SlideShare una empresa de Scribd logo
1 de 21
1 | CONFIDENTIAL AND PRIVILEGED
Evolving Role of the CISO:
Reshaping the Cybersecurity Battlespace
Anthony G. Dupree CISO/CIO
2 | CONFIDENTIAL AND PRIVILEGED
My Background
A technology industry
veteran with over
two decades of
infrastructure and
security experience
Masters of Technology
- Stevens Institute of
Technology
Retired Lieutenant
Colonel Army Reserve
Officer - OEF/OIF
Bronze Star Recipient
Certified Information
Security Manager
& Certified Chief
Information Security
Officer
3 | CONFIDENTIAL AND PRIVILEGED
Problem Statement
Information Security
is a business risk, not just
an information technology
problem
The long information
security war
Which frameworks to use
for the present and future
(Perimeter Security vs
Borderless Security)
Effective information
security program –
What are the requirements?
Hiring the right type of
Chief Information
Security Officer
How to hire the right person
for your security team
Use of Artificial Intelligence
Foe or Friend?
4 | CONFIDENTIAL AND PRIVILEGED
Our World
Data Breaches
"There are only two types of companies –
firms that were hacked and those that will be.”
Former FBI Director Robert Mueller
5 | CONFIDENTIAL AND PRIVILEGED
Current CISO Role
The information security leader for an organization.
The CISO must equip to have ‘awareness’ of the infrastructure as a whole – to feel the problems,
to detect the symptoms. We must understand weaknesses, threats and risks.
We must strengthen defense capabilities, have the means to carry out further analysis in case of doubt,
to inoculate or provide other remediation, and even to containment in the event of the spread of deadly
malware or viruses .
CISOs are coordinators and facilitators across teams to advise and assist in the problem resolution. The
ability to effectively lead the technical experts.
Executive presence and skills to effectively lead, develop, communicate and sell the security program.
A deep technical awareness of the security ecosystem.
Chief Information Security Officer is rapidly becoming indispensable for an organization’s survival.
6 | CONFIDENTIAL AND PRIVILEGED
Our Responsibilities
To protect your organization’s brand, reputation and customer confidential information
through an Information Security Program
Ensure customer and employee information
is classified as an asset!!!
Define security requirements, establish baselines
and measure compliance, based on applicable
laws, regulations and best practices.
Develop processes, procedures and policies
required for the protection of confidential
information.
• Collaborate with key stakeholders, administrators and
technical staff to develop the information security
strategy and architecture.
• Ensure incident response and disaster recovery plans
are developed and implemented.
• Respond to and recover from disruptive and
destructive information security events.
• Increase awareness of information security through
training and communication.
7 | CONFIDENTIAL AND PRIVILEGED
Information Security Basics
https://www.opentext.com/products-and-solutions/business-needs/information-governance/ensure-compliance/information-security-and-privacy
Information
Security
ConfidentialityIntegrity
Availability
Protecting the Data Protecting the Infrastructure Protecting the People / Organization
Through innovation and agility = Drive Enterprise Growth
Taking data protection personallyAdding Value to IT Infrastructure
Security Risk
8 | CONFIDENTIAL AND PRIVILEGED8 |
Information Security Methodology
Information
Security Program
Incident Management
& Response
Training, Awareness
& Communications
Information Security Governance,
Risk & Compliance
Policy, Standards & Baselines
Technical Controls
Operational Controls
9 | CONFIDENTIAL AND PRIVILEGED
Types of CISO for today
and tomorrow
Key skills needed
as a CISO
CISO reporting
Hiring the Right CISO
• That depends on your
organization
• Key is independence
authority
• Effective communication
and leadership
• Metrics-based approach
• Technical savvy –
experience
• Check the box CISO
• The house is on fire CISO
• Risk and Measured Based
CISO
10 | CONFIDENTIAL AND PRIVILEGED
Tomorrow CISO
http://www.typargeosynthetics.com/products/geocells/defencell---military-and-security-geocell.html
11 | CONFIDENTIAL AND PRIVILEGED
Evolving Cybersecurity Environment
CISOs now must be a business enabler and must keep
the various lines of business and departments focused,
functioning and moving forward on a day-to-day basis.
Key business areas which CISO must be able to address:
• How can information security help generate, protect and
ensure revenue?
• How can information security help retain existing customers?
• How can information security help differentiate
against competitors?
• How can information security drive operational efficiencies
and effectiveness?
Compliance regulations like General Data Protection
Regulation (GDPR), is challenging the status quo of IT
operations, especially considering how much regulated
data is entrenched in normal business operations.
We must analyze, predict and prepare for the future
strengths, weaknesses, opportunities and threats - SWOT
We must ensure that the organization is disciplined in the
day to day operations
Become proficient in addressing today’s more
expansive expectations
How do CISO measure success? Risk based
12 | CONFIDENTIAL AND PRIVILEGED
Perimeter Security – legacy
http://www.typargeosynthetics.com/products/geocells/defencell---military-and-security-geocell.html
13 | CONFIDENTIAL AND PRIVILEGED
Security Evolution
Drivers
• Application and users
are everywhere
• Borders are leaky
• Mobile and IOT
