SlideShare a Scribd company logo
1 
Mission Critical Global 
Technology Group 
(MCGlobalTech) 
Information Security 
Continuous Monitoring 
Within A 
Risk Management Framework
2 
Why Federal Information Security is Evolving 
Foreign Intelligence organizations trying 
to hack into our military’s 100 digital networks 
10 Million Cyber attacks daily at Department of Energy 
400%+ Increase of cyber attacks since 2006 
80% Attacks leveraging known vulnerabilities & 
configuration setting weaknesses
3 
Why Federal Information Security is Evolving 
Security Incidents are 
increasing. 
IT Environments are in 
constant change. 
Risks need to be 
continuously assessed.
4 
Organization Wide Risk Monitoring
5 
Risk Management Framework (ISCM View)
6 
Information Security Continuous Monitoring Strategy
7 
Information Security Continuous Monitoring Steps 
Step 1 - Define Strategy: 
Effective ISCM begins with the development of a addressed the ISCM 
requirements and activities at each organizational tier; (Tier 1, Tier 2, Tier 3) 
• Tier 1 – The risk mitigation strategy; executives must determine the 
overall organizational risk tolerance and risk 
• Tier 2 – Information generated from Tier 1 (Governance, Policy, Risk 
Tolerance, Strategy, etc.) is communicated to staff / business units 
owner, and process owner, to enable the reflect and implementation of 
the ISCM strategy in there is system and processes; 
• Tier 3 – The ISCM is implemented to support risk management and risk 
tolerance at all three tier.
8 
Information Security Continuous Monitoring Steps 
Step 2 – Establish Measures and Metrics: 
• Goals, detect security anomalies, changes in IT operations, Information 
Systems, vulnerabilities awareness, control effectiveness, security 
status; control ongoing risk to the organization; 
Step 3 – Establish Monitoring and Assessment Frequencies: 
• Organization determine the frequencies each security control is 
assessed. The data generated with different latencies is used to create a 
holistic view of the security disposition 
Step 4 – Implementing the ISCM Program 
• Data is collected for predefined metrics, security control assessments 
are conducted, and this information is reported and used in accordance 
with organizational policies and procedures;
9 
Information Security Continuous Monitoring Steps 
Step 5 – Analyze Data and Report Findings: 
• Organization must develop procedures for analyzing and reporting 
assessment and monitoring results. This will includes the content and 
format of reports, frequency of reports, tools that are used, and most 
importantly requirements for analyzing and reporting the results of 
controls; 
• Organizational officials should review the analyzed reports to determine 
whether to conducts mitigations activities or to transfer, avoid / reject or 
accept the risk; 
Step 6 – Respond to Findings: 
• Repose to findings at all tiers may include risk mitigation, risk 
acceptance, risk avoidance, or risk sharing in accordance with 
organizational tolerance.
10 
Information Security Continuous Monitoring Steps 
Step 7 – Review and Update Program: 
• Security controls assessments, security status metrics, and monitoring 
frequencies change according to the needs of the organization; 
• The ISCM strategy should be reviewed to ensure it is sufficiently 
supports the organization and is operating within acceptable risk 
tolerance levels; that metrics remain relevant, and data is current and 
complete.
11 
ISCM Recommendations for The Leadership Team 
Recommendations on ISCM for Leadership: 
• Anchor to a specific risk framework or approach (i.e., NIST 800-137) 
• Develop risk ranking / scoring methods; 
• Prioritizes security projects, actions, and investments according to risk 
rank; 
• Maintain situational awareness of all information systems and functions 
across the organization; 
• Support a clear view and understanding of threat activities; 
• Continuously re-evaluate security controls, frequencies, and security 
program; 
• Collect and analyze meaningful information security related data; 
• Communication Security status across all tiers of the organization; 
• Organization executives must have an active role in risk management;
12 
Executive Summary 
• The combination of preventive and detective monitoring controls is important 
in building an effective continuous monitoring program; 
• The successful implementation of a continuous monitoring program will 
require common commitment through leadership support, authorizing official 
enforcement, and system owner responsibility; 
• A well designed and implemented continuous monitoring program can 
improve the quality of agency information security programs by providing 
management with current, meaningful information on the security posture of 
their IT assets;
13 
Contact Information 
Mission Critical Global Technology Group 
1776 I Street, NW 
9th Floor 
Washington, District of Columbia 20006 
Phone: 571-249-3932 
Email: Info@mcglobaltech.com 
William McBorrough Morris Cody 
Managing Principal Managing Principal 
wjm4@mcglobaltech.com mcody@mcglobaltech.com

