SlideShare a Scribd company logo
My experience as CISO
@marcvael March 2021
My experience as CISO
managing information security
Marc Vael
Tuesday 23rd of March 2021
How to become a CISO
1. Self-analysis
My experience as CISO
@marcvael March 2021
How to become a CISO
1. Self-analysis
How to become a CISO
2. Education
My experience as CISO
@marcvael March 2021
How to become a CISO
2. Education
How to become a CISO
3. Career path
My experience as CISO
@marcvael March 2021
How to become a CISO
4. Professional certifications
My experience as CISO
@marcvael March 2021
How to become a CISO
4. Professional certifications
2004
2003
1994
My experience as CISO
@marcvael March 2021
Information Security Governance
Establish and/or maintain
an information security governance
framework & supporting processes
to ensure that
the information security strategy is aligned
with organizational goals & objectives.
Information Risk Management
Manage
information risk
to an acceptable level
based on risk appetite
in order to meet
organizational goals & objectives.
My experience as CISO
@marcvael March 2021
Information Security Program
Development & Management
Develop & maintain
an information security program that
identifies, manages and protects
the organization’s assets while aligning
to information security strategy & business
goals, thereby
supporting an effective security posture.
Information Security Incident Management
Plan, establish and manage
the capability
to detect, investigate, respond to and
recover from
information security incidents
to minimize business impact.
My experience as CISO
@marcvael March 2021
Information Security Management
Security
Operations
Security
Governance / Risk
Security
Business Support
IT
Compliance
Implement & improve foundational principles
for securing Esko IT infrastructure
Implement & improve processes
for mature information security governance & risk within Esko
Create & improve standard work
for Esko business security
Integrate Esko IT compliance by design
in terms of Information Security (& Privacy)
Security
Innovation
Integrate Information Security
into new innovative Esko (IT) solutions
Security
Incidents
Identify, Protect, Detect, Respond to and Recover from
Information Security Incidents
How to become a CISO
5. Keep current
My experience as CISO
@marcvael March 2021
Chief Information Security Officer
Success formula:
4C x 3I x 2S x O
4C = Complexity + Culture + Communication + Collaboration
3I = Information + Interconnectiveness + Initiative
2S = Strategy + Security
O = Optimization
Stephane Nappo, VP & Global CISO, Groupe SEB
My experience as CISO
@marcvael March 2021
Contact details
Mr. Marc Vael, CISM, CISSP, CRISC, CGEIT, ITIL SM, Guberna Certified Director
CISO President
Esko SAI
marc.vael@sai.be
http://www.linkedin.com/in/marcvael
@marcvael
My experience as CISO
@marcvael March 2021
Backup Slides CISM
Information Security Governance
1) Establish and/or maintain an information security strategy in alignment with organizational goals and
objectives to guide the establishment and/or ongoing management of the information security
program.
2) Establish and/or maintain an information security governance framework to guide activities that
support the information security strategy.
3) Integrate information security governance into corporate governance to ensure that organizational
goals and objectives are supported by the information security program.
4) Establish and maintain information security policies to guide the development of standards, procedures
and guidelines in alignment with enterprise goals and objectives.
5) Develop business cases to support investments in information security.
6) Identify internal and external influences to the organization (e.g., emerging technologies, social media,
business environment, risk tolerance, regulatory requirements, third-party considerations, threat
landscape) to ensure that these factors are continually addressed by the information security strategy.
7) Gain ongoing commitment from senior leadership and other stakeholders to support the successful
implementation of the information security strategy.
8) Define, communicate, and monitor information security responsibilities throughout the organization
(e.g., data owners, data custodians, end-users, privileged or high-risk users) and lines of authority.
9) Establish, monitor, evaluate and report key information security metrics to provide management with
accurate and meaningful information regarding the effectiveness of the information security strategy.
My experience as CISO
@marcvael March 2021
Information Risk Management
1) Establish and/or maintain a process for information asset classification to ensure that measures taken to
protect assets are proportional to their business value.
2) Identify legal, regulatory, organizational and other applicable requirements to manage the risk of
noncompliance to acceptable levels.
