SlideShare a Scribd company logo
TEXAS CISO COUNCIL
Information Security Program Essentials Guide
About the Council
About the Guide
Next Steps
Agenda
Who Are We?
Business
Services
Retail
Real EstateEnergy
Software
Education
Government
Manufacturing
Financial
Computers
& Electronics
Consulting
Hospitality
& Travel
The Texas CISO Council is a group of
Texas-based, cross-industry information
security leaders.
We have teamed up to improve
information security and share
information through voluntary
contributions of our expertise,
time, and experience to consider
security challenges and formulate
community-driven solutions.
Information
Security
Essentials
Guide
• Problem ?  Solution !
What Did We Do?
Essentials Guide Overview
Resources
Considerations
Components
Audience
Overview
SLT
IT RISK CSO
http://rafeeqrehman.com/2014/12/14/latest-update-to-ciso-responsibilities-mind-map/
Governance & Organization
Strategy Development
Frameworks
Risk Management Components
Measurement & Metric References
https://mlblogscountingbaseballs.files.wordpress.com/2012/02/2012-topps-derek-jeter-back.jpg
What Did We Learn?
What’s Next?
TEXAS CISO COUNCIL
http://www.texascisocouncil.org/
info@texascisocouncil.org

More Related Content

PPTX
NTXISSACSC2 - Four Deadly Traps in Using Information Security Frameworks by D...
PPTX
NTXISSACSC2 - Why Lead with Risk? by Doug Landoll
PPTX
NTXISSACSC2 - Information Security Opportunity: Embracing Big Data with Peopl...
PPTX
NTXISSACSC2 - The Evolving DMZ by John Fehan
PPTX
NTXISSACSC2 - Software Assurance (SwA) by John Whited
PPTX
NTXISSACSC2 - Software Security - My Other Marathon by Harold Toomey
PPTX
NTXISSACSC2 - Social Engineering 101 or The Art of How You Got Owned by That ...
PPTX
Tictaclabs Managed Cyber Security Services
NTXISSACSC2 - Four Deadly Traps in Using Information Security Frameworks by D...
NTXISSACSC2 - Why Lead with Risk? by Doug Landoll
NTXISSACSC2 - Information Security Opportunity: Embracing Big Data with Peopl...
NTXISSACSC2 - The Evolving DMZ by John Fehan
NTXISSACSC2 - Software Assurance (SwA) by John Whited
NTXISSACSC2 - Software Security - My Other Marathon by Harold Toomey
NTXISSACSC2 - Social Engineering 101 or The Art of How You Got Owned by That ...
Tictaclabs Managed Cyber Security Services

What's hot (20)

PPTX
Gabriel Gumbs - A Capability Maturity Model for Sustainable Data Loss Protection
PPT
Managed Cyber Security Services
PDF
Security Program Development for the Hipster Company
PPTX
Jason Harrell - Compliance and Security: Building a Cybersecurity Risk Manage...
PDF
Marlabs Capabilities Overview: Cyber Security Services
PDF
isicg - 3 r's v4
PPTX
DHS Cybersecurity Services for Building Cyber Resilience
PDF
Security Consulting Services
PPTX
Security and Compliance Initial Roadmap
PDF
Cyber Security Management | Cyber Security Consultant | JST Business Solution...
PPTX
Cyber Threat Intelligence Solution Demonstration
PPT
Security Consulting Methodology
PDF
Security Consulting Services
PPTX
SurfWatch Labs Threat Intelligence Solution Demo
PPTX
Roadmap to security operations excellence
PDF
Vulnerability management - beyond scanning
PDF
NTXISSACSC1 Conference - Security is Doomed by Jesse Lee
PDF
Enumerating your shadow it attack surface
PDF
Cyber Security - Maintaining Operational Control of Critical Services
PPTX
Healthcare info tech systems cyber threats ABI conference 2016
Gabriel Gumbs - A Capability Maturity Model for Sustainable Data Loss Protection
Managed Cyber Security Services
Security Program Development for the Hipster Company
Jason Harrell - Compliance and Security: Building a Cybersecurity Risk Manage...
Marlabs Capabilities Overview: Cyber Security Services
isicg - 3 r's v4
DHS Cybersecurity Services for Building Cyber Resilience
Security Consulting Services
Security and Compliance Initial Roadmap
Cyber Security Management | Cyber Security Consultant | JST Business Solution...
Cyber Threat Intelligence Solution Demonstration
Security Consulting Methodology
Security Consulting Services
SurfWatch Labs Threat Intelligence Solution Demo
Roadmap to security operations excellence
Vulnerability management - beyond scanning
NTXISSACSC1 Conference - Security is Doomed by Jesse Lee
Enumerating your shadow it attack surface
Cyber Security - Maintaining Operational Control of Critical Services
Healthcare info tech systems cyber threats ABI conference 2016
Ad

