SlideShare a Scribd company logo
1 of 33
Download to read offline
Copyright © 2015 ITpreneurs. All rights reserved.
Cyber Resilience:
whose problem is it?
Follow: @itpreneurs
Visit: www.itpreneurs.com
Copyright © 2015 ITpreneurs. All rights reserved.
Welcome
Connie Tai
Head of Products and Solutions Marketing
ITpreneurs
AXELOS - GLOBAL BEST PRACTICE3
Cyber: who’s problem is it?
Dan Cole
RESILIA Product Lead, AXELOS
www.AXELOS.com/RESILIA
AXELOS - GLOBAL BEST PRACTICE4
Why is it an issue now?
AXELOS - GLOBAL BEST PRACTICE5
Why is it an issue now?
AXELOS - GLOBAL BEST PRACTICE6
...and the impactsThe response...
“I’m tied in for another year with these
people that can’t manage data properly. I
don’t want to stay with this company giving
them my money”
TalkTalk customer
“TalkTalk hit by customer backlash – legal
claims over cyberattack”
Sunday Times lead article: 25 October
“Experts estimate the debacle could cost
TalkTalk up to £75m in lost revenues and
other costs”
Sunday Times: 25 October
We need to Talk Talk
“Cyber crime is the crime of our generation”
“With the benefit of hindsight, were we doing
enough? Well, you’ve got to say we weren’t
and obviously we will be looking back and
reviewing that extremely seriously”
Asked by the BBC whether customers’ bank
details had been encrypted by TalkTalk, she
said: “the awful truth is, I don’t know”.
Dido Harding, CEO, TalkTalk
AXELOS - GLOBAL BEST PRACTICE7
The risks
$4.2 trillion
estimated value of the
internet economy in G20
economies by 2016
The opportunities
94%of businesses with 10+
employees are online
936 exabytesgrowth in global internet
traffic from 2005-2015
13.5% to 23%
projected rise in consumer
purchases made over the
internet from 2010-2016
4.1%of GDP contributed
by internet
$445 billion
cost of cyber-crime to the
global economy per year
44%increase in cyber attacks.
That’s 1.4 successful
attacks per organization
per week
95%of all security incidents
involve human error
3000
companies had been
victims of cyber attacks in
2013
$145average cost paid for each
lost or stolen file
containing sensitive or
confidential information
Opportunity and Risk
AXELOS - GLOBAL BEST PRACTICE8
Getting the balance right
PREVENT DETECT CORRECT
PEOPLE PROCESS TECHNOLOGY
RISK OPPORTUNITY
AXELOS - GLOBAL BEST PRACTICE9
A familiar situation of ownership
This is a little story about four people named Everybody, Somebody, Anybody, and Nobody.
There was an important job to be done and Everybody was sure that Somebody would do it.
Anybody could have done it, but Nobody did it.
Somebody got angry about that because it was Everybody's job.
Everybody thought that Anybody could do it, but Nobody realized that Everybody wouldn't do it.
It ended up that Everybody blamed Somebody when Nobody did what Anybody could have done.
10 AXELOS - GLOBAL BEST PRACTICE COMMERCIAL IN CONFIDENCE
“We set security standards and policy;
we expect everyone to stick to these
and we will check compliance”
Risk Information Security
“We flagged the information is
sensitive and needs protecting –
so go and do that”
Information owners
“We own the services – but we
don’t have the detailed technical
knowledge to do everything”
IT delivery & Dev teams
“We have risk and security
teams; if they want to bring
risks or investment cases to us
we will look at them”
Board / Leadership team
Cyber: who’s problem is it?
AXELOS - GLOBAL BEST PRACTICE11
Roles and Responsibilities
Further reading:
Cyber Resilience Best
Practice section 9: Roles
and Responsibilities
Governance
* Board / audit
* Information owners
Leadership & management
* Risk & security
management
* IT strategy and services
Delivery
* IT service delivery
* Process owners
AXELOS - GLOBAL BEST PRACTICE12
Need to build collaboration
AXELOS - GLOBAL BEST PRACTICE13