3) Ensure that risk assessments, vulnerability assessments and threat analyses are conducted consistently,
at appropriate times, and to identify and assess risk to the organization’s information.
4) Identify, recommend or implement appropriate risk treatment/response options to manage risk to
acceptable levels based on organizational risk appetite.
5) Determine whether information security controls are appropriate and effectively manage risk to an
acceptable level.
6) Facilitate the integration of information risk management into business and IT processes (e.g., systems
development, procurement, project management) to enable a consistent and comprehensive
information risk management program across the organization.
7) Monitor for internal and external factors (e.g., key risk indicators [KRIs], threat landscape, geopolitical,
regulatory change) that may require reassessment of risk to ensure that changes to existing, or new, risk
scenarios are identified and managed appropriately.
8) Report noncompliance and other changes in information risk to facilitate the risk management decision-
making process.
9) Ensure that information security risk is reported to senior management to support an understanding of
potential impact on the organizational goals and objectives.
Information Security Program
Development & Management
1) Establish and/or maintain the information security program in alignment with the information security strategy.
2) Align the information security program with the operational objectives of other business functions (e.g., human resources
[HR], accounting, procurement and IT) to ensure that the information security program adds value to and protects the
business.
3) Identify, acquire and manage requirements for internal and external resources to execute the information security
program.
4) Establish and maintain information security processes and resources (including people and technologies) to execute the
information security program in alignment with the organization’s business goals.
5) Establish, communicate and maintain organizational information security standards, guidelines, procedures and other
documentation to guide and enforce compliance with information security policies.
6) Establish, promote and maintain a program for information security awareness and training to foster an effective security
culture.
7) Integrate information security requirements into organizational processes (e.g., change control, mergers and acquisitions,
system development, business continuity, disaster recovery) to maintain the organization’s security strategy.
8) Integrate information security requirements into contracts and activities of third parties (e.g., joint ventures, outsourced
providers, business partners, customers) and monitor adherence to established requirements in order to maintain the
organization’s security strategy.
9) Establish, monitor and analyze program management and operational metrics to evaluate the effectiveness and efficiency
of the information security program.
10) Compile and present reports to key stakeholders on the activities, trends and overall effectiveness of the IS program and
the underlying business processes in order to communicate security performance.
My experience as CISO
@marcvael March 2021
Information Security Incident Management
1) Establish and maintain an organizational definition of, and severity hierarchy for, information security
incidents to allow accurate classification and categorization of and response to incidents.
2) Establish and maintain an incident response plan to ensure an effective and timely response to information
security incidents.
3) Develop and implement processes to ensure the timely identification of information security incidents that
could impact the business.
4) Establish and maintain processes to investigate and document information security incidents in order to
determine the appropriate response and cause while adhering to legal, regulatory and organizational
requirements.
5) Establish and maintain incident notification and escalation processes to ensure that the appropriate
stakeholders are involved in incident response management.
6) Organize, train and equip incident response teams to respond to information security incidents in an effective
and timely manner.
7) Test, review and revise (as applicable) the incident response plan periodically to ensure an effective response
to information security incidents and to improve response capabilities.
8) Establish and maintain communication plans and processes to manage communication with internal and
external entities.
9) Conduct post-incident reviews to determine the root cause of information security incidents, develop
corrective actions, reassess risk, evaluate response effectiveness and take appropriate remedial actions.
10) Establish and maintain integration among the incident response plan, business continuity plan and disaster
recovery plan.

