SlideShare a Scribd company logo
FRSecure 2016 CISSP
Mentor Program
EVAN FRANCEN, PRESIDENT & CO-FOUNDER - FRSECURE
CLASS SESSION #1
CISSP Mentor Program Session #1
Welcome!
• What is the CISSP Mentor Program
• History
• 1st class was 2010; 6 students
• Today’s class; 80 students
• Why we do it
• Success Stories
• Heck, it’s free! If you aren’t satisfied, we’ll
refund everything you paid us. ;)
We need MORE good information security
people!
CISSP Mentor Program Session #1
We need MORE good information security people!
The CISSP is ideal for those working in positions such
as, but not limited to:
◦ Security Consultant
◦ Security Manager
◦ IT Director/Manager
◦ Security Auditor
◦ Security Architect
◦ Security Analyst
◦ Security Systems Engineer
◦ Chief Information Security Officer
◦ Director of Security
◦ Network Architect
CISSP Mentor Program Session #1
Typical Class Structure
• Recap of previous content/session
• Questions
• Quiz
• Current Events
• Lecture
• Homework Assignment - WHAT?! Yeah, we got homework. 
• Questions
CISSP Mentor Program Session #1
Questions
• We may not get to all of the questions during class
• Send questions to Robb Stiffler (rstiffler@frsecure.com) – for now.
• We will soon (probably) assist in setting up (or facilitating) a study group.
• Content will be made available to all students upon request.
CISSP Mentor Program Session #1
The Certified Information Systems Security Professional (or
“CISSP”)
• Maintained by the International Information Systems Security Certification
Consortium (or ISC2®)
• Tests your knowledge (or memorization) of the Common Body of Knowledge
(or “CBK”).
• “a mile wide and two inches deep” (or maybe just an inch deep).
• 2015 CBK, updated in April, 2015
• CBK consists of eight domains… next page
CISSP Mentor Program Session #1
The Certified Information Systems Security Professional (or “CISSP”)
Eight domains for the CISSP CBK:
• Security and Risk Management
• Asset Security
• Security Engineering
• Communications and Network Security
• Identity and Access Management
• Security Assessment and Testing
• Security Operations
• Software Development Security
CISSP Mentor Program Session #1
The Certified Information Systems Security Professional (or “CISSP”)
Preparation (there are bunches of ways)
• 3x Book Read (my favorite)
• Read the book once, fast
• Read the book a second time, focus on concepts
• Read the book a third time, focus on mastery and memorization
• Note Cards
• Practice Tests (and quizzes)
• Study Groups
The CISSP Mentor Program a tool and facilitation of your studies, it does not supplant
them! YOU WILL STILL NEED TO STUDY.
CISSP Mentor Program Session #1
The Certified Information Systems Security Professional (or “CISSP”)
How to take the exam
• Computer-based (“CBT”) at Pearson Vue
• 250 questions
• Six hour time limit
• Two (sort of four) types of questions:
• Multiple Choice (four options, two are almost obviously wrong)
• “Advanced Innovative”
• Scenario
• Drag/Drop
• Hotspot
• 25 (10%) of the questions are “experimental” or research questions.
CISSP Mentor Program Session #1
The Certified Information Systems Security
Professional (or “CISSP”)
How to take the exam
• Methods
• Two-pass
• Three-pass
• Suppose you could do one-pass too if you’re some kind of Jedi Master
(or whatever)
• You will know right away if you have passed or failed.
CISSP Mentor Program Session #1
The Certified Information Systems Security Professional (or
“CISSP”)
Becoming a CISSP
• Passing the exam is only one step.
• Need experience
• 5 or more years within 2 or more domains (can waive one year with a college degree or
with another relevant certification)
• Not enough experience? Pass the exam and you’re known as an “Associate of (ISC2)”
• Must agree to the (ISC2) Code of Ethics.
• Must be endorsed by another CISSP (in good standing).
CISSP Mentor Program Session #1
About me
• President & Co-founder of FRSecure
• 20+ years of information security experience
• Big breach inside experience
• Information security evangelist
• Specialties: Security leadership coaching, risk management, methodology development, and
Social Engineering ;)
• CISSP sixty thousand something (I forgot my number).
• Very, very passionate about information security, but most importantly in doing the right
thing.
FRSecure exists to fix the broken industry.
CISSP Mentor Program Session #1
Same presentation given numerous times… Good for us too.
• Introduction
• We’re all experts right?
• Fundamentals
• The value of listening
• Principles
• Solutions – What to do…
• Questions
Information Security Fundamentals
Introduction
• FRSecure
• Information security consulting company
• Business since 2008
• 700+ clients, many in legal, healthcare, and finance
• Speaker – Evan Francen
• President & Co-founder of FRSecure
• 20+ years of information security experience
• Big breach inside experience
• Information security evangelist
• Specialties: Security leadership coaching, risk management, methodology development, and
Social Engineering ;)
Information Security Fundamentals
If there’s one thing that I’ve learned in 20+ years in information
security it’s to LISTEN.
If there’s one more thing that I’ve learned in 20+ years in
information security it’s that I don’t know everything!
Although too many information security “experts” won’t admit it.
Information Security Fundamentals
One thing is clear…
We’re missing the information security