• Use of public cloud, private cloud,
hybrid cloud or combination of all
• Transporting of sensitive data
Borderless Security
Secure
Connectivity
General
Cloud
Security
Data Loss
Prevention
Threat
Response and
Containment
Context –
Aware
Access
Control
Think Outside the Box
Stay in the Circle
14 | CONFIDENTIAL AND PRIVILEGED
Information Security Frameworks / Standards
Security Model – Business Drives Security
http://www.jirasekonsecurity.com/2011/10/security-model-business-oriented.html
ISO 27001
NIST
COBIT
GDPR
FEDRAMP
SSAE-18
SANS
PCI – DSS
FISMA
HIPAA
HITRUST
IRS PUB 1075
Security
threats
International
security
standards
Laws
& regulations
Compliance
requirements
Business
objectives
Risks &
Compliance
CEO & Board
Governance
Line
Management
Product
Management
Auditors
Security
Professionals
Program
Management
Managing Risk
Drivers Rules Measure
Security Management
Correction of Security Processes
Policy Framework Process Framework Metrics Framework
Information Security
Policies
Information Security
Standards
Information Security
Artefacts
Security Intelligence
Information Security
Processes
People
Technology
Information Security
Metrics Objectives
Security Metrics Portal
Define security controls Execute security controls
Measure security controls
maturity
Inform
External
Security Metrics
Define
15 | CONFIDENTIAL AND PRIVILEGED
Information Security Frameworks/Models to Consider
Zero Trust
• This is a security concept centered on the belief that organizations should not automatically trust anything inside or outside its
perimeters and instead must verify anything and everything trying to connect to its systems before granting access. (tactical)
NIST Cyber Security
Framework
• This framework provides the company the ability to establish policy framework and guidance to identify, protect, detect,
respond and recover from cyber attacks. (strategic)
Defense in Depth
Approach
• The model is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered
defense system than to penetrate a single This layered methodology leverages people, technology and operational processes
to meet the most rigorous standards of data confidentiality, integrity and availability, supporting the ongoing security of mission-
critical data. It requires identifying and applying controls to all of the different possible means by which a bad actor can access
data from. (operational)
16 | CONFIDENTIAL AND PRIVILEGED
Hiring the Right Team Members
Bridging the skills gap
Defining the exact skills that you need
Consider flexing your educational requirements
Ask the right questions during the interview
Do a hands-on interview
Business understanding
Culture fit
Information security team member traits
• Attention to detail
• Think like a hacker
• Analytical
• Minimum supervision
• Follow up and close the loop
• Continuous learner
• Persistence
• Curious and perceptive
• Instinctive
• Having a well-rounded skill set
17 | CONFIDENTIAL AND PRIVILEGED
AI - Information Security
https://www.cso.com.au/article/624361/security-ai-explodes-lack-efficacy-comparisons-leaves-csos-flying-blind/
“AI and machine learning (ML) technologies has grown significantly,
fueled by companies’ increasing desire for sustainable tools that detect and
classify security threats based on behavior that often has never been seen before.
Continued dependence on antiquated legacy systems is not sustainable.”
18 | CONFIDENTIAL AND PRIVILEGED
Tomorrow’s CISO
You must be a business enabler and strategic leader.
To be successful, CISOs must speak the language of business.
Must be able to understand how my company operates and how I can make it grow.
It's important to achieve alignment between IT security and lines of business.
Building visibility
• Understanding and secure the environment
• Understanding attack vectors – use of AI and machine learning
• Being surgical in purchasing tools / services
Must have strong moral compass. If I see something wrong, I fix it, without looking for credit.
Resolving security issues and gaps
• Use of different frameworks will assist in the your remediation roadmap
Application Centric
Must have opportunities to regularly report to the CEO and board of directors
Reducing Risk
• Understand your risk profile – created risk register
• Outside audits
19 | CONFIDENTIAL AND PRIVILEGED
Information Security as a Continuous Process
Plan Build Run
Identify Risk
Analyze/Synthesize Risk
Build
Execute
External
Customers
Vendors
Partners
Incidents
Internal
Projects
Observation
Requests
Incidents
Audits, Compliance Tools Implement Controls
Report Finalization
Recommendations
Requirements
Data Gathering
Assess Risks
Best Practices
Regulations Policies
Compliance
Protect
the Company
Brand
20 | CONFIDENTIAL AND PRIVILEGED
Conclusion
• Proper management of this industry can only be achieved by the cooperation among
industry vendors, policymakers, regulators and organizations while encouraging open
and transparent processes.
• Information security is a topic that has and will become even more critical in the future,
as technology continues to evolve and become integrated into our lives in ways that we
can’t even imagine.
• Use several frameworks and model (no one framework fits all), integrated security
(people, process and technology), and view information security as a continuous
process.
• Use of advisory and managed services is important - increases your credibility
and confirms validation.
• Use of Scorecards for the board - must be risk based
• Use of soft skill – keep it simple.
• YOU ARE IMPORTANT!!!
21 | CONFIDENTIAL AND PRIVILEGED
Evolving Role of the CISO:
Reshaping the Cybersecurity Battlespace
Anthony G. Dupree CISO/CIO

