SlideShare a Scribd company logo
Session ID:
Session Classification:
Todd Fitzgerald
Director Global Information Security
Information Security Management Author
ManpowerGroup, Inc.
(NYSE:MAN, Fortune 500 #129)
MASH-F43
Intermediate
I, (MR. TECHIE) GOT THE
CISO JOB! SHOULD I
PREPARE 3 ENVELOPES?
(Security Architect/Officer)
(YES THIS WAS A REAL JOB POSTING!!!!)
Job description:
This position will represent the information protection program of the’ region and requires the ability to understand business issues
and processes and articulate appropriate security models to protect the assets of and entrusted to. A strong understanding of
information security is necessary to manage, coordinate, plan, implement and organize the information protection and security
objectives of the’ region. This position is a senior technical role within our information protection and security department. A high-
level of technical and security expertise is required and will be responsible for managing information security professionals. This
position will play a key role in defining acceptable and appropriate security models for protecting information and enabling secure
business operations. This person must be knowledgeable of current data protection best practices, standards and applicable
legislation and familiar with principles and techniques of security risk analysis, disaster recovery planning and business continuity
processes and must demonstrate an understanding of the management issues involved in implementing security processes and
security-aware culture in a large, global corporate environment. He or she will work with a wide variety of people from different
internal organizational units, and bring them together to manifest information security controls that reflect workable compromises as
well as proactive responses to current and future business risks to enable ongoing operations and protection of corporate assets.
RESPONSIBILITIES INCLUDE: • Manage a cost-effective information security program for the Americas region; aligned with the
global information security program, business goals and objectives • Assist with RFP and Information Security responses for clients •
Implementing and maintaining documentation, policies, procedures, guidelines and processes related to ISO 9000, ISO 27000, ISO
20000, European Union Safe Harbor Framework, Payment Card Industry Data Protection Standards (PCI), SAS-70, General
Computer Controls and client requirements • Performing information security risk assessments • Ensuring disaster recovery and
business continuity plans for information systems are documented and tested • Participate in the system development process to
ensure that applications adhere to an appropriate security model and are properly tested prior to production • Ensure appropriate
and adequate information security training for employees, contractors, partners and other third parties • Manage information
protection support desk and assist with resolution • Manage security incident response including performing investigative follow-up,
assigning responsibility for corrective action, and auditing for effective completion • Manage the change control program • Monitor
the compliance and effectiveness of Americas’ region information protection program • Develop and enhance the security skills and
experience of infrastructure, development, information security and operational staff to improve the security of applications,
systems, procedures and processes •
… A Complete Job Description
Direct senior security personnel in order to achieve the security initiatives • Participate in the information
security steering and advisory committees to address organization-wide issues involving information security matters and concerns,
establish objectives and set priorities for the information security initiatives • Work closely with different departments and regions on
information security issues • Consult with and advise senior management on all major information security related issues, incidents and
violations • Update senior management regarding the security posture and initiative progress • Provide advice and assistance
concerning the security of sensitive information and the processing of that information • Participate in security planning for future
application system implementations • Stay current with industry trends relating to Information Security • Monitor changes in legislation
and standards that affect information security • Monitor and review new technologies • Performs other Information Security projects /
