CCISO Domain 1 v8 051721
CCISO Domain 1 v8 051721
• Name
• Title
• Company
• What are you looking to gain most from this
course?
• What do you see as your biggest challenge in the
fi eld of information security?
Risk
Governance Compliance Privacy
Management
Adherence to Laws, Conform to Stated Ensure Private Analyze, Assess, and
Regulations, and Requirements Information is Kept Treat Risk
Policies Secret
• A partnership is an organization in
which two or more individuals share
the benefi ts and the responsibility
for liabilities related to the
operations of the organization.
• Partnerships allow owners to pool
their knowledge and experience.
Partnershi • Governance becomes more complex
p as the partnership increases
members.
65%
Ty p i c a l l y, o r g a n i z a t i o n s c a n n o t b e g i n t o r e a l i z e t h e b e n e fi t s o f m a p p i n g p r o c e s s e s
to organizational standards and achieving consistency across the enterprise until
CMMI Level 3.
Complexity
Industry Can you name other drivers?
1. _____________________
Company 2. _____________________
Size
3. _____________________
4. _____________________
Technology
Regulations
There is no CEO
standard that
COO CIO CFO CISO CRO C LO
establishes the
Operations Technology Finance Risk Legal
optimal
CISO CISO CISO CISO CISO
placement of a
CISO within the
organizational
hierarchy.
Matrix (Multiple)
HR / Legal
Audit / Risk
CFO
IT Manager
Board
CIO / CTO
Desired Current
Source: ClubCISO – 2019 Information Security Maturity Report
Domain 1: Governance and Risk
3 .3 T HE EX ECUT IVE CISO
• A ThreatTrack survey of
C-Level 200+ US-based C-suite-level
executives by data security
Attitudes fi rm ThreatTrack found:
toward the o 61% - CISOs would not be
successful outside of IS.
CISOCISO Grade
o 44% - CISOs should be
A - Excellent 23% accountable for data
B – Above Average 42% breaches.
C - Average 30% o 46% - CISOs should be
responsible for cybersecurity
purchases.
Source: ThreatTrack -
https://media.scmagazine.com/documents/89/threattrack_study_on_c
isos_22034.pdf
Domain 1: Governance and Risk
3 .4 NO NEX ECUT IVE CISO
• It is not uncommon to
place the CISO in a
nonexecutive leadership
role.
The nonexecutive CISO
Offi ce of the CISO • These individuals
typically focus only on
information security and
risk management
objectives rather than
infl uencing broader
business operations.
Domain 1: Governance and Risk
4.
LAWS/REGULATION
S/ STANDARDS AS
DRIVERS OF
ORGANIZATION
POLICY/STANDARD
S/ PROCEDURES
• Acceptable Use
• Authentication • Network Security
• Asset Management • Outsourcing
Certain policies can • Backup • Password
be considered • Business • Physical Security
Continuity/Disaster • Remote Access
essential to security Recovery • Retention
management. • Confidential Data • Third Party Management
• Data Classification • VPN
• Encryption • Wireless Use
• Incident Response • Email
• Mobile Device • Guest Access
• Network Access
• Leadership:
o An intangible quality that is very difficult to define. Most people will
know when they see it. There is a significant difference between a
manager and a leader.
• Ethics:
o Defines the moral principles that govern the behavior of a person or
group. Appropriate and ethical behavior is crucial for activities the
CISO conducts or directs within an organization.
o Because of the influence associated with the role of the CISO, the
behavior of the CISO greatly influences the character and behavior
of other people throughout the organization.
Domain 1: Governance and Risk
5 .5 LEAD E R SHIP AND ET HIC S: FR AMEWO R K
1. Keep private and confidential information gained in your 11. Conduct oneself in the most ethical and competent
professional work. manner.
2. Protect the intellectual property of others. 12. Ensure ethical conduct and professional care at all times.
3. Disclose to appropriate persons or authorities’ potential 13. Not to neither associate with malicious hackers nor
dangers to any ecommerce clients. engage in any malicious activities.
4. Provide service in your areas of competence, being honest 14. Not to purposefully compromise or allow the client
and forthright about any limitations of your experience and organization’s systems to be compromised.
education. 15. Ensure all penetration testing activities are authorized
5. Never knowingly use software or process that is obtained or and within legal limits.
retained either illegally or unethically. 16. Not to take part in any black hat activity or be associated
6. Not to engage in deceptive financial practices. with any black hat community .
7. Use the property of a client or employer only in ways 17. Not to be part of any underground hacking community .
properly authorized. 18. Not to make inappropriate reference to the certification
8. Disclose to all concerned parties those conflicts of interest. or misleading use of certificates.
9. Ensure good management for any project you lead, including 19. Not convicted in any felony or violated any law of the
effective procedures for promotion of quality and full land.
disclosure of risk.
10. Add to the knowledge of the e-commerce profession by
constant study, share the lessons of your experience.
