SlideShare una empresa de Scribd logo
1 de 47
Descargar para leer sin conexión
I am a Security Learning & Development Professional
@dennisshepp
dennisshepp@shaw.ca
& ESRM
▪ ESRM = Enterprise Security Risk Management
▪ “A management process that creates a consistent and
holistic approach to managing threats to any
organization through an ongoing process of assessing all
security-related risks across the entire enterprise.”
▪ “ESRM process ensures that any new risks that
treated in the same way.”
▪ “A process of continuous improvement.”
ASIS International CSO Center (2014), Accessed March 2017:
https://cso.asisonline.org/esrm/Pages/default.aspx
LEADERSHIP
Learning & Development
Business Enabler
Performance Measurement
Return on Inve$tment
QUALITY IMPROVEMENT
Is your organization “mature” enough to adopt ESRM?
Sally Godfrey (2008) “What is CMMI?” NASA presentation. Accessed: Feb 21, 2017.
Cindy Blake, HP’s Enterprise
Security Products Group,
(2013), “Key Security
Investments for 2013… and
Beyond”, Accessed March 15,
2017:
https://community.hpe.com/t5/
Protect-Your-Assets/Key-
Security-Investments-for-
2013-and-beyond/ba-
p/5929243#.WMmJbhLysfw
▪ How to Conduct a Maturity Assessment the Six Sigma Way:
▪ ASSESS – ANALYZE – ADDRESS
▪ ASSESSMENT reviews 12 Lean Six Sigma parameters.
▪ Process provides a checklist.
▪ Key element: LEADERSHIP!
Afsar Choudhary, “Are You Ready? How to Conduct a Maturity Assessment?”, Accessed March 15, 2017:
https://www.isixsigma.com/new-to-six-sigma/getting-started/are-you-ready-how-conduct-maturity-
assessment/
Afsar Choudhary, “Are You Ready? How to Conduct a Maturity Assessment?”, Accessed March 15, 2017:
https://www.isixsigma.com/new-to-six-sigma/getting-started/are-you-ready-how-conduct-maturity-
assessment/
Lean Six Sigma Parameters Compared to Organizational Maturity Index
Adapted from Lynn Mattice, CPP & Jerry Brennan, CPP, 2015, “Chief Executive
Magazine”, survey results from CEOs “Top 10 Skills Needed for Leadership” (modified).
of L&D pros say that talent is the #1 priority
The main objectives of organization’s L&D strategy?
1. Develop managers & leaders.
2. Help employees develop technical skills.
3. Train all employees globally in one cohesive way.
4. Support career development for employees.
“2017 Workplace Learning Report”, (2017) LinkedIn Learning Solutions, Survey of >500
organizations in USA & Canada. Published and accessed online:
https://learning.linkedin.com/elearning-solutions-guides/2017-workplace-learning-report
Ass’n for Talent Development (ATD) formerly ASTD, “2016 State of the Industry Report”,
https://www.td.org/Publications/Blogs/ATD-Blog/2016/12/ATD-Releases-2016-State-
of-the-Industry-Report
“
Does your training (learning &
development) program impact the
business?
Ass’n for Talent Development (ATD) formerly ASTD, “2016 State of the Industry Report”,
https://www.td.org/Publications/Blogs/ATD-Blog/2016/12/ATD-Releases-2016-State-
of-the-Industry-Report
1. Reaction
What did learners feel about the experience?
How was the trainer/instructor?
2. Learning
Assessments & testing – did the learners
actually learn any skills/knowledge?
3. Behavior
Has performance improved at work because of the L&D?
4. Results (ROI)
What is the business impact of the L&D?
Adapted Phillips Model (1997) – Training ROI
Competency
Gap Analysis
What’s missing?
Develop Training
Objectives
Learning outcomes must
meet missing
competencies.
Develop
Assessment Plan
•Develop assessments
(testing).
•Based on learning
outcomes.
•Knowledge, skills, & on-
the-job testing.
Collect Level 1 & 2 Data
•Reaction and
satisfaction.
•Learning assessment &
measure learning
outcomes.
Collect Level 3 & 4
Data
•Application.
•Business Impact.
Data Analysis
Convert data to
values that impact
the business.
Level 5: Calculate ROI
•Identify tangible
costs.
•Identify intangible
costs.
Report
Generate impact
study & report.
Competency Assessment Stage Data Collection Stage
Data Collection Stage Data Analysis Stage
Reporting Stage
• ASIS International CSO Center (2014), Accessed March 2017:
https://cso.asisonline.org/esrm/Pages/default.aspx
• “Protective Security Capability Maturity Model”, Gov’t of NZ – Protective Security, Accessed Feb 21,
2017: https://protectivesecurity.govt.nz/assets/Uploads/Protective-Security-Capability-Maturity-
Model.pdf
• “Metrics and the Security Mindset”, SM Online, December 2016,
https://sm.asisonline.org/pages/metrics-and-the-maturity-mindset.aspx
• Cindy Blake, HP’s Enterprise Security Products Group, (2013), “Key Security Investments for 2013…
and Beyond”, Accessed March 15, 2017: https://community.hpe.com/t5/Protect-Your-Assets/Key-
Security-Investments-for-2013-and-beyond/ba-p/5929243#.WMmJbhLysfw
• Afsar Choudhary, “Are You Ready? How to Conduct a Maturity Assessment?”, Accessed March 15,
2017: https://www.isixsigma.com/new-to-six-sigma/getting-started/are-you-ready-how-conduct-
maturity-assessment/
• “2017 Workplace Learning Report”, (2017) LinkedIn Learning Solutions, Survey of >500 organizations
in USA & Canada. Published and accessed online: https://learning.linkedin.com/elearning-solutions-
guides/2017-workplace-learning-report
• “Kirkpatrick’s Four-Level Training Evaluation Model”, Accessed March 15, 2017:
https://www.mindtools.com/pages/article/kirkpatrick.htm
@dennisshepp
dennisshepp@shaw.ca
I am a Director at The Banks Group Inc.
@PhillipBanksPE
pbanks@thebanksgroup.ca
2. Critical Thinking
3. Risk-Based Decision Making
4. Leading-Practice Implementation