Más contenido relacionado

La actualidad más candente

What it Takes to be a CISO in 2017
What it Takes to be a CISO in 2017What it Takes to be a CISO in 2017
What it Takes to be a CISO in 2017Doug Copley
 
CISSO Certification | CISSO Training | CISSO
CISSO Certification | CISSO Training | CISSOCISSO Certification | CISSO Training | CISSO
CISSO Certification | CISSO Training | CISSOSagarNegi10
 
DSS ITSEC 2013 Conference 07.11.2013 - IBM Security Strategy
DSS ITSEC 2013 Conference 07.11.2013 - IBM Security StrategyDSS ITSEC 2013 Conference 07.11.2013 - IBM Security Strategy
DSS ITSEC 2013 Conference 07.11.2013 - IBM Security StrategyAndris Soroka
 
Information Security Management Education Program - Concept Document
Information Security Management Education Program - Concept Document Information Security Management Education Program - Concept Document
Information Security Management Education Program - Concept Document Dinesh O Bareja
 
The CISO in 2020: Prepare for the Unexpected
The CISO in 2020: Prepare for the UnexpectedThe CISO in 2020: Prepare for the Unexpected
The CISO in 2020: Prepare for the UnexpectedIBM Security
 
The Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt
The Journey to Cyber Resilience in a World of Fear, Uncertainty and DoubtThe Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt
The Journey to Cyber Resilience in a World of Fear, Uncertainty and DoubtJohn D. Johnson
 
Information Systems Policy
Information Systems PolicyInformation Systems Policy
Information Systems PolicyAli Sadhik Shaik
 
Cybersecurity solution-guide
Cybersecurity solution-guideCybersecurity solution-guide
Cybersecurity solution-guideAdilsonSuende
 
A New Remedy for the Cyber Storm Approaching
A New Remedy for the Cyber Storm ApproachingA New Remedy for the Cyber Storm Approaching
A New Remedy for the Cyber Storm ApproachingSPI Conference
 
Information Systems Security & Strategy
Information Systems Security & StrategyInformation Systems Security & Strategy
Information Systems Security & StrategyTony Hauxwell
 
The Role of Information Security Policy
The Role of Information Security PolicyThe Role of Information Security Policy
The Role of Information Security PolicyRobot Mode
 
IANS 2015 RSA Presentation
IANS 2015 RSA PresentationIANS 2015 RSA Presentation
IANS 2015 RSA PresentationAndrew Sanders
 
IT Information Security Management Principles, 15 - 18 May 2016 Dubai UAE
IT Information Security Management Principles, 15 - 18 May 2016 Dubai UAEIT Information Security Management Principles, 15 - 18 May 2016 Dubai UAE
IT Information Security Management Principles, 15 - 18 May 2016 Dubai UAE360 BSI
 
IT Information Security Management Principles, 23 - 26 November 2015 Dubai UAE
IT Information Security Management Principles, 23 - 26 November 2015 Dubai UAEIT Information Security Management Principles, 23 - 26 November 2015 Dubai UAE
IT Information Security Management Principles, 23 - 26 November 2015 Dubai UAE360 BSI
 
Information Security It's All About Compliance
Information Security   It's All About ComplianceInformation Security   It's All About Compliance
Information Security It's All About ComplianceDinesh O Bareja
 
Dealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber ResilienceDealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber ResilienceDonald Tabone
 
Security and personnel bp11521
Security and personnel bp11521Security and personnel bp11521
Security and personnel bp11521Merlin Florrence
 
Shift Toward Dynamic Cyber Resilience
Shift Toward Dynamic Cyber ResilienceShift Toward Dynamic Cyber Resilience
Shift Toward Dynamic Cyber ResilienceDarren Argyle
 
Building an effective Information Security Roadmap
Building an effective Information Security RoadmapBuilding an effective Information Security Roadmap
Building an effective Information Security RoadmapElliott Franklin
 

La actualidad más candente (20)

What it Takes to be a CISO in 2017
What it Takes to be a CISO in 2017What it Takes to be a CISO in 2017
What it Takes to be a CISO in 2017
 
CISSO Certification | CISSO Training | CISSO
CISSO Certification | CISSO Training | CISSOCISSO Certification | CISSO Training | CISSO
CISSO Certification | CISSO Training | CISSO
 
DSS ITSEC 2013 Conference 07.11.2013 - IBM Security Strategy
DSS ITSEC 2013 Conference 07.11.2013 - IBM Security StrategyDSS ITSEC 2013 Conference 07.11.2013 - IBM Security Strategy
DSS ITSEC 2013 Conference 07.11.2013 - IBM Security Strategy
 
Information Security Management Education Program - Concept Document
Information Security Management Education Program - Concept Document Information Security Management Education Program - Concept Document
Information Security Management Education Program - Concept Document
 
The CISO in 2020: Prepare for the Unexpected
The CISO in 2020: Prepare for the UnexpectedThe CISO in 2020: Prepare for the Unexpected
The CISO in 2020: Prepare for the Unexpected
 
The Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt
The Journey to Cyber Resilience in a World of Fear, Uncertainty and DoubtThe Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt
The Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt
 
Information Systems Policy
Information Systems PolicyInformation Systems Policy
Information Systems Policy
 
Cybersecurity solution-guide
Cybersecurity solution-guideCybersecurity solution-guide
Cybersecurity solution-guide
 
A New Remedy for the Cyber Storm Approaching
A New Remedy for the Cyber Storm ApproachingA New Remedy for the Cyber Storm Approaching
A New Remedy for the Cyber Storm Approaching
 
Information Systems Security & Strategy
Information Systems Security & StrategyInformation Systems Security & Strategy
Information Systems Security & Strategy
 
The Role of Information Security Policy
The Role of Information Security PolicyThe Role of Information Security Policy
The Role of Information Security Policy
 
IANS 2015 RSA Presentation
IANS 2015 RSA PresentationIANS 2015 RSA Presentation
IANS 2015 RSA Presentation
 
IT Information Security Management Principles, 15 - 18 May 2016 Dubai UAE
IT Information Security Management Principles, 15 - 18 May 2016 Dubai UAEIT Information Security Management Principles, 15 - 18 May 2016 Dubai UAE
IT Information Security Management Principles, 15 - 18 May 2016 Dubai UAE
 
IT Information Security Management Principles, 23 - 26 November 2015 Dubai UAE
IT Information Security Management Principles, 23 - 26 November 2015 Dubai UAEIT Information Security Management Principles, 23 - 26 November 2015 Dubai UAE
IT Information Security Management Principles, 23 - 26 November 2015 Dubai UAE
 
Information Security It's All About Compliance
Information Security   It's All About ComplianceInformation Security   It's All About Compliance
Information Security It's All About Compliance
 
Dealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber ResilienceDealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber Resilience
 
Security and personnel bp11521
Security and personnel bp11521Security and personnel bp11521
Security and personnel bp11521
 