Managing
risks requires
the
identification,
analysis and
control of the
exposure to
risk. Source: "The
Essentials of Risk
Management”
+ + + =
Asset Vector Threats + Vulnerability + Impacts Risk Residual
Treatment Risk
Risk
Assessment
Results
Satisfactory
Assessment
Risk Decision Point 1
Risk Treatment
Options
Risk
Assessment
Results
Satisfactory
Assessment
Risk Decision Point 2
Ease of
Ethical People Us e
Cultural Other
Financial Legal
Controls
Technical
Policy
Time
Balance
Risk
Risk Identification
Owner
Risk Analysis
Assets Threats
Vulnerabilities
Impacts Likelihood
Risk Formulas
Probability of Event
Estimation of Impact
Occurring
Risk Treatments
Domain 1: Governance and Risk
1 6.3 .1 ISO 27 0 05 R ISK MANAGEMENT
WO R K FLO W
Risk Risk
Risk Analysis
Identification Evaluation
Identification of: • Consequences List of Risks:
• Assets • Incident Likelihood • Information security
• Threats • Level of Risk properties - relevance
• Existing Controls Determination • Business Impact
• Vulnerabilities
• Consequences
Assessment of: Develop A Prioritized
ISO 27005 Risk Assessment Workflow
Domain 1: Governance and Risk
1 6.3 .3 ISO 27 0 05 : R ISK ID ENTIFICAT ION
Risk
Communica Risk
tion & Monitoring
Consultatio & Review
n
N a t i o n a l I n s t i t u t e o f S t a n d a rd s a n d Te c h n o l o g y
( N I S T ) – S p e c i a l Pu b l i c a t i o n ( S P ) 8 0 0 - 3 7 R 2 R i s k
M a n a g e m e n t Fr a m e w o r k f o r I n f o rm a t i o n S y s t e m s
a n d O rg a n i z a t i o n s : A S y s t e m L i f e C y c l e :
o Life cycle for risk management.
o Ti e s o f n u m b e r o f N I S T r i s k a n d s e c u r i t y p u b l i c a t i o n s
together to manage risk.
800-53 (Security and Privacy Controls for Information
Systems and Organizations)
800-30 (Guide for Conducting Risk Assessments)
800-39 (Managing Information Security Risk)
o A p p l i c a b l e t o a n y i n d u s t r y.
Domain 1: Governance and Risk Management
16.14 NIST RISK MANAGEMENT FRAMEWORK
(RMF)
800-60 – IS Mapping
Architecture Organizationa
Description: Step 1: l Inputs:
• Reference Models Categorize • Laws
• Solution Architectures • Directives
• Business Processes 800-137 – Monitoring
Information System
800-53 – Control • Policies
• Information System Catalog • Goals &
Boundaries Step 6: Step 2: Objectives
Monitor Select • Resources
Security Controls Risk Security Controls • Supply Chain
Entity Objectives
• Enterprise Risk Management
Components of ERM
of Sponsoring Organizations
of the Treadway Commission
(COSO) .
• Defines essential enterprise
risk management
components, discusses key
ERM principles and concepts, Source: Treadway Commission
evaluation.
D o m a•
i n Four
1 : G o v e phase,
r n a n c e a n d eight
Risk step
6 .18 .6 T HR EAT ASSESSMENT AND R EMED IAT IO N
ANALYSIS (TAR A)
• Effective risk
management includes an
articulated lifecycle.
• Ensures risk is managed
in a continuous and
methodical manner.
• Closed loop lifecycle.
Risk Management Lifecycle. (By Tari Schreider, licensed under a Creative Commons Attribution-
NonCommercial-NoDerivatives 4.0 International License)
Domain 1: Governance and Risk
6 .20 R ISK MANAGEMENT LIFECYCLE
• Risk assessment
o Quantitative
o Qualitative
o Hybrid
• Risk registry
• Risk treatment
• Rik acceptance
• Risk monitoring
• Risk reporting
1 2 3 4 5
Identification
Identification Identification
Identification Identification of
of Existing of
of Assets of Threats Consequence
Controls Vulnerabilities
s
• Attack surface:
o Assets – anything of value.
• Asset inventory:
o Defines scope of risk management program.
• Asset owners = risk owners.
• Shadow IT assets.
• Hackers look at
organizations as
something that can be
exploited, an attack
surface.
• Assets can be tangible
and intangible.
• You can’t protect what
you can’t see.
Attack Surface Model™. (By Tari Schreider, licensed under a Creative Commons Attribution-
NonCommercial-NoDerivatives 4.0 International License)
Domain 1: Governance and Risk
6 .2 1 ST EP 2 : ID ENT IFICAT IO N O F T HR EAT S
• Threats need to be
vetted.
• Threat sources are
registered in the risk
register.
• You can’t protect what
you can’t see.
• Supply chain
represents threats.
• Discussed further in
Domain 3. Source: ISO 27005 Annex C - Examples of Typical
Threats
Key; A = Accidental – D = Deliberate – E =
Domain 1: Governance and Risk Environmental
6 .21 ST EP 3 : ID ENT IFICAT IO N O F EX IST ING
CONT R O LS
• Vulnerabilities are
weaknesses in an
attack surface.
• Vulnerabilities
represent exploit
potential.
• Vulnerability
database
integrates with risk
register.
• Discussed further in
Domain 3. Source: ISO 27005 Annex D - Examples of Vulnerabilities
Domain 1: Governance and Risk
6 .21 ST EP 5 : ID ENT IFICAT IO N O F
CONSEQ UENCES