SlideShare a Scribd company logo
Cyber Security Organizational
Operating Model And Governance
Anusha Amareshbabu, Deepti Madhu, Rishi Midha, Srinidhi Aithal,
Suvir Singh, Swati Mehta, Vikram Konduru
UB – SOM – MSS – MGS 650/420 IA
November 16, 2015; Buffalo, NY
Deloitte Challenge
Safeguard and Maintain Confidentiality,
Integrity and Availability Triad1
Information Security is not Just technical
issues, but Governance responsibility2
Need for a “Safer Internal Business
Community”3
• Organizations want to be more effective and competitive
• Board of directors are driving Innovation like never before
• Built in link between growth, innovation and cyber security
CYBER SECURITY GOVERNANCE –
THE EMERGING TREND
KEY CHALLENGES
 Security Posture
Lack of due diligence in evaluating Security Maturity Level
 Physical and Logical Security
Controlled Access
Encryption
 Competitors
Corporate Espionage
KEY CHALLENGES (contd.)
 Disgruntled Employees
Headcount reduction
Culture change after Merger
 Policies and Awareness
Mismatch of security policies and governance models
 Financial Criminals
Internal Threats
APT
WHAT DOES THE FUTURE HOLD?
LURKING
PROBLEMS
Technological
Transformations
Unhealthy
Cyber
Ecosystem
Resource
Allocation and
Risk Appetite
Globalization
and
Disappearing
Business
Boundaries
POPULAR CYBER SECURITY
FRAMEWORKS
 Cybersecurity Capability Maturity Model(C2M2)
 National Institute Of Standards and
Technology(NIST)
 Control Objectives for Information and Related
Technology(COBIT 5)
 ITIL Security Management
 ISO 27000-series
THE NEXT GENERATION MODEL
 Enterprise-wide acceptance
 Commensurate with the work culture
 Senior management endorsement
 Alignment with business objectives
 Extend beyond the boundaries of the organization
 Long-term risk-based approach
 Comprehensive, Effective, and Adaptive
THE NEXT GENERATION MODEL
ENHANCE SECURITY
• Align corporate governance with
IT
• Perform risk analysis
• Design enterprise wide policy
• Build strong application controls
• Establish accountability
• Ensure security awareness
• Audit processes, procedures, and
controls
BUILD RESILIENCE
CONTINUOUS
VIGILANCE
• Monitor and adapt to
threat trends in the
industry
• Design effective
detection systems
• Protect against internal
attacks
• Modify and update
indicators of risk
• Report inconsistencies for
proactive measures
• Effective, adaptive, and
tested business
continuity planning
• Organization-wide
training to enhance
disaster response
mechanism
• Business impact analysis
evaluations
• Continuous rehearsals of
disaster handling
procedures
REFERENCES
• https://securityintelligence.com/creating-a-cybersecurity-governance-framework-the-
necessity-of-time/
• http://www.computerworld.com/article/2564800/security0/the-link-between-
information-security-and-corporate-governance.html
• http://www.govtech.com/blogs/lohrmann-on-cybersecurity/What-is-a-healthy-
061211.html
• https://hbr.org/1991/05/transcending-business-boundaries-12000-world-managers-
view-change
• http://www.ciosummits.com/Financial_Services_Cyber_Challenges_White_Paper.pdf
• https://www.securestate.com/blog/2015/02/06/cyber-security-concerns-in-the-
mergers-acquisitions-due-diligence-process
• http://www.boozallen.com/media/file/Overcoming-Financial-Crimes-wp.pdf
• http://www2.deloitte.com/global/en/pages/risk/topics/cybersecurity.html

More Related Content

PDF
Cybersecurity roadmap : Global healthcare security architecture
PDF
Cybersecurity Roadmap Development for Executives
PDF
Data Loss Prevention (DLP) - Fundamental Concept - Eryk
PPTX
Enterprise Security Architecture Design
PPTX
Cybersecurity Awareness Training
PDF
Introduction to Cybersecurity
PPTX
Siem solutions R&E
Cybersecurity roadmap : Global healthcare security architecture
Cybersecurity Roadmap Development for Executives
Data Loss Prevention (DLP) - Fundamental Concept - Eryk
Enterprise Security Architecture Design
Cybersecurity Awareness Training
Introduction to Cybersecurity
Siem solutions R&E

What's hot (20)

