SlideShare a Scribd company logo
1 of 15
IT Optimization &
      Risk
  Management
Jeromie Jackson – CISSP, CISM
 Jeromie.Jackson@Tig.com /
   Jeromie@comsecinc.com
         619-368-7353
About Me
    President- San Diego OWASP
●


    Vice President- San Diego ISACA
●


    CISM, CISSP Since 1996
●


    CISM, COBIT, & ITIL Certified
●


    SANS Mentor
●


    Security Solutions Architect @ TIG
●
Board Concerns
    Profitability
●


    Satisfying Regulations & Passing Audit
●


    Risk Management
●


    IT Alignment
●


    Governance
●
Down Economy causing executives
     to focus on profitability

                    3 ways to improve
                ●

                    profitability
                        Increase top-line sales
                    –

                        Reduce COGS
                    –

                        Optimize Operations
                    –
Regulations




    Overlap
●


    Minimal benefit
●


    Increasing complexity
●


    Resource intensive
●


    Divert focus on maturing risk management
●
Security Risks & Exposures are
                 Growing
    More than 35 million data records were
●

    breached in 2008 in the United States
    -Theft Resource Center

    Jan 20, 2009- Heartland Payment Systems-
●

    100 Million Transactions Per Month!
    http://www.2008breach.com/

    252,276,206 records with personal information
●

    since January 1995
    - www.privacyrights.org
IT & Business Alignment- Are we communicating?




Prudent              Agile   Competitive
                             Advantage
Implications

    IT is meant to
●

    serve the business
    IT must be aligned
●

    with business
    goals
    IT is costly and
●

    requires prudent
    management
Become Proactive
    Instill best-practice governance
●


    Utilize a risk-management portfolio to guide
●

    remediation
    Consolidate Regulations
●
5 Facets of Governance
    Value Delivery
●


    Strategic Alignment
●


    Performance Measurement
●


    Resource Management
●


    Risk Management
●
Improve Risk Management


    Risk Management
●

    Process
        Identify critical assets
    –

        Define containers
    –

        Identify risks & threats
    –

        Quantify or qualify risks
    –

    Prioritize Remediation
●

    Efforts
Risk Management Frameworks &
              Functions
    Frameworks
●


         NIST (SP800-30)
     –

         Octave
     –

         Octave Allegro
     –

         Factor Analysis for Information Risk (FAIR)
     –

    Primary Functions
●


    Create Value                      Account for People, Process, and
                                      Technology
    Integral Organizational Process   Continual
    Systematic                        Focused on Continual Improvement
Regulatory
    Optimize
●

    Remediation      Convergence
    Assert
●

    Compliance
    Simultaneously
Optimize IT
    Bridge the gap between control
●

    requirements, technical issues, and
    business risk
    Use a portfolio approach to risk
●

    management
    Manage by measurement
●


    Enable your organization to reap
●

    maximum benefit from technology
    investments
Questions?




        Jeromie Jackson- CISSP, CISM
         Jeromie@ComSecInc.com /
         Jeromie.Jackson@TIG.COM
              619-368-7353-direct
http://www.linkedin.com/in/securityassessment

More Related Content

What's hot

Developing Metrics for Information Security Governance
Developing Metrics for Information Security GovernanceDeveloping Metrics for Information Security Governance
Developing Metrics for Information Security Governancedigitallibrary
 
The Business Of Identity, Access And Security V1.0
The Business Of Identity, Access And Security V1.0The Business Of Identity, Access And Security V1.0
The Business Of Identity, Access And Security V1.0theonassiokas
 
The missing parts of the governance puzzle : The 2000 tide and what to expect...
The missing parts of the governance puzzle : The 2000 tide and what to expect...The missing parts of the governance puzzle : The 2000 tide and what to expect...
The missing parts of the governance puzzle : The 2000 tide and what to expect...PECB
 
Integrated Risk Management 101
Integrated Risk Management 101Integrated Risk Management 101
Integrated Risk Management 101Resolver Inc.
 
Emerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and SecurityEmerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and SecurityJessica Santamaria
 
The Business Of Information Security V2.0
The Business Of Information Security V2.0The Business Of Information Security V2.0
The Business Of Information Security V2.0theonassiokas
 
GMFI Conference (3)
GMFI Conference (3)GMFI Conference (3)
GMFI Conference (3)Daniel Paula
 
Why does-your-company-need-a-third-party-risk-management-program
Why does-your-company-need-a-third-party-risk-management-programWhy does-your-company-need-a-third-party-risk-management-program
Why does-your-company-need-a-third-party-risk-management-programCharles Steve
 
Cyber Essentials and BSI standards - managing the business risk
Cyber Essentials and BSI standards - managing the business riskCyber Essentials and BSI standards - managing the business risk
Cyber Essentials and BSI standards - managing the business riskJisc
 
Loss Prevention 2017
Loss Prevention 2017Loss Prevention 2017
Loss Prevention 2017Zoe Gammie
 
Dwight Koop's Chicago ECFT talk "The Chicago School of Cybersecurity Thinking...
Dwight Koop's Chicago ECFT talk "The Chicago School of Cybersecurity Thinking...Dwight Koop's Chicago ECFT talk "The Chicago School of Cybersecurity Thinking...
Dwight Koop's Chicago ECFT talk "The Chicago School of Cybersecurity Thinking...Cohesive Networks
 

What's hot (13)

Developing Metrics for Information Security Governance
Developing Metrics for Information Security GovernanceDeveloping Metrics for Information Security Governance
Developing Metrics for Information Security Governance
 
The Business Of Identity, Access And Security V1.0
The Business Of Identity, Access And Security V1.0The Business Of Identity, Access And Security V1.0
The Business Of Identity, Access And Security V1.0
 
The missing parts of the governance puzzle : The 2000 tide and what to expect...
The missing parts of the governance puzzle : The 2000 tide and what to expect...The missing parts of the governance puzzle : The 2000 tide and what to expect...
The missing parts of the governance puzzle : The 2000 tide and what to expect...
 
Integrated Risk Management 101
Integrated Risk Management 101Integrated Risk Management 101
Integrated Risk Management 101
 
Emerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and SecurityEmerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and Security
 
CISO Case Study 2011 V2
CISO Case Study  2011 V2CISO Case Study  2011 V2
CISO Case Study 2011 V2
 
The Business Of Information Security V2.0
The Business Of Information Security V2.0The Business Of Information Security V2.0
The Business Of Information Security V2.0
 
GMFI Conference (3)
GMFI Conference (3)GMFI Conference (3)
GMFI Conference (3)
 
Why does-your-company-need-a-third-party-risk-management-program
Why does-your-company-need-a-third-party-risk-management-programWhy does-your-company-need-a-third-party-risk-management-program
Why does-your-company-need-a-third-party-risk-management-program
 
Cyber Essentials and BSI standards - managing the business risk
Cyber Essentials and BSI standards - managing the business riskCyber Essentials and BSI standards - managing the business risk
Cyber Essentials and BSI standards - managing the business risk
 
Loss Prevention 2017
Loss Prevention 2017Loss Prevention 2017
Loss Prevention 2017
 
Dwight Koop's Chicago ECFT talk "The Chicago School of Cybersecurity Thinking...
Dwight Koop's Chicago ECFT talk "The Chicago School of Cybersecurity Thinking...Dwight Koop's Chicago ECFT talk "The Chicago School of Cybersecurity Thinking...
Dwight Koop's Chicago ECFT talk "The Chicago School of Cybersecurity Thinking...
 
Intro to IT Auditing
Intro to IT AuditingIntro to IT Auditing
Intro to IT Auditing
 

Viewers also liked

Role of The Board In IT Governance & Cyber Security-Steve Howse
Role of The Board In IT Governance & Cyber Security-Steve HowseRole of The Board In IT Governance & Cyber Security-Steve Howse
Role of The Board In IT Governance & Cyber Security-Steve HowseCGTI
 
Lpg reticulated gas system (cylinder bank) digital energy
Lpg reticulated gas system (cylinder bank) digital energyLpg reticulated gas system (cylinder bank) digital energy
Lpg reticulated gas system (cylinder bank) digital energyAbu Bakar Siddiqui
 