5. Security Optimization
6. Maturity Modeling
1. SMART Training
• Successful &
measurable
results.
• Cost effective,
highest
achievable
performance.
• Formalized
consideration
of risk
elements.
• Objective
analysis of
FACTS in all
situations.
Critical
Thinking
Risk-Based
Decisions
Leading
Practices
Security
Optimization
Observations
Facts
Inferences
Assumptions
Opinions
Arguments
Critical
Analysis
“A process that organizes
information about the
possibility for one or more
unwanted outcomes into a
broad, orderly structure that
helps decision-makers
make more informed
management choices.1”
1Introduction to Risk-based Decision Making – US Coast
Guard
Risk Evaluation – Issue or opportunity?
Risk Response – Treat, tolerate, transfer,
terminate?
Evaluate Response Options – Readily or
reasonably achievable? Constrain decision bias.
Consider – Risk appetite, cost benefit,
stakeholders, compliance Issues, reputation.
Decision Making – Yes, co or somewhere in-
between, now what to do?
“Nothing is less productive than to make
more efficient what should not be done at
all.”
Peter Drucker
Best versus
Leading Practice
• Best Practice — is a technique or
methodology that, through experience and
research, has proven to reliably lead to a
desired result.
• Leading Practice - term used in place of “best
practice” where it is inordinately difficult to
identify or implement the best practice.
Considerations:
• “As-is” environment – observable elements?
• What is the problem or issue that needs
remediation?
• Basis for leading practice?
• Implementable at effective cost?
• Measurable outcome?
• “To-be” environment what will it look like?
• Based on what?
“As-Is”
Leading
Practice
“To-Be”
Leading Practice
Elements
1 http://www.thehackettgroup.com/best-practices/
Security Optimization
People – Risk aware and organizationally
resilient.
Process – Understanding business processes
and matching supporting security initiatives
and programs.
Technology – Flexible, integratable, scalable
and measurable security solutions
Enterprise Security Risk Management –
Security strategies which with a focus on
forward thinking, vulnerability reduction,
business enablement and sustainable control
measures.
Risk Management – focus on
protecting an organization’s tangible
and intangible assets.
Enterprise Risk Management – broader
focus than protection of physical and
financial assets but also includes
enhancement of the business strategy.
Operational
Risk
Financial
Risk
Compliance
Risk
Strategic
Risk
Reputational
Risk
▪ Consistency (documented and repeatable)
▪ Continual improvement (internal audit)
▪ Measurable results (KPIs, benchmarking)
▪ Management commitment
▪ Enhancement of organization (overall)
performance enhancement
▪ Systematical risk identification
1ON Semiconductor
Security Program Maturity Levels
Corporate security is reactive, uncontrolled, unpredictable &
inconsistent.
Corporate security is characterized for projects and is
often reactive and of variable consistency.
Corporate security is tailored for the
organization and is proactive.
Corporate security is managed, measured and
proactive. Risk-based decision-making is practiced
across all corporate security activities. Client
satisfaction is measured as a KPI.
Corporate security is branded and functions on a corporate-wide
basis as a valued partner and recognized business enabler.
Initial - Site-by-site difference approach. No success criteria
set. Ad-hoc reactive approach.
Defined - Corporate and security best practices gathered
and translated into physical security corporate goals and
requirements.
Repeatable – Set requirements formally documented and
standardized. Site level gap analysis and action plan.
Managed and Measured – Formal PSMS which is measured
and controlled. Report and auditing system established.
Optimized – Corporate-wide physical security management
system and aware workforce. Process improvement and
performance measurement focused.
1ON Semiconductor
Do you know where you are?
Do you know where you want to go?
Can you see the path?
How will you know when you get
there?
@PhillipBanksPE
pbanks@thebanksgroup.ca
▪ An inner-city pharmaceutical production facility will be closing in 3 years
and the operations of the facility will be moving to a new off-shore
location. Operations will fully continue at the current facility until closing
day and threats and risks to the operation’s success will likely not change.
▪ The existing security technology is nearing the end of its useful life and
maintenance costs are increasing. Some concerns have been expressed
with respect to the security of employees in an area of the city which
appears to be declining.
▪ List three primary actions that you would consider critical with respect to
the onward security of the operation and safety of the employees.
▪ A security professional colleague has approached you at the local ASIS
chapter meeting claiming they understand you have successfully
implemented an incident reporting, information and automated
communications management system in your company.
▪ He asks if you would share your experiences of how you would
recommend he proceed in adopting a CAD, incident reporting system
for his company.
▪ Base your recommendations on “Best Practices”, lessons learned and
how they really should proceed.
▪ Provide examples of effective measures for SMART training.
▪ What are the primary elements you would select
to measure the level of effectiveness of security
governance in your organization or company?