Viewers also liked (17)

PDF
Security services mind map
PDF
Improving Your Information Security Program
PPT
Developing an Information Security Program
PDF
Building security leaders ISSA Virtual CISO Series
PDF
From Cave Man to Business Man, the Evolution of the CISO to CIRO
PPTX
Information Security By Design
PPT
The CISO in 2020: Prepare for the Unexpected
PDF
(Consulting) Couch to CISO: A Security Leader's First 100 Days and Beyond
PDF
Super CISO 2020: How to Keep Your Job
PPT
Developing A Risk Based Information Security Program
PDF
Mind Map of Information Security
PPT
The CISO Guide – How Do You Spell CISO?
PPTX
CIO-CTO 90 day plan 2017
PDF
NIST Cybersecurity Framework - Mindmap
PPTX
New CISO - The First 90 Days
PDF
7 cyber security questions for boards
PDF
Building an effective Information Security Roadmap
Security services mind map
Improving Your Information Security Program
Developing an Information Security Program
Building security leaders ISSA Virtual CISO Series
From Cave Man to Business Man, the Evolution of the CISO to CIRO
Information Security By Design
The CISO in 2020: Prepare for the Unexpected
(Consulting) Couch to CISO: A Security Leader's First 100 Days and Beyond
Super CISO 2020: How to Keep Your Job
Developing A Risk Based Information Security Program
Mind Map of Information Security
The CISO Guide – How Do You Spell CISO?
CIO-CTO 90 day plan 2017
NIST Cybersecurity Framework - Mindmap
New CISO - The First 90 Days
7 cyber security questions for boards
Building an effective Information Security Roadmap
Ad

Similar to NTXISSACSC2 - Texas CISO Council - Information Security Program Essential Guide by Brian Wrozek (20)

PPTX
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
PDF
my experience as ciso
PPTX
Presentation 1.pptx
PDF
Contrast & Compare & Contrast Information Security Roles
PPTX
Security advisor alliance primer
PPTX
Introduction-to-Information-Security.pptx
PPTX
CISO's first 100 days
PDF
Gary R. Hayslip April 2023 Top Cyber News MAGAZINE
PPTX
Information Security
PPTX
Setting up an Effective Security and Compliance Office
PDF
Four mistakes to avoid when hiring your next security chief (print version ...
PPT
chapter 1. Introduction to Information Security
PDF
the-ciso-report for 2024 predictions by SPLUNK
PDF
Security Program Guidance and Establishing a Culture of Security
PDF
CNIT 160: Ch 2a: Introduction to Information Security Governance
PPT
zSecurity_L9_Standards and Policies.ppt
PDF
Top Cyber News Magazine - Oct 2022
PDF
Top Cyber News MAGAZINE. October 2022. Matthew Rosenquist.pdf
PDF
What’s my job again? Slides from Mark Simos talk at 2025 Tampa BSides
PDF
CISCO Handbook.pdf
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
my experience as ciso
Presentation 1.pptx
Contrast & Compare & Contrast Information Security Roles
Security advisor alliance primer
Introduction-to-Information-Security.pptx
CISO's first 100 days
Gary R. Hayslip April 2023 Top Cyber News MAGAZINE
Information Security
Setting up an Effective Security and Compliance Office
Four mistakes to avoid when hiring your next security chief (print version ...
chapter 1. Introduction to Information Security
the-ciso-report for 2024 predictions by SPLUNK
Security Program Guidance and Establishing a Culture of Security
CNIT 160: Ch 2a: Introduction to Information Security Governance
zSecurity_L9_Standards and Policies.ppt
Top Cyber News Magazine - Oct 2022
Top Cyber News MAGAZINE. October 2022. Matthew Rosenquist.pdf
What’s my job again? Slides from Mark Simos talk at 2025 Tampa BSides
CISCO Handbook.pdf

More from North Texas Chapter of the ISSA (20)