fundamentals!
Information Security Fundamentals
What are some of the fundamentals?
We’re all experts, right?
What is “information security”?
We can argue about who’s definition is better, but we need to start with a common understanding (or definition).
Information Security Fundamentals
What are some of the fundamentals?
Information security is the application of administrative, physical,
and technical controls to protect the confidentiality, integrity, and
availability of information.
“Most organizations overemphasize technical controls to protect confidentiality
and do so at the expense of other critical controls and purposes.”
Seems fundamental. How about a story?
Information Security Fundamentals
What are some of the fundamentals?
Probably one of the most overused words in all of security…
What is “risk”?
Again, we can argue about who’s definition is better, but we need to start with a common understanding (or
definition).
Information Security Fundamentals
What are some of the fundamentals?
Risk is the likelihood of something bad happening and the impact if it
did.
“The likelihood of a threat exploiting a vulnerability, leads an associated
impact.”
Seems fundamental. How about another story?
Information Security Fundamentals
What are some of the fundamentals?
Risk
Anybody know who this guy is? 
Information Security Fundamentals
What are some of the fundamentals?
What is information security?
What is risk?
Why are these definitions so important?
Because they should drive everything you’re doing.
Information Security Fundamentals
The value of listening.
To keep us honest (and humble), we organized the FRSecure
Customer Advisory Board (or “CAB”).
We posed two simple questions…
What is your greatest frustration with respect to information security?
What is your greatest challenge with respect to information security?
Then we listened…
Information Security Fundamentals
The value of listening.
Greatest frustrations:
1. Lack of common information security understanding.
2. Different interpretations of different information security
regulations and standards.
3. Lack of education for practitioners and executive management.
4. Constantly changing priorities based on outside influences.
Together we derived a core frustration that sums up everything; we are all speaking different languages
for the same topic.
Information Security Fundamentals
The value of listening.
Greatest Challenges:
1. Education/training for executives, IT personnel, and users.
2. Management commitment to continuous improvement.
3. Obtaining the necessary resources to manage information
security.
4. Measuring information security (metrics, status, improvements,
etc.)
Greatest frustrations could be summed up with; we don’t know how to fix the issues facing us within the
greater context of a strategic information security program.
Information Security Fundamentals
So what are we going to do?
Our two problems, summed up by listening:
1. We are all speaking different languages for the same topic.
2. We don’t know how to fix the issues.
Now we can offer some advice, but only after listening.
Information Security Fundamentals
We are all speaking different languages for the same topic.
1. Define and live by your definition of information security. Get
everybody in agreement with the common definition because it
will (or should) drive everything.
2. Define and live by your definition of risk. If you can understand
and communicate risk well:
• You will automatically be compliant with regulations.
• You will be able to make good decisions.
• You will build a security program that works for you.
Information Security Fundamentals
We don’t know how to fix the issues.
Start with defining your information security principles. These are
the rules that you are going to live by. Here’s ours:
1. A business is in business to make money.
2. Information Security is a business issue.
3. Information Security is fun.
4. People are the biggest risk.
5. “Compliant” and “secure” are different.
Information Security Fundamentals
We don’t know how to fix the issues.
Start with defining your information security principles. These are
the rules that you are going to live by. Here’s ours:
6. There is no common sense in Information Security.
7. “Secure” is relative.
8. Information Security should drive business.
9. Information Security is not one size fits all.
10. There is no “easy button”.
Information Security Fundamentals
We don’t know how to fix the issues.
Now that you’re bought in on principles for managing your security
program, go here:
1. Management commitment. For real. Either you’re in or you’re not.
2. Asset management. You can’t secure what you don’t know you have.
3. Access control. You can’t secure what you can’t control.
4. Change control. See step 3.
5. Measure, measure, measure. You can’t manage what you can’t
measure.
Information Security Fundamentals
As you build, implement, manage, and improve your security
program…
Don’t forget to listen!
The things that people are telling you are real, and you might learn a
thing or two.
It’s also OK to admit that you don’t know everything.
Questions?
Aaaaaannnnnnnd we’re back.
Homework for Thursday (4/28)
◦ Please read Chapter 2/Domain 1: Security and Risk Management
◦ Pages 11 – 74 (only 63ish pages)
We’ll dig in!
Questions?
Hopefully about security.
Thank you!
Evan Francen
◦ FRSecure
◦ efrancen@frsecure.com
◦ 952-467-6384

