SlideShare una empresa de Scribd logo
1 de 8
Descargar para leer sin conexión
CISOs and their teams operate against a backdrop of continuous change in the threat
landscape, information security technology, and business conditions. The mission to
protect critical assets across space and time is further complicated by a lack of direct
control over the people and processes that expose the organization to risk through day-
to-day operations.
In-depth research with hundreds of information security leaders revealed
a common thread among the top performers:
Technical skills, while essential, are not enough.
To deliver maximum impact, Information Security must
engage with the business and practice proactive
organizational engagement.
To drive insight and enable action
on these “soft skills,” IANS has
broken proactive organizational
engagement down into a set of
clearly defined, quantifiable
elements we call The 7 Factors
of CISO Impact.
Our CISO Impact framework provides a
structured, action-oriented approach that
allows you to baseline your performance
and measure progress down to the Factor
and sub-Factor levels as you work towards
b e t t e r p ro a c t i v e o rg a n i z a t i o n a l
engagement.
First step: take the Diagnostic.
The Diagnostic is an online self-
assessment that measures the current
state of your team’s organizational
engagement. Your personal report
provides you with insight into your team’s
strengths and weaknesses, and allows
you to compare the results to those of
your peers.
As you work to improve your skill sets in
each of the 7 Factors, your Diagnostic
results will reflect your progress.
Then, attend
a CISO Impact
Workshop.
The CISO Impact Workshop is a four-hour
deep dive into one of the 7 Factors of
CISO Impact.
IANS-proprietary worksheets will help you
break down your Factor-specific Diagnostic
results into concrete, step-by-step actions
for improvement.
You’ll experience a new way of thinking
about what you do, and walk away with
insights that will influence the way that you
execute your mission.
A CISO Impact Workshop is a collaborative
hands-on working session.
Wrap-Up
Review lessons
learned and
discuss of how
improvement
will drive
success.Introductions
Get to know your
fellow CISOs
Workshop Orientation
The IANS facilitator
describes the workshop
context, components and
flow for the day
Solo Work
Document your
team’s skills and
processes vs. the
workshop Factor.
Presentations &
Feedback
Present your
workbook
writings and
receive feedback
from your peers.
Research Overview
A discussion of the
research and structure of
the CISO Impact
framework
Diagnostic
An explanation of how
the CISO Impact self-
assessment tool works
What are the 7 Factors?
An overview of the individual
7 Factors of CISO Impact,
and a look at how they all
work together to drive
success.
Small Group
Discussion
Share ideas and
challenges with
your small group
Most business leaders view information
security risk as separate from business
risk. Why? And how can we change this?
Only 7% of CISOs who have taken the CISO Impact
Diagnostic report being in-sync with business
leadership regarding information security assets,
processes, and incident response capabilities. What
steps can you take to bring your goals into line with
the strategic goals of the business and convince
business leaders to own information security risk?
At a recent Factor 2 Workshop, we posed the question:
Factor 2:
Get Business Leaders
to Own Information
Security Risk
Participants discussed the challenges …
… and through that discussion, shared
thoughts on how to address the problem.
“If the business signs off
on risk, nobody blinks.
We have to push to
revisit risks periodically.” “We don’t have a risk
culture so developing a
policy on risk stewardship
isn’t getting much
support.”
“Top management sends
mixed signals about who is
accountable for information
security risk. We’re left on the
hot seat.”
You’ll walk away with strategies for success
in real-world situations. For example,
you’ll learn how to:
•  Work with C-Level executives to tie business leaders’
compensation to reducing security risks.
•  Create competition among business leaders by implementing
and publishing ‘wall of shame’ metrics for information security
compliance.
•  Work on building connections and finding security champions
in other departments in the organization, like Finance or
Legal.