Personnel security
Personnel securityPersonnel security
Personnel security
 
Shift Toward Dynamic Cyber Resilience
Shift Toward Dynamic Cyber ResilienceShift Toward Dynamic Cyber Resilience
Shift Toward Dynamic Cyber Resilience
 
Building an effective Information Security Roadmap
Building an effective Information Security RoadmapBuilding an effective Information Security Roadmap
Building an effective Information Security Roadmap
 

Similar a Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshaping the Cybersecurity Battlespace"

IT governance and Information System Security
IT governance and Information System SecurityIT governance and Information System Security
IT governance and Information System SecurityCSSRL PUNE
 
CISSO Certification| CISSO Training | CISSO
CISSO Certification|  CISSO Training | CISSOCISSO Certification|  CISSO Training | CISSO
CISSO Certification| CISSO Training | CISSOSagarNegi10
 
NUS-ISS Learning Day 2019-Architecting security in the digital age
NUS-ISS Learning Day 2019-Architecting security in the digital ageNUS-ISS Learning Day 2019-Architecting security in the digital age
NUS-ISS Learning Day 2019-Architecting security in the digital ageNUS-ISS
 
Infocon Bangladesh 2016
Infocon Bangladesh 2016Infocon Bangladesh 2016
Infocon Bangladesh 2016Prime Infoserv
 
A CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk ManagementA CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk ManagementDaren Dunkel
 
IT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAE
IT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAEIT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAE
IT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAE360 BSI
 
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAEIT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE360 BSI
 
IT Security Architecture & Leadership, 24 - 27 November 2013 Dubai UAE
IT Security Architecture & Leadership, 24 - 27 November 2013 Dubai UAEIT Security Architecture & Leadership, 24 - 27 November 2013 Dubai UAE
IT Security Architecture & Leadership, 24 - 27 November 2013 Dubai UAE360 BSI
 
New technologies - Amer Haza'a
New technologies - Amer Haza'aNew technologies - Amer Haza'a
New technologies - Amer Haza'aFahmi Albaheth
 
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...360 BSI
 
Information Security vs IT - Key Roles & Responsibilities
Information Security vs IT - Key Roles & ResponsibilitiesInformation Security vs IT - Key Roles & Responsibilities
Information Security vs IT - Key Roles & ResponsibilitiesKroll
 
MCGlobalTech Service Presentation
MCGlobalTech Service PresentationMCGlobalTech Service Presentation
MCGlobalTech Service PresentationWilliam McBorrough
 
Presentation 1.pptx
Presentation 1.pptxPresentation 1.pptx
Presentation 1.pptxrabeetkashif
 
Ravi i ot-security
Ravi i ot-securityRavi i ot-security
Ravi i ot-securityskumartarget
 
MCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationMCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationWilliam McBorrough
 
IT Information Security Management Principles, 28 February - 02 March 2016 Du...
IT Information Security Management Principles, 28 February - 02 March 2016 Du...IT Information Security Management Principles, 28 February - 02 March 2016 Du...
IT Information Security Management Principles, 28 February - 02 March 2016 Du...360 BSI
 
Cyber resilience itsm academy_april2015
Cyber resilience itsm academy_april2015Cyber resilience itsm academy_april2015
Cyber resilience itsm academy_april2015ITSM Academy, Inc.
 
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptxTop_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptxinfosec train
 
IT Risk Management & Leadership 23 - 26 June 2013 Dubai
IT Risk Management & Leadership 23 - 26 June 2013 DubaiIT Risk Management & Leadership 23 - 26 June 2013 Dubai
IT Risk Management & Leadership 23 - 26 June 2013 Dubai360 BSI
 

Similar a Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshaping the Cybersecurity Battlespace" (20)

IT governance and Information System Security
IT governance and Information System SecurityIT governance and Information System Security
IT governance and Information System Security
 
CISSO Certification| CISSO Training | CISSO
CISSO Certification|  CISSO Training | CISSOCISSO Certification|  CISSO Training | CISSO
CISSO Certification| CISSO Training | CISSO
 
NUS-ISS Learning Day 2019-Architecting security in the digital age
NUS-ISS Learning Day 2019-Architecting security in the digital ageNUS-ISS Learning Day 2019-Architecting security in the digital age
NUS-ISS Learning Day 2019-Architecting security in the digital age
 
Infocon Bangladesh 2016
Infocon Bangladesh 2016Infocon Bangladesh 2016
Infocon Bangladesh 2016
 
Information & Cyber Security Risk
Information & Cyber Security RiskInformation & Cyber Security Risk
Information & Cyber Security Risk
 
A CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk ManagementA CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk Management
 
IT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAE
IT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAEIT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAE
IT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAE
 
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAEIT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
 
IT Security Architecture & Leadership, 24 - 27 November 2013 Dubai UAE
IT Security Architecture & Leadership, 24 - 27 November 2013 Dubai UAEIT Security Architecture & Leadership, 24 - 27 November 2013 Dubai UAE
IT Security Architecture & Leadership, 24 - 27 November 2013 Dubai UAE
 
New technologies - Amer Haza'a
New technologies - Amer Haza'aNew technologies - Amer Haza'a
New technologies - Amer Haza'a
 
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
 
Information Security vs IT - Key Roles & Responsibilities
Information Security vs IT - Key Roles & ResponsibilitiesInformation Security vs IT - Key Roles & Responsibilities
Information Security vs IT - Key Roles & Responsibilities
 
MCGlobalTech Service Presentation
MCGlobalTech Service PresentationMCGlobalTech Service Presentation
MCGlobalTech Service Presentation
 
Presentation 1.pptx
Presentation 1.pptxPresentation 1.pptx
Presentation 1.pptx
 
Ravi i ot-security
Ravi i ot-securityRavi i ot-security
Ravi i ot-security
 
MCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationMCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service Presentation
 
IT Information Security Management Principles, 28 February - 02 March 2016 Du...
IT Information Security Management Principles, 28 February - 02 March 2016 Du...IT Information Security Management Principles, 28 February - 02 March 2016 Du...
IT Information Security Management Principles, 28 February - 02 March 2016 Du...
 
