CYBER RISK OPERATION CENTER
STRATEGIC VALUE in
CYBER RISK MANAGEMENT and OPERATIONAL FRAMEWORK
FRANCESCO FAENZI
HEAD OF CYBERSECURITY & RESILIENCY
Itway.com
ITWAY CYBER SECURITY & RESILIENCY
CYBER-PHYSICAL
SECURITY &
RESILIENCY
IDENTITY
& MICROSOFT
SECURITY &
RESILIENCY
MULTI-CLOUD
& HYBRID INFRA
SECURITY &
RESILIENCY
MODERN PLATFORM ENGENEERING & MODERN OPS
CYBER RISK OPERATION CENTER
RISK
MANAGEMENT
CROC IS NOT A SOC
CROC
SOC
CYBER DOMAINS
WHAT CROC MEANS FOR A CISO
CYBER RISK MANAGEMENT LIFECYCLE
CROC MEANS CYBER RISK SCORING
INTELLIGENT CYBER RISK SCORING
Vulnerability Exposure
- Vulnerabilities detected
- Misconfigurations
- Suspicius activity
- Suspicius data access
Security Config + control
- Security Policies
implemented
- Regulatory Compliance
Threat Activity
- Threat Detections
- Detection from
investigation
- Attack attempts
Business Value
- Asset importance
- Impact of outage
Asset Posture
- Asset Discovery
- Asset Influence
- Asset Context
Likelihood for a successfull attack
Impact for a successfull attack
Reduce
Likelihood
Minimaze
Impact
scope
THANK YOU

More Related Content

PDF
" Operacje militarne w cyberprzestrzeni, czyli jak wojsko realizuje zadania w...
PPTX
Cyber security.pptx
PDF
DTS Solution - Cyber Security Services Portfolio
PDF
INTRODUCTION TO CYBER FORENSICS
PDF
CYBER SECURITY CAREER GUIDE CHEAT SHEET
PDF
DETECTE E INVESTIGUE LAS AMENAZAS AVANZADAS
PDF
Cyber_Services_2015_company_intro_ENG_v2p0
PDF
ISACA 2019 Amman Chapter - Shah Sheikh - Cyber Resilience
" Operacje militarne w cyberprzestrzeni, czyli jak wojsko realizuje zadania w...
Cyber security.pptx
DTS Solution - Cyber Security Services Portfolio
INTRODUCTION TO CYBER FORENSICS
CYBER SECURITY CAREER GUIDE CHEAT SHEET
DETECTE E INVESTIGUE LAS AMENAZAS AVANZADAS
Cyber_Services_2015_company_intro_ENG_v2p0
ISACA 2019 Amman Chapter - Shah Sheikh - Cyber Resilience

Similar to Cyber Risk Operation Center … is not a SOC (20)

PDF
DTS Solution - Company Presentation
PDF
MID_SIEM_Boubker_EN
PPTX
So You Want a Job in Cybersecurity
PDF
cybersecurity-careers.pdf
PPTX
Be the Hunter
PDF
Information Security Risk Management
PPTX
LIFT OFF 2017: Transforming Security
PDF
Apache Kafka as the Backbone for Cybersecurity with Kai Waehner | Kafka Summi...
PDF
Reducing cyber risks in the era of digital transformation
PDF
Revolutionizing Advanced Threat Protection
PPTX
Information Security: We are all InfoSec (updated for 2018)
DOCX
CYBER SECURITY PRIMERCYBER SECURITY PRIMERA brief in
PPTX
2016 - Cyber Security for the Public Sector
PPTX
Prezentare_RSA.pptx
PPTX
Using SurfWatch Labs' Threat Intelligence to Monitor Your Digital Risk
PDF
DTS Solution - Company Presentation
PDF
Estratégia de segurança da Cisco (um diferencial para seus negócios)
PDF
Splunk for Security
PDF
SplunkLive Auckland 2015 - Splunk for Security
PDF
SplunkLive Wellington 2015 - Splunk for Security
DTS Solution - Company Presentation
MID_SIEM_Boubker_EN
So You Want a Job in Cybersecurity
cybersecurity-careers.pdf
Be the Hunter
Information Security Risk Management
LIFT OFF 2017: Transforming Security
Apache Kafka as the Backbone for Cybersecurity with Kai Waehner | Kafka Summi...
Reducing cyber risks in the era of digital transformation
Revolutionizing Advanced Threat Protection
Information Security: We are all InfoSec (updated for 2018)
CYBER SECURITY PRIMERCYBER SECURITY PRIMERA brief in
2016 - Cyber Security for the Public Sector
Prezentare_RSA.pptx
Using SurfWatch Labs' Threat Intelligence to Monitor Your Digital Risk
DTS Solution - Company Presentation
Estratégia de segurança da Cisco (um diferencial para seus negócios)
Splunk for Security
SplunkLive Auckland 2015 - Splunk for Security
SplunkLive Wellington 2015 - Splunk for Security
Ad

More from Francesco Faenzi (16)