Más contenido relacionado

La actualidad más candente

Creating safety cultures
Creating safety culturesCreating safety cultures
Creating safety cultures
Phil La Duke
 
Case analysis
Case analysisCase analysis
Case analysis
amol_nale
 
Mr. Stuart Johnston - Leading with safety the path to excellence
Mr. Stuart Johnston - Leading with safety the path to excellenceMr. Stuart Johnston - Leading with safety the path to excellence
Mr. Stuart Johnston - Leading with safety the path to excellence
kuwaitsupplychain
 
Behavior based safety how thinking safe leads to acting safe
Behavior based safety   how thinking safe leads to acting safeBehavior based safety   how thinking safe leads to acting safe
Behavior based safety how thinking safe leads to acting safe
HNI Risk Services
 
Taking Control Of Workplace Safety
Taking Control Of Workplace SafetyTaking Control Of Workplace Safety
Taking Control Of Workplace Safety
ladukepc
 

La actualidad más candente (18)

Data-centric Safety Critical Element Management
Data-centric Safety Critical Element ManagementData-centric Safety Critical Element Management
Data-centric Safety Critical Element Management
 
Major Hazard Installations
Major Hazard InstallationsMajor Hazard Installations
Major Hazard Installations
 
Creating a Behavioral Safety Process
Creating a Behavioral Safety ProcessCreating a Behavioral Safety Process
Creating a Behavioral Safety Process
 
Social Performance: Can we get it right?
Social Performance: Can we get it right?Social Performance: Can we get it right?
Social Performance: Can we get it right?
 
Creating safety cultures
Creating safety culturesCreating safety cultures
Creating safety cultures
 
Cybersecurity.1
Cybersecurity.1Cybersecurity.1
Cybersecurity.1
 
Case analysis
Case analysisCase analysis
Case analysis
 
Managing Rule Breaking
Managing Rule BreakingManaging Rule Breaking
Managing Rule Breaking
 
Mr. Stuart Johnston - Leading with safety the path to excellence
Mr. Stuart Johnston - Leading with safety the path to excellenceMr. Stuart Johnston - Leading with safety the path to excellence
Mr. Stuart Johnston - Leading with safety the path to excellence
 
Are we truly accountable towards safety?
Are we truly accountable towards safety?Are we truly accountable towards safety?
Are we truly accountable towards safety?
 
Good HSE Governance
Good HSE GovernanceGood HSE Governance
Good HSE Governance
 
The seventh value asse show
The seventh value asse showThe seventh value asse show
The seventh value asse show
 
Safety As A Competitve Advantage
Safety As A Competitve AdvantageSafety As A Competitve Advantage
Safety As A Competitve Advantage
 
Behavior based safety how thinking safe leads to acting safe
Behavior based safety   how thinking safe leads to acting safeBehavior based safety   how thinking safe leads to acting safe
Behavior based safety how thinking safe leads to acting safe
 
Crisis Ready: Build an Invincible Brand Slide Deck
Crisis Ready: Build an Invincible Brand Slide DeckCrisis Ready: Build an Invincible Brand Slide Deck
Crisis Ready: Build an Invincible Brand Slide Deck
 
Taking Control Of Workplace Safety
Taking Control Of Workplace SafetyTaking Control Of Workplace Safety
Taking Control Of Workplace Safety
 
Behavioral Safety Leadership in Oil & Gas construction
Behavioral Safety Leadership in Oil & Gas constructionBehavioral Safety Leadership in Oil & Gas construction
Behavioral Safety Leadership in Oil & Gas construction
 
What is an IANS Connector Event?
What is an IANS Connector Event?What is an IANS Connector Event?
What is an IANS Connector Event?
 

Destacado

Google-Work Culture and Innovation
Google-Work Culture and InnovationGoogle-Work Culture and Innovation
Google-Work Culture and Innovation
Prasant Patro
 

Destacado (17)

Dinner
DinnerDinner
Dinner
 
Google - HR Policies
Google - HR PoliciesGoogle - HR Policies
Google - HR Policies
 
Google-Work Culture and Innovation
Google-Work Culture and InnovationGoogle-Work Culture and Innovation
Google-Work Culture and Innovation
 
Organizational Development
Organizational DevelopmentOrganizational Development
Organizational Development
 
Presentation skills for managers
Presentation skills for managersPresentation skills for managers
Presentation skills for managers
 