PPTX
Data Loss Prevention from Symantec
PDF
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
PPT
8. operations security
PPTX
Security awareness
PPTX
Physical access control
PPTX
Endpoint Protection
PPT
information security management
PDF
Enterprise Cybersecurity: From Strategy to Operating Model
PPTX
Information Security Governance and Strategy - 3
PPTX
Cloud Audit and Compliance
PPTX
Iso 27001 awareness
PPTX
NIST Critical Security Framework (CSF)
PPTX
Cyber security
PPTX
What is iso 27001 isms
PPTX
Physical security
PPTX
Cyber Security Best Practices
PPTX
Hyphenet Security Awareness Training
PPT
Information Security Policies and Standards
PPTX
SIEM Primer:
PDF
Data Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention from Symantec
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
8. operations security
Security awareness
Physical access control
Endpoint Protection
information security management
Enterprise Cybersecurity: From Strategy to Operating Model
Information Security Governance and Strategy - 3
Cloud Audit and Compliance
Iso 27001 awareness
NIST Critical Security Framework (CSF)
Cyber security
What is iso 27001 isms
Physical security
Cyber Security Best Practices
Hyphenet Security Awareness Training
Information Security Policies and Standards
SIEM Primer:
Data Loss Prevention: Challenges, Impacts & Effective Strategies
Ad

Similar to Cyber Security Organizational Operating Model and Governance (20)

PDF
New technologies - Amer Haza'a
PDF
Introduction to Cybersecurity.pdf
PDF
Pivotal Role of HR in Cybersecurity
PDF
Future of Cybersecurity 2016 - M.Rosenquist
PDF
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
PDF
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
PPTX
InfraGard Webinar March 2016 033016 A
PDF
Top 10 Cybersecurity Predictions for 2015
PPTX
Global Megatrends in Cybersecurity – A Survey of 1,000 CxOs
PDF
IREC165473PR RP 2017 Security Outlook
PDF
(eBook PDF) Effective Cybersecurity: A Guide to Using Best Practices and Stan...
PDF
(eBook PDF) Effective Cybersecurity: A Guide to Using Best Practices and Stan...
PDF
(eBook PDF) Effective Cybersecurity: A Guide to Using Best Practices and Stan...
PDF
Security as a Strategy
PDF
CIA Trifecta ISACA Boise 2016 Watson
PDF
br-security-connected-top-5-trends
PDF
A Major Revision of the CISRCP Program
PDF
(eBook PDF) Effective Cybersecurity: A Guide to Using Best Practices and Stan...
PDF
(eBook PDF) Effective Cybersecurity: A Guide to Using Best Practices and Stan...
PPTX
Fortify-Application_Security_Foundation_Training.pptx
New technologies - Amer Haza'a
Introduction to Cybersecurity.pdf
Pivotal Role of HR in Cybersecurity
Future of Cybersecurity 2016 - M.Rosenquist
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
InfraGard Webinar March 2016 033016 A
Top 10 Cybersecurity Predictions for 2015
Global Megatrends in Cybersecurity – A Survey of 1,000 CxOs
IREC165473PR RP 2017 Security Outlook
(eBook PDF) Effective Cybersecurity: A Guide to Using Best Practices and Stan...
(eBook PDF) Effective Cybersecurity: A Guide to Using Best Practices and Stan...
(eBook PDF) Effective Cybersecurity: A Guide to Using Best Practices and Stan...
Security as a Strategy
CIA Trifecta ISACA Boise 2016 Watson
br-security-connected-top-5-trends
A Major Revision of the CISRCP Program
(eBook PDF) Effective Cybersecurity: A Guide to Using Best Practices and Stan...
(eBook PDF) Effective Cybersecurity: A Guide to Using Best Practices and Stan...
Fortify-Application_Security_Foundation_Training.pptx
Ad

Recently uploaded (20)

PDF
CHAPTER 14 Manageement of Nursing Educational Institutions- planing and orga...
PPTX
Psychological_Contract_Presentation.pptx
PDF
Air India AI-171 Crash in Ahmedabad A Tragic Wake-Up Call.
PPTX
Chapter One an overview of political economy
PDF
CHAPTER 15- Manageement of Nursing Educational Institutions- Staffing and st...
PPTX
TCoE_IT_Concrete industry.why is it required
PDF
Case study -Uber strategic plan and management
PPTX
Mangeroal Finance for Strategic Management
PPTX
Concluding Session_Wrapup-India Jun 5 2024-Oct 5 2025 ZS.pptx
PPTX
School Annual day Presentation, Logo, Animation
PDF
MANAGEMENT LESSONS FROM ANCIENT KNOWLEDGE SYSTEM-ARTHASHASTRA AND THIRUKKURAL...
PPTX
2. CYCLE OF FUNCTIONING RIFLE -PP Presentation..pptx
PPTX
Leadership for Industry 4.0 And Industry 5.0
PDF
CISSP Domain 5: Identity and Access Management (IAM)
PPTX
Consulting on marketing-The needs wants and demands are a very important comp...
PPTX
MY GOLDEN RULES la regla de oro jhonatan requena
PPTX
Effective_communication._(strategy).pptx
PPTX
Human Resources management _HR structure
PPTX
Press Release Importance & Structure.pptx
PDF
CHAPTER 14 Manageement of Nursing Educational Institutions- planing and orga...
CHAPTER 14 Manageement of Nursing Educational Institutions- planing and orga...
Psychological_Contract_Presentation.pptx
Air India AI-171 Crash in Ahmedabad A Tragic Wake-Up Call.
Chapter One an overview of political economy
CHAPTER 15- Manageement of Nursing Educational Institutions- Staffing and st...
TCoE_IT_Concrete industry.why is it required
Case study -Uber strategic plan and management
Mangeroal Finance for Strategic Management
Concluding Session_Wrapup-India Jun 5 2024-Oct 5 2025 ZS.pptx
School Annual day Presentation, Logo, Animation
MANAGEMENT LESSONS FROM ANCIENT KNOWLEDGE SYSTEM-ARTHASHASTRA AND THIRUKKURAL...
2. CYCLE OF FUNCTIONING RIFLE -PP Presentation..pptx
Leadership for Industry 4.0 And Industry 5.0
CISSP Domain 5: Identity and Access Management (IAM)
Consulting on marketing-The needs wants and demands are a very important comp...
MY GOLDEN RULES la regla de oro jhonatan requena
Effective_communication._(strategy).pptx
Human Resources management _HR structure
Press Release Importance & Structure.pptx
CHAPTER 14 Manageement of Nursing Educational Institutions- planing and orga...

