SlideShare a Scribd company logo
1 of 21
Download to read offline
CYBER RESILIENCE:
THERE’S NO TIME
TO WASTE
AXELOS.com
AXELOS - GLOBAL BEST PRACTICE2
The risks
$4.2 trillion
estimated value of
the internet economy
in G20 economies by
2016
The opportunities
94%
of businesses with
10+ employees are
online
936 exabytes
growth in global
internet traffic from
2005-2015
13.5% to 23%
projected rise in
consumer purchases
via the internet from
2010-2016
4.1%
of GDP contributed
by internet
$445 billion
cost of cyber-crime
to the global
economy per year
44%
increase in cyber
incidents - 1.4 per
organization per
week
95%
of cyber attacks
succeed because
of the unwitting
actions of a
member of staff
$145
average cost paid for
each lost or stolen file
containing sensitive or
confidential information
Balancing opportunity and risk
AXELOS - GLOBAL BEST PRACTICE3
The risks are real
AXELOS - GLOBAL BEST PRACTICE4
Material impacts Risk and responsibility
We all have a role to play
…why is Cyber Resilience important?
Situational awareness
AXELOS - GLOBAL BEST PRACTICE5
Common statements
“Why would anyone
want to attack our
organization?”
“We do not know what
our most critical
information assets are
in our organization.”
“We have our
networks well
protected by good
technology”
“Our current
information security
training is ineffective
in driving new
behaviour across
organization.”
“We know we have
already been attacked
but do not know how
best to respond and
recover effectively.”
“We do not know what
good cyber resilience
looks like for our
organization”
AXELOS - GLOBAL BEST PRACTICE6
Our people are our
strongest asset but…
No-one is safe
Threats are constantly adapting
and more targeted
Compliance does not
= security
CONSEQUENCES: reputation, cost and competitive advantage
What are the strategic challenges?
Mind the language gap
AXELOS - GLOBAL BEST PRACTICE7
Known needs
We need to develop a
coherent cyber
resilience strategy
We need to know
what our critical
information assets are
We need a cyber
smart workforce and
partner network
We need to embed
good practices across
our organization
We need to
communicate and
understand more
effectively across the
organization
We need to
understand how we
will respond and
recover from attack
more effectively
AXELOS - GLOBAL BEST PRACTICE8
What is Cyber Resilience?
Cyber Resilience is the ability for an
organization to resist, respond and
recover from threats that will
impact the information they require
to do business.
AXELOS - GLOBAL BEST PRACTICE9
...many are struggling to answer...
...what does good look like?
AXELOS - GLOBAL BEST PRACTICE10
Best Practice Guide
Core practical guidance for strategy,
implementation and management:
“what good looks like”
Individual Awareness
Learning & Know-how
All staff across an organisation
Foundation
& Practitioner
Training
Business heads/IT teams
and data owners/managers
Membership
& CPD
IT teams and data
owners/managers
Leader
Engagement
Leadership team
across an organisation
Maturity
Pathway Tool
Leaders of the organisation
Cyber Resilience Portfolio
AXELOS - GLOBAL BEST PRACTICE11
Target markets and audiences
Key target sectors:
• Critical infrastructure: Energy, Financial services,
Health, Utilities, IT/Telecoms, Federal government
• Other: Retail, NGOs, Manufacturing/Hi-Tech,
Construction, Education, Professional Services
Target buyers/influencers:
• VP/Head of ITSM
• VP/Head of HR or Learning & Development
• VP/Head of IT, Security or CISO
• VP/Head of Risk and/or Compliance
We want to target:
• Large and medium sized organizations – commercial
and federal
AXELOS - GLOBAL BEST PRACTICE12
The detailThe principles The structure
Applicable to all
organizations across
commercial and
public/federal sectors
Alignment with common
approaches and standards
Focus on improving
organization resilience
Background of complex
multi-party and multi-system
transactions define the
cyber landscape
Lifecycle structure for
cyber follows ITIL
Scope covers entire
organization
Guidance covering people,
process and technology
Concepts and guidance
Aimed at those responsible
for IT, security, risk and
resilience
Extensive practical
management guidance
Framework for assessing
the right
“Practical information for IT and business staff to better
understand the risks and benefits of Cyber Resilience –
with practical guidance on assessing, deploying and efficiently
managing good Cyber Resilience within business operations.”
Cyber Resilience Best Practice Guide
AXELOS - GLOBAL BEST PRACTICE13 AXELOS - GLOBAL BEST PRACTICE13
InfoSec & Risk
Security Ops
Info Assurance
Risk Management
IT & SM
Service Operations
IT Dev (& DevOps)
Architects
Bus analysis
Project Management
Business
Finance & HR
Sales &
Marketing
Customer service
Operations
Exec
CxO
Business strategy
Department
Heads
Cyber
Resilience
Practitioner
 Structured
implementation
and operation of
Best Practice
Cyber
Resilience
Foundation
 Knowledge of
Risk and
Vulnerability plus
efficient selection
and Management
of Controls to
address
Leader
engagement
 Business value
of good Cyber
Resilience
Cyber
Awareness
Learning
 Understand
Cyber Risks to
organization
and personal
responsibility
Targeted learning across organization
AXELOS - GLOBAL BEST PRACTICE14
Cyber Resilience Certification Training
Learning outcomesCourse structure Target audience
Cyber
Resilience
Foundation
Cyber
Resilience
Practitioner
3
20
day classroom course
or
hours of distance learning,
optional simulation to start
course, Foundation certification
multiple choice exam
Complete IT team
Basic understanding of general
cyber security
Good understanding of IT
and business goals
How decisions impact good/bad
Cyber Resilience
Comprehensive approach
across all areas
How to make good Cyber
Resilience an efficient part
of business and operational
management
2
15
day classroom course
or
hours of distance learning,
optional simulation to start
course, Practitioner certification
multiple choice exam, bundled
with Foundation as a 5 day course
Similar to Foundation but skewed
to more experienced roles
Complete IT team
Good understanding of
cyber security
Good understanding of IT
What effective Cyber Resilience
looks like
Pitfalls, risk and issues that can
easily hit Cyber Resilience
Getting the best balance of risk,
cost, benefits and flexibility
within an organization
AXELOS - GLOBAL BEST PRACTICE15
Reliance on
checking the box
Lack of engaging and
appropriate materials
Reliance on a single
training exercise
Metrics are not collected Unreasonable expectations
Failure to acknowledge that
awareness is a unique
discipline
Why do security awareness
programmes typically fail?
AXELOS - GLOBAL BEST PRACTICE16
“Tell me and I forget,
Teach me and I remember,
Involve me and I learn.”
“Everybody can learn, just
not on the same day or in
the same way”
When does awareness learning ‘stick’?
© AXELOS Limited 2014
All rights reserved.
Reproduction and distribution of this material requires the permission of AXELOS Limited
COMMERCIAL IN CONFIDENCE
17 AXELOS - GLOBAL BEST PRACTICE COMMERCIAL IN CONFIDENCE
Our Awareness learning principles
On-going, regular learning
Adaptive & personalised
Measurable benefit
Principle
Engaging, competitive and fun
• Regular learning
• Short and concise
• Supporting updates and refreshers
• Suit individual learning preferences
• Content tailored to different skill levels
• Focus on the priority security issues
• Tracking changing behaviours over time
• Qualitative and quantitative metrics
• Demonstrate value of investment
• Different learning styles and formats
• Ability to learn inside and outside work
• Play to the competitive element of games
Summary and benefits
18 AXELOS - GLOBAL BEST PRACTICE COMMERCIAL IN CONFIDENCE
Our Awareness learning
• Phishing
• Social engineering
• BYOD
• Password safety
• Personal information
• Information handling
• Remote and mobile working
• Online safety
• Social media
• Removable media
...role based and sector specific
learning
Learning areas
• Gamification
• Animations
• Video
• eLearning
• Posters
• Refreshers/Reminders
...part of an ongoing campaign to
influence and measure the impact of new
behaviours
Learning formats
AXELOS - GLOBAL BEST PRACTICE19
Test AdaptLearn
Evangelists and early adopters!
AXELOS - GLOBAL BEST PRACTICE20
Live events Game playing
NetworkingInteraction Innovation and creativity
Panel discussions
June launch
AXELOS - GLOBAL BEST PRACTICE21
Questions and observations?
Nick Wilding
Head of Cyber Resilience, AXELOS
E: nick.wilding@axelos.com T: 07860 950108

