SlideShare a Scribd company logo
1 of 18
Practical insights in the 
day-to-day routine of an 
information security officer 
How to be realistic about information security and don’t stress out. 
Practical tips that will help any organization.
Douwe Pieter van den Bos
Information Security Management 
Plan 
Do 
Check 
Act 
• Risk Appetite 
• Maturity 
• Risk Analysis 
• Secure Software Development 
• Project Management 
• Security Advise 
• Security Testing 
• Security Audits 
• Red-teaming 
• Risk Management 
• Improvement Planning
Information Security in a fast moving world 
 Gaining threads 
 Legislation 
 Privacy concerns 
 Customer awareness 
Information Security is 
becoming a larger issue 
for all organizations, 
including Oracle 
customers.
Risk Maturity 
Ad Hoc Opportunistic Systematic Managed Optimized 
Plan 
Do 
Check 
Act
Be realistic Plan 
Do 
Check 
Act
Risk Appetite Plan 
Do 
Check 
Act
Risk Analysis 
Confidentiality 
Integrity 
Availability 
Fraud 
Detection 
Compliance 
Reporting
Risk Classification Plan 
Do 
Check 
Act 
Risk Classification 
Impact 
Chance
Secure Software Development 
Best Practices 
Plan 
Do 
Check 
Act 
https://www.ncsc.nl/dienstverlening/expertise-advies/ 
kennisdeling/whitepapers/ict-beveiligingsrichtlijnen-voor-webapplicaties. 
html 
http://www.oracle.com/technetwork/topics/entarch/itso-165161.html 
http://www.nist.gov/cyberframework/ 
http://www.cip-overheid.nl/downloads/grip-op-ssd/
Security Advices Plan 
Do 
Check 
Act 
https://www.ncsc.nl/dienstverlening/response-op-dreigingen-en-incidenten/ 
beveiligingsadviezen
Learn and Act Fast! Plan 
Do 
Check 
Act 
An audit is not scary. It’s just a quick 
way to investigate what you’re 
doing right and where you might 
improve.
Red Team! Plan 
Do 
Check 
Act
Who is the owner of risk? 
http://www.taskforcebid.nl/producten/instrumenten-informatieveiligheid/ 
Plan 
Do 
Check 
Act
Risk Management 
Risk 
Low costs Low impact / chance 
Quick Win Plan Accept 
Just do it. 
These risks are 
easily 
mitigated. Low 
cost, despite of 
the impact or 
chance. 
Make a project 
out of it. You 
will have to 
plan and 
prioritize. 
The impact is 
so low, or the 
chance of 
occurrence is 
so low that you 
can decide to 
accept the risk. 
Plan 
Do 
Check 
Act
Improvement Planning 
Target 1 
Target 2 
Target 3 
Target 4 
Target 5 
Plan 
Do 
Check 
Act
Douwe Pieter van den Bos 
douwepieter@otechmag.com 
+31 6 149 143 43

More Related Content

What's hot

LDITSITAM WebinarSept2016
LDITSITAM WebinarSept2016LDITSITAM WebinarSept2016
LDITSITAM WebinarSept2016
Yvette Mathews
 
Big data in term of security measure
Big data in term of security measureBig data in term of security measure
Big data in term of security measure
Yaakub Idris
 
Information Security Project
Information Security ProjectInformation Security Project
Information Security Project
novemberchild
 
Balance Compliance and Experimentation by Joanne Molesky - The Lean Startup C...
Balance Compliance and Experimentation by Joanne Molesky - The Lean Startup C...Balance Compliance and Experimentation by Joanne Molesky - The Lean Startup C...
Balance Compliance and Experimentation by Joanne Molesky - The Lean Startup C...
Lean Startup Co.
 

What's hot (20)

Cyber strategies stack the odds in your favor
Cyber strategies stack the odds in your favorCyber strategies stack the odds in your favor
Cyber strategies stack the odds in your favor
 
OWF14 - Plenary Session : David Jones, Chief Solutions Architect, Sonatype
OWF14 - Plenary Session : David Jones, Chief Solutions Architect, SonatypeOWF14 - Plenary Session : David Jones, Chief Solutions Architect, Sonatype
OWF14 - Plenary Session : David Jones, Chief Solutions Architect, Sonatype
 
How organisations can_avoid_data_breaches_and_thus_meet_their_security_obliga...
How organisations can_avoid_data_breaches_and_thus_meet_their_security_obliga...How organisations can_avoid_data_breaches_and_thus_meet_their_security_obliga...
How organisations can_avoid_data_breaches_and_thus_meet_their_security_obliga...
 