Building collaboration
Start at home: IT and service
management
1
• Large team, diverse skills
• Engaged with all areas of the
organization
• Build common language and
knowledge
• Manage the business value:
Opportunities & Risk balance
Further reading:
Cyber Resilience Best
Practice guide and
Pocket Guide
AXELOS - GLOBAL BEST PRACTICE14
Building collaboration
Specialist skills: Information Security
2
• Small team, extended network
• Specialist technical knowledge
and skills
• Help enable everyone to do the
operational basics
Further reading:
Cyber Resilience and
ITSM – white paper
AXELOS - GLOBAL BEST PRACTICE15
Building collaboration
Setting the tone: Board and Leadership
team
3
• Business opportunity and risk –
not detail
• Personal responsibility and
reputation
• Sponsors for organization wide
collaboration
Further reading:
Mind the Information
Gap: Non-Executive
Directors – white paper
AXELOS - GLOBAL BEST PRACTICE16
Building collaboration
Understanding the value: Information
owners
4
• Understand the value of
information – and the risks
• Provide structure on quantifying
risk
Further reading:
Cyber Resilience Pocket
Guide
AXELOS - GLOBAL BEST PRACTICE17
Building collaboration
Everyone is involved: IT users and staff
5
• By far the largest risk – 90% of
incidents
• Balance of security and usability
– Opportunity & Risk
• People are more adaptable than
technology or process
• Proactive culture change
AXELOS - GLOBAL BEST PRACTICE18
What does good look like?
Bringing it together
AXELOS - GLOBAL BEST PRACTICE19
Lifecycle management
Further reading:
Cyber Resilience Best
Practice guide
AXELOS - GLOBAL BEST PRACTICE20
Questions to ask…
1. Do you know what your critical information assets are – and who has
responsibility for them?
2. Is everyone involved in cyber resilience?
3. Are you prepared for when a successful attack comes?
AXELOS - GLOBAL BEST PRACTICE21
RESILIA portfolio
Best Practice Guide
Core practical guidance for strategy,
implementation and management or
effective cyber resilience
Individual Awareness
Learning & Know-howAll IT users and staff across an
organization
IT and Security teams and
Membership
& CPDFoundation and
Practitioner community
Leadership
EngagementBoard and leadership teams
Pathway Tool
IT, Security and Risk
decision makers
Foundation
& Practitioner
Training
AXELOS - GLOBAL BEST PRACTICE22
Questions and thoughts?
Dan Cole
RESILIA Product Lead
E: dan.cole@axelos.com
Copyright © 2015 ITpreneurs. All rights reserved.
Working with
ITpreneurs on
RESILIA
Copyright © 2015 ITpreneurs. All rights reserved.
● Quality
Our Lead author Moyn Uddin is one
of the authors of the RESILIA cyber
security best practice
● Enabling You to Succeed
ITpreneurs does not compete with
you and we are dedicated to make
you successful
● Cutting Edge Content
Classroom, eLearning, Printed
materials, eBooks
Working with ITpreneurs on RESILIA
Copyright © 2015 ITpreneurs. All rights reserved.
ITpreneurs RESILIA Portfolio
RESILIA ™ Foundation
Classroom/Virtual Classroom
(3 days)
RESILIA ™ Practitioner
Classroom/ Virtual Classroom
(2 days)
Fast-Track
RESILIA ™ Practitioner
Classroom/Virtual Classroom
(2 days)
RESILIA ™ Foundation
eLearning
(12 hours)
Copyright © 2015 ITpreneurs. All rights reserved.
How Can You Work with ITpreneurs?
Accreditor
AXELOS
Exam
institute
Exam
institute
EXAMINATION / ACCREDITATIONCOURSEWARE PROVISION
Exam
institute
Exam
institute
ACPACP
ITPRENEURS
ACP
ATO
ITPRENEURS
ATO ATO
Affiliate Affiliate
ACP
Courseware Exams
Copyright © 2015 ITpreneurs. All rights reserved.
About
ITpreneurs
Solutions for IT Training Providers
Copyright © 2016 ITpreneurs. All rights reserved.
Training Materials & Services for Each
Component in Your IT Training Value Chain
28
ITpreneurs End-to-End Services
