application Modernization Development
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Teaching material agriculture food technology
Cloud computing and distributed systems.
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Agricultural_Statistics_at_a_Glance_2022_0.pdf
CIFDAQ's Market Insight: SEC Turns Pro Crypto
“AI and Expert System Decision Support & Business Intelligence Systems”
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Encapsulation_ Review paper, used for researhc scholars
Encapsulation theory and applications.pdf
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Electronic commerce courselecture one. Pdf

CISO Platform Security Maturity Model

  • 1. CISO Platform Security Strategy Model ( CP-SSM ) Bikash Barai
  • 3. Challenges with existing models • Too heavy to be intimidating - Too many steps • Cannot be done incrementally – Needs big bang approach • Very few SABSA professionals and very few implementation • Does not produce a prioritized list of security activities
  • 4. Goodness Criteria • Should help to eliminate • Should help to focus • Should be simple • Should be easy to remember
  • 6. Goals of CP-SSM • Light • Minimalist • Focused
  • 7. Steps • Create Business Architecture (High Level) • Strategic Threat Modeling • Elimination: Bucket and Prune • Mapping: Threats to 4 types of controls • Priority Bucketing of Activities
  • 8. Key Elements • CP- Threat Repository • Threat Prioritization Guideline – Available – Benchmark, Risk Management Model • CP - Control Repository – Not available • CP- Threat to Control Map – Not available • CP- Activity/Control Priority Map
  • 9. Threat Repository • Taxonomy – Software (26 sub class) – Hardware (3) – Physical Security (3) – Supply Chain (2) – Human (3) • Industry or vertical specific top N listing
  • 10. CISO Platform Threat – Control Map • Threat: SQL Injection Attack – Detection: WAF, SAST, DAST, IAST, RASP – Prevention: Secure Coding, WAF, RASP – Response: SIEM, SOC Response Process – Prediction: TI (External and Internal)
  • 11. Prioritization Matrix Prevention Detection Response Prediction High Risk 1 1 2 3 Medium Risk 2 2 2 3 Low Risk 3 3 3 3
  • 12. Next Steps • Utilize the model (loosely) for building an Appsec Program - Post Lunch • Create Community Projects – Threat Repository (Comprehensive + Top N) – Threat Control