duties as needed MINIMUM QUALIFICATIONS: Transferable Skills (Competencies) • Strong communication and interpersonal skills •
Strong understanding of computer networking technologies, architectures and protocols • Strong understanding of client and server
technologies, architectures and systems • Strong understanding of database technologies • Strong knowledge of information security
best practices, tools and techniques • Strong conceptual understanding of Information Security theory • Strong working knowledge of
security architecture and recovery methods and concepts including encryption, firewalls, and VPNs • Knowledge of business, security
and privacy requirements related to international standards and legislation (including ISO 9001, ISO 27001, ISO 20000, Payment Card
Industry data protection standard (PCI), HIPPA, European Union Data Protection Directive, Canada’s Personal Information Protection
and Electronic Documents Act, SAS-70 Type II, US state privacy legislation and Mexico’s E-Commerce Act) • Knowledge of risk analysis
and security techniques • Working knowledge of BCP and DR plan requirements and testing procedures • Working knowledge of
Windows XP/2000/2003, Active Directory, and IT Infrastructure security and recovery methods and concepts • Working knowledge of
Web-based application security and recovery methods and concepts • Working knowledge of AS400 security and recovery methods and
concepts • Working knowledge of PeopleSoft security and recovery methods and concepts • Working Knowledge of anti-virus systems,
vulnerability management, and violation monitoring • Strong multi-tasking and analytical/troubleshooting skills • Knowledge of audit
and control methods and concepts a plus • Knowledge of SAS-70 audit requirements a plus • Knowledge of ISO 9001 requirements a
plus • Knowledge of ISO 27001 requirements a plus • Knowledge of ISO 20001 requirements a plus • Knowledge of COBIT
requirements a plus • Knowledge of EU / Safe Harbor requirements a plus • Knowledge of Linux security a plus • Knowledge of VB.NET,
C++, JAVA, or similar programming languages a plus • Proficient in MS-Office suite of products • Professional, team oriented
Qualifications • Bachelor’s Degree (B.A., B.S.), or equivalent combination of education and experience in Information Security,
Information Technology, Computer Science, Management Information Systems or similar curriculum • 7+ years of Information
Technology or Information Security experience, including at least 5 years dedicated to Information Security • 2+ years of Travel
Industry experience preferred • Must be a Certified Information Systems Security Professional (CISSP) • Certified Information Security
Manager (CISM) preferred • Strong organizational, time management, decision making, and problem solving skills • Strong initiative
and self motivated professional • Professional certifications from ISACA, (ISC)2, or SANS preferred • Experience with ISO certified
systems a plus
► Raised their hand at the wrong time during a
meeting
► Didn’t attend the selection meeting
► Last IT guy in the shop
► Working on compliance/privacy – must know
something about security
► Chose this career (full deck not in order !)
Where Did The Security Officers
Come From ?
► For each pair of images flashed on the screen
► Pick the image that you the most
► Rely on your first impression
QUICK 5 QUESTION TECHIE
OR CISO QUIZ (to determine the roadmap for
the rest of your life)
THIS
or
THAT ?
“Techie” Core Competencies
Analytical
Problem
Solving
Tool
Expertise
Best
Practices
Technical
Knowledge
Team
Work
Emerging
Technologies
Crisis
Mgmt
Industry
Standards
Leadership Competencies
Technical
Competency
Security/Audit/
Compliance
Leadership
& Managerial
Competency
Adaptability
Self-control
Self-Development
Orientation
Flexibility
Interpersonal
Awareness
Perseverance
Self-control
Critical
Information Seeking
Efficiency
Initiative
Thoroughness
Results-Oriented
Non-Technical Core Competencies
Vision
Leadership
Influencing
Skills
Team
Work
Conceptual &
Strategic
Thinking
Customer
Focus
Written/Oral
Communication
Interpersonal
Effectiveness
Financial/
Budgetary
Important Security Leadership Skills
Source: Fitzgerald/Krause CISO Survey, CISO Leadership Skills, 2008 ISC2 Press
Self Confidence 65%
Oral Communications 74%
Written Communications 74%
Influence 69%
Teamwork 68%
► Technical challenge
► Concrete non-ambiguous solutions
► Task-oriented
► Mastery of technical skill
► Hands-on training focus
► Documentation aversion
► High level of individual contribution
► Meetings are distractions
Career Path Decision Point: Techie or
CISO Differences In Thought
Processes