Más contenido relacionado

La actualidad más candente

Introduction to Core Assessments
Introduction to Core AssessmentsIntroduction to Core Assessments
Introduction to Core AssessmentsResolver Inc.
 
Reporting to the Board on Corporate Compliance
Reporting to the Board on Corporate ComplianceReporting to the Board on Corporate Compliance
Reporting to the Board on Corporate ComplianceResolver Inc.
 
How to Prove the Value of Security Investments
How to Prove the Value of Security InvestmentsHow to Prove the Value of Security Investments
How to Prove the Value of Security InvestmentsResolver Inc.
 
The Journey to Integrated Risk Management: Lessons from the Field
The Journey to Integrated Risk Management: Lessons from the Field The Journey to Integrated Risk Management: Lessons from the Field
The Journey to Integrated Risk Management: Lessons from the Field Resolver Inc.
 
Enterprise Risk Management - Aligning Risk with Strategy and Performance
Enterprise Risk Management - Aligning Risk with Strategy and PerformanceEnterprise Risk Management - Aligning Risk with Strategy and Performance
Enterprise Risk Management - Aligning Risk with Strategy and PerformanceResolver Inc.
 
App Showcase: Compliance
App Showcase: ComplianceApp Showcase: Compliance
App Showcase: ComplianceResolver Inc.
 
Data Driven Risk Management
Data Driven Risk ManagementData Driven Risk Management
Data Driven Risk ManagementResolver Inc.
 
Relating Risk to Vulnerability
Relating Risk to Vulnerability Relating Risk to Vulnerability
Relating Risk to Vulnerability Resolver Inc.
 
Improve Your Risk Assessment Process in 4 Steps
Improve Your Risk Assessment Process in 4 StepsImprove Your Risk Assessment Process in 4 Steps
Improve Your Risk Assessment Process in 4 StepsResolver Inc.
 
Int:rsect: CEO Address with Will Anderson
Int:rsect: CEO Address with Will AndersonInt:rsect: CEO Address with Will Anderson
Int:rsect: CEO Address with Will AndersonResolver Inc.
 
App Showcase: Enterprise Risk Management
App Showcase: Enterprise Risk ManagementApp Showcase: Enterprise Risk Management
App Showcase: Enterprise Risk ManagementResolver Inc.
 
Integrated Security & Risk Management: Benchmarking
Integrated Security & Risk Management: BenchmarkingIntegrated Security & Risk Management: Benchmarking
Integrated Security & Risk Management: BenchmarkingResolver Inc.
 
App Showcase: Internal Audit
App Showcase: Internal AuditApp Showcase: Internal Audit
App Showcase: Internal AuditResolver Inc.
 
The Purpose of Holistic Risk Management
The Purpose of Holistic Risk ManagementThe Purpose of Holistic Risk Management
The Purpose of Holistic Risk ManagementCorporater
 
Integrated Risk Management 101
Integrated Risk Management 101Integrated Risk Management 101
Integrated Risk Management 101Resolver Inc.
 
Ballot: Risk Assessments Made Simple
Ballot: Risk Assessments Made SimpleBallot: Risk Assessments Made Simple
Ballot: Risk Assessments Made SimpleResolver Inc.
 
Infographic - Critical Capabilities of a Good Risk Management Solution
Infographic - Critical Capabilities of a Good Risk Management SolutionInfographic - Critical Capabilities of a Good Risk Management Solution
Infographic - Critical Capabilities of a Good Risk Management SolutionCorporater
 
Creating safety cultures
Creating safety culturesCreating safety cultures
Creating safety culturesPhil La Duke
 
The seventh value asse show
The seventh value asse showThe seventh value asse show
The seventh value asse showPhil La Duke
 

La actualidad más candente (20)

Introduction to Core Assessments
Introduction to Core AssessmentsIntroduction to Core Assessments
Introduction to Core Assessments
 
Reporting to the Board on Corporate Compliance
Reporting to the Board on Corporate ComplianceReporting to the Board on Corporate Compliance
Reporting to the Board on Corporate Compliance
 
How to Prove the Value of Security Investments
How to Prove the Value of Security InvestmentsHow to Prove the Value of Security Investments
How to Prove the Value of Security Investments
 
The Journey to Integrated Risk Management: Lessons from the Field
The Journey to Integrated Risk Management: Lessons from the Field The Journey to Integrated Risk Management: Lessons from the Field
The Journey to Integrated Risk Management: Lessons from the Field
 
Enterprise Risk Management - Aligning Risk with Strategy and Performance
Enterprise Risk Management - Aligning Risk with Strategy and PerformanceEnterprise Risk Management - Aligning Risk with Strategy and Performance
Enterprise Risk Management - Aligning Risk with Strategy and Performance
 
App Showcase: Compliance
App Showcase: ComplianceApp Showcase: Compliance
App Showcase: Compliance
 
Data Driven Risk Management
Data Driven Risk ManagementData Driven Risk Management
Data Driven Risk Management
 
Relating Risk to Vulnerability
Relating Risk to Vulnerability Relating Risk to Vulnerability
Relating Risk to Vulnerability
 
Improve Your Risk Assessment Process in 4 Steps
Improve Your Risk Assessment Process in 4 StepsImprove Your Risk Assessment Process in 4 Steps
Improve Your Risk Assessment Process in 4 Steps
 
Int:rsect: CEO Address with Will Anderson
Int:rsect: CEO Address with Will AndersonInt:rsect: CEO Address with Will Anderson
Int:rsect: CEO Address with Will Anderson
 
App Showcase: Enterprise Risk Management
App Showcase: Enterprise Risk ManagementApp Showcase: Enterprise Risk Management
App Showcase: Enterprise Risk Management
 
