governance requirements for cyber security - · pdf filegovernance requirements for cyber...

18
Governance Requirements for Cyber Security CK Bruce, CISA, CISM, CRISC

Upload: vannguyet

Post on 21-Mar-2018

235 views

Category:

Documents


8 download

TRANSCRIPT

Page 1: Governance Requirements for Cyber Security -  · PDF fileGovernance Requirements for Cyber Security CK Bruce, CISA, ... IT’s Stakeholders. ... SONY Created Date: 10/15

Governance Requirements for Cyber Security

CK Bruce, CISA, CISM, CRISC

Page 2: Governance Requirements for Cyber Security -  · PDF fileGovernance Requirements for Cyber Security CK Bruce, CISA, ... IT’s Stakeholders. ... SONY Created Date: 10/15

Changing nature of cyberspace

Source: Presentation materials at ITU workshop on “Ubiquitous Network Societies”, April 2005.

Page 3: Governance Requirements for Cyber Security -  · PDF fileGovernance Requirements for Cyber Security CK Bruce, CISA, ... IT’s Stakeholders. ... SONY Created Date: 10/15
Page 4: Governance Requirements for Cyber Security -  · PDF fileGovernance Requirements for Cyber Security CK Bruce, CISA, ... IT’s Stakeholders. ... SONY Created Date: 10/15

Governance Incident

Management Culture

Collaboration Legislation

Cyber Security Strategy: Focus Areas

Page 5: Governance Requirements for Cyber Security -  · PDF fileGovernance Requirements for Cyber Security CK Bruce, CISA, ... IT’s Stakeholders. ... SONY Created Date: 10/15

Legislation

Cyber Security Strategy: Focus Areas

Page 6: Governance Requirements for Cyber Security -  · PDF fileGovernance Requirements for Cyber Security CK Bruce, CISA, ... IT’s Stakeholders. ... SONY Created Date: 10/15

• Criminalization of offences related to computer crime and cybercrime

• Institution of investigation mechanisms

• Use of electronic evidence in prosecution

• Creation of an environment that defines the obligations and restricts the liability of ISPs

LEGISLATION: FOCUS

Page 7: Governance Requirements for Cyber Security -  · PDF fileGovernance Requirements for Cyber Security CK Bruce, CISA, ... IT’s Stakeholders. ... SONY Created Date: 10/15

Collaboration

Cyber Security Strategy: Focus Areas

Page 8: Governance Requirements for Cyber Security -  · PDF fileGovernance Requirements for Cyber Security CK Bruce, CISA, ... IT’s Stakeholders. ... SONY Created Date: 10/15

COLLABORATION

National Collaboration International Collaboration

Government

Private Sector

Civil Society

Academia

GH

AU

UN

Partners

ECOWAS

Page 9: Governance Requirements for Cyber Security -  · PDF fileGovernance Requirements for Cyber Security CK Bruce, CISA, ... IT’s Stakeholders. ... SONY Created Date: 10/15

Culture

Cyber Security Strategy: Focus Areas

Page 10: Governance Requirements for Cyber Security -  · PDF fileGovernance Requirements for Cyber Security CK Bruce, CISA, ... IT’s Stakeholders. ... SONY Created Date: 10/15

Multi-disciplinary and multi-stakeholder approach

Promote awareness of risks at all levels

Embedding cyber security in wider aspects of policy formulation

Certification programs through public and private education institutions

Research and development

CULTURE

Page 11: Governance Requirements for Cyber Security -  · PDF fileGovernance Requirements for Cyber Security CK Bruce, CISA, ... IT’s Stakeholders. ... SONY Created Date: 10/15

Incident Management

Cyber Security Strategy: Focus Areas

Page 12: Governance Requirements for Cyber Security -  · PDF fileGovernance Requirements for Cyber Security CK Bruce, CISA, ... IT’s Stakeholders. ... SONY Created Date: 10/15

INCIDENT RESPONSE

Establishment of a Computer Security Incident Response Team

The first point of contact to address cyber incidents that may affect national critical information infrastructure

– detection, tracking, mitigation

- Alerts and warnings

-a part of hemispheric and international network of CSIRTS

Page 13: Governance Requirements for Cyber Security -  · PDF fileGovernance Requirements for Cyber Security CK Bruce, CISA, ... IT’s Stakeholders. ... SONY Created Date: 10/15

CAREER PATH: CYBERSECURITY CERTIFICATIONS

www.isaca.org/csx-certifications

CSX training and certifications offered for skill levels and specialties

throughout a professional’s career.

Page 14: Governance Requirements for Cyber Security -  · PDF fileGovernance Requirements for Cyber Security CK Bruce, CISA, ... IT’s Stakeholders. ... SONY Created Date: 10/15

Governance

Cyber Security Strategy: Focus Areas

Page 15: Governance Requirements for Cyber Security -  · PDF fileGovernance Requirements for Cyber Security CK Bruce, CISA, ... IT’s Stakeholders. ... SONY Created Date: 10/15

Frameworks helps build or augment a

security program that equips the enterprise

to keep pace with the evolving threats

Establish the right level of security for your environment

Inform cybersecurity budget planning

Communicate cyber risks comprehensively to Senior Leadership

Harmonize cybersecurity approaches and provide a common language

15

Page 16: Governance Requirements for Cyber Security -  · PDF fileGovernance Requirements for Cyber Security CK Bruce, CISA, ... IT’s Stakeholders. ... SONY Created Date: 10/15

Board and Executive

• Set direction for IT, monitor key results and insist on corrective measures

IT Management

• Delivers and improves IT services as required by the business

IT Audit

• Provides independent assurance to demonstrate that IT delivers what is needed

Risk & Compliance

• Measures compliance with related policies and focuses on identification/mitigation of new risks

Business Management

• Defines business requirements for IT and ensures that value is delivered and risks are managed

IT’s Stakeholders

Page 17: Governance Requirements for Cyber Security -  · PDF fileGovernance Requirements for Cyber Security CK Bruce, CISA, ... IT’s Stakeholders. ... SONY Created Date: 10/15

IT Governance Road Map Overview

Obtain support from senior management Cascade and

strengthen stakeholder roles and

responsibilities

Further strengthen environment with

specific Cybersecurity Frameworks

Establish the ISMS to create a secure, smooth operating

environment

Develop a strong service management capability to ensure that IT services is

supporting enterprise strategic objectives

Instill project management

practices

Page 18: Governance Requirements for Cyber Security -  · PDF fileGovernance Requirements for Cyber Security CK Bruce, CISA, ... IT’s Stakeholders. ... SONY Created Date: 10/15

Thank you