More Related Content

PPTX
Developing a Continuous Monitoring Action Plan
PDF
Understanding the Risk Management Framework & (ISC)2 CAP Module 4: Life Cycle
PDF
SuprTEK Continuous Monitoring
PPTX
Continuous Monitoring: Getting Past Complexity & Reducing Risk
PPTX
RMF Roles and Responsibilities (Part 1)
PPTX
INFOSECFORCE Risk Management Framework Transition Plan
PDF
Guide for Applying The Risk Management Framework to Federal Information Systems
PDF
Understanding the Risk Management Framework & (ISC)2 CAP Module 1: Exam
Developing a Continuous Monitoring Action Plan
Understanding the Risk Management Framework & (ISC)2 CAP Module 4: Life Cycle
SuprTEK Continuous Monitoring
Continuous Monitoring: Getting Past Complexity & Reducing Risk
RMF Roles and Responsibilities (Part 1)
INFOSECFORCE Risk Management Framework Transition Plan
Guide for Applying The Risk Management Framework to Federal Information Systems
Understanding the Risk Management Framework & (ISC)2 CAP Module 1: Exam

What's hot (20)

PDF
Understanding the Risk Management Framework & (ISC)2 CAP Module 9: Assess Con...
PPTX
Achieving Continuous Monitoring with Security Automation
PDF
Understanding the Risk Management Framework & (ISC)2 CAP Module 2: Introduction
PDF
Understanding the Risk Management Framework & (ISC)2 CAP Module 3: Roles
PDF
Understanding the Risk Management Framework & (ISC)2 CAP Module 10: Authorize
PDF
Understanding the Risk Management Framework & (ISC)2 CAP Module 8: Implement ...
PDF
Understanding the Risk Management Framework & (ISC)2 CAP Module 13: Contingen...
PDF
Understanding the Risk Management Framework & (ISC)2 CAP Module 11: Monitor
PPTX
Introduction to NIST’s Risk Management Framework (RMF)
PPT
NIST 800-37 Certification & Accreditation Process
PDF
Understanding the Risk Management Framework & (ISC)2 CAP Module 7: Select Con...
PPTX
FISMA NextGen - Continuous Monitoring, Near Real-Time Risk Management
PDF
Understanding the Risk Management Framework & (ISC)2 CAP Module 6: Categorize
PDF
Understanding the NIST Risk Management Framework: 800-37 Rev. 2
PPTX
"Backoff" Malware: How to Know If You're Infected
PPTX
It security controls, plans, and procedures
 
PPTX
IS audit checklist
PPTX
System Security Plans 101
PPTX
Continual Monitoring
PPSX
NIST presentation on RMF 2.0 / SP 800-37 rev. 2
Understanding the Risk Management Framework & (ISC)2 CAP Module 9: Assess Con...
Achieving Continuous Monitoring with Security Automation
Understanding the Risk Management Framework & (ISC)2 CAP Module 2: Introduction
Understanding the Risk Management Framework & (ISC)2 CAP Module 3: Roles
Understanding the Risk Management Framework & (ISC)2 CAP Module 10: Authorize
Understanding the Risk Management Framework & (ISC)2 CAP Module 8: Implement ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 13: Contingen...
Understanding the Risk Management Framework & (ISC)2 CAP Module 11: Monitor
Introduction to NIST’s Risk Management Framework (RMF)
NIST 800-37 Certification & Accreditation Process
Understanding the Risk Management Framework & (ISC)2 CAP Module 7: Select Con...
FISMA NextGen - Continuous Monitoring, Near Real-Time Risk Management
Understanding the Risk Management Framework & (ISC)2 CAP Module 6: Categorize
Understanding the NIST Risk Management Framework: 800-37 Rev. 2
"Backoff" Malware: How to Know If You're Infected
It security controls, plans, and procedures
 
IS audit checklist
System Security Plans 101
Continual Monitoring
NIST presentation on RMF 2.0 / SP 800-37 rev. 2
Ad

Similar to Information Security Continuous Monitoring within a Risk Management Framework (20)