Portfolio
Planning
Training
Calendar
Marketing Sales Delivery
400+ certifications
1000+ titles
portfolio
Accreditation
Services
Training Content
Partner Course
Calendar
Marketing in a Box
Go-To Market
Webinars
Sales Enablement Printing Services 24/7 Support
LMS Exam Ordering
Instructor
Primary Activities of a Training Provider
TTT’s Partner Matters
Newsletter
Partner Products &
Solutions Updates
Copyright © 2016 ITpreneurs. All rights reserved.
ITpreneurs is a full service provider to training
and consulting organizations
Access a Comprehensive Library
Cost Saving on content by up to 80%
● No Content Development Costs
● No Content Maintenance Costs
● Pay-per-use: Use more, pay less!
● 1000+ Titles
● Across most IT Domains
● 12 Languages
● Some unique Titles
Enjoy Convenience
● Anytime, Anywhere ordering
● Marketing Support
● Exam Services
● Accreditation
● Trainer Services
Stay on the Cutting-Edge
● First to Market
● Consistent Quality
● Various Delivery Formats
● Always Up-to-Date
● Partner Enablement
Increase Revenues Save Costs
Copyright © 2016 ITpreneurs. All rights reserved.
ITpreneurs’ Certification Portfolio
IT Best Practices
IT Governance
and Assurance
- CGEIT
- CISA
- COBIT 5
- COBIT Controls for NIST
Cloud /
Big Data
- Big Data
- CCSK
- CCC -
professional
cloud
- OpenStack
- CTA
IT Program
Management
- MoV
- MSP
- Managing Benefits
- MoP
- P3O
IT Project
Management
- AGILE PM
- PRINCE2
- PMI-PMP
- PMI-ACP
- PMI-CAPM
Testing
Business
Analysis
- CBAP
- CCBA
-PM-PBA
Development
- Agile Scrum
- ScrumMaster
- Mobile App Testing
- TMAP
- ISTQB
-CMAP
Process and
Quality
Management
Asset
Management
- Lean Six
Sigma
- Lean IT
- TIPA
- IAITAM
Service
Management
Support
Center
Management
- DevOps
- Kepner-
Tregoe
- ITIL
- ISO/IEC
20000
- MOF
- HDI
Change
Management
- Change
Management
Network
and Hardware
management
- CISM
- CISSP
- NIST Cyber
Security
- RESILIA
- Security+
- EC-Council
- ISO/IEC 27001
- ISO/IEC 27002
- ISO/IEC 22301
- Secure Programming
Information
Security
- A+
- Network+
- SDN
Risk
Management
- M_o_R
- PMI-RMP
- CRISC
- ISO31000
Architecture
- Archimate
- Professional
Cloud
Architect
- TOGAF
- BPMN
-IT4IT
Big Data
- Big Data
Strategy
Copyright © 2015 ITpreneurs. All rights reserved.
FAQ
Copyright © 2016 ITpreneurs. All rights reserved.
FAQ
What services does ITpreneurs provide? ITpreneurs is a full service provider to training organizations.
ITpreneurs offers courseware, exams, trainers, logistical services and anything else that a training provider
requires to deliver a course.
How do I engage with ITpreneurs? You can reach out to us through info@itpreneurs.com We then walk
you through the process of leveraging our services and get you up and running, quickly.
What is your commercial model? We offer courseware and other products in a Pay-per-use model. If
you would like to run a course with 10 students, you can purchase 10 sets of course materials from us.
What countries do you serve, and at what time zones?ITpreneurs offers support in most geographies.
We operate global support centers in three major locations, and ensure that we are available when you
need us most.
How is your courseware provided? Courseware is provided as ebooks, or printed coursebooks, but we
also allow you to print most of the courseware titles.
Copyright © 2016 ITpreneurs. All rights reserved.
Solutions for IT Training Providers
ITpreneurs provides IT training content and services to training providers
worldwide. We’ll help you keep up with changes, scale your business and
increase your profitability.
View RESILIA Training Materials →
#greatproducts #greatpricing
Keep an eye on our blog: www.itpreneurs.com/blog
Follow our twitter channel: @itpreneurs
Connect via linkedin: www.linkedin.com/company/itpreneurs