Creative Thinking Skills
Creative Thinking SkillsCreative Thinking Skills
Creative Thinking Skills
 
Developing leadership skills
Developing leadership skillsDeveloping leadership skills
Developing leadership skills
 
HR Scorecard
HR ScorecardHR Scorecard
HR Scorecard
 
Emotional Intelligence
Emotional IntelligenceEmotional Intelligence
Emotional Intelligence
 
Good To Great
Good To GreatGood To Great
Good To Great
 
Career Planning and Development
Career Planning and DevelopmentCareer Planning and Development
Career Planning and Development
 
Measuring ROI of Training
Measuring ROI of Training  Measuring ROI of Training
Measuring ROI of Training
 
Balanced Scorecard
Balanced Scorecard  Balanced Scorecard
Balanced Scorecard
 
Diagnosing Organizational Effectiveness
Diagnosing Organizational Effectiveness  Diagnosing Organizational Effectiveness
Diagnosing Organizational Effectiveness
 
Change Management
Change Management  Change Management
Change Management
 
Coaching For Optimal Performance
Coaching For Optimal Performance   Coaching For Optimal Performance
Coaching For Optimal Performance
 
Communication Skills
Communication  Skills    Communication  Skills
Communication Skills
 

Similar a What is an IANS CISO Workshop? Factor 2

The 7 Factors of CISO Impact
The 7 Factors of CISO ImpactThe 7 Factors of CISO Impact
The 7 Factors of CISO Impact
IANS
 
Balbix-New-CISO-Board-Deck.pptx
Balbix-New-CISO-Board-Deck.pptxBalbix-New-CISO-Board-Deck.pptx
Balbix-New-CISO-Board-Deck.pptx
jjvdneut
 
Balbix-New-CISO-Board-Deck.pptx
Balbix-New-CISO-Board-Deck.pptxBalbix-New-CISO-Board-Deck.pptx
Balbix-New-CISO-Board-Deck.pptx
jjvdneut
 
Information Assurance Guidelines For Commercial Buildings...
Information Assurance Guidelines For Commercial Buildings...Information Assurance Guidelines For Commercial Buildings...
Information Assurance Guidelines For Commercial Buildings...
Laura Benitez
 
5 steps for better risk assessment
5 steps for better risk assessment5 steps for better risk assessment
5 steps for better risk assessment
DrMohammedFarid
 
10-things-you-ought-to-know-before-you-benchmark(1)
10-things-you-ought-to-know-before-you-benchmark(1)10-things-you-ought-to-know-before-you-benchmark(1)
10-things-you-ought-to-know-before-you-benchmark(1)
Marie Peters
 
A CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk ManagementA CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk Management
Daren Dunkel
 
IREC165473PR RP 2017 Security Outlook
IREC165473PR RP 2017 Security OutlookIREC165473PR RP 2017 Security Outlook
IREC165473PR RP 2017 Security Outlook
Chris Cornillie
 

Similar a What is an IANS CISO Workshop? Factor 2 (20)

What is an IANS CISO Workshop? Factor 1
What is an IANS CISO Workshop? Factor 1What is an IANS CISO Workshop? Factor 1
What is an IANS CISO Workshop? Factor 1
 
What is an IANS CISO Workshop? Factor 3
What is an IANS CISO Workshop? Factor 3What is an IANS CISO Workshop? Factor 3
What is an IANS CISO Workshop? Factor 3
 
The 7 Factors of CISO Impact
The 7 Factors of CISO ImpactThe 7 Factors of CISO Impact
The 7 Factors of CISO Impact
 
Top 10 Interview Questions for Risk Analyst.pptx
Top 10 Interview Questions for Risk Analyst.pptxTop 10 Interview Questions for Risk Analyst.pptx
Top 10 Interview Questions for Risk Analyst.pptx
 
CISO Interview Question.pdf
CISO Interview Question.pdfCISO Interview Question.pdf
CISO Interview Question.pdf
 