DOCX
E’s Data Security Company Strategic Security Plan – 2015.docx
DOCX
Example of fisma compliance analysis.1
PPTX
Step by-step for risk analysis and management-yaser aljohani
PPTX
Step by-step for risk analysis and management-yaser aljohani
PDF
Cyber Security Risk Mitigation Checklist
PPTX
L1_Introduction.pptx
PPT
Risk Based Security and Self Protection Powerpoint
PDF
Solve the exercise in security management.pdf
PPTX
800-30.pptx
PPTX
Assuring Digital Strategic Initiatives by
PDF
Threat and Vulnerability Management https://www.omexsecurity.com/
PPT
Chapter003
PPT
Security Manager - Slides - Module 10.ppt
PPT
Security Manager - Slides - Module 4 Powerpoint Presentation
PPT
Security Manager - Slides - Module 4 Powerpoint Presentation
PPT
Security Manager - Slides - Module 4 Powerpoint Presentation
PPTX
Planning for security and security audit process
PDF
IIA GAM CS 8-5: Audit and Control of Continuous Monitoring Programs and Artif...
PDF
CS 8-5_Audit and Control of Continuous Monitoring Programs and Artificial Int...
PDF
Applying Lean for information security operations centre
E’s Data Security Company Strategic Security Plan – 2015.docx
Example of fisma compliance analysis.1
Step by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohani
Cyber Security Risk Mitigation Checklist
L1_Introduction.pptx
Risk Based Security and Self Protection Powerpoint
Solve the exercise in security management.pdf
800-30.pptx
Assuring Digital Strategic Initiatives by
Threat and Vulnerability Management https://www.omexsecurity.com/
Chapter003
Security Manager - Slides - Module 10.ppt
Security Manager - Slides - Module 4 Powerpoint Presentation
Security Manager - Slides - Module 4 Powerpoint Presentation
Security Manager - Slides - Module 4 Powerpoint Presentation
Planning for security and security audit process
IIA GAM CS 8-5: Audit and Control of Continuous Monitoring Programs and Artif...
CS 8-5_Audit and Control of Continuous Monitoring Programs and Artificial Int...
Applying Lean for information security operations centre
Ad

More from William McBorrough (20)

PPTX
MCGlobalTech CMMC Managed Compliance Service
PDF
MCGlobalTech Managed Security Compliance Program
PDF
MCGlobalTech Cyber Capability Statement
PPTX
Cybersecurity Career Information by Next Gen Cyber
PDF
Improving Cyber Readiness with the NIST Cybersecurity Framework
PPTX
MCG Cybersecurity Webinar Series - Risk Management
PPTX
MCG Cybersecurity Webinar Series - Risk Management
PDF
MCGlobalTech Commercial Cybersecurity Capability Statement
PPTX
MCGlobalTech Consulting Service Presentation
PPTX
MCGlobalTech Enterprise Risk Management Program
PDF
MCGlobalTech Cyber Capability Statement_Final
PDF
MCG_OnePageBrochure_Final
PPTX
MCGlobalTech Service Presentation
PDF
MCGlobalTech Capability Statement
PPTX
Managing Security Risks in Manufacturing
PPTX
Cyber Crime Threat Landscape - A Focus on the Financial Industry
PPT
Protecting Customer Confidential Information
PPTX
Need for Improved Critical Industrial Infrastructure Protection
PDF
Need for Improved Critical Industrial Infrastructure Protection
PDF
No National 'Stand Your Cyberground' Law Please
MCGlobalTech CMMC Managed Compliance Service
MCGlobalTech Managed Security Compliance Program
MCGlobalTech Cyber Capability Statement
Cybersecurity Career Information by Next Gen Cyber
Improving Cyber Readiness with the NIST Cybersecurity Framework
MCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk Management
MCGlobalTech Commercial Cybersecurity Capability Statement
MCGlobalTech Consulting Service Presentation
MCGlobalTech Enterprise Risk Management Program
MCGlobalTech Cyber Capability Statement_Final
MCG_OnePageBrochure_Final
MCGlobalTech Service Presentation
MCGlobalTech Capability Statement
Managing Security Risks in Manufacturing
Cyber Crime Threat Landscape - A Focus on the Financial Industry
Protecting Customer Confidential Information
Need for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure Protection
No National 'Stand Your Cyberground' Law Please

Recently uploaded (20)

PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Electronic commerce courselecture one. Pdf
PPT
Teaching material agriculture food technology
PPTX
Cloud computing and distributed systems.
PPTX
Big Data Technologies - Introduction.pptx
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Approach and Philosophy of On baking technology
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
cuic standard and advanced reporting.pdf
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
NewMind AI Monthly Chronicles - July 2025
Chapter 3 Spatial Domain Image Processing.pdf
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Electronic commerce courselecture one. Pdf
Teaching material agriculture food technology
Cloud computing and distributed systems.
Big Data Technologies - Introduction.pptx
Agricultural_Statistics_at_a_Glance_2022_0.pdf
The Rise and Fall of 3GPP – Time for a Sabbatical?
Approach and Philosophy of On baking technology
Diabetes mellitus diagnosis method based random forest with bat algorithm
Reach Out and Touch Someone: Haptics and Empathic Computing
Network Security Unit 5.pdf for BCA BBA.
cuic standard and advanced reporting.pdf
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Per capita expenditure prediction using model stacking based on satellite ima...
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Encapsulation_ Review paper, used for researhc scholars
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
How UI/UX Design Impacts User Retention in Mobile Apps.pdf