Cyber resilience itsm academy_april2015
Cyber resilience itsm academy_april2015Cyber resilience itsm academy_april2015
Cyber resilience itsm academy_april2015
 
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptxTop_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
 
IT Risk Management & Leadership 23 - 26 June 2013 Dubai
IT Risk Management & Leadership 23 - 26 June 2013 DubaiIT Risk Management & Leadership 23 - 26 June 2013 Dubai
IT Risk Management & Leadership 23 - 26 June 2013 Dubai
 

Más de EC-Council

CyberOm - Hacking the Wellness Code in a Chaotic Cyber World
CyberOm - Hacking the Wellness Code in a Chaotic Cyber WorldCyberOm - Hacking the Wellness Code in a Chaotic Cyber World
CyberOm - Hacking the Wellness Code in a Chaotic Cyber WorldEC-Council
 
Cloud Security Architecture - a different approach
Cloud Security Architecture - a different approachCloud Security Architecture - a different approach
Cloud Security Architecture - a different approachEC-Council
 
Phases of Incident Response
Phases of Incident ResponsePhases of Incident Response
Phases of Incident ResponseEC-Council
 
Weaponizing OSINT – Hacker Halted 2019 – Michael James
 Weaponizing OSINT – Hacker Halted 2019 – Michael James  Weaponizing OSINT – Hacker Halted 2019 – Michael James
Weaponizing OSINT – Hacker Halted 2019 – Michael James EC-Council
 
Hacking Your Career – Hacker Halted 2019 – Keith Turpin
Hacking Your Career – Hacker Halted 2019 – Keith TurpinHacking Your Career – Hacker Halted 2019 – Keith Turpin
Hacking Your Career – Hacker Halted 2019 – Keith TurpinEC-Council
 
Hacking Diversity – Hacker Halted . 2019 – Marcelle Lee
Hacking Diversity – Hacker Halted . 2019 – Marcelle LeeHacking Diversity – Hacker Halted . 2019 – Marcelle Lee
Hacking Diversity – Hacker Halted . 2019 – Marcelle LeeEC-Council
 
Cloud Proxy Technology – Hacker Halted 2019 – Jeff Silver
Cloud Proxy Technology – Hacker Halted 2019 – Jeff SilverCloud Proxy Technology – Hacker Halted 2019 – Jeff Silver
Cloud Proxy Technology – Hacker Halted 2019 – Jeff SilverEC-Council
 
DNS – Strategies for Reducing Data Leakage & Protecting Online Privacy – Hack...
DNS – Strategies for Reducing Data Leakage & Protecting Online Privacy – Hack...DNS – Strategies for Reducing Data Leakage & Protecting Online Privacy – Hack...
DNS – Strategies for Reducing Data Leakage & Protecting Online Privacy – Hack...EC-Council
 
Data in cars can be creepy – Hacker Halted 2019 – Andrea Amico
Data in cars can be creepy – Hacker Halted 2019 – Andrea AmicoData in cars can be creepy – Hacker Halted 2019 – Andrea Amico
Data in cars can be creepy – Hacker Halted 2019 – Andrea AmicoEC-Council
 
Breaking Smart [Bank] Statements – Hacker Halted 2019 – Manuel Nader
Breaking Smart [Bank] Statements – Hacker Halted 2019 – Manuel NaderBreaking Smart [Bank] Statements – Hacker Halted 2019 – Manuel Nader
Breaking Smart [Bank] Statements – Hacker Halted 2019 – Manuel NaderEC-Council
 
Are your cloud servers under attack?– Hacker Halted 2019 – Brian Hileman
Are your cloud servers under attack?– Hacker Halted 2019 – Brian HilemanAre your cloud servers under attack?– Hacker Halted 2019 – Brian Hileman
Are your cloud servers under attack?– Hacker Halted 2019 – Brian HilemanEC-Council
 
War Game: Ransomware – Global CISO Forum 2019
War Game: Ransomware – Global CISO Forum 2019War Game: Ransomware – Global CISO Forum 2019
War Game: Ransomware – Global CISO Forum 2019EC-Council
 
How to become a Security Behavior Alchemist – Global CISO Forum 2019 – Perry ...
How to become a Security Behavior Alchemist – Global CISO Forum 2019 – Perry ...How to become a Security Behavior Alchemist – Global CISO Forum 2019 – Perry ...
How to become a Security Behavior Alchemist – Global CISO Forum 2019 – Perry ...EC-Council
 
Introduction to FAIR Risk Methodology – Global CISO Forum 2019 – Donna Gall...
Introduction to FAIR Risk Methodology – Global CISO Forum 2019  –  Donna Gall...Introduction to FAIR Risk Methodology – Global CISO Forum 2019  –  Donna Gall...
Introduction to FAIR Risk Methodology – Global CISO Forum 2019 – Donna Gall...EC-Council
 
Alexa is a snitch! Hacker Halted 2019 - Wes Widner
Alexa is a snitch! Hacker Halted 2019 - Wes WidnerAlexa is a snitch! Hacker Halted 2019 - Wes Widner
Alexa is a snitch! Hacker Halted 2019 - Wes WidnerEC-Council
 
Hacker Halted 2018: Don't Panic! Big Data Analytics vs. Law Enforcement
Hacker Halted 2018: Don't Panic! Big Data Analytics vs. Law EnforcementHacker Halted 2018: Don't Panic! Big Data Analytics vs. Law Enforcement
Hacker Halted 2018: Don't Panic! Big Data Analytics vs. Law EnforcementEC-Council
 