More Related Content

What's hot

Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...PECB
 
2015 KSU So You Want To Be in Cyber Security
2015 KSU So You Want To Be in Cyber Security2015 KSU So You Want To Be in Cyber Security
2015 KSU So You Want To Be in Cyber SecurityPhil Agcaoili
 
Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...
Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...
Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...BCM Institute
 
Case Study: The Role of Human Error in Information Security
Case Study: The Role of Human Error in Information SecurityCase Study: The Role of Human Error in Information Security
Case Study: The Role of Human Error in Information SecurityPECB
 
A Look at Cyber Insurance -- A Corporate Perspective
A Look at Cyber Insurance -- A Corporate  PerspectiveA Look at Cyber Insurance -- A Corporate  Perspective
A Look at Cyber Insurance -- A Corporate PerspectiveDawn Yankeelov
 
Strategic Leadership for Managing Evolving Cybersecurity Risks
Strategic Leadership for Managing Evolving Cybersecurity RisksStrategic Leadership for Managing Evolving Cybersecurity Risks
Strategic Leadership for Managing Evolving Cybersecurity RisksMatthew Rosenquist
 
ICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security GovernanceICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security GovernanceCharles Lim
 
Is Cyber Resilience Really That Difficult?
Is Cyber Resilience Really That Difficult?Is Cyber Resilience Really That Difficult?
Is Cyber Resilience Really That Difficult?John Gilligan
 
How an Integrated Management system helps you comply with new Cyber Laws and ...
How an Integrated Management system helps you comply with new Cyber Laws and ...How an Integrated Management system helps you comply with new Cyber Laws and ...
How an Integrated Management system helps you comply with new Cyber Laws and ...PECB
 
CSA Atlanta Q1'2016 Chapter Meeting
CSA Atlanta Q1'2016 Chapter MeetingCSA Atlanta Q1'2016 Chapter Meeting
CSA Atlanta Q1'2016 Chapter MeetingPhil Agcaoili
 
Managing Enterprise Risk: Why U No Haz Metrics?
Managing Enterprise Risk: Why U No Haz Metrics?Managing Enterprise Risk: Why U No Haz Metrics?
Managing Enterprise Risk: Why U No Haz Metrics?John D. Johnson
 
Introduction to Cyber Resilience
Introduction to Cyber ResilienceIntroduction to Cyber Resilience
Introduction to Cyber ResiliencePeter Wood
 
