SlideShare a Scribd company logo
Speakers: Put your Name and Title here:
---
---
---
xxxSWE2016xxx
Christopher Mandelaris, MS, CCSIO, CISM, CRISC, CISA, PMP, MCSA
CISO Chemical Bank
www.linkedin.com/in/cmandelaris
Background: 15 years of progressive IT experience and organizations.
7x Ironman Triathlete, 2x Boston Marathon finisher and endurance athlete
Key Talking Points
• Information Security and IT Risk Management
• The Changing Dynamic of Information Security
• The Modern CISO
• Program Components and Future Trends
• Partnership and Communication
Perspective
Going from…
• Reactive
• Product Purchasing state of mind
…To
• Proactive
• Risk-informed state of mind
Traditional Role of CISO
The Modern CISO
Security & Risk Management:
A Shared Responsibility
IT Security Partnerships
• Bridging the gaps between Information Security and Business
• Building partnerships with Information Technology teams.
IT Risk Management
• Set of processes through which management identifies, analyzes, and
responds appropriately to risks that might adversely affect the business
• Has become one of the most important tools used by the CISO
• Translates security requirements and controls into a common language
understood by all stakeholders
ISM Program Building Blocks
Gain An Understanding
Program Components &
Future Trend Gaps
Technical Security Operations
& Architecture
Example. - Firewalls, gateways, IDS/IPS
• Subset of enterprise architecture
which answers:
– When, Where and Why something
can be done
– What is being done
– Who is authorized to do it
– How is it supposed to be done
• Only one facet of a mature program
• Driven by Policy, which is driven by the
business
Asset Classification
• Establish IT asset inventory
– Public, Internal, Restricted and Confidential
• Review inventory at least quarterly
• Policies & Procedures to document AND maintain:
– Acceptable Use Policy
– Information Classification and Handling Policy
– IT asset handling procedures
Security Management & Operations Center
(SOC)
Business Continuity &
Disaster Recovery
• Program which helps organizations prepare for disruptive events
• Business Impact Analysis (BIA) = process that defines what and how
critical something is
Training & Awareness
• Build awareness to protect system resources
• Develop skills and knowledge so employees can perform duties more
securely
• Build in-depth knowledge as needed, to design, implement or operate
security for organizations and systems
Metrics & Reporting
Basic Methods to define Operational Metrics for Information Security
Reporting:
1. Trailing and leading indicators of business related metrics
2. To measure the effectiveness of the security department
Information Security Governance
Defined:
The active involvement of senior management in the institutionalization
and oversight of the information security program of a given organization.
Information Security Governance
Success Factors
• Institution-wide issue
• Leaders are accountable
• Viewed as an instructional requirement
• IT is Risk-Based, and Risk Informed
• Roles, responsibilities and segregation of
duties are defined
• IT is addressed and enforced in policy
• Adequate resources are committed
• Staff is trained and aware
• Requires Development Life Cycle
• Planned, managed, measurable and measured
• Reviewed and Audited
Information Security Governance
Closing Remarks

More Related Content

PPTX
Managing Security Risks in Manufacturing
PDF
CNIT 160 3a Information Risk Management
PDF
BRG_CSP_Study-Summary-nofees
PPTX
Information Security Governance and Strategy - 3
PPTX
Risk Management and Security in Strategic Planning
PDF
Cisa 2013 ch0
PPTX
PPTX
Mastering Information Technology Risk Management
Managing Security Risks in Manufacturing
CNIT 160 3a Information Risk Management
BRG_CSP_Study-Summary-nofees
Information Security Governance and Strategy - 3
Risk Management and Security in Strategic Planning
Cisa 2013 ch0
Mastering Information Technology Risk Management

What's hot (20)

PDF
Ch 3a: Risk Management Concepts
PPTX
Information Security Governance and Strategy
PDF
CNIT 160: Ch 2a: Introduction to Information Security Governance
PDF
CNIT 160: Ch 3a: Risk Management Concepts & Implementing a Program
PDF
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
PPT
Lesson 1- Risk Managment
PPTX
Roadmap to security operations excellence
PPTX
Information classification
PPT
Information security policy_2011
PPTX
Nabil Malik - Security performance metrics
PPT
Chapter 5 Planning for Security-students.ppt
PDF
Information Security Benchmarking 2015
PPTX
Data governance guide
PDF
Information Security Governance #2A
PPTX
Assuring Digital Strategic Initiatives by
PPTX
Professional Designations IT Assurance
Ch 3a: Risk Management Concepts
Information Security Governance and Strategy
CNIT 160: Ch 2a: Introduction to Information Security Governance
CNIT 160: Ch 3a: Risk Management Concepts & Implementing a Program
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
Lesson 1- Risk Managment
Roadmap to security operations excellence
Information classification
Information security policy_2011
Nabil Malik - Security performance metrics
Chapter 5 Planning for Security-students.ppt
Information Security Benchmarking 2015
Data governance guide
Information Security Governance #2A
Assuring Digital Strategic Initiatives by
Professional Designations IT Assurance
Ad

Viewers also liked (6)

PDF
Flowchart - Building next gen malware behavioural analysis environment
PPTX
Building next gen malware behavioural analysis environment
PDF
GDPR Cyber Insurance 11/1/2017
PDF
Super CISO 2020: How to Keep Your Job
PDF
The evolving threats and the challenges of the modern CISO
PDF
Itil 2011 Mind Maps
Flowchart - Building next gen malware behavioural analysis environment
Building next gen malware behavioural analysis environment
GDPR Cyber Insurance 11/1/2017
Super CISO 2020: How to Keep Your Job
The evolving threats and the challenges of the modern CISO
Itil 2011 Mind Maps
Ad