More Related Content

PPTX
Slide Deck – Session 2 – FRSecure CISSP Mentor Program 2017
PPTX
Slide Deck – Session 3 – FRSecure CISSP Mentor Program 2017
PDF
Slide Deck CISSP Class Session 3
PPTX
Purple Teaming - The Collaborative Future of Penetration Testing
PDF
Slide Deck CISSP Class Session 2
PPTX
Slide Deck – Session 4 – FRSecure CISSP Mentor Program 2017
PPTX
Slide Deck – Class Session 1 – FRSecure CISSP Mentor Program
PDF
2018 CISSP Mentor Program Session 2
Slide Deck – Session 2 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 3 – FRSecure CISSP Mentor Program 2017
Slide Deck CISSP Class Session 3
Purple Teaming - The Collaborative Future of Penetration Testing
Slide Deck CISSP Class Session 2
Slide Deck – Session 4 – FRSecure CISSP Mentor Program 2017
Slide Deck – Class Session 1 – FRSecure CISSP Mentor Program
2018 CISSP Mentor Program Session 2

What's hot (20)

PDF
PDF
Slide Deck CISSP Class Session 4
PPTX
Cissp- Security and Risk Management
PDF
Craft Your Cyber Incident Response Plan (Before It's Too Late)
PPTX
Architecting for Security Resilience
PDF
Chapter 15 incident handling
PPTX
Incident Response in the age of Nation State Cyber Attacks
PDF
Setting up CSIRT
DOCX
SEC440: Incident Response Plan
PPTX
Insider threat kill chain
PDF
Identify and Stop Insider Threats
PPTX
CISSP - Chapter 1 - Security Concepts
PPTX
How to Build a Successful Incident Response Program
PDF
The Accidental Insider Threat
PPTX
Slide Deck – Session 12 – FRSecure CISSP Mentor Program 2017
PPTX
Dancyrityshy 1foundatioieh
PPTX
Jim Wojno: Incident Response - No Pain, No Gain!
PDF
Incident Response
PDF
Science of Security: Cyber Ecosystem Attack Analysis Methodology
Slide Deck CISSP Class Session 4
Cissp- Security and Risk Management
Craft Your Cyber Incident Response Plan (Before It's Too Late)
Architecting for Security Resilience
Chapter 15 incident handling
Incident Response in the age of Nation State Cyber Attacks
Setting up CSIRT
SEC440: Incident Response Plan
Insider threat kill chain
Identify and Stop Insider Threats
CISSP - Chapter 1 - Security Concepts
How to Build a Successful Incident Response Program
The Accidental Insider Threat
Slide Deck – Session 12 – FRSecure CISSP Mentor Program 2017
Dancyrityshy 1foundatioieh
Jim Wojno: Incident Response - No Pain, No Gain!
Incident Response
Science of Security: Cyber Ecosystem Attack Analysis Methodology
Ad

Viewers also liked (14)