More Related Content

PDF
Zlatibor risk based balancing of organizational and technical controls for ...
PPTX
Information security management (bel g. ragad)
PPSX
Information Security Governance: Concepts, Security Management & Metrics
PDF
Security-Brochure
PDF
Security-Brochure
PPT
information security management
PDF
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
DOCX
Information Systems Security & Strategy
Zlatibor risk based balancing of organizational and technical controls for ...
Information security management (bel g. ragad)
Information Security Governance: Concepts, Security Management & Metrics
Security-Brochure
Security-Brochure
information security management
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
Information Systems Security & Strategy

What's hot (16)

PPTX
PDF
Agiliance Wp Hipaa
PPT
Supplement To Student Guide Seminar 03 A 3 Nov09
PDF
IT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAE
PPT
Implementing Business Aligned Security Strategy Dane Warren Li
PDF
Security Risk Management: ovvero come mitigare e gestire i rischi dei dati at...
PPT
Information security
PDF
Connection can help keep your business secure!
PDF
ISO.IEC_27001-27002-2013 Topology
PDF
IT Security Architecture & Leadership, 24 - 27 November 2013 Dubai UAE
PPT
Developing A Risk Based Information Security Program
DOCX
INFOSECFORCE llc security services
DOCX
Infosecforce security services
PDF
Winning the war on data breaches in a changing data landscape
PPTX
Preparing for the Inevitable
PPTX
Information security: importance of having defined policy & process
Agiliance Wp Hipaa
Supplement To Student Guide Seminar 03 A 3 Nov09
IT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAE
Implementing Business Aligned Security Strategy Dane Warren Li
Security Risk Management: ovvero come mitigare e gestire i rischi dei dati at...
Information security
Connection can help keep your business secure!
ISO.IEC_27001-27002-2013 Topology
IT Security Architecture & Leadership, 24 - 27 November 2013 Dubai UAE
Developing A Risk Based Information Security Program
INFOSECFORCE llc security services
Infosecforce security services
Winning the war on data breaches in a changing data landscape
Preparing for the Inevitable
Information security: importance of having defined policy & process
Ad

Similar to my experience as ciso (20)

PDF
Solve the exercise in security management.pdf
PDF
CCISO_Certification_Training_Course-Outline.pdf
PPSX
PB CV v0.4
PPTX
Planning for security and security audit process
PDF
Mastering Cybersecurity Risk Management: Strategies to Safeguard Your Digital...
PPTX
Information Security Governance and Strategy - 3
PDF
NCSC-Cyber-securitydhhdhhhfhfhfhfhfhfhfhfhf
PDF
Improving Cyber Readiness with the NIST Cybersecurity Framework
PDF
Bim tek 15 juni 2017 konsep iso27000-2016 smki
PPT
Developing an Information Security Program
PPTX
Security Plans & Policies in Cybersecurity.pptx
PDF
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
PPTX
Cissp- Security and Risk Management
PDF
Cyber Security Risk Mitigation Checklist
PPTX
Build an Information Security Strategy
PPTX
CISSP- Security & Risk Management-Domain 1 Overview-Edited.pptx
PDF
Chapter 1-3 - Information Assurance Basics.pptx.pdf
PDF
Protecting business interests with policies for it asset management it-tool...
PPTX
Build and Information Security Strategy
PDF
Fissea09 mgupta-day3-panel process-program-build-effective-training
Solve the exercise in security management.pdf
CCISO_Certification_Training_Course-Outline.pdf
PB CV v0.4
Planning for security and security audit process
Mastering Cybersecurity Risk Management: Strategies to Safeguard Your Digital...
Information Security Governance and Strategy - 3
NCSC-Cyber-securitydhhdhhhfhfhfhfhfhfhfhfhf
Improving Cyber Readiness with the NIST Cybersecurity Framework
Bim tek 15 juni 2017 konsep iso27000-2016 smki
Developing an Information Security Program
Security Plans & Policies in Cybersecurity.pptx
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
Cissp- Security and Risk Management
Cyber Security Risk Mitigation Checklist
Build an Information Security Strategy
CISSP- Security & Risk Management-Domain 1 Overview-Edited.pptx
Chapter 1-3 - Information Assurance Basics.pptx.pdf
Protecting business interests with policies for it asset management it-tool...
Build and Information Security Strategy
Fissea09 mgupta-day3-panel process-program-build-effective-training
Ad

More from Marc Vael (20)

PDF
How secure are chat and webconf tools
PDF
Advantages of privacy by design in IoE
PDF
Cybersecurity governance existing frameworks (nov 2015)
PDF
Cybersecurity nexus vision
PDF
ISACA Reporting relevant IT risks to stakeholders
PDF
Cloud security lessons learned and audit
PDF
Value-added it auditing
PDF
ISACA Internet of Things open forum presentation
PDF
hoe kan u vandaag informatie veiligheid realiseren op een praktische manier?
PDF
The value of big data analytics
PDF
Social media risks and controls
PDF
The view of auditor on cybercrime
PDF
ISACA Mobile Payments Forum presentation
PDF
Belgian Data Protection Commission's new audit programme
PDF
ISACA Cloud Computing Risks
PDF
Information security awareness (sept 2012) bis handout
PPTX
ISACA smart security for smart devices
PPTX
Securing big data (july 2012)
PDF
Valuendo cyberwar and security (jan 2012) handout
PDF
How to handle multilayered IT security today
How secure are chat and webconf tools
Advantages of privacy by design in IoE
Cybersecurity governance existing frameworks (nov 2015)
Cybersecurity nexus vision
ISACA Reporting relevant IT risks to stakeholders
Cloud security lessons learned and audit
Value-added it auditing
ISACA Internet of Things open forum presentation
hoe kan u vandaag informatie veiligheid realiseren op een praktische manier?
The value of big data analytics
Social media risks and controls
The view of auditor on cybercrime
ISACA Mobile Payments Forum presentation
Belgian Data Protection Commission's new audit programme
ISACA Cloud Computing Risks
Information security awareness (sept 2012) bis handout
ISACA smart security for smart devices
Securing big data (july 2012)
Valuendo cyberwar and security (jan 2012) handout
How to handle multilayered IT security today