Balbix-New-CISO-Board-Deck.pptx
Balbix-New-CISO-Board-Deck.pptxBalbix-New-CISO-Board-Deck.pptx
Balbix-New-CISO-Board-Deck.pptx
 
Balbix-New-CISO-Board-Deck.pptx
Balbix-New-CISO-Board-Deck.pptxBalbix-New-CISO-Board-Deck.pptx
Balbix-New-CISO-Board-Deck.pptx
 
Security by Collaboration: Rethinking Red Teams versus Blue Teams
Security by Collaboration: Rethinking Red Teams versus Blue TeamsSecurity by Collaboration: Rethinking Red Teams versus Blue Teams
Security by Collaboration: Rethinking Red Teams versus Blue Teams
 
How to measure your cybersecurity performance
How to measure your cybersecurity performanceHow to measure your cybersecurity performance
How to measure your cybersecurity performance
 
Information Assurance Guidelines For Commercial Buildings...
Information Assurance Guidelines For Commercial Buildings...Information Assurance Guidelines For Commercial Buildings...
Information Assurance Guidelines For Commercial Buildings...
 
Cyber presentation spet 2019 v8sentfor upload
Cyber presentation spet 2019 v8sentfor uploadCyber presentation spet 2019 v8sentfor upload
Cyber presentation spet 2019 v8sentfor upload
 
Weakest links of an organization's Cybersecurity chain
Weakest links of an organization's Cybersecurity chainWeakest links of an organization's Cybersecurity chain
Weakest links of an organization's Cybersecurity chain
 
5 steps for better risk assessment
5 steps for better risk assessment5 steps for better risk assessment
5 steps for better risk assessment
 
Meningkatkan peran audit internal fungsi peran digital
Meningkatkan peran audit internal fungsi peran digital Meningkatkan peran audit internal fungsi peran digital
Meningkatkan peran audit internal fungsi peran digital
 
10-things-you-ought-to-know-before-you-benchmark(1)
10-things-you-ought-to-know-before-you-benchmark(1)10-things-you-ought-to-know-before-you-benchmark(1)
10-things-you-ought-to-know-before-you-benchmark(1)
 
Cyber Defence - Service portfolio
Cyber Defence - Service portfolioCyber Defence - Service portfolio
Cyber Defence - Service portfolio
 
A CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk ManagementA CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk Management
 
Using Threat Information to Build Your Cyber Risk Intelligence Program
Using Threat Information to Build Your Cyber Risk Intelligence ProgramUsing Threat Information to Build Your Cyber Risk Intelligence Program
Using Threat Information to Build Your Cyber Risk Intelligence Program
 
Managing Interdependencies in Complex Organizations
Managing Interdependencies in Complex OrganizationsManaging Interdependencies in Complex Organizations
Managing Interdependencies in Complex Organizations
 
IREC165473PR RP 2017 Security Outlook
IREC165473PR RP 2017 Security OutlookIREC165473PR RP 2017 Security Outlook
IREC165473PR RP 2017 Security Outlook
 

Más de IANS

Más de IANS (6)

Application Security - Making It Work
Application Security - Making It WorkApplication Security - Making It Work
Application Security - Making It Work
 
The 7 Factors of CISO Impact at RSA 2015
The 7 Factors of CISO Impact at RSA 2015The 7 Factors of CISO Impact at RSA 2015
The 7 Factors of CISO Impact at RSA 2015
 
What is an IANS Connector Event? - Factor 6
What is an IANS Connector Event? - Factor 6What is an IANS Connector Event? - Factor 6
What is an IANS Connector Event? - Factor 6
 
What is an IANS Connector Event? - Factor 5
What is an IANS Connector Event? - Factor 5What is an IANS Connector Event? - Factor 5
What is an IANS Connector Event? - Factor 5
 
What is an IANS Connector Event? - Factor 3
What is an IANS Connector Event? - Factor 3What is an IANS Connector Event? - Factor 3
What is an IANS Connector Event? - Factor 3
 
What is an IANS Connector Event? - Factor 1
What is an IANS Connector Event? - Factor 1What is an IANS Connector Event? - Factor 1
What is an IANS Connector Event? - Factor 1
 