Cyber Risk Management in 2017 - Challenges & Recommendations
Cyber Risk Management in 2017 - Challenges & RecommendationsCyber Risk Management in 2017 - Challenges & Recommendations
Cyber Risk Management in 2017 - Challenges & RecommendationsUlf Mattsson
 
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA RegulationTop 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA RegulationPECB
 
Impacts cloud remote_workforce
Impacts cloud remote_workforceImpacts cloud remote_workforce
Impacts cloud remote_workforceRodrigo Varas
 
Building Cyber Resilience in the Digital Economy
Building Cyber Resilience in the Digital EconomyBuilding Cyber Resilience in the Digital Economy
Building Cyber Resilience in the Digital EconomyAgus Wicaksono
 
Leveraging Board Governance for Cybersecurity
Leveraging Board Governance for CybersecurityLeveraging Board Governance for Cybersecurity
Leveraging Board Governance for CybersecurityShareDocView.com
 
Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and riskEY
 

What's hot (20)

Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
 
2015 KSU So You Want To Be in Cyber Security
2015 KSU So You Want To Be in Cyber Security2015 KSU So You Want To Be in Cyber Security
2015 KSU So You Want To Be in Cyber Security
 
Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...
Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...
Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...
 
Case Study: The Role of Human Error in Information Security
Case Study: The Role of Human Error in Information SecurityCase Study: The Role of Human Error in Information Security
Case Study: The Role of Human Error in Information Security
 
A Look at Cyber Insurance -- A Corporate Perspective
A Look at Cyber Insurance -- A Corporate  PerspectiveA Look at Cyber Insurance -- A Corporate  Perspective
A Look at Cyber Insurance -- A Corporate Perspective
 
A Strategy for Addressing Cyber Security Challenges
A Strategy for Addressing Cyber Security Challenges A Strategy for Addressing Cyber Security Challenges
A Strategy for Addressing Cyber Security Challenges
 
Strategic Leadership for Managing Evolving Cybersecurity Risks
Strategic Leadership for Managing Evolving Cybersecurity RisksStrategic Leadership for Managing Evolving Cybersecurity Risks
Strategic Leadership for Managing Evolving Cybersecurity Risks
 
ICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security GovernanceICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security Governance
 
What is cyber resilience?
What is cyber resilience?What is cyber resilience?
What is cyber resilience?
 
Is Cyber Resilience Really That Difficult?
Is Cyber Resilience Really That Difficult?Is Cyber Resilience Really That Difficult?
Is Cyber Resilience Really That Difficult?
 
How an Integrated Management system helps you comply with new Cyber Laws and ...
How an Integrated Management system helps you comply with new Cyber Laws and ...How an Integrated Management system helps you comply with new Cyber Laws and ...
How an Integrated Management system helps you comply with new Cyber Laws and ...
 
CSA Atlanta Q1'2016 Chapter Meeting
CSA Atlanta Q1'2016 Chapter MeetingCSA Atlanta Q1'2016 Chapter Meeting
CSA Atlanta Q1'2016 Chapter Meeting
 
Managing Enterprise Risk: Why U No Haz Metrics?
Managing Enterprise Risk: Why U No Haz Metrics?Managing Enterprise Risk: Why U No Haz Metrics?
Managing Enterprise Risk: Why U No Haz Metrics?
 
Introduction to Cyber Resilience
Introduction to Cyber ResilienceIntroduction to Cyber Resilience
Introduction to Cyber Resilience
 
Cyber Risk Management in 2017 - Challenges & Recommendations
Cyber Risk Management in 2017 - Challenges & RecommendationsCyber Risk Management in 2017 - Challenges & Recommendations
Cyber Risk Management in 2017 - Challenges & Recommendations
 
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA RegulationTop 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
 
Impacts cloud remote_workforce
Impacts cloud remote_workforceImpacts cloud remote_workforce
Impacts cloud remote_workforce
 
Building Cyber Resilience in the Digital Economy
Building Cyber Resilience in the Digital EconomyBuilding Cyber Resilience in the Digital Economy
Building Cyber Resilience in the Digital Economy
 
Leveraging Board Governance for Cybersecurity
Leveraging Board Governance for CybersecurityLeveraging Board Governance for Cybersecurity
Leveraging Board Governance for Cybersecurity
 
Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and risk
 

Viewers also liked

Cyber Resilience Summit Briefing
Cyber Resilience Summit Briefing Cyber Resilience Summit Briefing
Cyber Resilience Summit Briefing John Weiler
 
Cyber security resilience ESRM Conference Amsterdam 2016
Cyber security resilience  ESRM Conference Amsterdam 2016Cyber security resilience  ESRM Conference Amsterdam 2016
Cyber security resilience ESRM Conference Amsterdam 2016Niran Seriki, CCISO, CISM
 
Cyber Resilience: A New Perspective on Security
Cyber Resilience: A New Perspective on SecurityCyber Resilience: A New Perspective on Security
Cyber Resilience: A New Perspective on SecurityIna Luft
 
Rakuten Marketing Q3 Data Report
Rakuten Marketing Q3 Data ReportRakuten Marketing Q3 Data Report
Rakuten Marketing Q3 Data ReportRakutenMarketingUS
 
Journey to cyber resilience
Journey to cyber resilienceJourney to cyber resilience
Journey to cyber resilienceAndrew Bycroft
 
150401_Tre_Proposal_HHD_ltr_v6
150401_Tre_Proposal_HHD_ltr_v6150401_Tre_Proposal_HHD_ltr_v6
150401_Tre_Proposal_HHD_ltr_v6Stephanie Coleman
 