More Related Content

More from ITpreneurs

EC-Council Certified Security Analyst Program
EC-Council Certified Security Analyst ProgramEC-Council Certified Security Analyst Program
EC-Council Certified Security Analyst Program
ITpreneurs
 

More from ITpreneurs (20)

EC-Council Computer Hacking Forensic Investigator v9
EC-Council Computer Hacking Forensic Investigator v9EC-Council Computer Hacking Forensic Investigator v9
EC-Council Computer Hacking Forensic Investigator v9
 
Step by Step Guide
Step by Step Guide Step by Step Guide
Step by Step Guide
 
Why SDN Skills is a Big Boost to Networking Careers
Why SDN Skills is a Big Boost to Networking CareersWhy SDN Skills is a Big Boost to Networking Careers
Why SDN Skills is a Big Boost to Networking Careers
 
EC-Council Certified Security Analyst Program
EC-Council Certified Security Analyst ProgramEC-Council Certified Security Analyst Program
EC-Council Certified Security Analyst Program
 
EC-Council Certified Network Defender
EC-Council Certified Network DefenderEC-Council Certified Network Defender
EC-Council Certified Network Defender
 
Enterprise Architecture Courseware by ITpreneurs
Enterprise Architecture Courseware by ITpreneursEnterprise Architecture Courseware by ITpreneurs
Enterprise Architecture Courseware by ITpreneurs
 
[Infographic] Top 10 Reasons Why You and Your IT Organization Should Adopt Ke...
[Infographic] Top 10 Reasons Why You and Your IT Organization Should Adopt Ke...[Infographic] Top 10 Reasons Why You and Your IT Organization Should Adopt Ke...
[Infographic] Top 10 Reasons Why You and Your IT Organization Should Adopt Ke...
 
[Infographic] Top 5 Reasons To Become a Licensed Kepner-Tregoe Foundation Tra...
[Infographic] Top 5 Reasons To Become a Licensed Kepner-Tregoe Foundation Tra...[Infographic] Top 5 Reasons To Become a Licensed Kepner-Tregoe Foundation Tra...
[Infographic] Top 5 Reasons To Become a Licensed Kepner-Tregoe Foundation Tra...
 
[Infographic] How Simulations accelerate change management (5 stages).
[Infographic] How Simulations accelerate change management (5 stages).[Infographic] How Simulations accelerate change management (5 stages).
[Infographic] How Simulations accelerate change management (5 stages).
 
EC-Council Certified Secure Computer User C|SCU Program
EC-Council Certified Secure Computer User C|SCU ProgramEC-Council Certified Secure Computer User C|SCU Program
EC-Council Certified Secure Computer User C|SCU Program
 
IT4IT™
IT4IT™IT4IT™
IT4IT™
 
EC-Council Certified Ethical Hacker (CEH) v9 - Hackers are here. Where are you?
EC-Council Certified Ethical Hacker (CEH) v9 - Hackers are here. Where are you?EC-Council Certified Ethical Hacker (CEH) v9 - Hackers are here. Where are you?
EC-Council Certified Ethical Hacker (CEH) v9 - Hackers are here. Where are you?
 
EC-Council Cyber Security Training and Certifications
EC-Council Cyber Security Training and CertificationsEC-Council Cyber Security Training and Certifications
EC-Council Cyber Security Training and Certifications
 
ITpreneurs Corporate Brochure
ITpreneurs Corporate BrochureITpreneurs Corporate Brochure
ITpreneurs Corporate Brochure
 
10 Questions Any Training Business Should Answer - by ITpreneurs
10 Questions Any Training Business Should Answer - by ITpreneurs10 Questions Any Training Business Should Answer - by ITpreneurs
10 Questions Any Training Business Should Answer - by ITpreneurs
 
PRINCE2®とPMBOK・ITIL®の比較
PRINCE2®とPMBOK・ITIL®の比較PRINCE2®とPMBOK・ITIL®の比較
PRINCE2®とPMBOK・ITIL®の比較
 
Agile and Risk Management: How Agile Becomes Risky Business
Agile and Risk Management: How Agile Becomes Risky BusinessAgile and Risk Management: How Agile Becomes Risky Business
Agile and Risk Management: How Agile Becomes Risky Business
 
Will They Blend? - Agile, TOGAF and Enterprise Architecture
Will They Blend? - Agile, TOGAF and Enterprise ArchitectureWill They Blend? - Agile, TOGAF and Enterprise Architecture
Will They Blend? - Agile, TOGAF and Enterprise Architecture
 