LDITSITAM WebinarSept2016
LDITSITAM WebinarSept2016LDITSITAM WebinarSept2016
LDITSITAM WebinarSept2016
 
Physical Security Information Management (PSIM) Solution for the Government
Physical Security Information Management (PSIM) Solution for the GovernmentPhysical Security Information Management (PSIM) Solution for the Government
Physical Security Information Management (PSIM) Solution for the Government
 
Big data in term of security measure
Big data in term of security measureBig data in term of security measure
Big data in term of security measure
 
User and Entity Behavioral Analytics
User and Entity Behavioral AnalyticsUser and Entity Behavioral Analytics
User and Entity Behavioral Analytics
 
The Future of Employment Law
The Future of Employment LawThe Future of Employment Law
The Future of Employment Law
 
IT Security Strategy
IT Security StrategyIT Security Strategy
IT Security Strategy
 
A New Approach to Threat Detection: Big Data Security Analytics
A New Approach to Threat Detection: Big Data Security Analytics A New Approach to Threat Detection: Big Data Security Analytics
A New Approach to Threat Detection: Big Data Security Analytics
 
Information Security Project
Information Security ProjectInformation Security Project
Information Security Project
 
Balance Compliance and Experimentation by Joanne Molesky - The Lean Startup C...
Balance Compliance and Experimentation by Joanne Molesky - The Lean Startup C...Balance Compliance and Experimentation by Joanne Molesky - The Lean Startup C...
Balance Compliance and Experimentation by Joanne Molesky - The Lean Startup C...
 
NTXISSACSC2 - Kid Proofing the Internet of Things by Monty McDougal
NTXISSACSC2 - Kid Proofing the Internet of Things by Monty McDougalNTXISSACSC2 - Kid Proofing the Internet of Things by Monty McDougal
NTXISSACSC2 - Kid Proofing the Internet of Things by Monty McDougal
 
How to Mitigate Risk From Your Expanding Digital Presence
How to Mitigate Risk From Your Expanding Digital PresenceHow to Mitigate Risk From Your Expanding Digital Presence
How to Mitigate Risk From Your Expanding Digital Presence
 
To be a clinical research associate (CRA) during Covid-19 outbreak
To be a clinical research associate (CRA) during Covid-19 outbreakTo be a clinical research associate (CRA) during Covid-19 outbreak
To be a clinical research associate (CRA) during Covid-19 outbreak
 
How TransUnion Moved to a Risk-Based Approach for Vulnerability Management
How TransUnion Moved to a Risk-Based Approach for Vulnerability ManagementHow TransUnion Moved to a Risk-Based Approach for Vulnerability Management
How TransUnion Moved to a Risk-Based Approach for Vulnerability Management
 
Mind the gap
Mind the gapMind the gap
Mind the gap
 
Technology Issues and Cybersecurity Strategies
Technology Issues and Cybersecurity StrategiesTechnology Issues and Cybersecurity Strategies
Technology Issues and Cybersecurity Strategies
 
Everyone is talking Cloud - How secure is your data?
Everyone is talking Cloud - How secure is your data? Everyone is talking Cloud - How secure is your data?
Everyone is talking Cloud - How secure is your data?
 
Best Practices for Data at Scale - Global Data Science Conference
Best Practices for Data at Scale - Global Data Science ConferenceBest Practices for Data at Scale - Global Data Science Conference
Best Practices for Data at Scale - Global Data Science Conference
 

Viewers also liked

Comparative Analysis of Information Security Management System Standards - Si...
Comparative Analysis of Information Security Management System Standards - Si...Comparative Analysis of Information Security Management System Standards - Si...
Comparative Analysis of Information Security Management System Standards - Si...
Mansoor Faridi, CISA
 
Cross cultural management
Cross cultural managementCross cultural management
Cross cultural management
Mingsheng Li
 
ITIL v3 Foundation Presentation
ITIL v3 Foundation PresentationITIL v3 Foundation Presentation
ITIL v3 Foundation Presentation
Wajahat Rajab
 

Viewers also liked (11)

Raising Standards in Information Management
Raising Standards in Information ManagementRaising Standards in Information Management
Raising Standards in Information Management
 
Comparative Analysis of Information Security Management System Standards - Si...
Comparative Analysis of Information Security Management System Standards - Si...Comparative Analysis of Information Security Management System Standards - Si...
Comparative Analysis of Information Security Management System Standards - Si...
 