Similar to Mandelaris_SecureWorld_2016_FINAL (20)

DOCX
IT Risk assessment and Audit Planning
PDF
Kmicro Cybersecurity Offerings 2020
PPTX
CISM_WK_1.pptx
PDF
From Cave Man to Business Man, the Evolution of the CISO to CIRO
PDF
Building an effective Information Security Roadmap
PDF
Information Assurance Guidelines For Commercial Buildings...
PDF
Implementing a Security Management Framework
PDF
NIST Cybersecurity Framework 101
PDF
Solve the exercise in security management.pdf
PPTX
Bob West - Educating the Board of Directors
PPT
Role of The Board In IT Governance & Cyber Security-Steve Howse
PPTX
5548 isaca for-students
PPT
Risk Based Security and Self Protection Powerpoint
PDF
NY State's cybersecurity legislation requirements for risk management, securi...
PDF
CCISO_Certification_Training_Course-Outline.pdf
PPTX
crisc_wk_2a.pptx
PPTX
MIS.pptx Management of information system
PPTX
Cyber Defence - Service portfolio
PDF
Decode_Portfolio2016
PPTX
IT Risk assessment and Audit Planning
Kmicro Cybersecurity Offerings 2020
CISM_WK_1.pptx
From Cave Man to Business Man, the Evolution of the CISO to CIRO
Building an effective Information Security Roadmap
Information Assurance Guidelines For Commercial Buildings...
Implementing a Security Management Framework
NIST Cybersecurity Framework 101
Solve the exercise in security management.pdf
Bob West - Educating the Board of Directors
Role of The Board In IT Governance & Cyber Security-Steve Howse
5548 isaca for-students
Risk Based Security and Self Protection Powerpoint
NY State's cybersecurity legislation requirements for risk management, securi...
CCISO_Certification_Training_Course-Outline.pdf
crisc_wk_2a.pptx
MIS.pptx Management of information system
Cyber Defence - Service portfolio
Decode_Portfolio2016

Mandelaris_SecureWorld_2016_FINAL

  • 1. Speakers: Put your Name and Title here: --- --- --- xxxSWE2016xxx Christopher Mandelaris, MS, CCSIO, CISM, CRISC, CISA, PMP, MCSA CISO Chemical Bank www.linkedin.com/in/cmandelaris Background: 15 years of progressive IT experience and organizations. 7x Ironman Triathlete, 2x Boston Marathon finisher and endurance athlete
  • 2. Key Talking Points • Information Security and IT Risk Management • The Changing Dynamic of Information Security • The Modern CISO • Program Components and Future Trends • Partnership and Communication
  • 3. Perspective Going from… • Reactive • Product Purchasing state of mind …To • Proactive • Risk-informed state of mind
  • 6. Security & Risk Management: A Shared Responsibility
  • 7. IT Security Partnerships • Bridging the gaps between Information Security and Business • Building partnerships with Information Technology teams.
  • 8. IT Risk Management • Set of processes through which management identifies, analyzes, and responds appropriately to risks that might adversely affect the business • Has become one of the most important tools used by the CISO • Translates security requirements and controls into a common language understood by all stakeholders
  • 12. Technical Security Operations & Architecture Example. - Firewalls, gateways, IDS/IPS • Subset of enterprise architecture which answers: – When, Where and Why something can be done – What is being done – Who is authorized to do it – How is it supposed to be done • Only one facet of a mature program • Driven by Policy, which is driven by the business
  • 13. Asset Classification • Establish IT asset inventory – Public, Internal, Restricted and Confidential • Review inventory at least quarterly • Policies & Procedures to document AND maintain: – Acceptable Use Policy – Information Classification and Handling Policy – IT asset handling procedures
  • 14. Security Management & Operations Center (SOC)
  • 15. Business Continuity & Disaster Recovery • Program which helps organizations prepare for disruptive events • Business Impact Analysis (BIA) = process that defines what and how critical something is
  • 16. Training & Awareness • Build awareness to protect system resources • Develop skills and knowledge so employees can perform duties more securely • Build in-depth knowledge as needed, to design, implement or operate security for organizations and systems
  • 17. Metrics & Reporting Basic Methods to define Operational Metrics for Information Security Reporting: 1. Trailing and leading indicators of business related metrics 2. To measure the effectiveness of the security department
  • 18. Information Security Governance Defined: The active involvement of senior management in the institutionalization and oversight of the information security program of a given organization.
  • 19. Information Security Governance Success Factors • Institution-wide issue • Leaders are accountable • Viewed as an instructional requirement • IT is Risk-Based, and Risk Informed • Roles, responsibilities and segregation of duties are defined • IT is addressed and enforced in policy • Adequate resources are committed • Staff is trained and aware • Requires Development Life Cycle • Planned, managed, measurable and measured • Reviewed and Audited

Editor's Notes

  • #4: So often Information Security is thought of a product tools centric initiate with code running in the background in a dark room where the business has no idea what’s going on. Buying products to monitor, alert and respond to threats and vulnerabilities and keep the fraudsters at bay keep organizations in a reactive state rather than proactive state. Many organizations implement products and services to keep risk at a minimum but alternatively opens the organization up to more risk by not aligning with goals an objectives of the enterprise, not risk based focus, not reviewing logs and alerts coming from security applications, too many solutions best in class rather than a security management system focused on the right risks, vulnerabilities and threats for the environment.
  • #7: Domain 1 page 30 for further definitions to speak
  • #8: Domain 1 page 30 for further definitions to speak
  • #10: Domain 1 page 5
  • #15: The workhorses, monitoring, detecting and reporting
  • #18: Page 67 domain 1