Prepayment Metering System
Prepayment Metering SystemPrepayment Metering System
Prepayment Metering Systemkmhasanc
 
GSM BASED PREPAID ENERGY METER BILLING VIA SMS
GSM BASED PREPAID ENERGY METER BILLING VIA SMSGSM BASED PREPAID ENERGY METER BILLING VIA SMS
GSM BASED PREPAID ENERGY METER BILLING VIA SMSSRINIVAS REDDY
 
7 cyber security questions for boards
7 cyber security questions for boards7 cyber security questions for boards
7 cyber security questions for boardsPaul McGillicuddy
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentationBijay Bhandari
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.pptAeman Khan
 
Cyber security
Cyber securityCyber security
Cyber securitySiblu28
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptMOE515253
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security pptLipsita Behera
 

Viewers also liked (14)

CISSPills #3.03
CISSPills #3.03CISSPills #3.03
CISSPills #3.03
 
Meter data
Meter dataMeter data
Meter data
 
Role of The Board In IT Governance & Cyber Security-Steve Howse
Role of The Board In IT Governance & Cyber Security-Steve HowseRole of The Board In IT Governance & Cyber Security-Steve Howse
Role of The Board In IT Governance & Cyber Security-Steve Howse
 
Meter sets
Meter setsMeter sets
Meter sets
 
Lpg reticulated gas system (cylinder bank) digital energy
Lpg reticulated gas system (cylinder bank) digital energyLpg reticulated gas system (cylinder bank) digital energy
Lpg reticulated gas system (cylinder bank) digital energy
 
Prepayment Metering System
Prepayment Metering SystemPrepayment Metering System
Prepayment Metering System
 
Cybersecurity - NSA Style
Cybersecurity - NSA StyleCybersecurity - NSA Style
Cybersecurity - NSA Style
 
GSM BASED PREPAID ENERGY METER BILLING VIA SMS
GSM BASED PREPAID ENERGY METER BILLING VIA SMSGSM BASED PREPAID ENERGY METER BILLING VIA SMS
GSM BASED PREPAID ENERGY METER BILLING VIA SMS
 
7 cyber security questions for boards
7 cyber security questions for boards7 cyber security questions for boards
7 cyber security questions for boards
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 

Similar to IT Optimization & Risk Management

Emerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and SecurityEmerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and SecurityJessica Santamaria
 
Governance Risk and Compliance for SAP
Governance Risk and Compliance for SAPGovernance Risk and Compliance for SAP
Governance Risk and Compliance for SAPPECB
 
Project_Paper_Presentation_ISSC471_Intindolo
Project_Paper_Presentation_ISSC471_IntindoloProject_Paper_Presentation_ISSC471_Intindolo
Project_Paper_Presentation_ISSC471_IntindoloJohn Intindolo
 
Don't Lose Sleep Over Lost IT Assets
Don't Lose Sleep Over Lost IT AssetsDon't Lose Sleep Over Lost IT Assets
Don't Lose Sleep Over Lost IT AssetsIvanti
 
Martin Huddleston: No Service Management, No Security
Martin Huddleston: No Service Management, No SecurityMartin Huddleston: No Service Management, No Security
Martin Huddleston: No Service Management, No SecurityitSMF UK
 
Maclear’s IT GRC Tools – Key Issues and Trends
Maclear’s  IT GRC Tools – Key Issues and TrendsMaclear’s  IT GRC Tools – Key Issues and Trends
Maclear’s IT GRC Tools – Key Issues and TrendsMaclear LLC
 
Infocon Bangladesh 2016
Infocon Bangladesh 2016Infocon Bangladesh 2016
Infocon Bangladesh 2016Prime Infoserv
 
Business-Aligned Enterprise Security – Driving Success in the Face of Shifti...
Business-Aligned Enterprise Security – Driving Success in the Face of Shifti...Business-Aligned Enterprise Security – Driving Success in the Face of Shifti...
Business-Aligned Enterprise Security – Driving Success in the Face of Shifti...CA Technologies
 