Recently uploaded (20)

PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Electronic commerce courselecture one. Pdf
PDF
Machine learning based COVID-19 study performance prediction
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Encapsulation_ Review paper, used for researhc scholars
PPT
Teaching material agriculture food technology
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
Big Data Technologies - Introduction.pptx
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
MIND Revenue Release Quarter 2 2025 Press Release
Electronic commerce courselecture one. Pdf
Machine learning based COVID-19 study performance prediction
Programs and apps: productivity, graphics, security and other tools
Encapsulation_ Review paper, used for researhc scholars
Teaching material agriculture food technology
Building Integrated photovoltaic BIPV_UPV.pdf
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Reach Out and Touch Someone: Haptics and Empathic Computing
Chapter 3 Spatial Domain Image Processing.pdf
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Network Security Unit 5.pdf for BCA BBA.
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Big Data Technologies - Introduction.pptx
Understanding_Digital_Forensics_Presentation.pptx
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Review of recent advances in non-invasive hemoglobin estimation
Mobile App Security Testing_ A Comprehensive Guide.pdf

my experience as ciso

  • 1. My experience as CISO @marcvael March 2021 My experience as CISO managing information security Marc Vael Tuesday 23rd of March 2021 How to become a CISO 1. Self-analysis
  • 2. My experience as CISO @marcvael March 2021 How to become a CISO 1. Self-analysis How to become a CISO 2. Education
  • 3. My experience as CISO @marcvael March 2021 How to become a CISO 2. Education How to become a CISO 3. Career path
  • 4. My experience as CISO @marcvael March 2021 How to become a CISO 4. Professional certifications
  • 5. My experience as CISO @marcvael March 2021 How to become a CISO 4. Professional certifications 2004 2003 1994
  • 6. My experience as CISO @marcvael March 2021 Information Security Governance Establish and/or maintain an information security governance framework & supporting processes to ensure that the information security strategy is aligned with organizational goals & objectives. Information Risk Management Manage information risk to an acceptable level based on risk appetite in order to meet organizational goals & objectives.
  • 7. My experience as CISO @marcvael March 2021 Information Security Program Development & Management Develop & maintain an information security program that identifies, manages and protects the organization’s assets while aligning to information security strategy & business goals, thereby supporting an effective security posture. Information Security Incident Management Plan, establish and manage the capability to detect, investigate, respond to and recover from information security incidents to minimize business impact.
  • 8. My experience as CISO @marcvael March 2021 Information Security Management Security Operations Security Governance / Risk Security Business Support IT Compliance Implement & improve foundational principles for securing Esko IT infrastructure Implement & improve processes for mature information security governance & risk within Esko Create & improve standard work for Esko business security Integrate Esko IT compliance by design in terms of Information Security (& Privacy) Security Innovation Integrate Information Security into new innovative Esko (IT) solutions Security Incidents Identify, Protect, Detect, Respond to and Recover from Information Security Incidents How to become a CISO 5. Keep current
  • 9. My experience as CISO @marcvael March 2021 Chief Information Security Officer Success formula: 4C x 3I x 2S x O 4C = Complexity + Culture + Communication + Collaboration 3I = Information + Interconnectiveness + Initiative 2S = Strategy + Security O = Optimization Stephane Nappo, VP & Global CISO, Groupe SEB
  • 10. My experience as CISO @marcvael March 2021 Contact details Mr. Marc Vael, CISM, CISSP, CRISC, CGEIT, ITIL SM, Guberna Certified Director CISO President Esko SAI marc.vael@sai.be http://www.linkedin.com/in/marcvael @marcvael
  • 11. My experience as CISO @marcvael March 2021 Backup Slides CISM Information Security Governance 1) Establish and/or maintain an information security strategy in alignment with organizational goals and objectives to guide the establishment and/or ongoing management of the information security program. 2) Establish and/or maintain an information security governance framework to guide activities that support the information security strategy. 3) Integrate information security governance into corporate governance to ensure that organizational goals and objectives are supported by the information security program. 4) Establish and maintain information security policies to guide the development of standards, procedures and guidelines in alignment with enterprise goals and objectives. 5) Develop business cases to support investments in information security. 6) Identify internal and external influences to the organization (e.g., emerging technologies, social media, business environment, risk tolerance, regulatory requirements, third-party considerations, threat landscape) to ensure that these factors are continually addressed by the information security strategy. 7) Gain ongoing commitment from senior leadership and other stakeholders to support the successful implementation of the information security strategy. 8) Define, communicate, and monitor information security responsibilities throughout the organization (e.g., data owners, data custodians, end-users, privileged or high-risk users) and lines of authority. 9) Establish, monitor, evaluate and report key information security metrics to provide management with accurate and meaningful information regarding the effectiveness of the information security strategy.