PPTX
Slide Deck – Session 9 – FRSecure CISSP
PDF
Slide Deck Class Session 8 – FRSecure CISSP Mentor Program
PPTX
HHS Ransomware and Breach Guidance - Brad Nigh
PPTX
Slide Deck – Session 8 – FRSecure CISSP Mentor Program 2017
PDF
Slide Deck Class Session 11 – FRSecure CISSP Mentor Program
PDF
Slide Deck CISSP Class Session 7
PPTX
Slide Deck CISSP Class Session 5
PPTX
Slide Deck – Session 5 – FRSecure CISSP Mentor Program 2017
PPTX
Slide Deck – Session 7 – FRSecure CISSP Mentor Program 2017
PDF
Slide Deck CISSP Class Session 6
PPTX
Slide Deck – Session 11 – FRSecure CISSP Mentor Program 2017
PPTX
Slide Deck – Session 10 – FRSecure CISSP Mentor Program 2017
PPTX
Slide Deck – Session 6 – FRSecure CISSP Mentor Program 2017
PDF
Slide Deck Class Session 10 – FRSecure CISSP Mentor Program
Slide Deck – Session 9 – FRSecure CISSP
Slide Deck Class Session 8 – FRSecure CISSP Mentor Program
HHS Ransomware and Breach Guidance - Brad Nigh
Slide Deck – Session 8 – FRSecure CISSP Mentor Program 2017
Slide Deck Class Session 11 – FRSecure CISSP Mentor Program
Slide Deck CISSP Class Session 7
Slide Deck CISSP Class Session 5
Slide Deck – Session 5 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 7 – FRSecure CISSP Mentor Program 2017
Slide Deck CISSP Class Session 6
Slide Deck – Session 11 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 10 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 6 – FRSecure CISSP Mentor Program 2017
Slide Deck Class Session 10 – FRSecure CISSP Mentor Program
Ad

Similar to Slide Deck - CISSP Mentor Program Class Session 1 (20)

PDF
2019 FRSecure CISSP Mentor Program: Class One
PPTX
Career In Information security
PDF
2020 FRsecure CISSP Mentor Program - Class 1
PPTX
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
PDF
Just4Meeting 2012 - How to protect your web applications
PPT
Introduction to information systems security 365 765
PPT
Introduction To Information Systems Security 365 765
PPTX
DevOps and the Future of Information Security
PPTX
Information Security is NOT an IT Issue
PPTX
How to Secure America
PDF
2018 CISSP Mentor Program Session 1
PDF
Rothke stimulating your career as an information security professional
PPTX
An Introduction To IT Security And Privacy In Libraries
PPTX
WANTED – People Committed to Solving our Information Security Language Problem
PPTX
DevSecOps with Microsoft Tech
PDF
Cybersecurity is a Team Sport (SecureWorld - Dallas 2018)
PPTX
TIES 2013 Education Technology Conference
PPTX
cybersecurity analyst.pptx
PDF
IT Risk Management & Leadership 23 - 26 June 2013 Dubai
2019 FRSecure CISSP Mentor Program: Class One
Career In Information security
2020 FRsecure CISSP Mentor Program - Class 1
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Just4Meeting 2012 - How to protect your web applications
Introduction to information systems security 365 765
Introduction To Information Systems Security 365 765
DevOps and the Future of Information Security
Information Security is NOT an IT Issue
How to Secure America
2018 CISSP Mentor Program Session 1
Rothke stimulating your career as an information security professional
An Introduction To IT Security And Privacy In Libraries
WANTED – People Committed to Solving our Information Security Language Problem
DevSecOps with Microsoft Tech
Cybersecurity is a Team Sport (SecureWorld - Dallas 2018)
TIES 2013 Education Technology Conference
cybersecurity analyst.pptx
IT Risk Management & Leadership 23 - 26 June 2013 Dubai

More from FRSecure (20)