Operational security | How to design your information security GRC (governanc...
Operational security | How to design your information security GRC (governanc...Operational security | How to design your information security GRC (governanc...
Operational security | How to design your information security GRC (governanc...Maxime CARPENTIER
 
Operational Risk Management under BASEL era
Operational Risk Management under BASEL eraOperational Risk Management under BASEL era
Operational Risk Management under BASEL eraTreat Risk
 
Indranil Guha - It transformation challenges & choices...
Indranil Guha - It transformation challenges & choices...Indranil Guha - It transformation challenges & choices...
Indranil Guha - It transformation challenges & choices...Global Business Events
 
Ken Kurdziel: Enterprise Risk Management
Ken Kurdziel: Enterprise Risk ManagementKen Kurdziel: Enterprise Risk Management
Ken Kurdziel: Enterprise Risk ManagementJamesMooreCo
 
IT Risk Management
IT Risk ManagementIT Risk Management
IT Risk ManagementTudor Damian
 
How To Handle Cybersecurity Risk PowerPoint Presentation Slides
How To Handle Cybersecurity Risk PowerPoint Presentation SlidesHow To Handle Cybersecurity Risk PowerPoint Presentation Slides
How To Handle Cybersecurity Risk PowerPoint Presentation SlidesSlideTeam
 
Too Small to Get Hacked? Think Again (Webinar)
Too Small to Get Hacked? Think Again (Webinar)Too Small to Get Hacked? Think Again (Webinar)
Too Small to Get Hacked? Think Again (Webinar)OnRamp
 
Putting the Business in Enterprise Information Security Architecture
Putting the Business in Enterprise Information Security ArchitecturePutting the Business in Enterprise Information Security Architecture
Putting the Business in Enterprise Information Security ArchitectureRavila White
 

Similar to IT Optimization & Risk Management (20)

Emerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and SecurityEmerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and Security
 
Governance Risk and Compliance for SAP
Governance Risk and Compliance for SAPGovernance Risk and Compliance for SAP
Governance Risk and Compliance for SAP
 
Risk Product.pptx
Risk Product.pptxRisk Product.pptx
Risk Product.pptx
 
Project_Paper_Presentation_ISSC471_Intindolo
Project_Paper_Presentation_ISSC471_IntindoloProject_Paper_Presentation_ISSC471_Intindolo
Project_Paper_Presentation_ISSC471_Intindolo
 
Don't Lose Sleep Over Lost IT Assets
Don't Lose Sleep Over Lost IT AssetsDon't Lose Sleep Over Lost IT Assets
Don't Lose Sleep Over Lost IT Assets
 
Martin Huddleston: No Service Management, No Security
Martin Huddleston: No Service Management, No SecurityMartin Huddleston: No Service Management, No Security
Martin Huddleston: No Service Management, No Security
 
Maclear’s IT GRC Tools – Key Issues and Trends
Maclear’s  IT GRC Tools – Key Issues and TrendsMaclear’s  IT GRC Tools – Key Issues and Trends
Maclear’s IT GRC Tools – Key Issues and Trends
 
Ignorance Is Risk
Ignorance Is RiskIgnorance Is Risk
Ignorance Is Risk
 
Infocon Bangladesh 2016
Infocon Bangladesh 2016Infocon Bangladesh 2016
Infocon Bangladesh 2016
 
Business-Aligned Enterprise Security – Driving Success in the Face of Shifti...
Business-Aligned Enterprise Security – Driving Success in the Face of Shifti...Business-Aligned Enterprise Security – Driving Success in the Face of Shifti...
Business-Aligned Enterprise Security – Driving Success in the Face of Shifti...
 
Operational security | How to design your information security GRC (governanc...
Operational security | How to design your information security GRC (governanc...Operational security | How to design your information security GRC (governanc...
Operational security | How to design your information security GRC (governanc...
 
Operational Risk Management under BASEL era
Operational Risk Management under BASEL eraOperational Risk Management under BASEL era
Operational Risk Management under BASEL era
 
Indranil Guha - It transformation challenges & choices...
Indranil Guha - It transformation challenges & choices...Indranil Guha - It transformation challenges & choices...
Indranil Guha - It transformation challenges & choices...
 