Último

Abortion pills in Jeddah |• +966572737505 ] GET CYTOTEC
Abortion pills in Jeddah |• +966572737505 ] GET CYTOTECAbortion pills in Jeddah |• +966572737505 ] GET CYTOTEC
Abortion pills in Jeddah |• +966572737505 ] GET CYTOTEC
Abortion pills in Riyadh +966572737505 get cytotec
 
Agile Coaching Change Management Framework.pptx
Agile Coaching Change Management Framework.pptxAgile Coaching Change Management Framework.pptx
Agile Coaching Change Management Framework.pptx
alinstan901
 
Beyond the Codes_Repositioning towards sustainable development
Beyond the Codes_Repositioning towards sustainable developmentBeyond the Codes_Repositioning towards sustainable development
Beyond the Codes_Repositioning towards sustainable development
Nimot Muili
 

Último (15)

Abortion pills in Jeddah |• +966572737505 ] GET CYTOTEC
Abortion pills in Jeddah |• +966572737505 ] GET CYTOTECAbortion pills in Jeddah |• +966572737505 ] GET CYTOTEC
Abortion pills in Jeddah |• +966572737505 ] GET CYTOTEC
 
Dealing with Poor Performance - get the full picture from 3C Performance Mana...
Dealing with Poor Performance - get the full picture from 3C Performance Mana...Dealing with Poor Performance - get the full picture from 3C Performance Mana...
Dealing with Poor Performance - get the full picture from 3C Performance Mana...
 
Strategic Management, Vision Mission, Internal Analsysis
Strategic Management, Vision Mission, Internal AnalsysisStrategic Management, Vision Mission, Internal Analsysis
Strategic Management, Vision Mission, Internal Analsysis
 
Agile Coaching Change Management Framework.pptx
Agile Coaching Change Management Framework.pptxAgile Coaching Change Management Framework.pptx
Agile Coaching Change Management Framework.pptx
 
Reviewing and summarization of university ranking system to.pptx
Reviewing and summarization of university ranking system  to.pptxReviewing and summarization of university ranking system  to.pptx
Reviewing and summarization of university ranking system to.pptx
 
BDSM⚡Call Girls in Sector 99 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 99 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 99 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 99 Noida Escorts >༒8448380779 Escort Service
 
Day 0- Bootcamp Roadmap for PLC Bootcamp
Day 0- Bootcamp Roadmap for PLC BootcampDay 0- Bootcamp Roadmap for PLC Bootcamp
Day 0- Bootcamp Roadmap for PLC Bootcamp
 
Call Now Pooja Mehta : 7738631006 Door Step Call Girls Rate 100% Satisfactio...
Call Now Pooja Mehta :  7738631006 Door Step Call Girls Rate 100% Satisfactio...Call Now Pooja Mehta :  7738631006 Door Step Call Girls Rate 100% Satisfactio...
Call Now Pooja Mehta : 7738631006 Door Step Call Girls Rate 100% Satisfactio...
 
International Ocean Transportation p.pdf
International Ocean Transportation p.pdfInternational Ocean Transportation p.pdf
International Ocean Transportation p.pdf
 
Intro_University_Ranking_Introduction.pptx
Intro_University_Ranking_Introduction.pptxIntro_University_Ranking_Introduction.pptx
Intro_University_Ranking_Introduction.pptx
 
Beyond the Codes_Repositioning towards sustainable development
Beyond the Codes_Repositioning towards sustainable developmentBeyond the Codes_Repositioning towards sustainable development
Beyond the Codes_Repositioning towards sustainable development
 
Safety T fire missions army field Artillery
Safety T fire missions army field ArtillerySafety T fire missions army field Artillery
Safety T fire missions army field Artillery
 
internal analysis on strategic management
internal analysis on strategic managementinternal analysis on strategic management
internal analysis on strategic management
 
Call now : 9892124323 Nalasopara Beautiful Call Girls Vasai virar Best Call G...
Call now : 9892124323 Nalasopara Beautiful Call Girls Vasai virar Best Call G...Call now : 9892124323 Nalasopara Beautiful Call Girls Vasai virar Best Call G...
Call now : 9892124323 Nalasopara Beautiful Call Girls Vasai virar Best Call G...
 