Cyber Security Organizational Operating Model and Governance

  • 1. Cyber Security Organizational Operating Model And Governance Anusha Amareshbabu, Deepti Madhu, Rishi Midha, Srinidhi Aithal, Suvir Singh, Swati Mehta, Vikram Konduru UB – SOM – MSS – MGS 650/420 IA November 16, 2015; Buffalo, NY Deloitte Challenge
  • 2. Safeguard and Maintain Confidentiality, Integrity and Availability Triad1 Information Security is not Just technical issues, but Governance responsibility2 Need for a “Safer Internal Business Community”3 • Organizations want to be more effective and competitive • Board of directors are driving Innovation like never before • Built in link between growth, innovation and cyber security CYBER SECURITY GOVERNANCE – THE EMERGING TREND
  • 3. KEY CHALLENGES  Security Posture Lack of due diligence in evaluating Security Maturity Level  Physical and Logical Security Controlled Access Encryption  Competitors Corporate Espionage
  • 4. KEY CHALLENGES (contd.)  Disgruntled Employees Headcount reduction Culture change after Merger  Policies and Awareness Mismatch of security policies and governance models  Financial Criminals Internal Threats APT
  • 5. WHAT DOES THE FUTURE HOLD? LURKING PROBLEMS Technological Transformations Unhealthy Cyber Ecosystem Resource Allocation and Risk Appetite Globalization and Disappearing Business Boundaries
  • 6. POPULAR CYBER SECURITY FRAMEWORKS  Cybersecurity Capability Maturity Model(C2M2)  National Institute Of Standards and Technology(NIST)  Control Objectives for Information and Related Technology(COBIT 5)  ITIL Security Management  ISO 27000-series
  • 7. THE NEXT GENERATION MODEL  Enterprise-wide acceptance  Commensurate with the work culture  Senior management endorsement  Alignment with business objectives  Extend beyond the boundaries of the organization  Long-term risk-based approach  Comprehensive, Effective, and Adaptive
  • 8. THE NEXT GENERATION MODEL ENHANCE SECURITY • Align corporate governance with IT • Perform risk analysis • Design enterprise wide policy • Build strong application controls • Establish accountability • Ensure security awareness • Audit processes, procedures, and controls BUILD RESILIENCE CONTINUOUS VIGILANCE • Monitor and adapt to threat trends in the industry • Design effective detection systems • Protect against internal attacks • Modify and update indicators of risk • Report inconsistencies for proactive measures • Effective, adaptive, and tested business continuity planning • Organization-wide training to enhance disaster response mechanism • Business impact analysis evaluations • Continuous rehearsals of disaster handling procedures
  • 9. REFERENCES • https://securityintelligence.com/creating-a-cybersecurity-governance-framework-the- necessity-of-time/ • http://www.computerworld.com/article/2564800/security0/the-link-between- information-security-and-corporate-governance.html • http://www.govtech.com/blogs/lohrmann-on-cybersecurity/What-is-a-healthy- 061211.html • https://hbr.org/1991/05/transcending-business-boundaries-12000-world-managers- view-change • http://www.ciosummits.com/Financial_Services_Cyber_Challenges_White_Paper.pdf • https://www.securestate.com/blog/2015/02/06/cyber-security-concerns-in-the- mergers-acquisitions-due-diligence-process • http://www.boozallen.com/media/file/Overcoming-Financial-Crimes-wp.pdf • http://www2.deloitte.com/global/en/pages/risk/topics/cybersecurity.html