SCAT Chart
SCAT ChartSCAT Chart
SCAT Chart
 
ITIL service design
ITIL service designITIL service design
ITIL service design
 
ISO/IEC 27001:2013 An Overview
ISO/IEC 27001:2013  An Overview ISO/IEC 27001:2013  An Overview
ISO/IEC 27001:2013 An Overview
 
ITIL foundations - Complete introduction to ITIL phases, lifecycle and processes
ITIL foundations - Complete introduction to ITIL phases, lifecycle and processesITIL foundations - Complete introduction to ITIL phases, lifecycle and processes
ITIL foundations - Complete introduction to ITIL phases, lifecycle and processes
 
ITIL & CMMI for Services
ITIL & CMMI for ServicesITIL & CMMI for Services
ITIL & CMMI for Services
 
The Art of Asking Survey Questions: 7 Survey-Writing Don'ts
The Art of Asking Survey Questions: 7 Survey-Writing Don'tsThe Art of Asking Survey Questions: 7 Survey-Writing Don'ts
The Art of Asking Survey Questions: 7 Survey-Writing Don'ts
 
ITIL Foundation Training - A guide to beginners
ITIL Foundation Training - A guide to beginners ITIL Foundation Training - A guide to beginners
ITIL Foundation Training - A guide to beginners
 
Cross cultural management
Cross cultural managementCross cultural management
Cross cultural management
 
ITIL v3 Foundation Presentation
ITIL v3 Foundation PresentationITIL v3 Foundation Presentation
ITIL v3 Foundation Presentation
 

Similar to Practical insights in the day-to-day routine of an information security officer

IT Risk Management & Leadership 23 - 26 June 2013 Dubai
IT Risk Management & Leadership 23 - 26 June 2013 DubaiIT Risk Management & Leadership 23 - 26 June 2013 Dubai
IT Risk Management & Leadership 23 - 26 June 2013 Dubai
360 BSI
 
Tech Talent Meetup Hacking Security Event Recap
Tech Talent Meetup Hacking Security Event RecapTech Talent Meetup Hacking Security Event Recap
Tech Talent Meetup Hacking Security Event Recap
Dominic Vogel
 
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAEIT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
360 BSI
 

Similar to Practical insights in the day-to-day routine of an information security officer (20)

Improve Information Security Practices in the Small Enterprise
Improve Information Security Practices in the Small EnterpriseImprove Information Security Practices in the Small Enterprise
Improve Information Security Practices in the Small Enterprise
 
Risk Management
Risk ManagementRisk Management
Risk Management
 
IT Risk Management & Leadership 23 - 26 June 2013 Dubai
IT Risk Management & Leadership 23 - 26 June 2013 DubaiIT Risk Management & Leadership 23 - 26 June 2013 Dubai
IT Risk Management & Leadership 23 - 26 June 2013 Dubai
 
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdfFor Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
 
Tech Talent Meetup Hacking Security Event Recap
Tech Talent Meetup Hacking Security Event RecapTech Talent Meetup Hacking Security Event Recap
Tech Talent Meetup Hacking Security Event Recap
 
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAEIT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
 
Security Analytics Beyond Cyber
Security Analytics Beyond CyberSecurity Analytics Beyond Cyber
Security Analytics Beyond Cyber
 
Why security is the kidney not the tail of the dog v3
Why security is the kidney not the tail of the dog v3Why security is the kidney not the tail of the dog v3
Why security is the kidney not the tail of the dog v3
 
Security-Brochure
Security-BrochureSecurity-Brochure
Security-Brochure
 
Security-Brochure
Security-BrochureSecurity-Brochure
Security-Brochure
 
OSB50: Operational Security: State of the Union
OSB50: Operational Security: State of the UnionOSB50: Operational Security: State of the Union
OSB50: Operational Security: State of the Union
 
Security architecture frameworks
Security architecture frameworksSecurity architecture frameworks
Security architecture frameworks
 
Information Security Awareness And Training Business Case For Web Based Solut...
Information Security Awareness And Training Business Case For Web Based Solut...Information Security Awareness And Training Business Case For Web Based Solut...
Information Security Awareness And Training Business Case For Web Based Solut...
 
Rogers eBook Security
Rogers eBook SecurityRogers eBook Security
Rogers eBook Security
 
Connection can help keep your business secure!
Connection can help keep your business secure!Connection can help keep your business secure!
Connection can help keep your business secure!
 
Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...
Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...
Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...
 
The Legal Case for Cybersecurity
The Legal Case for CybersecurityThe Legal Case for Cybersecurity
The Legal Case for Cybersecurity
 
Breached! App Attacks, Application Protection and Incident Response
Breached! App Attacks, Application Protection and Incident ResponseBreached! App Attacks, Application Protection and Incident Response
Breached! App Attacks, Application Protection and Incident Response
 
111.pptx
111.pptx111.pptx
111.pptx
 
16231
1623116231
16231
 

More from Getting value from IoT, Integration and Data Analytics

More from Getting value from IoT, Integration and Data Analytics (20)

AMIS Oracle OpenWorld en Code One Review 2018 - Blockchain, Integration, Serv...
AMIS Oracle OpenWorld en Code One Review 2018 - Blockchain, Integration, Serv...AMIS Oracle OpenWorld en Code One Review 2018 - Blockchain, Integration, Serv...
AMIS Oracle OpenWorld en Code One Review 2018 - Blockchain, Integration, Serv...
 
AMIS Oracle OpenWorld en Code One Review 2018 - Pillar 2: Custom Application ...
AMIS Oracle OpenWorld en Code One Review 2018 - Pillar 2: Custom Application ...AMIS Oracle OpenWorld en Code One Review 2018 - Pillar 2: Custom Application ...
AMIS Oracle OpenWorld en Code One Review 2018 - Pillar 2: Custom Application ...
 
AMIS Oracle OpenWorld en Code One Review 2018 - Pillar 2: SaaS
AMIS Oracle OpenWorld en Code One Review 2018 - Pillar 2: SaaSAMIS Oracle OpenWorld en Code One Review 2018 - Pillar 2: SaaS
AMIS Oracle OpenWorld en Code One Review 2018 - Pillar 2: SaaS
 
AMIS Oracle OpenWorld en Code One Review 2018 - Pillar 1: Data
AMIS Oracle OpenWorld en Code One Review 2018 - Pillar 1: DataAMIS Oracle OpenWorld en Code One Review 2018 - Pillar 1: Data
AMIS Oracle OpenWorld en Code One Review 2018 - Pillar 1: Data
 
AMIS Oracle OpenWorld en Code One Review 2018 - Pillar 1: Cloud Infrastructure
AMIS Oracle OpenWorld en Code One Review 2018 - Pillar 1: Cloud Infrastructure AMIS Oracle OpenWorld en Code One Review 2018 - Pillar 1: Cloud Infrastructure
AMIS Oracle OpenWorld en Code One Review 2018 - Pillar 1: Cloud Infrastructure
 
10 tips voor verbetering in je Linkedin profiel
10 tips voor verbetering in je Linkedin profiel10 tips voor verbetering in je Linkedin profiel
10 tips voor verbetering in je Linkedin profiel
 
Iot in de zorg the next step - fit for purpose
Iot in de zorg   the next step - fit for purpose Iot in de zorg   the next step - fit for purpose
Iot in de zorg the next step - fit for purpose
 
Iot overview .. Best practices and lessons learned by Conclusion Conenct
Iot overview .. Best practices and lessons learned by Conclusion Conenct Iot overview .. Best practices and lessons learned by Conclusion Conenct
Iot overview .. Best practices and lessons learned by Conclusion Conenct
 
IoT Fit for purpose - how to be successful in IOT Conclusion Connect
IoT Fit for purpose - how to be successful in IOT Conclusion Connect IoT Fit for purpose - how to be successful in IOT Conclusion Connect
IoT Fit for purpose - how to be successful in IOT Conclusion Connect
 
Industry and IOT Overview of protocols and best practices Conclusion Connect
Industry and IOT Overview of protocols and best practices  Conclusion ConnectIndustry and IOT Overview of protocols and best practices  Conclusion Connect
Industry and IOT Overview of protocols and best practices Conclusion Connect
 
IoT practical case using the people counter sensing traffic density build usi...
IoT practical case using the people counter sensing traffic density build usi...IoT practical case using the people counter sensing traffic density build usi...
IoT practical case using the people counter sensing traffic density build usi...
 