Integrated Security & Risk Management: Benchmarking
Integrated Security & Risk Management: BenchmarkingIntegrated Security & Risk Management: Benchmarking
Integrated Security & Risk Management: Benchmarking
 
App Showcase: Internal Audit
App Showcase: Internal AuditApp Showcase: Internal Audit
App Showcase: Internal Audit
 
The Purpose of Holistic Risk Management
The Purpose of Holistic Risk ManagementThe Purpose of Holistic Risk Management
The Purpose of Holistic Risk Management
 
Integrated Risk Management 101
Integrated Risk Management 101Integrated Risk Management 101
Integrated Risk Management 101
 
An Intro to Core
An Intro to CoreAn Intro to Core
An Intro to Core
 
Ballot: Risk Assessments Made Simple
Ballot: Risk Assessments Made SimpleBallot: Risk Assessments Made Simple
Ballot: Risk Assessments Made Simple
 
Infographic - Critical Capabilities of a Good Risk Management Solution
Infographic - Critical Capabilities of a Good Risk Management SolutionInfographic - Critical Capabilities of a Good Risk Management Solution
Infographic - Critical Capabilities of a Good Risk Management Solution
 
Creating safety cultures
Creating safety culturesCreating safety cultures
Creating safety cultures
 
The seventh value asse show
The seventh value asse showThe seventh value asse show
The seventh value asse show
 

Similar a The Security Practitioner of the Future

06.business model and risk 1
06.business model and risk 106.business model and risk 1
06.business model and risk 1Lucki Dixit
 
Innovation Management for BU syllabus
Innovation Management for BU syllabusInnovation Management for BU syllabus
Innovation Management for BU syllabusChetan T R
 
#Contract Risk Audit# By SN panigrahi
#Contract Risk Audit# By SN panigrahi#Contract Risk Audit# By SN panigrahi
#Contract Risk Audit# By SN panigrahiSN Panigrahi, PMP
 
Holistic pulse checks: People Value Creation
Holistic pulse checks: People Value CreationHolistic pulse checks: People Value Creation
Holistic pulse checks: People Value CreationPraxis Global Alliance
 
Intro To Alignment By Design
Intro To Alignment By DesignIntro To Alignment By Design
Intro To Alignment By DesignThomas Bradley
 
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAEIT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE360 BSI
 
360degreeappraisal4 3-2009-090323003457-phpapp02
360degreeappraisal4 3-2009-090323003457-phpapp02360degreeappraisal4 3-2009-090323003457-phpapp02
360degreeappraisal4 3-2009-090323003457-phpapp02srsp96
 
360 Degree Appraisal 4.3.2009
360 Degree Appraisal 4.3.2009360 Degree Appraisal 4.3.2009
360 Degree Appraisal 4.3.2009lochan_gupta
 
Risk seminar - john crawley & emer mc aneny
Risk seminar - john crawley & emer mc anenyRisk seminar - john crawley & emer mc aneny
Risk seminar - john crawley & emer mc anenyИван Вали-Пур
 
Make Every Touchpoint Count: How to Drive Revenue in an Increasingly Online W...
Make Every Touchpoint Count: How to Drive Revenue in an Increasingly Online W...Make Every Touchpoint Count: How to Drive Revenue in an Increasingly Online W...
Make Every Touchpoint Count: How to Drive Revenue in an Increasingly Online W...Optimizely
 
Targeted Solutions BMS Profile
Targeted Solutions BMS ProfileTargeted Solutions BMS Profile
Targeted Solutions BMS ProfileLeon Geldenhuys
 
Gs Us Roadmap For A World Class Information Security Management System– Isoie...
Gs Us Roadmap For A World Class Information Security Management System– Isoie...Gs Us Roadmap For A World Class Information Security Management System– Isoie...
Gs Us Roadmap For A World Class Information Security Management System– Isoie...Tammy Clark
 
Balancedscorecardpresentation
BalancedscorecardpresentationBalancedscorecardpresentation
BalancedscorecardpresentationRizwan Ahmed
 

Similar a The Security Practitioner of the Future (20)

MAPPING_ISO27001_TO_COBIT4.1
MAPPING_ISO27001_TO_COBIT4.1MAPPING_ISO27001_TO_COBIT4.1
MAPPING_ISO27001_TO_COBIT4.1
 
06.business model and risk 1
06.business model and risk 106.business model and risk 1
06.business model and risk 1
 
Innovation Management for BU syllabus
Innovation Management for BU syllabusInnovation Management for BU syllabus
Innovation Management for BU syllabus
 
Erm talking points
Erm talking pointsErm talking points
Erm talking points
 
#Contract Risk Audit# By SN panigrahi
#Contract Risk Audit# By SN panigrahi#Contract Risk Audit# By SN panigrahi
#Contract Risk Audit# By SN panigrahi
 
Kepner tregoe Presentation
Kepner tregoe Presentation Kepner tregoe Presentation
Kepner tregoe Presentation
 
3A - Turning Data into Decisions - Implementing a Cloud-based HSE Leading Ind...
3A - Turning Data into Decisions - Implementing a Cloud-based HSE Leading Ind...3A - Turning Data into Decisions - Implementing a Cloud-based HSE Leading Ind...
3A - Turning Data into Decisions - Implementing a Cloud-based HSE Leading Ind...
 