How Training and Consulting Companies Can Position CISSP, CISM and CRISC
How Training and Consulting Companies Can Position CISSP, CISM and CRISCHow Training and Consulting Companies Can Position CISSP, CISM and CRISC
How Training and Consulting Companies Can Position CISSP, CISM and CRISC
 
Opportunities for Training Companies - The CCC Cloud Business Associate
Opportunities for Training Companies - The CCC Cloud Business AssociateOpportunities for Training Companies - The CCC Cloud Business Associate
Opportunities for Training Companies - The CCC Cloud Business Associate
 

Recently uploaded

1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 

Recently uploaded (20)

Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 

RESILIA: How to Make the Best of ITSM and Cyber Resilience

  • 1. Copyright © 2015 ITpreneurs. All rights reserved. Cyber Resilience: whose problem is it? Follow: @itpreneurs Visit: www.itpreneurs.com
  • 2. Copyright © 2015 ITpreneurs. All rights reserved. Welcome Connie Tai Head of Products and Solutions Marketing ITpreneurs
  • 3. AXELOS - GLOBAL BEST PRACTICE3 Cyber: who’s problem is it? Dan Cole RESILIA Product Lead, AXELOS www.AXELOS.com/RESILIA
  • 4. AXELOS - GLOBAL BEST PRACTICE4 Why is it an issue now?
  • 5. AXELOS - GLOBAL BEST PRACTICE5 Why is it an issue now?
  • 6. AXELOS - GLOBAL BEST PRACTICE6 ...and the impactsThe response... “I’m tied in for another year with these people that can’t manage data properly. I don’t want to stay with this company giving them my money” TalkTalk customer “TalkTalk hit by customer backlash – legal claims over cyberattack” Sunday Times lead article: 25 October “Experts estimate the debacle could cost TalkTalk up to £75m in lost revenues and other costs” Sunday Times: 25 October We need to Talk Talk “Cyber crime is the crime of our generation” “With the benefit of hindsight, were we doing enough? Well, you’ve got to say we weren’t and obviously we will be looking back and reviewing that extremely seriously” Asked by the BBC whether customers’ bank details had been encrypted by TalkTalk, she said: “the awful truth is, I don’t know”. Dido Harding, CEO, TalkTalk
  • 7. AXELOS - GLOBAL BEST PRACTICE7 The risks $4.2 trillion estimated value of the internet economy in G20 economies by 2016 The opportunities 94%of businesses with 10+ employees are online 936 exabytesgrowth in global internet traffic from 2005-2015 13.5% to 23% projected rise in consumer purchases made over the internet from 2010-2016 4.1%of GDP contributed by internet $445 billion cost of cyber-crime to the global economy per year 44%increase in cyber attacks. That’s 1.4 successful attacks per organization per week 95%of all security incidents involve human error 3000 companies had been victims of cyber attacks in 2013 $145average cost paid for each lost or stolen file containing sensitive or confidential information Opportunity and Risk
  • 8. AXELOS - GLOBAL BEST PRACTICE8 Getting the balance right PREVENT DETECT CORRECT PEOPLE PROCESS TECHNOLOGY RISK OPPORTUNITY
  • 9. AXELOS - GLOBAL BEST PRACTICE9 A familiar situation of ownership This is a little story about four people named Everybody, Somebody, Anybody, and Nobody. There was an important job to be done and Everybody was sure that Somebody would do it. Anybody could have done it, but Nobody did it. Somebody got angry about that because it was Everybody's job. Everybody thought that Anybody could do it, but Nobody realized that Everybody wouldn't do it. It ended up that Everybody blamed Somebody when Nobody did what Anybody could have done.
  • 10. 10 AXELOS - GLOBAL BEST PRACTICE COMMERCIAL IN CONFIDENCE “We set security standards and policy; we expect everyone to stick to these and we will check compliance” Risk Information Security “We flagged the information is sensitive and needs protecting – so go and do that” Information owners “We own the services – but we don’t have the detailed technical knowledge to do everything” IT delivery & Dev teams “We have risk and security teams; if they want to bring risks or investment cases to us we will look at them” Board / Leadership team Cyber: who’s problem is it?