GENUINE Babe,Call Girls IN Baderpur Delhi | +91-8377087607
GENUINE Babe,Call Girls IN Baderpur  Delhi | +91-8377087607GENUINE Babe,Call Girls IN Baderpur  Delhi | +91-8377087607
GENUINE Babe,Call Girls IN Baderpur Delhi | +91-8377087607
 

What is an IANS CISO Workshop? Factor 2

  • 1. CISOs and their teams operate against a backdrop of continuous change in the threat landscape, information security technology, and business conditions. The mission to protect critical assets across space and time is further complicated by a lack of direct control over the people and processes that expose the organization to risk through day- to-day operations. In-depth research with hundreds of information security leaders revealed a common thread among the top performers: Technical skills, while essential, are not enough. To deliver maximum impact, Information Security must engage with the business and practice proactive organizational engagement.
  • 2. To drive insight and enable action on these “soft skills,” IANS has broken proactive organizational engagement down into a set of clearly defined, quantifiable elements we call The 7 Factors of CISO Impact. Our CISO Impact framework provides a structured, action-oriented approach that allows you to baseline your performance and measure progress down to the Factor and sub-Factor levels as you work towards b e t t e r p ro a c t i v e o rg a n i z a t i o n a l engagement.
  • 3. First step: take the Diagnostic. The Diagnostic is an online self- assessment that measures the current state of your team’s organizational engagement. Your personal report provides you with insight into your team’s strengths and weaknesses, and allows you to compare the results to those of your peers. As you work to improve your skill sets in each of the 7 Factors, your Diagnostic results will reflect your progress.
  • 4. Then, attend a CISO Impact Workshop. The CISO Impact Workshop is a four-hour deep dive into one of the 7 Factors of CISO Impact. IANS-proprietary worksheets will help you break down your Factor-specific Diagnostic results into concrete, step-by-step actions for improvement. You’ll experience a new way of thinking about what you do, and walk away with insights that will influence the way that you execute your mission.
  • 5. A CISO Impact Workshop is a collaborative hands-on working session. Wrap-Up Review lessons learned and discuss of how improvement will drive success.Introductions Get to know your fellow CISOs Workshop Orientation The IANS facilitator describes the workshop context, components and flow for the day Solo Work Document your team’s skills and processes vs. the workshop Factor. Presentations & Feedback Present your workbook writings and receive feedback from your peers. Research Overview A discussion of the research and structure of the CISO Impact framework Diagnostic An explanation of how the CISO Impact self- assessment tool works What are the 7 Factors? An overview of the individual 7 Factors of CISO Impact, and a look at how they all work together to drive success. Small Group Discussion Share ideas and challenges with your small group
  • 6. Most business leaders view information security risk as separate from business risk. Why? And how can we change this? Only 7% of CISOs who have taken the CISO Impact Diagnostic report being in-sync with business leadership regarding information security assets, processes, and incident response capabilities. What steps can you take to bring your goals into line with the strategic goals of the business and convince business leaders to own information security risk? At a recent Factor 2 Workshop, we posed the question: Factor 2: Get Business Leaders to Own Information Security Risk
  • 7. Participants discussed the challenges … … and through that discussion, shared thoughts on how to address the problem. “If the business signs off on risk, nobody blinks. We have to push to revisit risks periodically.” “We don’t have a risk culture so developing a policy on risk stewardship isn’t getting much support.” “Top management sends mixed signals about who is accountable for information security risk. We’re left on the hot seat.”
  • 8. You’ll walk away with strategies for success in real-world situations. For example, you’ll learn how to: •  Work with C-Level executives to tie business leaders’ compensation to reducing security risks. •  Create competition among business leaders by implementing and publishing ‘wall of shame’ metrics for information security compliance. •  Work on building connections and finding security champions in other departments in the organization, like Finance or Legal.