Hacker Halted 2018: HACKING TRILLIAN: A 42-STEP SOLUTION TO EXPLOIT POST-VOGA...
Hacker Halted 2018: HACKING TRILLIAN: A 42-STEP SOLUTION TO EXPLOIT POST-VOGA...Hacker Halted 2018: HACKING TRILLIAN: A 42-STEP SOLUTION TO EXPLOIT POST-VOGA...
Hacker Halted 2018: HACKING TRILLIAN: A 42-STEP SOLUTION TO EXPLOIT POST-VOGA...EC-Council
 
Hacker Halted 2018: Breaking the Bad News: How to Prevent Your IR Messages fr...
Hacker Halted 2018: Breaking the Bad News: How to Prevent Your IR Messages fr...Hacker Halted 2018: Breaking the Bad News: How to Prevent Your IR Messages fr...
Hacker Halted 2018: Breaking the Bad News: How to Prevent Your IR Messages fr...EC-Council
 
Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...
Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...
Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...EC-Council
 
Hacker Halted 2018: SE vs Predator: Using Social Engineering in ways I never ...
Hacker Halted 2018: SE vs Predator: Using Social Engineering in ways I never ...Hacker Halted 2018: SE vs Predator: Using Social Engineering in ways I never ...
Hacker Halted 2018: SE vs Predator: Using Social Engineering in ways I never ...EC-Council
 

Más de EC-Council (20)

CyberOm - Hacking the Wellness Code in a Chaotic Cyber World
CyberOm - Hacking the Wellness Code in a Chaotic Cyber WorldCyberOm - Hacking the Wellness Code in a Chaotic Cyber World
CyberOm - Hacking the Wellness Code in a Chaotic Cyber World
 
Cloud Security Architecture - a different approach
Cloud Security Architecture - a different approachCloud Security Architecture - a different approach
Cloud Security Architecture - a different approach
 
Phases of Incident Response
Phases of Incident ResponsePhases of Incident Response
Phases of Incident Response
 
Weaponizing OSINT – Hacker Halted 2019 – Michael James
 Weaponizing OSINT – Hacker Halted 2019 – Michael James  Weaponizing OSINT – Hacker Halted 2019 – Michael James
Weaponizing OSINT – Hacker Halted 2019 – Michael James
 
Hacking Your Career – Hacker Halted 2019 – Keith Turpin
Hacking Your Career – Hacker Halted 2019 – Keith TurpinHacking Your Career – Hacker Halted 2019 – Keith Turpin
Hacking Your Career – Hacker Halted 2019 – Keith Turpin
 
Hacking Diversity – Hacker Halted . 2019 – Marcelle Lee
Hacking Diversity – Hacker Halted . 2019 – Marcelle LeeHacking Diversity – Hacker Halted . 2019 – Marcelle Lee
Hacking Diversity – Hacker Halted . 2019 – Marcelle Lee
 
Cloud Proxy Technology – Hacker Halted 2019 – Jeff Silver
Cloud Proxy Technology – Hacker Halted 2019 – Jeff SilverCloud Proxy Technology – Hacker Halted 2019 – Jeff Silver
Cloud Proxy Technology – Hacker Halted 2019 – Jeff Silver
 
DNS – Strategies for Reducing Data Leakage & Protecting Online Privacy – Hack...
DNS – Strategies for Reducing Data Leakage & Protecting Online Privacy – Hack...DNS – Strategies for Reducing Data Leakage & Protecting Online Privacy – Hack...
DNS – Strategies for Reducing Data Leakage & Protecting Online Privacy – Hack...
 
Data in cars can be creepy – Hacker Halted 2019 – Andrea Amico
Data in cars can be creepy – Hacker Halted 2019 – Andrea AmicoData in cars can be creepy – Hacker Halted 2019 – Andrea Amico
Data in cars can be creepy – Hacker Halted 2019 – Andrea Amico
 
Breaking Smart [Bank] Statements – Hacker Halted 2019 – Manuel Nader
Breaking Smart [Bank] Statements – Hacker Halted 2019 – Manuel NaderBreaking Smart [Bank] Statements – Hacker Halted 2019 – Manuel Nader
Breaking Smart [Bank] Statements – Hacker Halted 2019 – Manuel Nader
 
Are your cloud servers under attack?– Hacker Halted 2019 – Brian Hileman
Are your cloud servers under attack?– Hacker Halted 2019 – Brian HilemanAre your cloud servers under attack?– Hacker Halted 2019 – Brian Hileman
Are your cloud servers under attack?– Hacker Halted 2019 – Brian Hileman
 
War Game: Ransomware – Global CISO Forum 2019
War Game: Ransomware – Global CISO Forum 2019War Game: Ransomware – Global CISO Forum 2019
War Game: Ransomware – Global CISO Forum 2019
 
How to become a Security Behavior Alchemist – Global CISO Forum 2019 – Perry ...
How to become a Security Behavior Alchemist – Global CISO Forum 2019 – Perry ...How to become a Security Behavior Alchemist – Global CISO Forum 2019 – Perry ...
How to become a Security Behavior Alchemist – Global CISO Forum 2019 – Perry ...
 
Introduction to FAIR Risk Methodology – Global CISO Forum 2019 – Donna Gall...
Introduction to FAIR Risk Methodology – Global CISO Forum 2019  –  Donna Gall...Introduction to FAIR Risk Methodology – Global CISO Forum 2019  –  Donna Gall...
Introduction to FAIR Risk Methodology – Global CISO Forum 2019 – Donna Gall...
 