Technical
Expert
Chief
Information
Security
Officer
Technical
► Business relationships
► People-oriented/Conflict Resolution
► Consensus building
► Many presentations
► Influence
► Team building
► Accepting ambiguity and uncertainty
► Meetings, meetings, Meetings!
► Oral communication with all
organizational levels
Career Path Decision Point: Techie or CISO
Differences In Thought Processes ?


Technical
Expert
Chief
Information
Security
Officer
Managerial
► Balances needs of the business with
► Increased regulated controls
► Increased complexity
► Translates “technical speak”
► Has a solid background
► 5-7 Years Information Security
► Additional IT Background
► Thinks strategically, Politically Savvy
► Knowledgeable of key aspects of business
► Possesses certification
Gartner Research Says The CISO…
Source: Emerging Role
and Skills
For the CISO Gartner
Report
QUESTIONS?
Todd_fitzgerald@yahoo.com
Todd_fitzgerald@yahoo.com
THANK YOU
FOR YOUR
PARTICIPATION

More Related Content

PPTX
CISSP - Chapter 1 - Security Concepts
PDF
Business cases internet 30 use cases
PDF
ISO 27001 2013 Introduction Study Case IGN Mantra, 2nd Day, 3rd Session.
PPTX
Security Awareness and Training
PPTX
CISSP Certification- Security Engineering-part1
PPTX
CISSP Chapter 1 Risk Management
PDF
Certified Information Systems Security Professional
DOC
Martin_Leroux_2014
CISSP - Chapter 1 - Security Concepts
Business cases internet 30 use cases
ISO 27001 2013 Introduction Study Case IGN Mantra, 2nd Day, 3rd Session.
Security Awareness and Training
CISSP Certification- Security Engineering-part1
CISSP Chapter 1 Risk Management
Certified Information Systems Security Professional
Martin_Leroux_2014

What's hot (20)

PDF
Chapter 12 iso 27001 awareness
PDF
Ch 3a: Risk Management Concepts
PPTX
Secure Your Career Shift With Computer-Security Training
PPTX
CISSP Certification-Asset Security
PDF
IT Information Security Management Principles, 28 February - 02 March 2016 Du...
PDF
IT Information Security Management Principles, 15 - 18 May 2016 Dubai UAE
PDF
Irfan Ur Rehman
PPTX
How To Secure MIS
PDF
CISSP Preparation: Introduction
PPT
Meletis BelsisManaging and enforcing information security
PPT
Lesson 1- Risk Managment
PDF
IT Information Security Management Principles, 23 - 26 November 2015 Dubai UAE
PPTX
Security-Invest Where it Matters Most
DOC
RHMR_Consultant_Profile_RRHarris07232016
PDF
CNIT 160 Ch 4a: Information Security Programs
PDF
CNIT 160: Ch 3a: Risk Management Concepts & Implementing a Program
Chapter 12 iso 27001 awareness
Ch 3a: Risk Management Concepts
Secure Your Career Shift With Computer-Security Training
CISSP Certification-Asset Security
IT Information Security Management Principles, 28 February - 02 March 2016 Du...
IT Information Security Management Principles, 15 - 18 May 2016 Dubai UAE
Irfan Ur Rehman
How To Secure MIS
CISSP Preparation: Introduction
Meletis BelsisManaging and enforcing information security
Lesson 1- Risk Managment
IT Information Security Management Principles, 23 - 26 November 2015 Dubai UAE
Security-Invest Where it Matters Most
RHMR_Consultant_Profile_RRHarris07232016
CNIT 160 Ch 4a: Information Security Programs
CNIT 160: Ch 3a: Risk Management Concepts & Implementing a Program
Ad

Viewers also liked (19)

PDF
PDF
Об осуществлении Банком России деятельности, направленной на снижение рисков ...
PDF
Новые технологические возможности и безопасность мобильных решений
PDF
PDF
PDF
Интегрированная система информационной и экономической безопасности в бизнес-...
PDF
Защита от DDoS-атак. Сегодня. В России.
PDF
PDF
PDF
PDF
Spo1 r31 spo1-r31
PDF
Защищенный мобильный доступ. Вчера. Сегодня. Завтра.
Об осуществлении Банком России деятельности, направленной на снижение рисков ...
Новые технологические возможности и безопасность мобильных решений
Интегрированная система информационной и экономической безопасности в бизнес-...
Защита от DDoS-атак. Сегодня. В России.
Spo1 r31 spo1-r31
Защищенный мобильный доступ. Вчера. Сегодня. Завтра.
Ad

Similar to Mash f43 (20)