Holistic pulse checks: People Value Creation
Holistic pulse checks: People Value CreationHolistic pulse checks: People Value Creation
Holistic pulse checks: People Value Creation
 
Intro To Alignment By Design
Intro To Alignment By DesignIntro To Alignment By Design
Intro To Alignment By Design
 
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAEIT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
 
360degreeappraisal4 3-2009-090323003457-phpapp02
360degreeappraisal4 3-2009-090323003457-phpapp02360degreeappraisal4 3-2009-090323003457-phpapp02
360degreeappraisal4 3-2009-090323003457-phpapp02
 
360 Degree Appraisal 4.3.2009
360 Degree Appraisal 4.3.2009360 Degree Appraisal 4.3.2009
360 Degree Appraisal 4.3.2009
 
PB CV v0.4
PB CV v0.4PB CV v0.4
PB CV v0.4
 
Risk seminar - john crawley & emer mc aneny
Risk seminar - john crawley & emer mc anenyRisk seminar - john crawley & emer mc aneny
Risk seminar - john crawley & emer mc aneny
 
Make Every Touchpoint Count: How to Drive Revenue in an Increasingly Online W...
Make Every Touchpoint Count: How to Drive Revenue in an Increasingly Online W...Make Every Touchpoint Count: How to Drive Revenue in an Increasingly Online W...
Make Every Touchpoint Count: How to Drive Revenue in an Increasingly Online W...
 
Insight into Security Leader Success Part 2
Insight into Security Leader Success Part 2Insight into Security Leader Success Part 2
Insight into Security Leader Success Part 2
 
HIRimsISO311KandERMFINAL
HIRimsISO311KandERMFINALHIRimsISO311KandERMFINAL
HIRimsISO311KandERMFINAL
 
Targeted Solutions BMS Profile
Targeted Solutions BMS ProfileTargeted Solutions BMS Profile
Targeted Solutions BMS Profile
 
Gs Us Roadmap For A World Class Information Security Management System– Isoie...
Gs Us Roadmap For A World Class Information Security Management System– Isoie...Gs Us Roadmap For A World Class Information Security Management System– Isoie...
Gs Us Roadmap For A World Class Information Security Management System– Isoie...
 
Balancedscorecardpresentation
BalancedscorecardpresentationBalancedscorecardpresentation
Balancedscorecardpresentation
 

Más de Resolver Inc.

ERM Benchmarking Survey Results
ERM Benchmarking Survey ResultsERM Benchmarking Survey Results
ERM Benchmarking Survey ResultsResolver Inc.
 
Best Practices and ROI for Risk-based Vulnerability Management
Best Practices and ROI for Risk-based Vulnerability ManagementBest Practices and ROI for Risk-based Vulnerability Management
Best Practices and ROI for Risk-based Vulnerability ManagementResolver Inc.
 
Taking a Data-Driven Approach to Business Continuity
Taking a Data-Driven Approach to Business ContinuityTaking a Data-Driven Approach to Business Continuity
Taking a Data-Driven Approach to Business ContinuityResolver Inc.
 
Terrorism in a Corporate Setting
Terrorism in a Corporate SettingTerrorism in a Corporate Setting
Terrorism in a Corporate SettingResolver Inc.
 
An Intro to Resolver's Compliance Application
An Intro to Resolver's Compliance ApplicationAn Intro to Resolver's Compliance Application
An Intro to Resolver's Compliance ApplicationResolver Inc.
 
Information Security Best Practices: Keeping Your Company's Data Safe
Information Security Best Practices: Keeping Your Company's Data SafeInformation Security Best Practices: Keeping Your Company's Data Safe
Information Security Best Practices: Keeping Your Company's Data SafeResolver Inc.
 
Security Trends: From "Silos" to Integrated Risk Management
Security Trends: From "Silos" to Integrated Risk ManagementSecurity Trends: From "Silos" to Integrated Risk Management
Security Trends: From "Silos" to Integrated Risk ManagementResolver Inc.
 
Modelling your Business Processes with Resolver Core
Modelling your Business Processes with Resolver CoreModelling your Business Processes with Resolver Core
Modelling your Business Processes with Resolver CoreResolver Inc.
 
How Resolver Uses Resolver
How Resolver Uses ResolverHow Resolver Uses Resolver
How Resolver Uses ResolverResolver Inc.
 
Scammed: Defend Against Social Engineering
Scammed: Defend Against Social EngineeringScammed: Defend Against Social Engineering
Scammed: Defend Against Social EngineeringResolver Inc.
 
A Peek at adidas Group's Integrated Risk & Security Management Strategy
A Peek at adidas Group's Integrated Risk & Security Management StrategyA Peek at adidas Group's Integrated Risk & Security Management Strategy
A Peek at adidas Group's Integrated Risk & Security Management StrategyResolver Inc.
 
An Intro to Resolver's Resilience Application
An Intro to Resolver's Resilience ApplicationAn Intro to Resolver's Resilience Application
An Intro to Resolver's Resilience ApplicationResolver Inc.
 
Data Driven Risk Assessment
Data Driven Risk AssessmentData Driven Risk Assessment
Data Driven Risk AssessmentResolver Inc.
 
How to Achieve a Fully Integrated Approach to Business Resilience
How to Achieve a Fully Integrated Approach to Business ResilienceHow to Achieve a Fully Integrated Approach to Business Resilience
How to Achieve a Fully Integrated Approach to Business ResilienceResolver Inc.
 
An Intro to Resolver's Risk Application
An Intro to Resolver's Risk ApplicationAn Intro to Resolver's Risk Application
An Intro to Resolver's Risk ApplicationResolver Inc.
 
Keeping Your Data Clean
Keeping Your Data CleanKeeping Your Data Clean
Keeping Your Data CleanResolver Inc.
 