The cyber resilient enterprise
The cyber resilient enterpriseThe cyber resilient enterprise
The cyber resilient enterpriseAndrew Bycroft
 
Balancing speed & agility with security & governance (July 2016)
Balancing speed & agility with security & governance (July 2016)Balancing speed & agility with security & governance (July 2016)
Balancing speed & agility with security & governance (July 2016)Rajiv Renganathan
 
How to Steer Cyber Security with Only One KPI: The Cyber Risk Resilience
How to Steer Cyber Security with Only One KPI: The Cyber Risk ResilienceHow to Steer Cyber Security with Only One KPI: The Cyber Risk Resilience
How to Steer Cyber Security with Only One KPI: The Cyber Risk ResiliencePriyanka Aash
 
The Measure of Success: Security Metrics to Tell Your Story
The Measure of Success: Security Metrics to Tell Your StoryThe Measure of Success: Security Metrics to Tell Your Story
The Measure of Success: Security Metrics to Tell Your StoryPriyanka Aash
 
ASFWS 2011 : Cyberguerre et Infrastructures critiques : Menaces & Risques
ASFWS 2011 : Cyberguerre et Infrastructures critiques : Menaces & RisquesASFWS 2011 : Cyberguerre et Infrastructures critiques : Menaces & Risques
ASFWS 2011 : Cyberguerre et Infrastructures critiques : Menaces & RisquesCyber Security Alliance
 
EC-Council Computer Hacking Forensic Investigator v9
EC-Council Computer Hacking Forensic Investigator v9EC-Council Computer Hacking Forensic Investigator v9
EC-Council Computer Hacking Forensic Investigator v9ITpreneurs
 

Viewers also liked (13)

Cyber Resilience Summit Briefing
Cyber Resilience Summit Briefing Cyber Resilience Summit Briefing
Cyber Resilience Summit Briefing
 
Cyber Resilience @ Dundee & Angus College
Cyber Resilience @ Dundee & Angus CollegeCyber Resilience @ Dundee & Angus College
Cyber Resilience @ Dundee & Angus College
 
Cyber security resilience ESRM Conference Amsterdam 2016
Cyber security resilience  ESRM Conference Amsterdam 2016Cyber security resilience  ESRM Conference Amsterdam 2016
Cyber security resilience ESRM Conference Amsterdam 2016
 
Cyber Resilience: A New Perspective on Security
Cyber Resilience: A New Perspective on SecurityCyber Resilience: A New Perspective on Security
Cyber Resilience: A New Perspective on Security
 
Rakuten Marketing Q3 Data Report
Rakuten Marketing Q3 Data ReportRakuten Marketing Q3 Data Report
Rakuten Marketing Q3 Data Report
 
Journey to cyber resilience
Journey to cyber resilienceJourney to cyber resilience
Journey to cyber resilience
 
150401_Tre_Proposal_HHD_ltr_v6
150401_Tre_Proposal_HHD_ltr_v6150401_Tre_Proposal_HHD_ltr_v6
150401_Tre_Proposal_HHD_ltr_v6
 
The cyber resilient enterprise
The cyber resilient enterpriseThe cyber resilient enterprise
The cyber resilient enterprise
 
Balancing speed & agility with security & governance (July 2016)
Balancing speed & agility with security & governance (July 2016)Balancing speed & agility with security & governance (July 2016)
Balancing speed & agility with security & governance (July 2016)
 
How to Steer Cyber Security with Only One KPI: The Cyber Risk Resilience
How to Steer Cyber Security with Only One KPI: The Cyber Risk ResilienceHow to Steer Cyber Security with Only One KPI: The Cyber Risk Resilience
How to Steer Cyber Security with Only One KPI: The Cyber Risk Resilience
 
The Measure of Success: Security Metrics to Tell Your Story
The Measure of Success: Security Metrics to Tell Your StoryThe Measure of Success: Security Metrics to Tell Your Story
The Measure of Success: Security Metrics to Tell Your Story
 
ASFWS 2011 : Cyberguerre et Infrastructures critiques : Menaces & Risques
ASFWS 2011 : Cyberguerre et Infrastructures critiques : Menaces & RisquesASFWS 2011 : Cyberguerre et Infrastructures critiques : Menaces & Risques
ASFWS 2011 : Cyberguerre et Infrastructures critiques : Menaces & Risques
 
EC-Council Computer Hacking Forensic Investigator v9
EC-Council Computer Hacking Forensic Investigator v9EC-Council Computer Hacking Forensic Investigator v9
EC-Council Computer Hacking Forensic Investigator v9
 

Similar to Cyber resilience itsm academy_april2015

Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...EC-Council
 
Strategies for cyber resilience - Everyone has a Role
Strategies for cyber resilience - Everyone has a RoleStrategies for cyber resilience - Everyone has a Role
Strategies for cyber resilience - Everyone has a RoleKevin Duffey
 
Introduction to RESILIA and Cyber Resilience
Introduction to RESILIA and Cyber ResilienceIntroduction to RESILIA and Cyber Resilience
Introduction to RESILIA and Cyber ResilienceChristian F. Nissen
 
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptxTop_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptxinfosec train
 
BlueVoyant: 7 Experts Share Key Questions To Ask When Evaluating Providers
BlueVoyant: 7 Experts Share Key Questions To Ask When Evaluating ProvidersBlueVoyant: 7 Experts Share Key Questions To Ask When Evaluating Providers
BlueVoyant: 7 Experts Share Key Questions To Ask When Evaluating ProvidersMighty Guides, Inc.
 