  • 11. AXELOS - GLOBAL BEST PRACTICE11 Roles and Responsibilities Further reading: Cyber Resilience Best Practice section 9: Roles and Responsibilities Governance * Board / audit * Information owners Leadership & management * Risk & security management * IT strategy and services Delivery * IT service delivery * Process owners
  • 12. AXELOS - GLOBAL BEST PRACTICE12 Need to build collaboration
  • 13. AXELOS - GLOBAL BEST PRACTICE13 Building collaboration Start at home: IT and service management 1 • Large team, diverse skills • Engaged with all areas of the organization • Build common language and knowledge • Manage the business value: Opportunities & Risk balance Further reading: Cyber Resilience Best Practice guide and Pocket Guide
  • 14. AXELOS - GLOBAL BEST PRACTICE14 Building collaboration Specialist skills: Information Security 2 • Small team, extended network • Specialist technical knowledge and skills • Help enable everyone to do the operational basics Further reading: Cyber Resilience and ITSM – white paper
  • 15. AXELOS - GLOBAL BEST PRACTICE15 Building collaboration Setting the tone: Board and Leadership team 3 • Business opportunity and risk – not detail • Personal responsibility and reputation • Sponsors for organization wide collaboration Further reading: Mind the Information Gap: Non-Executive Directors – white paper
  • 16. AXELOS - GLOBAL BEST PRACTICE16 Building collaboration Understanding the value: Information owners 4 • Understand the value of information – and the risks • Provide structure on quantifying risk Further reading: Cyber Resilience Pocket Guide
  • 17. AXELOS - GLOBAL BEST PRACTICE17 Building collaboration Everyone is involved: IT users and staff 5 • By far the largest risk – 90% of incidents • Balance of security and usability – Opportunity & Risk • People are more adaptable than technology or process • Proactive culture change
  • 18. AXELOS - GLOBAL BEST PRACTICE18 What does good look like? Bringing it together
  • 19. AXELOS - GLOBAL BEST PRACTICE19 Lifecycle management Further reading: Cyber Resilience Best Practice guide
  • 20. AXELOS - GLOBAL BEST PRACTICE20 Questions to ask… 1. Do you know what your critical information assets are – and who has responsibility for them? 2. Is everyone involved in cyber resilience? 3. Are you prepared for when a successful attack comes?
  • 21. AXELOS - GLOBAL BEST PRACTICE21 RESILIA portfolio Best Practice Guide Core practical guidance for strategy, implementation and management or effective cyber resilience Individual Awareness Learning & Know-howAll IT users and staff across an organization IT and Security teams and Membership & CPDFoundation and Practitioner community Leadership EngagementBoard and leadership teams Pathway Tool IT, Security and Risk decision makers Foundation & Practitioner Training
  • 22. AXELOS - GLOBAL BEST PRACTICE22 Questions and thoughts? Dan Cole RESILIA Product Lead E: dan.cole@axelos.com
  • 23. Copyright © 2015 ITpreneurs. All rights reserved. Working with ITpreneurs on RESILIA
  • 24. Copyright © 2015 ITpreneurs. All rights reserved. ● Quality Our Lead author Moyn Uddin is one of the authors of the RESILIA cyber security best practice ● Enabling You to Succeed ITpreneurs does not compete with you and we are dedicated to make you successful ● Cutting Edge Content Classroom, eLearning, Printed materials, eBooks Working with ITpreneurs on RESILIA
  • 25. Copyright © 2015 ITpreneurs. All rights reserved. ITpreneurs RESILIA Portfolio RESILIA ™ Foundation Classroom/Virtual Classroom (3 days) RESILIA ™ Practitioner Classroom/ Virtual Classroom (2 days) Fast-Track RESILIA ™ Practitioner Classroom/Virtual Classroom (2 days) RESILIA ™ Foundation eLearning (12 hours)
  • 26. Copyright © 2015 ITpreneurs. All rights reserved. How Can You Work with ITpreneurs? Accreditor AXELOS Exam institute Exam institute EXAMINATION / ACCREDITATIONCOURSEWARE PROVISION Exam institute Exam institute ACPACP ITPRENEURS ACP ATO ITPRENEURS ATO ATO Affiliate Affiliate ACP Courseware Exams