PPTX
Purple seven-ntxissacsc5 walcutt
PPTX
Ntxissacsc5 yellow 7 protecting the cloud with cep
PDF
Ntxissacsc5 gold 4 beyond detection and prevension remediation
PPTX
Ntxissacsc5 gold 1 mimecast e mail resiliency
PPTX
Ntxissacsc5 yellow 6-abusing protocols for dynamic addressing in space-jacenr...
PPTX
Ntxissacsc5 yellow 2-evidence driven infosec compliance strategy-garrettp1
PPTX
Ntxissacsc5 yellow 1-beginnerslinux bill-petersen
PDF
Ntxissacsc5 red 6-diy-pentest-lab dustin-dykes
PDF
Ntxissacsc5 red 1 & 2 basic hacking tools ncc group
PPTX
Ntxissacsc5 purple 5-insider threat-_andy_thompson
PPTX
Ntxissacsc5 purple 4-threat detection using machine learning-markszewczul
PPTX
Ntxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptx
PPTX
Ntxissacsc5 purple 1-eu-gdpr_patrick_florer
PPTX
Ntxissacsc5 gold 1--mimecast email resiliency- erez-haimowicz
PPTX
Ntxissacsc5 blue 7-zerotrust more effective approach to security-ed higgins
PPTX
Ntxissacsc5 blue 6-securityawareness-laurianna_callaghan
PPTX
Ntxissacsc5 blue 5-holistic approach to cybersecurity-abu_sadeq
PDF
Ntxissacsc5 blue 3-shifting from incident to continuous response bill white
PPTX
Ntxissacsc5 blue 4-the-attack_life_cycle_erich_mueller
PPTX
Ntxissacsc5 blue 2-herding cats and security tools-harold_toomey
Purple seven-ntxissacsc5 walcutt
Ntxissacsc5 yellow 7 protecting the cloud with cep
Ntxissacsc5 gold 4 beyond detection and prevension remediation
Ntxissacsc5 gold 1 mimecast e mail resiliency
Ntxissacsc5 yellow 6-abusing protocols for dynamic addressing in space-jacenr...
Ntxissacsc5 yellow 2-evidence driven infosec compliance strategy-garrettp1
Ntxissacsc5 yellow 1-beginnerslinux bill-petersen
Ntxissacsc5 red 6-diy-pentest-lab dustin-dykes
Ntxissacsc5 red 1 & 2 basic hacking tools ncc group
Ntxissacsc5 purple 5-insider threat-_andy_thompson
Ntxissacsc5 purple 4-threat detection using machine learning-markszewczul
Ntxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptx
Ntxissacsc5 purple 1-eu-gdpr_patrick_florer
Ntxissacsc5 gold 1--mimecast email resiliency- erez-haimowicz
Ntxissacsc5 blue 7-zerotrust more effective approach to security-ed higgins
Ntxissacsc5 blue 6-securityawareness-laurianna_callaghan
Ntxissacsc5 blue 5-holistic approach to cybersecurity-abu_sadeq
Ntxissacsc5 blue 3-shifting from incident to continuous response bill white
Ntxissacsc5 blue 4-the-attack_life_cycle_erich_mueller
Ntxissacsc5 blue 2-herding cats and security tools-harold_toomey

Recently uploaded (20)

PDF
Exploring VPS Hosting Trends for SMBs in 2025
PPT
FIRE PREVENTION AND CONTROL PLAN- LUS.FM.MQ.OM.UTM.PLN.00014.ppt
PDF
BIOCHEM CH2 OVERVIEW OF MICROBIOLOGY.pdf
DOC
Rose毕业证学历认证,利物浦约翰摩尔斯大学毕业证国外本科毕业证
PPTX
The-Importance-of-School-Sanitation.pptx
PDF
Alethe Consulting Corporate Profile and Solution Aproach
PDF
The Evolution of Traditional to New Media .pdf
PPTX
Introduction to cybersecurity and digital nettiquette
PDF
Session 1 (Week 1)fghjmgfdsfgthyjkhfdsadfghjkhgfdsa
PPTX
module 1-Part 1.pptxdddddddddddddddddddddddddddddddddddd
PDF
The Ikigai Template _ Recalibrate How You Spend Your Time.pdf
PPTX
IPCNA VIRTUAL CLASSES INTERMEDIATE 6 PROJECT.pptx
PDF
Uptota Investor Deck - Where Africa Meets Blockchain
PDF
Containerization lab dddddddddddddddmanual.pdf
PDF
si manuel quezon at mga nagawa sa bansang pilipinas
PDF
simpleintnettestmetiaerl for the simple testint
PPTX
Cyber Hygine IN organizations in MSME or
PPTX
Layers_of_the_Earth_Grade7.pptx class by
PPTX
Slides PPTX: World Game (s): Eco Economic Epochs.pptx
PPT
Ethics in Information System - Management Information System
Exploring VPS Hosting Trends for SMBs in 2025
FIRE PREVENTION AND CONTROL PLAN- LUS.FM.MQ.OM.UTM.PLN.00014.ppt
BIOCHEM CH2 OVERVIEW OF MICROBIOLOGY.pdf
Rose毕业证学历认证,利物浦约翰摩尔斯大学毕业证国外本科毕业证
The-Importance-of-School-Sanitation.pptx
Alethe Consulting Corporate Profile and Solution Aproach
The Evolution of Traditional to New Media .pdf
Introduction to cybersecurity and digital nettiquette
Session 1 (Week 1)fghjmgfdsfgthyjkhfdsadfghjkhgfdsa
module 1-Part 1.pptxdddddddddddddddddddddddddddddddddddd
The Ikigai Template _ Recalibrate How You Spend Your Time.pdf
IPCNA VIRTUAL CLASSES INTERMEDIATE 6 PROJECT.pptx
Uptota Investor Deck - Where Africa Meets Blockchain
Containerization lab dddddddddddddddmanual.pdf
si manuel quezon at mga nagawa sa bansang pilipinas
simpleintnettestmetiaerl for the simple testint
Cyber Hygine IN organizations in MSME or
Layers_of_the_Earth_Grade7.pptx class by
Slides PPTX: World Game (s): Eco Economic Epochs.pptx
Ethics in Information System - Management Information System