Information Security Continuous Monitoring within a Risk Management Framework

  • 1. 1 Mission Critical Global Technology Group (MCGlobalTech) Information Security Continuous Monitoring Within A Risk Management Framework
  • 2. 2 Why Federal Information Security is Evolving Foreign Intelligence organizations trying to hack into our military’s 100 digital networks 10 Million Cyber attacks daily at Department of Energy 400%+ Increase of cyber attacks since 2006 80% Attacks leveraging known vulnerabilities & configuration setting weaknesses
  • 3. 3 Why Federal Information Security is Evolving Security Incidents are increasing. IT Environments are in constant change. Risks need to be continuously assessed.
  • 4. 4 Organization Wide Risk Monitoring
  • 5. 5 Risk Management Framework (ISCM View)
  • 6. 6 Information Security Continuous Monitoring Strategy
  • 7. 7 Information Security Continuous Monitoring Steps Step 1 - Define Strategy: Effective ISCM begins with the development of a addressed the ISCM requirements and activities at each organizational tier; (Tier 1, Tier 2, Tier 3) • Tier 1 – The risk mitigation strategy; executives must determine the overall organizational risk tolerance and risk • Tier 2 – Information generated from Tier 1 (Governance, Policy, Risk Tolerance, Strategy, etc.) is communicated to staff / business units owner, and process owner, to enable the reflect and implementation of the ISCM strategy in there is system and processes; • Tier 3 – The ISCM is implemented to support risk management and risk tolerance at all three tier.
  • 8. 8 Information Security Continuous Monitoring Steps Step 2 – Establish Measures and Metrics: • Goals, detect security anomalies, changes in IT operations, Information Systems, vulnerabilities awareness, control effectiveness, security status; control ongoing risk to the organization; Step 3 – Establish Monitoring and Assessment Frequencies: • Organization determine the frequencies each security control is assessed. The data generated with different latencies is used to create a holistic view of the security disposition Step 4 – Implementing the ISCM Program • Data is collected for predefined metrics, security control assessments are conducted, and this information is reported and used in accordance with organizational policies and procedures;
  • 9. 9 Information Security Continuous Monitoring Steps Step 5 – Analyze Data and Report Findings: • Organization must develop procedures for analyzing and reporting assessment and monitoring results. This will includes the content and format of reports, frequency of reports, tools that are used, and most importantly requirements for analyzing and reporting the results of controls; • Organizational officials should review the analyzed reports to determine whether to conducts mitigations activities or to transfer, avoid / reject or accept the risk; Step 6 – Respond to Findings: • Repose to findings at all tiers may include risk mitigation, risk acceptance, risk avoidance, or risk sharing in accordance with organizational tolerance.
  • 10. 10 Information Security Continuous Monitoring Steps Step 7 – Review and Update Program: • Security controls assessments, security status metrics, and monitoring frequencies change according to the needs of the organization; • The ISCM strategy should be reviewed to ensure it is sufficiently supports the organization and is operating within acceptable risk tolerance levels; that metrics remain relevant, and data is current and complete.
  • 11. 11 ISCM Recommendations for The Leadership Team Recommendations on ISCM for Leadership: • Anchor to a specific risk framework or approach (i.e., NIST 800-137) • Develop risk ranking / scoring methods; • Prioritizes security projects, actions, and investments according to risk rank; • Maintain situational awareness of all information systems and functions across the organization; • Support a clear view and understanding of threat activities; • Continuously re-evaluate security controls, frequencies, and security program; • Collect and analyze meaningful information security related data; • Communication Security status across all tiers of the organization; • Organization executives must have an active role in risk management;
  • 12. 12 Executive Summary • The combination of preventive and detective monitoring controls is important in building an effective continuous monitoring program; • The successful implementation of a continuous monitoring program will require common commitment through leadership support, authorizing official enforcement, and system owner responsibility; • A well designed and implemented continuous monitoring program can improve the quality of agency information security programs by providing management with current, meaningful information on the security posture of their IT assets;
  • 13. 13 Contact Information Mission Critical Global Technology Group 1776 I Street, NW 9th Floor Washington, District of Columbia 20006 Phone: 571-249-3932 Email: Info@mcglobaltech.com William McBorrough Morris Cody Managing Principal Managing Principal wjm4@mcglobaltech.com mcody@mcglobaltech.com