  • 12. My experience as CISO @marcvael March 2021 Information Risk Management 1) Establish and/or maintain a process for information asset classification to ensure that measures taken to protect assets are proportional to their business value. 2) Identify legal, regulatory, organizational and other applicable requirements to manage the risk of noncompliance to acceptable levels. 3) Ensure that risk assessments, vulnerability assessments and threat analyses are conducted consistently, at appropriate times, and to identify and assess risk to the organization’s information. 4) Identify, recommend or implement appropriate risk treatment/response options to manage risk to acceptable levels based on organizational risk appetite. 5) Determine whether information security controls are appropriate and effectively manage risk to an acceptable level. 6) Facilitate the integration of information risk management into business and IT processes (e.g., systems development, procurement, project management) to enable a consistent and comprehensive information risk management program across the organization. 7) Monitor for internal and external factors (e.g., key risk indicators [KRIs], threat landscape, geopolitical, regulatory change) that may require reassessment of risk to ensure that changes to existing, or new, risk scenarios are identified and managed appropriately. 8) Report noncompliance and other changes in information risk to facilitate the risk management decision- making process. 9) Ensure that information security risk is reported to senior management to support an understanding of potential impact on the organizational goals and objectives. Information Security Program Development & Management 1) Establish and/or maintain the information security program in alignment with the information security strategy. 2) Align the information security program with the operational objectives of other business functions (e.g., human resources [HR], accounting, procurement and IT) to ensure that the information security program adds value to and protects the business. 3) Identify, acquire and manage requirements for internal and external resources to execute the information security program. 4) Establish and maintain information security processes and resources (including people and technologies) to execute the information security program in alignment with the organization’s business goals. 5) Establish, communicate and maintain organizational information security standards, guidelines, procedures and other documentation to guide and enforce compliance with information security policies. 6) Establish, promote and maintain a program for information security awareness and training to foster an effective security culture. 7) Integrate information security requirements into organizational processes (e.g., change control, mergers and acquisitions, system development, business continuity, disaster recovery) to maintain the organization’s security strategy. 8) Integrate information security requirements into contracts and activities of third parties (e.g., joint ventures, outsourced providers, business partners, customers) and monitor adherence to established requirements in order to maintain the organization’s security strategy. 9) Establish, monitor and analyze program management and operational metrics to evaluate the effectiveness and efficiency of the information security program. 10) Compile and present reports to key stakeholders on the activities, trends and overall effectiveness of the IS program and the underlying business processes in order to communicate security performance.
  • 13. My experience as CISO @marcvael March 2021 Information Security Incident Management 1) Establish and maintain an organizational definition of, and severity hierarchy for, information security incidents to allow accurate classification and categorization of and response to incidents. 2) Establish and maintain an incident response plan to ensure an effective and timely response to information security incidents. 3) Develop and implement processes to ensure the timely identification of information security incidents that could impact the business. 4) Establish and maintain processes to investigate and document information security incidents in order to determine the appropriate response and cause while adhering to legal, regulatory and organizational requirements. 5) Establish and maintain incident notification and escalation processes to ensure that the appropriate stakeholders are involved in incident response management. 6) Organize, train and equip incident response teams to respond to information security incidents in an effective and timely manner. 7) Test, review and revise (as applicable) the incident response plan periodically to ensure an effective response to information security incidents and to improve response capabilities. 8) Establish and maintain communication plans and processes to manage communication with internal and external entities. 9) Conduct post-incident reviews to determine the root cause of information security incidents, develop corrective actions, reassess risk, evaluate response effectiveness and take appropriate remedial actions. 10) Establish and maintain integration among the incident response plan, business continuity plan and disaster recovery plan.