Alexa is a snitch! Hacker Halted 2019 - Wes Widner
Alexa is a snitch! Hacker Halted 2019 - Wes WidnerAlexa is a snitch! Hacker Halted 2019 - Wes Widner
Alexa is a snitch! Hacker Halted 2019 - Wes Widner
 
Hacker Halted 2018: Don't Panic! Big Data Analytics vs. Law Enforcement
Hacker Halted 2018: Don't Panic! Big Data Analytics vs. Law EnforcementHacker Halted 2018: Don't Panic! Big Data Analytics vs. Law Enforcement
Hacker Halted 2018: Don't Panic! Big Data Analytics vs. Law Enforcement
 
Hacker Halted 2018: HACKING TRILLIAN: A 42-STEP SOLUTION TO EXPLOIT POST-VOGA...
Hacker Halted 2018: HACKING TRILLIAN: A 42-STEP SOLUTION TO EXPLOIT POST-VOGA...Hacker Halted 2018: HACKING TRILLIAN: A 42-STEP SOLUTION TO EXPLOIT POST-VOGA...
Hacker Halted 2018: HACKING TRILLIAN: A 42-STEP SOLUTION TO EXPLOIT POST-VOGA...
 
Hacker Halted 2018: Breaking the Bad News: How to Prevent Your IR Messages fr...
Hacker Halted 2018: Breaking the Bad News: How to Prevent Your IR Messages fr...Hacker Halted 2018: Breaking the Bad News: How to Prevent Your IR Messages fr...
Hacker Halted 2018: Breaking the Bad News: How to Prevent Your IR Messages fr...
 
Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...
Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...
Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...
 
Hacker Halted 2018: SE vs Predator: Using Social Engineering in ways I never ...
Hacker Halted 2018: SE vs Predator: Using Social Engineering in ways I never ...Hacker Halted 2018: SE vs Predator: Using Social Engineering in ways I never ...
Hacker Halted 2018: SE vs Predator: Using Social Engineering in ways I never ...
 

Último

Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 

Último (20)

Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 

Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshaping the Cybersecurity Battlespace"