Why You Should Prioritize Third Party Risk Management (TPRM) in Today's Marke...
Why You Should Prioritize Third Party Risk Management (TPRM) in Today's Marke...Why You Should Prioritize Third Party Risk Management (TPRM) in Today's Marke...
Why You Should Prioritize Third Party Risk Management (TPRM) in Today's Marke...Resolver Inc.
 
An Intro to Resolver's InfoSec Application (RiskVision)
An Intro to Resolver's InfoSec Application (RiskVision)An Intro to Resolver's InfoSec Application (RiskVision)
An Intro to Resolver's InfoSec Application (RiskVision)Resolver Inc.
 
Leveraging Change Leadership to Find Success in your IRM Program
Leveraging Change Leadership to Find Success in your IRM ProgramLeveraging Change Leadership to Find Success in your IRM Program
Leveraging Change Leadership to Find Success in your IRM ProgramResolver Inc.
 
An Intro to Resolver's Incident Management Application
An Intro to Resolver's Incident Management ApplicationAn Intro to Resolver's Incident Management Application
An Intro to Resolver's Incident Management ApplicationResolver Inc.
 

Más de Resolver Inc. (20)

ERM Benchmarking Survey Results
ERM Benchmarking Survey ResultsERM Benchmarking Survey Results
ERM Benchmarking Survey Results
 
Best Practices and ROI for Risk-based Vulnerability Management
Best Practices and ROI for Risk-based Vulnerability ManagementBest Practices and ROI for Risk-based Vulnerability Management
Best Practices and ROI for Risk-based Vulnerability Management
 
Taking a Data-Driven Approach to Business Continuity
Taking a Data-Driven Approach to Business ContinuityTaking a Data-Driven Approach to Business Continuity
Taking a Data-Driven Approach to Business Continuity
 
Terrorism in a Corporate Setting
Terrorism in a Corporate SettingTerrorism in a Corporate Setting
Terrorism in a Corporate Setting
 
An Intro to Resolver's Compliance Application
An Intro to Resolver's Compliance ApplicationAn Intro to Resolver's Compliance Application
An Intro to Resolver's Compliance Application
 
Information Security Best Practices: Keeping Your Company's Data Safe
Information Security Best Practices: Keeping Your Company's Data SafeInformation Security Best Practices: Keeping Your Company's Data Safe
Information Security Best Practices: Keeping Your Company's Data Safe
 
Security Trends: From "Silos" to Integrated Risk Management
Security Trends: From "Silos" to Integrated Risk ManagementSecurity Trends: From "Silos" to Integrated Risk Management
Security Trends: From "Silos" to Integrated Risk Management
 
Modelling your Business Processes with Resolver Core
Modelling your Business Processes with Resolver CoreModelling your Business Processes with Resolver Core
Modelling your Business Processes with Resolver Core
 
How Resolver Uses Resolver
How Resolver Uses ResolverHow Resolver Uses Resolver
How Resolver Uses Resolver
 
Scammed: Defend Against Social Engineering
Scammed: Defend Against Social EngineeringScammed: Defend Against Social Engineering
Scammed: Defend Against Social Engineering
 
A Peek at adidas Group's Integrated Risk & Security Management Strategy
A Peek at adidas Group's Integrated Risk & Security Management StrategyA Peek at adidas Group's Integrated Risk & Security Management Strategy
A Peek at adidas Group's Integrated Risk & Security Management Strategy
 
An Intro to Resolver's Resilience Application
An Intro to Resolver's Resilience ApplicationAn Intro to Resolver's Resilience Application
An Intro to Resolver's Resilience Application
 
Data Driven Risk Assessment
Data Driven Risk AssessmentData Driven Risk Assessment
Data Driven Risk Assessment
 
How to Achieve a Fully Integrated Approach to Business Resilience
How to Achieve a Fully Integrated Approach to Business ResilienceHow to Achieve a Fully Integrated Approach to Business Resilience
How to Achieve a Fully Integrated Approach to Business Resilience
 
An Intro to Resolver's Risk Application
An Intro to Resolver's Risk ApplicationAn Intro to Resolver's Risk Application
An Intro to Resolver's Risk Application
 
Keeping Your Data Clean
Keeping Your Data CleanKeeping Your Data Clean
Keeping Your Data Clean
 
Why You Should Prioritize Third Party Risk Management (TPRM) in Today's Marke...
Why You Should Prioritize Third Party Risk Management (TPRM) in Today's Marke...Why You Should Prioritize Third Party Risk Management (TPRM) in Today's Marke...
Why You Should Prioritize Third Party Risk Management (TPRM) in Today's Marke...
 
An Intro to Resolver's InfoSec Application (RiskVision)
An Intro to Resolver's InfoSec Application (RiskVision)An Intro to Resolver's InfoSec Application (RiskVision)
An Intro to Resolver's InfoSec Application (RiskVision)
 
Leveraging Change Leadership to Find Success in your IRM Program
Leveraging Change Leadership to Find Success in your IRM ProgramLeveraging Change Leadership to Find Success in your IRM Program
Leveraging Change Leadership to Find Success in your IRM Program
 
An Intro to Resolver's Incident Management Application
An Intro to Resolver's Incident Management ApplicationAn Intro to Resolver's Incident Management Application
An Intro to Resolver's Incident Management Application
 

Último

Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876dlhescort
 
Phases of negotiation .pptx
 Phases of negotiation .pptx Phases of negotiation .pptx
Phases of negotiation .pptxnandhinijagan9867
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Dipal Arora
 