IT Risk Management & Leadership 23 - 26 June 2013 Dubai
IT Risk Management & Leadership 23 - 26 June 2013 DubaiIT Risk Management & Leadership 23 - 26 June 2013 Dubai
IT Risk Management & Leadership 23 - 26 June 2013 Dubai360 BSI
 
KnowBe4-Presentation-Overview.pdf
KnowBe4-Presentation-Overview.pdfKnowBe4-Presentation-Overview.pdf
KnowBe4-Presentation-Overview.pdfahmad661583
 
Fissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-trainingFissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-trainingSwati Gupta
 
Assocham conf grc sept 13
Assocham conf  grc  sept 13Assocham conf  grc  sept 13
Assocham conf grc sept 13subramanian K
 
Infocon Bangladesh 2016
Infocon Bangladesh 2016Infocon Bangladesh 2016
Infocon Bangladesh 2016Prime Infoserv
 
Top 10 Interview Questions for Risk Analyst.pptx
Top 10 Interview Questions for Risk Analyst.pptxTop 10 Interview Questions for Risk Analyst.pptx
Top 10 Interview Questions for Risk Analyst.pptxinfosec train
 
Influential Business Leaders in Security services | CIO Look
Influential Business Leaders in Security services | CIO LookInfluential Business Leaders in Security services | CIO Look
Influential Business Leaders in Security services | CIO LookCIO Look Magazine
 
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAEIT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE360 BSI
 
Csmp overview may 14
Csmp overview may 14Csmp overview may 14
Csmp overview may 14Jock ANDRE
 
Ask the Experts final
Ask the Experts finalAsk the Experts final
Ask the Experts finalDaren Dunkel
 
New technologies - Amer Haza'a
New technologies - Amer Haza'aNew technologies - Amer Haza'a
New technologies - Amer Haza'aFahmi Albaheth
 
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...Matthew Rosenquist
 
Expressworks Perspective on Human Behavior and Cyber Security
Expressworks Perspective on Human Behavior and Cyber SecurityExpressworks Perspective on Human Behavior and Cyber Security
Expressworks Perspective on Human Behavior and Cyber SecurityExpressworks International
 

Similar to Cyber resilience itsm academy_april2015 (20)

Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
 
Strategies for cyber resilience - Everyone has a Role
Strategies for cyber resilience - Everyone has a RoleStrategies for cyber resilience - Everyone has a Role
Strategies for cyber resilience - Everyone has a Role
 
Introduction to RESILIA and Cyber Resilience
Introduction to RESILIA and Cyber ResilienceIntroduction to RESILIA and Cyber Resilience
Introduction to RESILIA and Cyber Resilience
 
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptxTop_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
 
BlueVoyant: 7 Experts Share Key Questions To Ask When Evaluating Providers
BlueVoyant: 7 Experts Share Key Questions To Ask When Evaluating ProvidersBlueVoyant: 7 Experts Share Key Questions To Ask When Evaluating Providers
BlueVoyant: 7 Experts Share Key Questions To Ask When Evaluating Providers
 
IT Risk Management & Leadership 23 - 26 June 2013 Dubai
IT Risk Management & Leadership 23 - 26 June 2013 DubaiIT Risk Management & Leadership 23 - 26 June 2013 Dubai
IT Risk Management & Leadership 23 - 26 June 2013 Dubai
 
Information & Cyber Security Risk
Information & Cyber Security RiskInformation & Cyber Security Risk
Information & Cyber Security Risk
 
KnowBe4-Presentation-Overview.pdf
KnowBe4-Presentation-Overview.pdfKnowBe4-Presentation-Overview.pdf
KnowBe4-Presentation-Overview.pdf
 
Fissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-trainingFissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-training
 
Assocham conf grc sept 13
Assocham conf  grc  sept 13Assocham conf  grc  sept 13
Assocham conf grc sept 13
 
Infocon Bangladesh 2016
Infocon Bangladesh 2016Infocon Bangladesh 2016
Infocon Bangladesh 2016
 
Top 10 Interview Questions for Risk Analyst.pptx
Top 10 Interview Questions for Risk Analyst.pptxTop 10 Interview Questions for Risk Analyst.pptx
Top 10 Interview Questions for Risk Analyst.pptx
 
Influential Business Leaders in Security services | CIO Look
Influential Business Leaders in Security services | CIO LookInfluential Business Leaders in Security services | CIO Look
Influential Business Leaders in Security services | CIO Look
 
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAEIT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
 
Csmp overview may 14
Csmp overview may 14Csmp overview may 14
Csmp overview may 14
 
Ask the Experts final
Ask the Experts finalAsk the Experts final
Ask the Experts final
 
New technologies - Amer Haza'a
New technologies - Amer Haza'aNew technologies - Amer Haza'a
New technologies - Amer Haza'a
 
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
 
Cyber Resilience
Cyber ResilienceCyber Resilience
Cyber Resilience
 
Expressworks Perspective on Human Behavior and Cyber Security
Expressworks Perspective on Human Behavior and Cyber SecurityExpressworks Perspective on Human Behavior and Cyber Security
Expressworks Perspective on Human Behavior and Cyber Security
 

More from ITSM Academy, Inc.

SRE Roundtable with 4 DevOps Ambassadors
SRE Roundtable with 4 DevOps AmbassadorsSRE Roundtable with 4 DevOps Ambassadors
SRE Roundtable with 4 DevOps AmbassadorsITSM Academy, Inc.
 