PDF
2020 FRSecure CISSP Mentor Program - Class 11
PDF
2020 FRSecure CISSP Mentor Program - Class 10
PDF
2020 FRSecure CISSP Mentor Program - Class 9
PDF
2020 FRSecure CISSP Mentor Program - Class 8
PDF
2020 FRSecure CISSP Mentor Program - Class 7
PDF
2020 FRSecure CISSP Mentor Program - Class 6
PDF
2020 FRSecure CISSP Mentor Program - Class 5
PDF
2020 FRSecure CISSP Mentor Program - Class 4
PDF
2020 FRSecure CISSP Mentor Program - Class 3
PDF
2020 FRSecure CISSP Mentor Program - Class 2
PDF
2019 FRSecure CISSP Mentor Program: Class Eleven
PDF
2019 FRSecure CISSP Mentor Program: Class Ten
PDF
2019 FRSecure CISSP Mentor Program: Class Nine
PDF
2019 FRSecure CISSP Mentor Program: Class Eight
PDF
2019 FRSecure CISSP Mentor Program: Class Seven
PDF
2019 FRSecure CISSP Mentor Program: Class Six
PDF
2019 FRSecure CISSP Mentor Program: Class Four
PDF
2019 FRSecure CISSP Mentor Program: Class Three
PDF
2019 FRecure CISSP Mentor Program: Session Two
PDF
2018 FRSecure CISSP Mentor Program Session 11
2020 FRSecure CISSP Mentor Program - Class 11
2020 FRSecure CISSP Mentor Program - Class 10
2020 FRSecure CISSP Mentor Program - Class 9
2020 FRSecure CISSP Mentor Program - Class 8
2020 FRSecure CISSP Mentor Program - Class 7
2020 FRSecure CISSP Mentor Program - Class 6
2020 FRSecure CISSP Mentor Program - Class 5
2020 FRSecure CISSP Mentor Program - Class 4
2020 FRSecure CISSP Mentor Program - Class 3
2020 FRSecure CISSP Mentor Program - Class 2
2019 FRSecure CISSP Mentor Program: Class Eleven
2019 FRSecure CISSP Mentor Program: Class Ten
2019 FRSecure CISSP Mentor Program: Class Nine
2019 FRSecure CISSP Mentor Program: Class Eight
2019 FRSecure CISSP Mentor Program: Class Seven
2019 FRSecure CISSP Mentor Program: Class Six
2019 FRSecure CISSP Mentor Program: Class Four
2019 FRSecure CISSP Mentor Program: Class Three
2019 FRecure CISSP Mentor Program: Session Two
2018 FRSecure CISSP Mentor Program Session 11

Recently uploaded (20)

PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PDF
Complications of Minimal Access Surgery at WLH
PDF
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PPTX
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PDF
Pre independence Education in Inndia.pdf
PDF
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PPTX
master seminar digital applications in india
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PPTX
PPH.pptx obstetrics and gynecology in nursing
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
Insiders guide to clinical Medicine.pdf
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
102 student loan defaulters named and shamed – Is someone you know on the list?
Complications of Minimal Access Surgery at WLH
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
Microbial diseases, their pathogenesis and prophylaxis
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
O5-L3 Freight Transport Ops (International) V1.pdf
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
STATICS OF THE RIGID BODIES Hibbelers.pdf
2.FourierTransform-ShortQuestionswithAnswers.pdf
Pre independence Education in Inndia.pdf
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
master seminar digital applications in india
FourierSeries-QuestionsWithAnswers(Part-A).pdf
Supply Chain Operations Speaking Notes -ICLT Program
PPH.pptx obstetrics and gynecology in nursing
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
Insiders guide to clinical Medicine.pdf
human mycosis Human fungal infections are called human mycosis..pptx