PDF
Super CISO 2020: How to Keep Your Job
PDF
Information Security Career Day Presentation
PDF
Rothke stimulating your career as an information security professional
PPTX
Professional Designations in IT Governance
PPTX
Professional designations in it governance
PPTX
Security and Personnel-Chapter 11 Presentation.pptx
DOC
Brenden Brown Resume
PDF
Resume 2.0 Remi Beauregard
DOCX
Albert G Info systems resume
DOCX
Michael Barham Resume 2014 ISA
PDF
Information Security Analyst Resume. When seeking
DOCX
Harris_Resume_2016_ITS_gmail
DOC
Johnny_Dennis_Leadership_Information_Security_Identity_Access_Management - Li...
PDF
Hiring Guide to the Information Security Profession
PDF
Secure Your Career Shift With Computer-Security Training
PPTX
Professional Designations IT Assurance
PDF
Willard_Grayson_2015
PDF
IS3 Capabilities Brief
PDF
Erwin (Chris) Carrow resume Brief 10-23-2015
DOCX
Template 30
Super CISO 2020: How to Keep Your Job
Information Security Career Day Presentation
Rothke stimulating your career as an information security professional
Professional Designations in IT Governance
Professional designations in it governance
Security and Personnel-Chapter 11 Presentation.pptx
Brenden Brown Resume
Resume 2.0 Remi Beauregard
Albert G Info systems resume
Michael Barham Resume 2014 ISA
Information Security Analyst Resume. When seeking
Harris_Resume_2016_ITS_gmail
Johnny_Dennis_Leadership_Information_Security_Identity_Access_Management - Li...
Hiring Guide to the Information Security Profession
Secure Your Career Shift With Computer-Security Training
Professional Designations IT Assurance
Willard_Grayson_2015
IS3 Capabilities Brief
Erwin (Chris) Carrow resume Brief 10-23-2015
Template 30

More from SelectedPresentations (20)

PDF
Длительное архивное хранение ЭД: правовые аспекты и технологические решения
PDF
Трансграничное пространство доверия. Доверенная третья сторона.
PDF
Варианты реализации атак через мобильные устройства
PDF
Управление безопасностью мобильных устройств
PDF
Современные технологии контроля и защиты мобильных устройств, тенденции рынка...
PDF
Кадровое агентство отрасли информационной безопасности
PDF
Основное содержание профессионального стандарта «Специалист по безопасности и...
PDF
Основное содержание профессионального стандарта «Специалист по безопасности а...
PDF
Основное содержание профессионального стандарта «Специалист по технической за...
PDF
Основное содержание профессионального стандарта «Специалист по безопасности т...
PDF
О профессиональных стандартах по группе занятий (профессий) «Специалисты в об...
PDF
Запись активности пользователей с интеллектуальным анализом данных
PDF
Импортозамещение в системах ИБ банков. Практические аспекты перехода на росси...
PDF
Обеспечение защиты информации на стадиях жизненного цикла ИС
PDF
Документ, как средство защиты: ОРД как основа обеспечения ИБ
PDF
Чего не хватает в современных ids для защиты банковских приложений
PDF
Об участии МОО «АЗИ» в разработке профессиональных стандартов в области инфор...
PDF
Оценка состояния, меры формирования индустрии информационной безопасности Рос...
PDF
Об угрозах информационной безопасности, актуальных для разработчика СЗИ
Длительное архивное хранение ЭД: правовые аспекты и технологические решения
Трансграничное пространство доверия. Доверенная третья сторона.
Варианты реализации атак через мобильные устройства
Управление безопасностью мобильных устройств
Современные технологии контроля и защиты мобильных устройств, тенденции рынка...
Кадровое агентство отрасли информационной безопасности
Основное содержание профессионального стандарта «Специалист по безопасности и...
Основное содержание профессионального стандарта «Специалист по безопасности а...
Основное содержание профессионального стандарта «Специалист по технической за...
Основное содержание профессионального стандарта «Специалист по безопасности т...
О профессиональных стандартах по группе занятий (профессий) «Специалисты в об...
Запись активности пользователей с интеллектуальным анализом данных
Импортозамещение в системах ИБ банков. Практические аспекты перехода на росси...
Обеспечение защиты информации на стадиях жизненного цикла ИС
Документ, как средство защиты: ОРД как основа обеспечения ИБ
Чего не хватает в современных ids для защиты банковских приложений
Об участии МОО «АЗИ» в разработке профессиональных стандартов в области инфор...
Оценка состояния, меры формирования индустрии информационной безопасности Рос...
Об угрозах информационной безопасности, актуальных для разработчика СЗИ