Ken Kurdziel: Enterprise Risk Management
Ken Kurdziel: Enterprise Risk ManagementKen Kurdziel: Enterprise Risk Management
Ken Kurdziel: Enterprise Risk Management
 
IT Risk Management
IT Risk ManagementIT Risk Management
IT Risk Management
 
How To Handle Cybersecurity Risk PowerPoint Presentation Slides
How To Handle Cybersecurity Risk PowerPoint Presentation SlidesHow To Handle Cybersecurity Risk PowerPoint Presentation Slides
How To Handle Cybersecurity Risk PowerPoint Presentation Slides
 
CISA Review Courses - Slides Part2
CISA Review Courses - Slides Part2CISA Review Courses - Slides Part2
CISA Review Courses - Slides Part2
 
CISA Part2
CISA Part2CISA Part2
CISA Part2
 
Too Small to Get Hacked? Think Again (Webinar)
Too Small to Get Hacked? Think Again (Webinar)Too Small to Get Hacked? Think Again (Webinar)
Too Small to Get Hacked? Think Again (Webinar)
 
Putting the Business in Enterprise Information Security Architecture
Putting the Business in Enterprise Information Security ArchitecturePutting the Business in Enterprise Information Security Architecture
Putting the Business in Enterprise Information Security Architecture
 

IT Optimization & Risk Management

  • 1. IT Optimization & Risk Management Jeromie Jackson – CISSP, CISM Jeromie.Jackson@Tig.com / Jeromie@comsecinc.com 619-368-7353
  • 2. About Me President- San Diego OWASP ● Vice President- San Diego ISACA ● CISM, CISSP Since 1996 ● CISM, COBIT, & ITIL Certified ● SANS Mentor ● Security Solutions Architect @ TIG ●
  • 3. Board Concerns Profitability ● Satisfying Regulations & Passing Audit ● Risk Management ● IT Alignment ● Governance ●
  • 4. Down Economy causing executives to focus on profitability 3 ways to improve ● profitability Increase top-line sales – Reduce COGS – Optimize Operations –
  • 5. Regulations Overlap ● Minimal benefit ● Increasing complexity ● Resource intensive ● Divert focus on maturing risk management ●
  • 6. Security Risks & Exposures are Growing More than 35 million data records were ● breached in 2008 in the United States -Theft Resource Center Jan 20, 2009- Heartland Payment Systems- ● 100 Million Transactions Per Month! http://www.2008breach.com/ 252,276,206 records with personal information ● since January 1995 - www.privacyrights.org
  • 7. IT & Business Alignment- Are we communicating? Prudent Agile Competitive Advantage
  • 8. Implications IT is meant to ● serve the business IT must be aligned ● with business goals IT is costly and ● requires prudent management
  • 9. Become Proactive Instill best-practice governance ● Utilize a risk-management portfolio to guide ● remediation Consolidate Regulations ●
  • 10. 5 Facets of Governance Value Delivery ● Strategic Alignment ● Performance Measurement ● Resource Management ● Risk Management ●
  • 11. Improve Risk Management Risk Management ● Process Identify critical assets – Define containers – Identify risks & threats – Quantify or qualify risks – Prioritize Remediation ● Efforts
  • 12. Risk Management Frameworks & Functions Frameworks ● NIST (SP800-30) – Octave – Octave Allegro – Factor Analysis for Information Risk (FAIR) – Primary Functions ● Create Value Account for People, Process, and Technology Integral Organizational Process Continual Systematic Focused on Continual Improvement
  • 13. Regulatory Optimize ● Remediation Convergence Assert ● Compliance Simultaneously
  • 14. Optimize IT Bridge the gap between control ● requirements, technical issues, and business risk Use a portfolio approach to risk ● management Manage by measurement ● Enable your organization to reap ● maximum benefit from technology investments
  • 15. Questions? Jeromie Jackson- CISSP, CISM Jeromie@ComSecInc.com / Jeromie.Jackson@TIG.COM 619-368-7353-direct http://www.linkedin.com/in/securityassessment