Slide Deck - CISSP Mentor Program Class Session 1

  • 1. FRSecure 2016 CISSP Mentor Program EVAN FRANCEN, PRESIDENT & CO-FOUNDER - FRSECURE CLASS SESSION #1
  • 2. CISSP Mentor Program Session #1 Welcome! • What is the CISSP Mentor Program • History • 1st class was 2010; 6 students • Today’s class; 80 students • Why we do it • Success Stories • Heck, it’s free! If you aren’t satisfied, we’ll refund everything you paid us. ;) We need MORE good information security people!
  • 3. CISSP Mentor Program Session #1 We need MORE good information security people! The CISSP is ideal for those working in positions such as, but not limited to: ◦ Security Consultant ◦ Security Manager ◦ IT Director/Manager ◦ Security Auditor ◦ Security Architect ◦ Security Analyst ◦ Security Systems Engineer ◦ Chief Information Security Officer ◦ Director of Security ◦ Network Architect
  • 4. CISSP Mentor Program Session #1 Typical Class Structure • Recap of previous content/session • Questions • Quiz • Current Events • Lecture • Homework Assignment - WHAT?! Yeah, we got homework.  • Questions
  • 5. CISSP Mentor Program Session #1 Questions • We may not get to all of the questions during class • Send questions to Robb Stiffler (rstiffler@frsecure.com) – for now. • We will soon (probably) assist in setting up (or facilitating) a study group. • Content will be made available to all students upon request.
  • 6. CISSP Mentor Program Session #1 The Certified Information Systems Security Professional (or “CISSP”) • Maintained by the International Information Systems Security Certification Consortium (or ISC2®) • Tests your knowledge (or memorization) of the Common Body of Knowledge (or “CBK”). • “a mile wide and two inches deep” (or maybe just an inch deep). • 2015 CBK, updated in April, 2015 • CBK consists of eight domains… next page
  • 7. CISSP Mentor Program Session #1 The Certified Information Systems Security Professional (or “CISSP”) Eight domains for the CISSP CBK: • Security and Risk Management • Asset Security • Security Engineering • Communications and Network Security • Identity and Access Management • Security Assessment and Testing • Security Operations • Software Development Security
  • 8. CISSP Mentor Program Session #1 The Certified Information Systems Security Professional (or “CISSP”) Preparation (there are bunches of ways) • 3x Book Read (my favorite) • Read the book once, fast • Read the book a second time, focus on concepts • Read the book a third time, focus on mastery and memorization • Note Cards • Practice Tests (and quizzes) • Study Groups The CISSP Mentor Program a tool and facilitation of your studies, it does not supplant them! YOU WILL STILL NEED TO STUDY.
  • 9. CISSP Mentor Program Session #1 The Certified Information Systems Security Professional (or “CISSP”) How to take the exam • Computer-based (“CBT”) at Pearson Vue • 250 questions • Six hour time limit • Two (sort of four) types of questions: • Multiple Choice (four options, two are almost obviously wrong) • “Advanced Innovative” • Scenario • Drag/Drop • Hotspot • 25 (10%) of the questions are “experimental” or research questions.
  • 10. CISSP Mentor Program Session #1 The Certified Information Systems Security Professional (or “CISSP”) How to take the exam • Methods • Two-pass • Three-pass • Suppose you could do one-pass too if you’re some kind of Jedi Master (or whatever) • You will know right away if you have passed or failed.
  • 11. CISSP Mentor Program Session #1 The Certified Information Systems Security Professional (or “CISSP”) Becoming a CISSP • Passing the exam is only one step. • Need experience • 5 or more years within 2 or more domains (can waive one year with a college degree or with another relevant certification) • Not enough experience? Pass the exam and you’re known as an “Associate of (ISC2)” • Must agree to the (ISC2) Code of Ethics. • Must be endorsed by another CISSP (in good standing).
  • 12. CISSP Mentor Program Session #1 About me • President & Co-founder of FRSecure • 20+ years of information security experience • Big breach inside experience • Information security evangelist • Specialties: Security leadership coaching, risk management, methodology development, and Social Engineering ;) • CISSP sixty thousand something (I forgot my number). • Very, very passionate about information security, but most importantly in doing the right thing. FRSecure exists to fix the broken industry.
  • 13. CISSP Mentor Program Session #1 Same presentation given numerous times… Good for us too. • Introduction • We’re all experts right? • Fundamentals • The value of listening • Principles • Solutions – What to do… • Questions
  • 14. Information Security Fundamentals Introduction • FRSecure • Information security consulting company • Business since 2008 • 700+ clients, many in legal, healthcare, and finance • Speaker – Evan Francen • President & Co-founder of FRSecure • 20+ years of information security experience • Big breach inside experience • Information security evangelist • Specialties: Security leadership coaching, risk management, methodology development, and Social Engineering ;)
  • 15. Information Security Fundamentals If there’s one thing that I’ve learned in 20+ years in information security it’s to LISTEN. If there’s one more thing that I’ve learned in 20+ years in information security it’s that I don’t know everything! Although too many information security “experts” won’t admit it.
  • 16. Information Security Fundamentals One thing is clear… We’re missing the information security fundamentals!