Mash f43

  • 1. Session ID: Session Classification: Todd Fitzgerald Director Global Information Security Information Security Management Author ManpowerGroup, Inc. (NYSE:MAN, Fortune 500 #129) MASH-F43 Intermediate I, (MR. TECHIE) GOT THE CISO JOB! SHOULD I PREPARE 3 ENVELOPES?
  • 2. (Security Architect/Officer) (YES THIS WAS A REAL JOB POSTING!!!!) Job description: This position will represent the information protection program of the’ region and requires the ability to understand business issues and processes and articulate appropriate security models to protect the assets of and entrusted to. A strong understanding of information security is necessary to manage, coordinate, plan, implement and organize the information protection and security objectives of the’ region. This position is a senior technical role within our information protection and security department. A high- level of technical and security expertise is required and will be responsible for managing information security professionals. This position will play a key role in defining acceptable and appropriate security models for protecting information and enabling secure business operations. This person must be knowledgeable of current data protection best practices, standards and applicable legislation and familiar with principles and techniques of security risk analysis, disaster recovery planning and business continuity processes and must demonstrate an understanding of the management issues involved in implementing security processes and security-aware culture in a large, global corporate environment. He or she will work with a wide variety of people from different internal organizational units, and bring them together to manifest information security controls that reflect workable compromises as well as proactive responses to current and future business risks to enable ongoing operations and protection of corporate assets. RESPONSIBILITIES INCLUDE: • Manage a cost-effective information security program for the Americas region; aligned with the global information security program, business goals and objectives • Assist with RFP and Information Security responses for clients • Implementing and maintaining documentation, policies, procedures, guidelines and processes related to ISO 9000, ISO 27000, ISO 20000, European Union Safe Harbor Framework, Payment Card Industry Data Protection Standards (PCI), SAS-70, General Computer Controls and client requirements • Performing information security risk assessments • Ensuring disaster recovery and business continuity plans for information systems are documented and tested • Participate in the system development process to ensure that applications adhere to an appropriate security model and are properly tested prior to production • Ensure appropriate and adequate information security training for employees, contractors, partners and other third parties • Manage information protection support desk and assist with resolution • Manage security incident response including performing investigative follow-up, assigning responsibility for corrective action, and auditing for effective completion • Manage the change control program • Monitor the compliance and effectiveness of Americas’ region information protection program • Develop and enhance the security skills and experience of infrastructure, development, information security and operational staff to improve the security of applications, systems, procedures and processes •
  • 3. … A Complete Job Description Direct senior security personnel in order to achieve the security initiatives • Participate in the information security steering and advisory committees to address organization-wide issues involving information security matters and concerns, establish objectives and set priorities for the information security initiatives • Work closely with different departments and regions on information security issues • Consult with and advise senior management on all major information security related issues, incidents and violations • Update senior management regarding the security posture and initiative progress • Provide advice and assistance concerning the security of sensitive information and the processing of that information • Participate in security planning for future application system implementations • Stay current with industry trends relating to Information Security • Monitor changes in legislation and standards that affect information security • Monitor and review new technologies • Performs other Information Security projects / duties as needed MINIMUM QUALIFICATIONS: Transferable Skills (Competencies) • Strong communication and interpersonal skills • Strong understanding of computer networking technologies, architectures and protocols • Strong understanding of client and server