PPTX
Security Architecture Anti-Patterns and Design Mistakes
PPTX
Anatomy of Modern Identity-Based Attacks
PPTX
Cyber Security and Resiliency Twin - Anomaly Detection with AI @ Edge
PPTX
Industry 4.0 CyberSecurity Assessment.pptx
PPTX
Advanced Metering Infrastructure Security Test.pptx
PPTX
Customer digital identity and consent management
PPTX
Identità digitale e identità in real-life: rischi e rimedi
PPTX
Telegram chatbot - considerazioni di sicurezza
PPTX
Cyber Threat Intelligence - La rilevanza del dato per il business
PPTX
Cybercrime underground: Vendita ed evoluzione del carding
PPTX
UPDATED - Analysis of exposed ICS / SCADA and IoT systems in Europe
PPTX
Cyber Attack: stories from the field - Threat analysis: useful methodologies ...
PPTX
Analisi del fenomeno carding nei blackmarket
PPTX
Advanced Persistent Threat in ICS/SCADA/IOT world: a case study
PPTX
Analysis of exposed ICS//SCADA/IoT systems in Europe
PPTX
SCADA Cybersecurity: Sessione live di Attacco e Difesa by Lutech & Phoenix Co...
Security Architecture Anti-Patterns and Design Mistakes
Anatomy of Modern Identity-Based Attacks
Cyber Security and Resiliency Twin - Anomaly Detection with AI @ Edge
Industry 4.0 CyberSecurity Assessment.pptx
Advanced Metering Infrastructure Security Test.pptx
Customer digital identity and consent management
Identità digitale e identità in real-life: rischi e rimedi
Telegram chatbot - considerazioni di sicurezza
Cyber Threat Intelligence - La rilevanza del dato per il business
Cybercrime underground: Vendita ed evoluzione del carding
UPDATED - Analysis of exposed ICS / SCADA and IoT systems in Europe
Cyber Attack: stories from the field - Threat analysis: useful methodologies ...
Analisi del fenomeno carding nei blackmarket
Advanced Persistent Threat in ICS/SCADA/IOT world: a case study
Analysis of exposed ICS//SCADA/IoT systems in Europe
SCADA Cybersecurity: Sessione live di Attacco e Difesa by Lutech & Phoenix Co...
Ad

Recently uploaded (20)

PPTX
The various Industrial Revolutions .pptx
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PDF
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
DOCX
search engine optimization ppt fir known well about this
PDF
Architecture types and enterprise applications.pdf
PPTX
observCloud-Native Containerability and monitoring.pptx
PDF
CloudStack 4.21: First Look Webinar slides
PDF
A comparative study of natural language inference in Swahili using monolingua...
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PPT
Module 1.ppt Iot fundamentals and Architecture
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PDF
DP Operators-handbook-extract for the Mautical Institute
PDF
Taming the Chaos: How to Turn Unstructured Data into Decisions
PDF
August Patch Tuesday
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PPTX
Benefits of Physical activity for teenagers.pptx
PDF
Getting started with AI Agents and Multi-Agent Systems
PPTX
Web Crawler for Trend Tracking Gen Z Insights.pptx
The various Industrial Revolutions .pptx
Univ-Connecticut-ChatGPT-Presentaion.pdf
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
search engine optimization ppt fir known well about this
Architecture types and enterprise applications.pdf
observCloud-Native Containerability and monitoring.pptx
CloudStack 4.21: First Look Webinar slides
A comparative study of natural language inference in Swahili using monolingua...
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
Module 1.ppt Iot fundamentals and Architecture
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
DP Operators-handbook-extract for the Mautical Institute
Taming the Chaos: How to Turn Unstructured Data into Decisions
August Patch Tuesday
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
Benefits of Physical activity for teenagers.pptx
Getting started with AI Agents and Multi-Agent Systems
Web Crawler for Trend Tracking Gen Z Insights.pptx

Cyber Risk Operation Center … is not a SOC

  • 1. CYBER RISK OPERATION CENTER STRATEGIC VALUE in CYBER RISK MANAGEMENT and OPERATIONAL FRAMEWORK FRANCESCO FAENZI HEAD OF CYBERSECURITY & RESILIENCY Itway.com
  • 2. ITWAY CYBER SECURITY & RESILIENCY CYBER-PHYSICAL SECURITY & RESILIENCY IDENTITY & MICROSOFT SECURITY & RESILIENCY MULTI-CLOUD & HYBRID INFRA SECURITY & RESILIENCY MODERN PLATFORM ENGENEERING & MODERN OPS CYBER RISK OPERATION CENTER RISK MANAGEMENT
  • 3. CROC IS NOT A SOC CROC SOC
  • 5. WHAT CROC MEANS FOR A CISO
  • 7. CROC MEANS CYBER RISK SCORING INTELLIGENT CYBER RISK SCORING Vulnerability Exposure - Vulnerabilities detected - Misconfigurations - Suspicius activity - Suspicius data access Security Config + control - Security Policies implemented - Regulatory Compliance Threat Activity - Threat Detections - Detection from investigation - Attack attempts Business Value - Asset importance - Impact of outage Asset Posture - Asset Discovery - Asset Influence - Asset Context Likelihood for a successfull attack Impact for a successfull attack Reduce Likelihood Minimaze Impact scope