  • 17. Information Security Fundamentals What are some of the fundamentals? We’re all experts, right? What is “information security”? We can argue about who’s definition is better, but we need to start with a common understanding (or definition).
  • 18. Information Security Fundamentals What are some of the fundamentals? Information security is the application of administrative, physical, and technical controls to protect the confidentiality, integrity, and availability of information. “Most organizations overemphasize technical controls to protect confidentiality and do so at the expense of other critical controls and purposes.” Seems fundamental. How about a story?
  • 19. Information Security Fundamentals What are some of the fundamentals? Probably one of the most overused words in all of security… What is “risk”? Again, we can argue about who’s definition is better, but we need to start with a common understanding (or definition).
  • 20. Information Security Fundamentals What are some of the fundamentals? Risk is the likelihood of something bad happening and the impact if it did. “The likelihood of a threat exploiting a vulnerability, leads an associated impact.” Seems fundamental. How about another story?
  • 21. Information Security Fundamentals What are some of the fundamentals? Risk Anybody know who this guy is? 
  • 22. Information Security Fundamentals What are some of the fundamentals? What is information security? What is risk? Why are these definitions so important? Because they should drive everything you’re doing.
  • 23. Information Security Fundamentals The value of listening. To keep us honest (and humble), we organized the FRSecure Customer Advisory Board (or “CAB”). We posed two simple questions… What is your greatest frustration with respect to information security? What is your greatest challenge with respect to information security? Then we listened…
  • 24. Information Security Fundamentals The value of listening. Greatest frustrations: 1. Lack of common information security understanding. 2. Different interpretations of different information security regulations and standards. 3. Lack of education for practitioners and executive management. 4. Constantly changing priorities based on outside influences. Together we derived a core frustration that sums up everything; we are all speaking different languages for the same topic.
  • 25. Information Security Fundamentals The value of listening. Greatest Challenges: 1. Education/training for executives, IT personnel, and users. 2. Management commitment to continuous improvement. 3. Obtaining the necessary resources to manage information security. 4. Measuring information security (metrics, status, improvements, etc.) Greatest frustrations could be summed up with; we don’t know how to fix the issues facing us within the greater context of a strategic information security program.
  • 26. Information Security Fundamentals So what are we going to do? Our two problems, summed up by listening: 1. We are all speaking different languages for the same topic. 2. We don’t know how to fix the issues. Now we can offer some advice, but only after listening.
  • 27. Information Security Fundamentals We are all speaking different languages for the same topic. 1. Define and live by your definition of information security. Get everybody in agreement with the common definition because it will (or should) drive everything. 2. Define and live by your definition of risk. If you can understand and communicate risk well: • You will automatically be compliant with regulations. • You will be able to make good decisions. • You will build a security program that works for you.
  • 28. Information Security Fundamentals We don’t know how to fix the issues. Start with defining your information security principles. These are the rules that you are going to live by. Here’s ours: 1. A business is in business to make money. 2. Information Security is a business issue. 3. Information Security is fun. 4. People are the biggest risk. 5. “Compliant” and “secure” are different.
  • 29. Information Security Fundamentals We don’t know how to fix the issues. Start with defining your information security principles. These are the rules that you are going to live by. Here’s ours: 6. There is no common sense in Information Security. 7. “Secure” is relative. 8. Information Security should drive business. 9. Information Security is not one size fits all. 10. There is no “easy button”.
  • 30. Information Security Fundamentals We don’t know how to fix the issues. Now that you’re bought in on principles for managing your security program, go here: 1. Management commitment. For real. Either you’re in or you’re not. 2. Asset management. You can’t secure what you don’t know you have. 3. Access control. You can’t secure what you can’t control. 4. Change control. See step 3. 5. Measure, measure, measure. You can’t manage what you can’t measure.
  • 31. Information Security Fundamentals As you build, implement, manage, and improve your security program… Don’t forget to listen! The things that people are telling you are real, and you might learn a thing or two. It’s also OK to admit that you don’t know everything.
  • 32. Questions? Aaaaaannnnnnnd we’re back. Homework for Thursday (4/28) ◦ Please read Chapter 2/Domain 1: Security and Risk Management ◦ Pages 11 – 74 (only 63ish pages) We’ll dig in!
  • 33. Questions? Hopefully about security. Thank you! Evan Francen ◦ FRSecure ◦ efrancen@frsecure.com ◦ 952-467-6384