  • 27. Copyright © 2015 ITpreneurs. All rights reserved. About ITpreneurs Solutions for IT Training Providers
  • 28. Copyright © 2016 ITpreneurs. All rights reserved. Training Materials & Services for Each Component in Your IT Training Value Chain 28 ITpreneurs End-to-End Services Portfolio Planning Training Calendar Marketing Sales Delivery 400+ certifications 1000+ titles portfolio Accreditation Services Training Content Partner Course Calendar Marketing in a Box Go-To Market Webinars Sales Enablement Printing Services 24/7 Support LMS Exam Ordering Instructor Primary Activities of a Training Provider TTT’s Partner Matters Newsletter Partner Products & Solutions Updates
  • 29. Copyright © 2016 ITpreneurs. All rights reserved. ITpreneurs is a full service provider to training and consulting organizations Access a Comprehensive Library Cost Saving on content by up to 80% ● No Content Development Costs ● No Content Maintenance Costs ● Pay-per-use: Use more, pay less! ● 1000+ Titles ● Across most IT Domains ● 12 Languages ● Some unique Titles Enjoy Convenience ● Anytime, Anywhere ordering ● Marketing Support ● Exam Services ● Accreditation ● Trainer Services Stay on the Cutting-Edge ● First to Market ● Consistent Quality ● Various Delivery Formats ● Always Up-to-Date ● Partner Enablement Increase Revenues Save Costs
  • 30. Copyright © 2016 ITpreneurs. All rights reserved. ITpreneurs’ Certification Portfolio IT Best Practices IT Governance and Assurance - CGEIT - CISA - COBIT 5 - COBIT Controls for NIST Cloud / Big Data - Big Data - CCSK - CCC - professional cloud - OpenStack - CTA IT Program Management - MoV - MSP - Managing Benefits - MoP - P3O IT Project Management - AGILE PM - PRINCE2 - PMI-PMP - PMI-ACP - PMI-CAPM Testing Business Analysis - CBAP - CCBA -PM-PBA Development - Agile Scrum - ScrumMaster - Mobile App Testing - TMAP - ISTQB -CMAP Process and Quality Management Asset Management - Lean Six Sigma - Lean IT - TIPA - IAITAM Service Management Support Center Management - DevOps - Kepner- Tregoe - ITIL - ISO/IEC 20000 - MOF - HDI Change Management - Change Management Network and Hardware management - CISM - CISSP - NIST Cyber Security - RESILIA - Security+ - EC-Council - ISO/IEC 27001 - ISO/IEC 27002 - ISO/IEC 22301 - Secure Programming Information Security - A+ - Network+ - SDN Risk Management - M_o_R - PMI-RMP - CRISC - ISO31000 Architecture - Archimate - Professional Cloud Architect - TOGAF - BPMN -IT4IT Big Data - Big Data Strategy
  • 31. Copyright © 2015 ITpreneurs. All rights reserved. FAQ
  • 32. Copyright © 2016 ITpreneurs. All rights reserved. FAQ What services does ITpreneurs provide? ITpreneurs is a full service provider to training organizations. ITpreneurs offers courseware, exams, trainers, logistical services and anything else that a training provider requires to deliver a course. How do I engage with ITpreneurs? You can reach out to us through info@itpreneurs.com We then walk you through the process of leveraging our services and get you up and running, quickly. What is your commercial model? We offer courseware and other products in a Pay-per-use model. If you would like to run a course with 10 students, you can purchase 10 sets of course materials from us. What countries do you serve, and at what time zones?ITpreneurs offers support in most geographies. We operate global support centers in three major locations, and ensure that we are available when you need us most. How is your courseware provided? Courseware is provided as ebooks, or printed coursebooks, but we also allow you to print most of the courseware titles.
  • 33. Copyright © 2016 ITpreneurs. All rights reserved. Solutions for IT Training Providers ITpreneurs provides IT training content and services to training providers worldwide. We’ll help you keep up with changes, scale your business and increase your profitability. View RESILIA Training Materials → #greatproducts #greatpricing Keep an eye on our blog: www.itpreneurs.com/blog Follow our twitter channel: @itpreneurs Connect via linkedin: www.linkedin.com/company/itpreneurs