  • 1. 1 | CONFIDENTIAL AND PRIVILEGED Evolving Role of the CISO: Reshaping the Cybersecurity Battlespace Anthony G. Dupree CISO/CIO
  • 2. 2 | CONFIDENTIAL AND PRIVILEGED My Background A technology industry veteran with over two decades of infrastructure and security experience Masters of Technology - Stevens Institute of Technology Retired Lieutenant Colonel Army Reserve Officer - OEF/OIF Bronze Star Recipient Certified Information Security Manager & Certified Chief Information Security Officer
  • 3. 3 | CONFIDENTIAL AND PRIVILEGED Problem Statement Information Security is a business risk, not just an information technology problem The long information security war Which frameworks to use for the present and future (Perimeter Security vs Borderless Security) Effective information security program – What are the requirements? Hiring the right type of Chief Information Security Officer How to hire the right person for your security team Use of Artificial Intelligence Foe or Friend?
  • 4. 4 | CONFIDENTIAL AND PRIVILEGED Our World Data Breaches "There are only two types of companies – firms that were hacked and those that will be.” Former FBI Director Robert Mueller
  • 5. 5 | CONFIDENTIAL AND PRIVILEGED Current CISO Role The information security leader for an organization. The CISO must equip to have ‘awareness’ of the infrastructure as a whole – to feel the problems, to detect the symptoms. We must understand weaknesses, threats and risks. We must strengthen defense capabilities, have the means to carry out further analysis in case of doubt, to inoculate or provide other remediation, and even to containment in the event of the spread of deadly malware or viruses . CISOs are coordinators and facilitators across teams to advise and assist in the problem resolution. The ability to effectively lead the technical experts. Executive presence and skills to effectively lead, develop, communicate and sell the security program. A deep technical awareness of the security ecosystem. Chief Information Security Officer is rapidly becoming indispensable for an organization’s survival.
  • 6. 6 | CONFIDENTIAL AND PRIVILEGED Our Responsibilities To protect your organization’s brand, reputation and customer confidential information through an Information Security Program Ensure customer and employee information is classified as an asset!!! Define security requirements, establish baselines and measure compliance, based on applicable laws, regulations and best practices. Develop processes, procedures and policies required for the protection of confidential information. • Collaborate with key stakeholders, administrators and technical staff to develop the information security strategy and architecture. • Ensure incident response and disaster recovery plans are developed and implemented. • Respond to and recover from disruptive and destructive information security events. • Increase awareness of information security through training and communication.
  • 7. 7 | CONFIDENTIAL AND PRIVILEGED Information Security Basics https://www.opentext.com/products-and-solutions/business-needs/information-governance/ensure-compliance/information-security-and-privacy Information Security ConfidentialityIntegrity Availability Protecting the Data Protecting the Infrastructure Protecting the People / Organization Through innovation and agility = Drive Enterprise Growth Taking data protection personallyAdding Value to IT Infrastructure Security Risk
  • 8. 8 | CONFIDENTIAL AND PRIVILEGED8 | Information Security Methodology Information Security Program Incident Management & Response Training, Awareness & Communications Information Security Governance, Risk & Compliance Policy, Standards & Baselines Technical Controls Operational Controls
  • 9. 9 | CONFIDENTIAL AND PRIVILEGED Types of CISO for today and tomorrow Key skills needed as a CISO CISO reporting Hiring the Right CISO • That depends on your organization • Key is independence authority • Effective communication and leadership • Metrics-based approach • Technical savvy – experience • Check the box CISO • The house is on fire CISO • Risk and Measured Based CISO
  • 10. 10 | CONFIDENTIAL AND PRIVILEGED Tomorrow CISO http://www.typargeosynthetics.com/products/geocells/defencell---military-and-security-geocell.html
  • 11. 11 | CONFIDENTIAL AND PRIVILEGED Evolving Cybersecurity Environment CISOs now must be a business enabler and must keep the various lines of business and departments focused, functioning and moving forward on a day-to-day basis. Key business areas which CISO must be able to address: • How can information security help generate, protect and ensure revenue? • How can information security help retain existing customers? • How can information security help differentiate against competitors? • How can information security drive operational efficiencies and effectiveness? Compliance regulations like General Data Protection Regulation (GDPR), is challenging the status quo of IT operations, especially considering how much regulated data is entrenched in normal business operations. We must analyze, predict and prepare for the future strengths, weaknesses, opportunities and threats - SWOT We must ensure that the organization is disciplined in the day to day operations Become proficient in addressing today’s more expansive expectations How do CISO measure success? Risk based
  • 12. 12 | CONFIDENTIAL AND PRIVILEGED Perimeter Security – legacy http://www.typargeosynthetics.com/products/geocells/defencell---military-and-security-geocell.html
  • 13. 13 | CONFIDENTIAL AND PRIVILEGED Security Evolution Drivers • Application and users are everywhere • Borders are leaky • Mobile and IOT • Use of public cloud, private cloud, hybrid cloud or combination of all • Transporting of sensitive data Borderless Security Secure Connectivity General Cloud Security Data Loss Prevention Threat Response and Containment Context – Aware Access Control Think Outside the Box Stay in the Circle
  • 14. 14 | CONFIDENTIAL AND PRIVILEGED Information Security Frameworks / Standards Security Model – Business Drives Security http://www.jirasekonsecurity.com/2011/10/security-model-business-oriented.html ISO 27001 NIST COBIT GDPR FEDRAMP SSAE-18 SANS PCI – DSS FISMA HIPAA HITRUST IRS PUB 1075 Security threats International security standards Laws & regulations Compliance requirements Business objectives Risks & Compliance CEO & Board Governance Line Management Product Management Auditors Security Professionals Program Management Managing Risk Drivers Rules Measure Security Management Correction of Security Processes Policy Framework Process Framework Metrics Framework Information Security Policies Information Security Standards Information Security Artefacts Security Intelligence Information Security Processes People Technology Information Security Metrics Objectives Security Metrics Portal Define security controls Execute security controls Measure security controls maturity Inform External Security Metrics Define
  • 15. 15 | CONFIDENTIAL AND PRIVILEGED Information Security Frameworks/Models to Consider Zero Trust • This is a security concept centered on the belief that organizations should not automatically trust anything inside or outside its perimeters and instead must verify anything and everything trying to connect to its systems before granting access. (tactical) NIST Cyber Security Framework • This framework provides the company the ability to establish policy framework and guidance to identify, protect, detect, respond and recover from cyber attacks. (strategic) Defense in Depth Approach • The model is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single This layered methodology leverages people, technology and operational processes to meet the most rigorous standards of data confidentiality, integrity and availability, supporting the ongoing security of mission- critical data. It requires identifying and applying controls to all of the different possible means by which a bad actor can access data from. (operational)
  • 16. 16 | CONFIDENTIAL AND PRIVILEGED Hiring the Right Team Members Bridging the skills gap Defining the exact skills that you need Consider flexing your educational requirements Ask the right questions during the interview Do a hands-on interview Business understanding Culture fit Information security team member traits • Attention to detail • Think like a hacker • Analytical • Minimum supervision • Follow up and close the loop • Continuous learner • Persistence • Curious and perceptive • Instinctive • Having a well-rounded skill set
  • 17. 17 | CONFIDENTIAL AND PRIVILEGED AI - Information Security https://www.cso.com.au/article/624361/security-ai-explodes-lack-efficacy-comparisons-leaves-csos-flying-blind/ “AI and machine learning (ML) technologies has grown significantly, fueled by companies’ increasing desire for sustainable tools that detect and classify security threats based on behavior that often has never been seen before. Continued dependence on antiquated legacy systems is not sustainable.”
  • 18. 18 | CONFIDENTIAL AND PRIVILEGED Tomorrow’s CISO You must be a business enabler and strategic leader. To be successful, CISOs must speak the language of business. Must be able to understand how my company operates and how I can make it grow. It's important to achieve alignment between IT security and lines of business. Building visibility • Understanding and secure the environment • Understanding attack vectors – use of AI and machine learning • Being surgical in purchasing tools / services Must have strong moral compass. If I see something wrong, I fix it, without looking for credit. Resolving security issues and gaps • Use of different frameworks will assist in the your remediation roadmap Application Centric Must have opportunities to regularly report to the CEO and board of directors Reducing Risk • Understand your risk profile – created risk register • Outside audits
  • 19. 19 | CONFIDENTIAL AND PRIVILEGED Information Security as a Continuous Process Plan Build Run Identify Risk Analyze/Synthesize Risk Build Execute External Customers Vendors Partners Incidents Internal Projects Observation Requests Incidents Audits, Compliance Tools Implement Controls Report Finalization Recommendations Requirements Data Gathering Assess Risks Best Practices Regulations Policies Compliance Protect the Company Brand
  • 20. 20 | CONFIDENTIAL AND PRIVILEGED Conclusion • Proper management of this industry can only be achieved by the cooperation among industry vendors, policymakers, regulators and organizations while encouraging open and transparent processes. • Information security is a topic that has and will become even more critical in the future, as technology continues to evolve and become integrated into our lives in ways that we can’t even imagine. • Use several frameworks and model (no one framework fits all), integrated security (people, process and technology), and view information security as a continuous process. • Use of advisory and managed services is important - increases your credibility and confirms validation. • Use of Scorecards for the board - must be risk based • Use of soft skill – keep it simple. • YOU ARE IMPORTANT!!!
  • 21. 21 | CONFIDENTIAL AND PRIVILEGED Evolving Role of the CISO: Reshaping the Cybersecurity Battlespace Anthony G. Dupree CISO/CIO