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Sheetaleventcompany
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsP&CO
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756dollysharma2066
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...daisycvs
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxAndy Lambert
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityEric T. Tung
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with CultureSeta Wicaksana
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxpriyanshujha201
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageMatteo Carbone
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfAdmir Softic
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdfRenandantas16
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentationuneakwhite
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communicationskarancommunications
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLSeo
 

Último (20)

Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
 
Phases of negotiation .pptx
 Phases of negotiation .pptx Phases of negotiation .pptx
Phases of negotiation .pptx
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
 
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
 
Falcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in indiaFalcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in india
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
 
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 

The Security Practitioner of the Future

  • 1.
  • 2.
  • 3. I am a Security Learning & Development Professional @dennisshepp dennisshepp@shaw.ca
  • 5. ▪ ESRM = Enterprise Security Risk Management ▪ “A management process that creates a consistent and holistic approach to managing threats to any organization through an ongoing process of assessing all security-related risks across the entire enterprise.” ▪ “ESRM process ensures that any new risks that treated in the same way.” ▪ “A process of continuous improvement.” ASIS International CSO Center (2014), Accessed March 2017: https://cso.asisonline.org/esrm/Pages/default.aspx
  • 6. LEADERSHIP Learning & Development Business Enabler Performance Measurement Return on Inve$tment QUALITY IMPROVEMENT
  • 7. Is your organization “mature” enough to adopt ESRM?
  • 8. Sally Godfrey (2008) “What is CMMI?” NASA presentation. Accessed: Feb 21, 2017.
  • 9. Cindy Blake, HP’s Enterprise Security Products Group, (2013), “Key Security Investments for 2013… and Beyond”, Accessed March 15, 2017: https://community.hpe.com/t5/ Protect-Your-Assets/Key- Security-Investments-for- 2013-and-beyond/ba- p/5929243#.WMmJbhLysfw
  • 10. ▪ How to Conduct a Maturity Assessment the Six Sigma Way: ▪ ASSESS – ANALYZE – ADDRESS ▪ ASSESSMENT reviews 12 Lean Six Sigma parameters. ▪ Process provides a checklist. ▪ Key element: LEADERSHIP! Afsar Choudhary, “Are You Ready? How to Conduct a Maturity Assessment?”, Accessed March 15, 2017: https://www.isixsigma.com/new-to-six-sigma/getting-started/are-you-ready-how-conduct-maturity- assessment/
  • 11. Afsar Choudhary, “Are You Ready? How to Conduct a Maturity Assessment?”, Accessed March 15, 2017: https://www.isixsigma.com/new-to-six-sigma/getting-started/are-you-ready-how-conduct-maturity- assessment/ Lean Six Sigma Parameters Compared to Organizational Maturity Index
  • 12.
  • 13. Adapted from Lynn Mattice, CPP & Jerry Brennan, CPP, 2015, “Chief Executive Magazine”, survey results from CEOs “Top 10 Skills Needed for Leadership” (modified).
  • 14.
  • 15. of L&D pros say that talent is the #1 priority The main objectives of organization’s L&D strategy? 1. Develop managers & leaders. 2. Help employees develop technical skills. 3. Train all employees globally in one cohesive way. 4. Support career development for employees. “2017 Workplace Learning Report”, (2017) LinkedIn Learning Solutions, Survey of >500 organizations in USA & Canada. Published and accessed online: https://learning.linkedin.com/elearning-solutions-guides/2017-workplace-learning-report
  • 16. Ass’n for Talent Development (ATD) formerly ASTD, “2016 State of the Industry Report”, https://www.td.org/Publications/Blogs/ATD-Blog/2016/12/ATD-Releases-2016-State- of-the-Industry-Report
  • 17. “ Does your training (learning & development) program impact the business?
  • 18. Ass’n for Talent Development (ATD) formerly ASTD, “2016 State of the Industry Report”, https://www.td.org/Publications/Blogs/ATD-Blog/2016/12/ATD-Releases-2016-State- of-the-Industry-Report
  • 19. 1. Reaction What did learners feel about the experience? How was the trainer/instructor? 2. Learning Assessments & testing – did the learners actually learn any skills/knowledge? 3. Behavior Has performance improved at work because of the L&D? 4. Results (ROI) What is the business impact of the L&D?
  • 20. Adapted Phillips Model (1997) – Training ROI Competency Gap Analysis What’s missing? Develop Training Objectives Learning outcomes must meet missing competencies. Develop Assessment Plan •Develop assessments (testing). •Based on learning outcomes. •Knowledge, skills, & on- the-job testing. Collect Level 1 & 2 Data •Reaction and satisfaction. •Learning assessment & measure learning outcomes. Collect Level 3 & 4 Data •Application. •Business Impact. Data Analysis Convert data to values that impact the business. Level 5: Calculate ROI •Identify tangible costs. •Identify intangible costs. Report Generate impact study & report. Competency Assessment Stage Data Collection Stage Data Collection Stage Data Analysis Stage Reporting Stage
  • 21.