How to improve Customer and Employee Experience with IT Service Management
How to improve Customer and Employee Experience with IT Service ManagementHow to improve Customer and Employee Experience with IT Service Management
How to improve Customer and Employee Experience with IT Service ManagementITSM Academy, Inc.
 
ITIL® 4 DSV - Drive Stakeholder Value
ITIL® 4 DSV - Drive Stakeholder ValueITIL® 4 DSV - Drive Stakeholder Value
ITIL® 4 DSV - Drive Stakeholder ValueITSM Academy, Inc.
 
ITIL® 4 HVIT - High Velocity IT
ITIL® 4 HVIT - High Velocity ITITIL® 4 HVIT - High Velocity IT
ITIL® 4 HVIT - High Velocity ITITSM Academy, Inc.
 
Adding Value with Change Management
Adding Value with Change ManagementAdding Value with Change Management
Adding Value with Change ManagementITSM Academy, Inc.
 
Is this the End of ITIL? NO, it is the end-to-end of ITIL!
Is this the End of ITIL? NO, it is the end-to-end of ITIL!Is this the End of ITIL? NO, it is the end-to-end of ITIL!
Is this the End of ITIL? NO, it is the end-to-end of ITIL!ITSM Academy, Inc.
 
Artificial Intelligence (AI) & The Future of Employee Service
Artificial Intelligence (AI) & The Future of Employee ServiceArtificial Intelligence (AI) & The Future of Employee Service
Artificial Intelligence (AI) & The Future of Employee ServiceITSM Academy, Inc.
 
Change Control in ITIL4: So Much More Than a New Name
Change Control in ITIL4: So Much More Than a New NameChange Control in ITIL4: So Much More Than a New Name
Change Control in ITIL4: So Much More Than a New NameITSM Academy, Inc.
 
Introducing “The V*A*L*U*E Formula: Do more with less and reduce stress"
Introducing “The V*A*L*U*E Formula: Do more with less and reduce stress"Introducing “The V*A*L*U*E Formula: Do more with less and reduce stress"
Introducing “The V*A*L*U*E Formula: Do more with less and reduce stress"ITSM Academy, Inc.
 
The Anatomy of XLA: eXperience Level Agreements
The Anatomy of XLA: eXperience Level AgreementsThe Anatomy of XLA: eXperience Level Agreements
The Anatomy of XLA: eXperience Level AgreementsITSM Academy, Inc.
 
DevSecOps - Blue is the new Green
DevSecOps - Blue is the new GreenDevSecOps - Blue is the new Green
DevSecOps - Blue is the new GreenITSM Academy, Inc.
 
Mapping Your Journey to ITIL Island
Mapping Your Journey to ITIL IslandMapping Your Journey to ITIL Island
Mapping Your Journey to ITIL IslandITSM Academy, Inc.
 
More on ITIL 4. The Conversation Continues
More on ITIL 4. The Conversation ContinuesMore on ITIL 4. The Conversation Continues
More on ITIL 4. The Conversation ContinuesITSM Academy, Inc.
 
Ask Me Anything - Lean Edition
Ask Me Anything - Lean EditionAsk Me Anything - Lean Edition
Ask Me Anything - Lean EditionITSM Academy, Inc.
 
Modernizing Service Management Processes with Self-Service Access
Modernizing Service Management Processes with Self-Service AccessModernizing Service Management Processes with Self-Service Access
Modernizing Service Management Processes with Self-Service AccessITSM Academy, Inc.
 
Service Portfolio - Preparing for the Future of your Organization
Service Portfolio - Preparing for the Future of your OrganizationService Portfolio - Preparing for the Future of your Organization
Service Portfolio - Preparing for the Future of your OrganizationITSM Academy, Inc.
 
Status Quo or Status Whoa? with Brad Utterback, an ITSM Academy Webinar
Status Quo or Status Whoa? with Brad Utterback, an ITSM Academy WebinarStatus Quo or Status Whoa? with Brad Utterback, an ITSM Academy Webinar
Status Quo or Status Whoa? with Brad Utterback, an ITSM Academy WebinarITSM Academy, Inc.
 

More from ITSM Academy, Inc. (20)

SRE Roundtable with 4 DevOps Ambassadors
SRE Roundtable with 4 DevOps AmbassadorsSRE Roundtable with 4 DevOps Ambassadors
SRE Roundtable with 4 DevOps Ambassadors
 
How to improve Customer and Employee Experience with IT Service Management
How to improve Customer and Employee Experience with IT Service ManagementHow to improve Customer and Employee Experience with IT Service Management
How to improve Customer and Employee Experience with IT Service Management
 
ITIL® 4 DSV - Drive Stakeholder Value
ITIL® 4 DSV - Drive Stakeholder ValueITIL® 4 DSV - Drive Stakeholder Value
ITIL® 4 DSV - Drive Stakeholder Value
 
ITIL® 4 HVIT - High Velocity IT
ITIL® 4 HVIT - High Velocity ITITIL® 4 HVIT - High Velocity IT
ITIL® 4 HVIT - High Velocity IT
 
ITIL4 and ServiceNow
ITIL4 and ServiceNowITIL4 and ServiceNow
ITIL4 and ServiceNow
 
Adding Value with Change Management
Adding Value with Change ManagementAdding Value with Change Management
Adding Value with Change Management
 
Is this the End of ITIL? NO, it is the end-to-end of ITIL!
Is this the End of ITIL? NO, it is the end-to-end of ITIL!Is this the End of ITIL? NO, it is the end-to-end of ITIL!
Is this the End of ITIL? NO, it is the end-to-end of ITIL!
 
