Enterprise Cyber Security Strategy Program and Governnace
Enterprise Cyber Security Strategy Program and Governnace
Enterprise
Cyber
Security
CLIENTX CYBER SECURIT Y STRATEGY
PROGRAM AND GOVERNANCE
Alignment with
Business
Compliance
with law,
regulations and
internal process
ClientX
Security
Objectives
Individual and
collective
responsibility
Standardization
& continuous
improvement
Reputation
Protection
Better
Compliance information
Achievement management
Availability of
Critical
Business
ClientX
Risk Quality
SOC Services PMO Admin HR Legal Finance
Management Assurance
•Security Services
•IT services
ClientX Security Value
Business
Requirements
Regulatory
Compliance Security Strategy
Resource
Legal Security
Governance
Security Program
Management
Dependency
Analsysis
Compliance Security
Drivers Organizational
Structure ISPA Audits EISA
Risk assessment
& management Personnel BCP
Threats
ClientX Organization Structure
Director –
Director - HR Director – IT Director – Sales
Marketing
CEO
Director - Director - Director –
Director - Risks
Operations Engineering Finance
Information Security Departement
Functions
CyberSecurity Compliance
Risk Management
Governance Management
ISD Head/CIO
Security
ISMS Risk Incident Awareness/Security
Implementer(/Informa Enterprise Security Management(/Informa Management(/Informa Vulnerability BCP(/Information IT Security
Architect Management Security Manager) SME Compliance Auditor Practitioners SOC specialists
tion Security Manager) tion Security Manager) tion Security Manager) Trainers(/Information
Security Manager)
Director - HR
Director -
Operations
Chair CEO
Director – IT
CyberSecurity
Steering
Committee
Director -
Engineering
Director –
Marketing
Stakeholders
Director –
Finance
Director – Sales
Director - Risks
CISO/CIO
ISD Inter-Department Relations
Information
Security
Dept
Enterprise
IT Dept QM Dept HR Finance Marketing Sales Legal PMO Risk
Architecture
ClientX Security Strategy
ClientX CyberSecurity Strategy
Criticality assessment Identification Protection Prevention Detection Infrastructure Management Training & Awareness Security Monitoring Incident Response Recovery Improvement programs
Adherence to ClientX
enterprise architectural Implement risk mitigation Configuration management
Critical Assets methods ISPA Technical controls automation Training for IT admins Critical component monitoring Deploy incident response plan Known process Frameworks/methodogies
security standards
BIA
CyberSecurity Strategy
development phases
Critical Assets Security strategy CyberSecurity
identification Roadmap Implementation plan
G
o
v
e
r Risk analysis
Target state
Strategy Review
n identification
a
n
c
e Current State wrt Cyber resilience
Improvement
cyber resilience assessment/Maturity
Program
principles assessment
ClientX Security Strategy
Overview
• Document Security Organization structure
• Alignment with business objectives
• Alignment with regulatory requirements
Outline Security
• Confidentiality objectives
• Integrity objectives
• Availability objectives
• Personnel objectives
Strategy
• ISPA
• ClientX Current/Target Security Profile
• ClientX Enteprise Security Architecture
• Risk assessment & management
• Audits
• Compliance Enforcement
• BCP
Security • ISPA
• Monitoring metrics for ClientX Security Strategy Components
Governance
• Performance metrics for ClientX
Security Program
• Compliance
• Threats
• Business Requirements
• Strategy components change
Management
• Planning
• Risk Management
• Education & Awareness
• Ongoing Program assessment
• Gap Analysis
Outline Enterprise Security
Architecture – a gist
BIA
Cotinous improvement
Test & Implement
Contingency Plan
Risk assessment
Security
Program
Management
Ongoing
Security Risk Education &
Program Gap Analysis
Requirements management Awareness
Assessment
Business Business
Compliance Threats Strategy Planning
Requirements Opportunities
Security Program Management
Security
Operations
IT Systems
Security Profile Requirements Education and
Target Profile Gap analysis Awareness
Risk Build Target
Action Plan Gap Analysis Action Plan
Enterprise Implementation
assessment Profile Ongoing
Security Program
Architecture Assessment
Profile
Security
Security
Technology
Governance
Architecture
Appendix
CISO Functions
Cyber Security
Working Group –
Security Strategy
Security Policies,
Infrastructure User
Guidelines, Enterprise Security Incident
Security Risk management BCP-BIA/DR Awareness/Training
Standards, Architecture Management
Architecture Programs
Procedures
Metrics
Security Governance
Security By Design - EISA
Business
Owner
Business
User
Policy driven security –
conceptual framework
Policy
Management
Authority
Policy
Repository
Policy Decision
Point(Policy
Engine)
Policy
Enforcement
Point(PEP)
Security
Services Policy Policy
Policy Decision
Management Policy Repository Enforcement Security Services
Point(PDP) Resources
Authority(PMA) Point(PEP)
Resources
Policy driven security –
conceptual architecture
Resources
•Policy Repository
•Access Management •Policy Decision Point •Border Protection Services
•Configuration Management •Detection Services
•Content Control Services
•Auditing Services
•Cryptographic Services
Policy Decision
Policy Point(PDP)
Security
Management Services
ClientX Security Program
•Security Governance
•Enterprise Security Architecture
ClientX Security •Data and Infrastructure Security Design
Strategy
ClientX BIASC
SOC Head/Representative
IR Head/Representative
TRM Head/Representative
CTI Head/Representative
RM Head/Representative
Stakeholders
CISO/CIO
QM Head/Representative
Enterprise
Architect/Enterprise
Security Architect
Information Security
Manager
Specialist function –
HR/Legal/PMO/Risk
CISO Functions
ClientX Security Strategy
ClientX Security Policy Architecture
ClientX Enterprise Security Architecture
ClientX Infrastructure Security Architecture
ClientX Risk management
ClientX BCP activities
ClientX Incident Management
ClientX User Security Awareness/Security Training Programs
ClientX Security Governance
ClientX Security Program