  • 22. • ASIS International CSO Center (2014), Accessed March 2017: https://cso.asisonline.org/esrm/Pages/default.aspx • “Protective Security Capability Maturity Model”, Gov’t of NZ – Protective Security, Accessed Feb 21, 2017: https://protectivesecurity.govt.nz/assets/Uploads/Protective-Security-Capability-Maturity- Model.pdf • “Metrics and the Security Mindset”, SM Online, December 2016, https://sm.asisonline.org/pages/metrics-and-the-maturity-mindset.aspx • Cindy Blake, HP’s Enterprise Security Products Group, (2013), “Key Security Investments for 2013… and Beyond”, Accessed March 15, 2017: https://community.hpe.com/t5/Protect-Your-Assets/Key- Security-Investments-for-2013-and-beyond/ba-p/5929243#.WMmJbhLysfw • Afsar Choudhary, “Are You Ready? How to Conduct a Maturity Assessment?”, Accessed March 15, 2017: https://www.isixsigma.com/new-to-six-sigma/getting-started/are-you-ready-how-conduct- maturity-assessment/ • “2017 Workplace Learning Report”, (2017) LinkedIn Learning Solutions, Survey of >500 organizations in USA & Canada. Published and accessed online: https://learning.linkedin.com/elearning-solutions- guides/2017-workplace-learning-report • “Kirkpatrick’s Four-Level Training Evaluation Model”, Accessed March 15, 2017: https://www.mindtools.com/pages/article/kirkpatrick.htm
  • 24. I am a Director at The Banks Group Inc. @PhillipBanksPE pbanks@thebanksgroup.ca
  • 25. 2. Critical Thinking 3. Risk-Based Decision Making 4. Leading-Practice Implementation 5. Security Optimization 6. Maturity Modeling 1. SMART Training
  • 26. • Successful & measurable results. • Cost effective, highest achievable performance. • Formalized consideration of risk elements. • Objective analysis of FACTS in all situations. Critical Thinking Risk-Based Decisions Leading Practices Security Optimization
  • 28. “A process that organizes information about the possibility for one or more unwanted outcomes into a broad, orderly structure that helps decision-makers make more informed management choices.1” 1Introduction to Risk-based Decision Making – US Coast Guard
  • 29. Risk Evaluation – Issue or opportunity? Risk Response – Treat, tolerate, transfer, terminate? Evaluate Response Options – Readily or reasonably achievable? Constrain decision bias. Consider – Risk appetite, cost benefit, stakeholders, compliance Issues, reputation. Decision Making – Yes, co or somewhere in- between, now what to do?
  • 30. “Nothing is less productive than to make more efficient what should not be done at all.” Peter Drucker
  • 31. Best versus Leading Practice • Best Practice — is a technique or methodology that, through experience and research, has proven to reliably lead to a desired result. • Leading Practice - term used in place of “best practice” where it is inordinately difficult to identify or implement the best practice.
  • 32. Considerations: • “As-is” environment – observable elements? • What is the problem or issue that needs remediation? • Basis for leading practice? • Implementable at effective cost? • Measurable outcome? • “To-be” environment what will it look like? • Based on what? “As-Is” Leading Practice “To-Be” Leading Practice Elements
  • 35. People – Risk aware and organizationally resilient. Process – Understanding business processes and matching supporting security initiatives and programs. Technology – Flexible, integratable, scalable and measurable security solutions Enterprise Security Risk Management – Security strategies which with a focus on forward thinking, vulnerability reduction, business enablement and sustainable control measures.
  • 36. Risk Management – focus on protecting an organization’s tangible and intangible assets. Enterprise Risk Management – broader focus than protection of physical and financial assets but also includes enhancement of the business strategy.
  • 38.
  • 39. ▪ Consistency (documented and repeatable) ▪ Continual improvement (internal audit) ▪ Measurable results (KPIs, benchmarking) ▪ Management commitment ▪ Enhancement of organization (overall) performance enhancement ▪ Systematical risk identification 1ON Semiconductor
  • 40. Security Program Maturity Levels Corporate security is reactive, uncontrolled, unpredictable & inconsistent. Corporate security is characterized for projects and is often reactive and of variable consistency. Corporate security is tailored for the organization and is proactive. Corporate security is managed, measured and proactive. Risk-based decision-making is practiced across all corporate security activities. Client satisfaction is measured as a KPI. Corporate security is branded and functions on a corporate-wide basis as a valued partner and recognized business enabler.
  • 41. Initial - Site-by-site difference approach. No success criteria set. Ad-hoc reactive approach. Defined - Corporate and security best practices gathered and translated into physical security corporate goals and requirements. Repeatable – Set requirements formally documented and standardized. Site level gap analysis and action plan. Managed and Measured – Formal PSMS which is measured and controlled. Report and auditing system established. Optimized – Corporate-wide physical security management system and aware workforce. Process improvement and performance measurement focused. 1ON Semiconductor
  • 42.
  • 43. Do you know where you are? Do you know where you want to go? Can you see the path? How will you know when you get there?
  • 45. ▪ An inner-city pharmaceutical production facility will be closing in 3 years and the operations of the facility will be moving to a new off-shore location. Operations will fully continue at the current facility until closing day and threats and risks to the operation’s success will likely not change. ▪ The existing security technology is nearing the end of its useful life and maintenance costs are increasing. Some concerns have been expressed with respect to the security of employees in an area of the city which appears to be declining. ▪ List three primary actions that you would consider critical with respect to the onward security of the operation and safety of the employees.
  • 46. ▪ A security professional colleague has approached you at the local ASIS chapter meeting claiming they understand you have successfully implemented an incident reporting, information and automated communications management system in your company. ▪ He asks if you would share your experiences of how you would recommend he proceed in adopting a CAD, incident reporting system for his company. ▪ Base your recommendations on “Best Practices”, lessons learned and how they really should proceed. ▪ Provide examples of effective measures for SMART training.
  • 47. ▪ What are the primary elements you would select to measure the level of effectiveness of security governance in your organization or company?