NTXISSACSC2 - Texas CISO Council - Information Security Program Essential Guide by Brian Wrozek

Editor's Notes

  • #2: Welcome and thank the audience and session host.
  • #3: Provide your BIO as introduction and give overview of this presentation.
  • #4: Co-founded by Brian Engle, former State of Texas Chief Information Security Officer and Philip Beyer, Director of Information Security at The Advisory Board Company. All council members have real-world experience managing information security corporate or governmental functions, or have made substantive contributions to the information security industry. Open membership but more than just a networking opportunity. We wanted to collaborate and produce tangible products that would benefit all. We wanted to help others be successful. We have almost 50 members with a dozen who contributed to the Essentials Guide.
  • #5: Problem: There are many similar and overlapping information security control frameworks in place around the globe. There is no simplified reference describing at a high level the essential components of a modern information security program. Solution: Offer a simplified mechanism to validate that an organization has in-place or planned solutions for key elements of an information security program and that the organization has not overlooked critical core competencies or controls. The Guide may also aid an information security professional or business leader to document an approach, support peer reviews, and/or allow a security program owner to present program fundamentals to internal stakeholders, auditors, partners, and vendors. Started in October 2013. Took us a while to get into a rhythm. We all have day jobs and are active in other industry groups. We met on a regular basis in different cities. Once we got serious, we treated it like any other typical project. We have a dedicated coordinator (not an actual PM). We subdivided the guide into sections with a dedicated section owner. We set deadlines. Finished in March 2015.
  • #6: The Guide is divided into these 5 main areas with the arrows representing their relationships and dependencies. The bubbles highlight the key topics. Each of the 5 areas are organized into these 5 sections.
  • #7: Continues to be a spirited debate on where Information Security should report. We highlight some of the benefits and challenges of reporting into different organizations such as IT, Risk/Compliance, Senior Leader (CSO, Finance, Legal). We also provide some advice on how to create an effective program even if you are not placed in the most ideal location in your company. We briefly describe some of the core components of an information security program. We don’t into every branch of this CISO mind-map otherwise our Guide would rival a NIST standard. The role is dependent on the company culture and executive support among other factors.
  • #8: There are multiple inputs into the strategy development process. Some may be given more weight than others depending on your situation. Developing a strategy is more art than science. Typically the output tends to be a more detailed list of priorities for the next calendar year plus an update to a 3 year roadmap.
  • #9: There are many different frameworks. Pick one that fits you and your company the best and follow it. Think of them like diet plans. Most will work if you commit to following them. One that is sure to gain in popularity is the new NIST Cybersecurity Framework for Critical Infrastructure.
  • #10: Ideally, information security should be just one component within the overall enterprise risk management function.
  • #11: There is no single magical metric that can answer the question how secure are you. Different metrics provide different value to different audiences. Put your metrics in some type of visual format besides just tables of text.
  • #12: Need to be patient, flexible and persistent. A small, dedicated core group is more effective than trying to get everyone involved. Let others jump in and provide value where and when they could. Need one or two people who pull everything together to give the end product a consistent feel and voice. Need someone to take ownership of the mechanics of the group (scheduling meetings, publishing minutes, etc). Leverage video conferencing and webex but there is no substitute for getting together in person on a regular basis. We did leverage local events so members could leverage their travel arrangements. Get version 1 published and then work on updates.
  • #13: Start looking to add more detail to the different 5 sections. We want to add real world case studies and examples. This could lead to additional break-out guides.
  • #14: This Guide is offered at no cost or obligation to any organization that seeks to build or improve their information security program. It can be downloaded at our website and you can send an email to this address if you have any questions, suggestions or want to get more involved in the council.