Artificial Intelligence (AI) & The Future of Employee Service
Artificial Intelligence (AI) & The Future of Employee ServiceArtificial Intelligence (AI) & The Future of Employee Service
Artificial Intelligence (AI) & The Future of Employee Service
 
Change Control in ITIL4: So Much More Than a New Name
Change Control in ITIL4: So Much More Than a New NameChange Control in ITIL4: So Much More Than a New Name
Change Control in ITIL4: So Much More Than a New Name
 
Introducing “The V*A*L*U*E Formula: Do more with less and reduce stress"
Introducing “The V*A*L*U*E Formula: Do more with less and reduce stress"Introducing “The V*A*L*U*E Formula: Do more with less and reduce stress"
Introducing “The V*A*L*U*E Formula: Do more with less and reduce stress"
 
The Anatomy of XLA: eXperience Level Agreements
The Anatomy of XLA: eXperience Level AgreementsThe Anatomy of XLA: eXperience Level Agreements
The Anatomy of XLA: eXperience Level Agreements
 
DevSecOps - Blue is the new Green
DevSecOps - Blue is the new GreenDevSecOps - Blue is the new Green
DevSecOps - Blue is the new Green
 
Mapping Your Journey to ITIL Island
Mapping Your Journey to ITIL IslandMapping Your Journey to ITIL Island
Mapping Your Journey to ITIL Island
 
More on ITIL 4. The Conversation Continues
More on ITIL 4. The Conversation ContinuesMore on ITIL 4. The Conversation Continues
More on ITIL 4. The Conversation Continues
 
ITIL 4. The Next Evolution
ITIL 4. The Next EvolutionITIL 4. The Next Evolution
ITIL 4. The Next Evolution
 
Ask Me Anything - Lean Edition
Ask Me Anything - Lean EditionAsk Me Anything - Lean Edition
Ask Me Anything - Lean Edition
 
Innovate ITIL with DevOps
Innovate ITIL with DevOpsInnovate ITIL with DevOps
Innovate ITIL with DevOps
 
Modernizing Service Management Processes with Self-Service Access
Modernizing Service Management Processes with Self-Service AccessModernizing Service Management Processes with Self-Service Access
Modernizing Service Management Processes with Self-Service Access
 
Service Portfolio - Preparing for the Future of your Organization
Service Portfolio - Preparing for the Future of your OrganizationService Portfolio - Preparing for the Future of your Organization
Service Portfolio - Preparing for the Future of your Organization
 
Status Quo or Status Whoa? with Brad Utterback, an ITSM Academy Webinar
Status Quo or Status Whoa? with Brad Utterback, an ITSM Academy WebinarStatus Quo or Status Whoa? with Brad Utterback, an ITSM Academy Webinar
Status Quo or Status Whoa? with Brad Utterback, an ITSM Academy Webinar
 

Recently uploaded

Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 

Recently uploaded (20)

Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 

Cyber resilience itsm academy_april2015

  • 1. CYBER RESILIENCE: THERE’S NO TIME TO WASTE AXELOS.com
  • 2. AXELOS - GLOBAL BEST PRACTICE2 The risks $4.2 trillion estimated value of the internet economy in G20 economies by 2016 The opportunities 94% of businesses with 10+ employees are online 936 exabytes growth in global internet traffic from 2005-2015 13.5% to 23% projected rise in consumer purchases via the internet from 2010-2016 4.1% of GDP contributed by internet $445 billion cost of cyber-crime to the global economy per year 44% increase in cyber incidents - 1.4 per organization per week 95% of cyber attacks succeed because of the unwitting actions of a member of staff $145 average cost paid for each lost or stolen file containing sensitive or confidential information Balancing opportunity and risk
  • 3. AXELOS - GLOBAL BEST PRACTICE3 The risks are real
  • 4. AXELOS - GLOBAL BEST PRACTICE4 Material impacts Risk and responsibility We all have a role to play …why is Cyber Resilience important? Situational awareness
  • 5. AXELOS - GLOBAL BEST PRACTICE5 Common statements “Why would anyone want to attack our organization?” “We do not know what our most critical information assets are in our organization.” “We have our networks well protected by good technology” “Our current information security training is ineffective in driving new behaviour across organization.” “We know we have already been attacked but do not know how best to respond and recover effectively.” “We do not know what good cyber resilience looks like for our organization”
  • 6. AXELOS - GLOBAL BEST PRACTICE6 Our people are our strongest asset but… No-one is safe Threats are constantly adapting and more targeted Compliance does not = security CONSEQUENCES: reputation, cost and competitive advantage What are the strategic challenges? Mind the language gap
  • 7. AXELOS - GLOBAL BEST PRACTICE7 Known needs We need to develop a coherent cyber resilience strategy We need to know what our critical information assets are We need a cyber smart workforce and partner network We need to embed good practices across our organization We need to communicate and understand more effectively across the organization We need to understand how we will respond and recover from attack more effectively
  • 8. AXELOS - GLOBAL BEST PRACTICE8 What is Cyber Resilience? Cyber Resilience is the ability for an organization to resist, respond and recover from threats that will impact the information they require to do business.
  • 9. AXELOS - GLOBAL BEST PRACTICE9 ...many are struggling to answer... ...what does good look like?
  • 10. AXELOS - GLOBAL BEST PRACTICE10 Best Practice Guide Core practical guidance for strategy, implementation and management: “what good looks like” Individual Awareness Learning & Know-how All staff across an organisation Foundation & Practitioner Training Business heads/IT teams and data owners/managers Membership & CPD IT teams and data owners/managers Leader Engagement Leadership team across an organisation Maturity Pathway Tool Leaders of the organisation Cyber Resilience Portfolio
  • 11. AXELOS - GLOBAL BEST PRACTICE11 Target markets and audiences Key target sectors: • Critical infrastructure: Energy, Financial services, Health, Utilities, IT/Telecoms, Federal government • Other: Retail, NGOs, Manufacturing/Hi-Tech, Construction, Education, Professional Services Target buyers/influencers: • VP/Head of ITSM • VP/Head of HR or Learning & Development • VP/Head of IT, Security or CISO • VP/Head of Risk and/or Compliance We want to target: • Large and medium sized organizations – commercial and federal
  • 12. AXELOS - GLOBAL BEST PRACTICE12 The detailThe principles The structure Applicable to all organizations across commercial and public/federal sectors Alignment with common approaches and standards Focus on improving organization resilience Background of complex multi-party and multi-system transactions define the cyber landscape Lifecycle structure for cyber follows ITIL Scope covers entire organization Guidance covering people, process and technology Concepts and guidance Aimed at those responsible for IT, security, risk and resilience Extensive practical management guidance Framework for assessing the right “Practical information for IT and business staff to better understand the risks and benefits of Cyber Resilience – with practical guidance on assessing, deploying and efficiently managing good Cyber Resilience within business operations.” Cyber Resilience Best Practice Guide
  • 13. AXELOS - GLOBAL BEST PRACTICE13 AXELOS - GLOBAL BEST PRACTICE13 InfoSec & Risk Security Ops Info Assurance Risk Management IT & SM Service Operations IT Dev (& DevOps) Architects Bus analysis Project Management Business Finance & HR Sales & Marketing Customer service Operations Exec CxO Business strategy Department Heads Cyber Resilience Practitioner  Structured implementation and operation of Best Practice Cyber Resilience Foundation  Knowledge of Risk and Vulnerability plus efficient selection and Management of Controls to address Leader engagement  Business value of good Cyber Resilience Cyber Awareness Learning  Understand Cyber Risks to organization and personal responsibility Targeted learning across organization
  • 14. AXELOS - GLOBAL BEST PRACTICE14 Cyber Resilience Certification Training Learning outcomesCourse structure Target audience Cyber Resilience Foundation Cyber Resilience Practitioner 3 20 day classroom course or hours of distance learning, optional simulation to start course, Foundation certification multiple choice exam Complete IT team Basic understanding of general cyber security Good understanding of IT and business goals How decisions impact good/bad Cyber Resilience Comprehensive approach across all areas How to make good Cyber Resilience an efficient part of business and operational management 2 15 day classroom course or hours of distance learning, optional simulation to start course, Practitioner certification multiple choice exam, bundled with Foundation as a 5 day course Similar to Foundation but skewed to more experienced roles Complete IT team Good understanding of cyber security Good understanding of IT What effective Cyber Resilience looks like Pitfalls, risk and issues that can easily hit Cyber Resilience Getting the best balance of risk, cost, benefits and flexibility within an organization
  • 15. AXELOS - GLOBAL BEST PRACTICE15 Reliance on checking the box Lack of engaging and appropriate materials Reliance on a single training exercise Metrics are not collected Unreasonable expectations Failure to acknowledge that awareness is a unique discipline Why do security awareness programmes typically fail?
  • 16. AXELOS - GLOBAL BEST PRACTICE16 “Tell me and I forget, Teach me and I remember, Involve me and I learn.” “Everybody can learn, just not on the same day or in the same way” When does awareness learning ‘stick’? © AXELOS Limited 2014 All rights reserved. Reproduction and distribution of this material requires the permission of AXELOS Limited COMMERCIAL IN CONFIDENCE
  • 17. 17 AXELOS - GLOBAL BEST PRACTICE COMMERCIAL IN CONFIDENCE Our Awareness learning principles On-going, regular learning Adaptive & personalised Measurable benefit Principle Engaging, competitive and fun • Regular learning • Short and concise • Supporting updates and refreshers • Suit individual learning preferences • Content tailored to different skill levels • Focus on the priority security issues • Tracking changing behaviours over time • Qualitative and quantitative metrics • Demonstrate value of investment • Different learning styles and formats • Ability to learn inside and outside work • Play to the competitive element of games Summary and benefits
  • 18. 18 AXELOS - GLOBAL BEST PRACTICE COMMERCIAL IN CONFIDENCE Our Awareness learning • Phishing • Social engineering • BYOD • Password safety • Personal information • Information handling • Remote and mobile working • Online safety • Social media • Removable media ...role based and sector specific learning Learning areas • Gamification • Animations • Video • eLearning • Posters • Refreshers/Reminders ...part of an ongoing campaign to influence and measure the impact of new behaviours Learning formats
  • 19. AXELOS - GLOBAL BEST PRACTICE19 Test AdaptLearn Evangelists and early adopters!
  • 20. AXELOS - GLOBAL BEST PRACTICE20 Live events Game playing NetworkingInteraction Innovation and creativity Panel discussions June launch
  • 21. AXELOS - GLOBAL BEST PRACTICE21 Questions and observations? Nick Wilding Head of Cyber Resilience, AXELOS E: nick.wilding@axelos.com T: 07860 950108