technologies, architectures and systems • Strong understanding of database technologies • Strong knowledge of information security best practices, tools and techniques • Strong conceptual understanding of Information Security theory • Strong working knowledge of security architecture and recovery methods and concepts including encryption, firewalls, and VPNs • Knowledge of business, security and privacy requirements related to international standards and legislation (including ISO 9001, ISO 27001, ISO 20000, Payment Card Industry data protection standard (PCI), HIPPA, European Union Data Protection Directive, Canada’s Personal Information Protection and Electronic Documents Act, SAS-70 Type II, US state privacy legislation and Mexico’s E-Commerce Act) • Knowledge of risk analysis and security techniques • Working knowledge of BCP and DR plan requirements and testing procedures • Working knowledge of Windows XP/2000/2003, Active Directory, and IT Infrastructure security and recovery methods and concepts • Working knowledge of Web-based application security and recovery methods and concepts • Working knowledge of AS400 security and recovery methods and concepts • Working knowledge of PeopleSoft security and recovery methods and concepts • Working Knowledge of anti-virus systems, vulnerability management, and violation monitoring • Strong multi-tasking and analytical/troubleshooting skills • Knowledge of audit and control methods and concepts a plus • Knowledge of SAS-70 audit requirements a plus • Knowledge of ISO 9001 requirements a plus • Knowledge of ISO 27001 requirements a plus • Knowledge of ISO 20001 requirements a plus • Knowledge of COBIT requirements a plus • Knowledge of EU / Safe Harbor requirements a plus • Knowledge of Linux security a plus • Knowledge of VB.NET, C++, JAVA, or similar programming languages a plus • Proficient in MS-Office suite of products • Professional, team oriented Qualifications • Bachelor’s Degree (B.A., B.S.), or equivalent combination of education and experience in Information Security, Information Technology, Computer Science, Management Information Systems or similar curriculum • 7+ years of Information Technology or Information Security experience, including at least 5 years dedicated to Information Security • 2+ years of Travel Industry experience preferred • Must be a Certified Information Systems Security Professional (CISSP) • Certified Information Security Manager (CISM) preferred • Strong organizational, time management, decision making, and problem solving skills • Strong initiative and self motivated professional • Professional certifications from ISACA, (ISC)2, or SANS preferred • Experience with ISO certified systems a plus
  • 4. ► Raised their hand at the wrong time during a meeting ► Didn’t attend the selection meeting ► Last IT guy in the shop ► Working on compliance/privacy – must know something about security ► Chose this career (full deck not in order !) Where Did The Security Officers Come From ?
  • 5. ► For each pair of images flashed on the screen ► Pick the image that you the most ► Rely on your first impression QUICK 5 QUESTION TECHIE OR CISO QUIZ (to determine the roadmap for the rest of your life) THIS or THAT ?
  • 8. Non-Technical Core Competencies Vision Leadership Influencing Skills Team Work Conceptual & Strategic Thinking Customer Focus Written/Oral Communication Interpersonal Effectiveness Financial/ Budgetary
  • 9. Important Security Leadership Skills Source: Fitzgerald/Krause CISO Survey, CISO Leadership Skills, 2008 ISC2 Press Self Confidence 65% Oral Communications 74% Written Communications 74% Influence 69% Teamwork 68%
  • 10. ► Technical challenge ► Concrete non-ambiguous solutions ► Task-oriented ► Mastery of technical skill ► Hands-on training focus ► Documentation aversion ► High level of individual contribution ► Meetings are distractions Career Path Decision Point: Techie or CISO Differences In Thought Processes   Technical Expert Chief Information Security Officer Technical
  • 11. ► Business relationships ► People-oriented/Conflict Resolution ► Consensus building ► Many presentations ► Influence ► Team building ► Accepting ambiguity and uncertainty ► Meetings, meetings, Meetings! ► Oral communication with all organizational levels Career Path Decision Point: Techie or CISO Differences In Thought Processes ?   Technical Expert Chief Information Security Officer Managerial
  • 12. ► Balances needs of the business with ► Increased regulated controls ► Increased complexity ► Translates “technical speak” ► Has a solid background ► 5-7 Years Information Security ► Additional IT Background ► Thinks strategically, Politically Savvy ► Knowledgeable of key aspects of business ► Possesses certification Gartner Research Says The CISO… Source: Emerging Role and Skills For the CISO Gartner Report