R introduction decision_trees
R introduction decision_treesR introduction decision_trees
R introduction decision_trees
 
Introduction overviewmachinelearning sig Door Lucas Jellema
Introduction overviewmachinelearning sig Door Lucas JellemaIntroduction overviewmachinelearning sig Door Lucas Jellema
Introduction overviewmachinelearning sig Door Lucas Jellema
 
IoT and the Future of work
IoT and the Future of work IoT and the Future of work
IoT and the Future of work
 
Oracle OpenWorld 2017 Review (31st October 2017 - 250 slides)
Oracle OpenWorld 2017 Review (31st October 2017 - 250 slides)Oracle OpenWorld 2017 Review (31st October 2017 - 250 slides)
Oracle OpenWorld 2017 Review (31st October 2017 - 250 slides)
 
Ethereum smart contracts - door Peter Reitsma
Ethereum smart contracts - door Peter ReitsmaEthereum smart contracts - door Peter Reitsma
Ethereum smart contracts - door Peter Reitsma
 
Blockchain - Techniek en usecases door Robert van Molken - AMIS - Conclusion
Blockchain - Techniek en usecases door Robert van Molken - AMIS - ConclusionBlockchain - Techniek en usecases door Robert van Molken - AMIS - Conclusion
Blockchain - Techniek en usecases door Robert van Molken - AMIS - Conclusion
 
kennissessie blockchain - Wat is Blockchain en smart contracts @Conclusion
kennissessie blockchain -  Wat is Blockchain en smart contracts @Conclusion kennissessie blockchain -  Wat is Blockchain en smart contracts @Conclusion
kennissessie blockchain - Wat is Blockchain en smart contracts @Conclusion
 
Internet of Things propositie - Enterprise IOT - AMIS - Conclusion
Internet of Things propositie - Enterprise IOT - AMIS - Conclusion Internet of Things propositie - Enterprise IOT - AMIS - Conclusion
Internet of Things propositie - Enterprise IOT - AMIS - Conclusion
 
Omc AMIS evenement 26012017 Dennis van Soest
Omc AMIS evenement 26012017 Dennis van SoestOmc AMIS evenement 26012017 Dennis van Soest
Omc AMIS evenement 26012017 Dennis van Soest
 

Recently uploaded

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Recently uploaded (20)

AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 

Practical insights in the day-to-day routine of an information security officer

  • 1. Practical insights in the day-to-day routine of an information security officer How to be realistic about information security and don’t stress out. Practical tips that will help any organization.
  • 3. Information Security Management Plan Do Check Act • Risk Appetite • Maturity • Risk Analysis • Secure Software Development • Project Management • Security Advise • Security Testing • Security Audits • Red-teaming • Risk Management • Improvement Planning
  • 4. Information Security in a fast moving world  Gaining threads  Legislation  Privacy concerns  Customer awareness Information Security is becoming a larger issue for all organizations, including Oracle customers.
  • 5. Risk Maturity Ad Hoc Opportunistic Systematic Managed Optimized Plan Do Check Act
  • 6. Be realistic Plan Do Check Act
  • 7. Risk Appetite Plan Do Check Act
  • 8. Risk Analysis Confidentiality Integrity Availability Fraud Detection Compliance Reporting
  • 9. Risk Classification Plan Do Check Act Risk Classification Impact Chance
  • 10. Secure Software Development Best Practices Plan Do Check Act https://www.ncsc.nl/dienstverlening/expertise-advies/ kennisdeling/whitepapers/ict-beveiligingsrichtlijnen-voor-webapplicaties. html http://www.oracle.com/technetwork/topics/entarch/itso-165161.html http://www.nist.gov/cyberframework/ http://www.cip-overheid.nl/downloads/grip-op-ssd/
  • 11. Security Advices Plan Do Check Act https://www.ncsc.nl/dienstverlening/response-op-dreigingen-en-incidenten/ beveiligingsadviezen
  • 12. Learn and Act Fast! Plan Do Check Act An audit is not scary. It’s just a quick way to investigate what you’re doing right and where you might improve.
  • 13. Red Team! Plan Do Check Act
  • 14. Who is the owner of risk? http://www.taskforcebid.nl/producten/instrumenten-informatieveiligheid/ Plan Do Check Act
  • 15. Risk Management Risk Low costs Low impact / chance Quick Win Plan Accept Just do it. These risks are easily mitigated. Low cost, despite of the impact or chance. Make a project out of it. You will have to plan and prioritize. The impact is so low, or the chance of occurrence is so low that you can decide to accept the risk. Plan Do Check Act
  • 16. Improvement Planning Target 1 Target 2 Target 3 Target 4 Target 5 Plan Do Check Act
  • 17.
  • 18. Douwe Pieter van den Bos douwepieter@otechmag.com +31 6 149 143 43