Program
Management
The Cyber Security Program will require a leader with specific skills and competencies. In order to hel...
Upcoming SlideShare
Loading in...5
×

Chief Cyber Security Officer skills and competencies

13,673

Published on

Chief Cyber Security Officer skills and competencies

Published in: Leadership & Management
14 Comments
15 Likes
Statistics
Notes
No Downloads
Views
Total Views
13,673
On Slideshare
0
From Embeds
0
Number of Embeds
8
Actions
Shares
0
Downloads
265
Comments
14
Likes
15
Embeds 0
No embeds

No notes for slide

Chief Cyber Security Officer skills and competencies

  1. 1. Program Management The Cyber Security Program will require a leader with specific skills and competencies. In order to help facilitate the identification, selection and development of Chief Cyber Security Officers to lead this Enterprise wide program I’ve developed the following skills and competence matrix. This information has been shared freely by Mark E.S. Bernard. If you find it useful please acknowledge this contribution. If you would like additional information or assistance with the customization and implementation of a balanced risk management process for your security program then please contact Mark @ 604-349-6557 or mesbernard@gmail.com Chief Cyber Security Officer Security Leadership Security Governance Security Risk Management Security Architecture Manage Strategic & Tactical Plans Manage Committee ToR Manage RM Policy Oversee Information Arch. Consult on Application Arch. Consult on Technology Arch. Manage Communications Lead Risk Assessment Lead Risk Treatment Manage Risk Registry Manage the Team & Projects Manage Audits Facilitate Decision Points Allocate Resources Allocate Capital Manage Security SLA / OLA Manage Compliance Manage the Budget Lead SIRT Lead Monitoring & Reporting Manage related Docs & Records Facilitate RM Appetite Manage the Roadmap Engage Stakeholders Lead Due Diligence Manage Service Provider Risks Align with Enterprise Risk Manage External Inquiries Facilitate Biz Architecture. Manage Vulnerabilities Lead Monitoring & Reporting Lead Investigations

×