SlideShare a Scribd company logo
1 of 7
© 2016 Stickman Consulting Pty Ltd 1
Stickman - Cyber security by design
By Ajay Unni, CEO, Stickman
© 2016 Stickman Consulting Pty Ltd 2
Why should cyber security be by design?
• The cyber and security world is dynamic and changing
constantly
• Organisations needs are not the same, customisation is
key to keep ahead of the dynamic nature of cyber
security
• Cyber security must be proactively managed within
organisations by way considering it as a key component
of from the beginning of any product or service
© 2016 Stickman Consulting Pty Ltd 3
Accomplishing cyber security by design
requires a strong:
Framework
Roadmap
Implementation Tiers
© 2016 Stickman Consulting Pty Ltd 4
Cyber Security Framework
© 2016 Stickman Consulting Pty Ltd 5
Framework Program of work
1: Prioritise &
Scope
2: Orient
3: Current Profile
4. Risk Assessment5: Target Profile
6: Prioritise Gaps
7: Implementation
Action Plan
Cyber Security
Program of
Work
© 2016 Stickman Consulting Pty Ltd 6
Implementation Tiers
Tier 1: Partial
Tier 2: Risk Informed
Informed
Tier 3: Repeatable
Tier 4: Adaptive
Cyber Security
Implementation
Tiers
© 2016 Stickman Consulting Pty Ltd 7
P: 1800 785 626
E: ajay.unni@stickman.com.au
www.stickman.com.au
Level 11, Suite 2,
210 George Street,
Sydney NSW 2000
Thank you!

More Related Content

Viewers also liked

What is ISO 27001 and why you should get compliant
What is ISO 27001 and why you should get compliant What is ISO 27001 and why you should get compliant
What is ISO 27001 and why you should get compliant Ajay Unni
 
Webinaari 9.12.2015 ulkomailla opiskelusta
Webinaari 9.12.2015 ulkomailla opiskelustaWebinaari 9.12.2015 ulkomailla opiskelusta
Webinaari 9.12.2015 ulkomailla opiskelustaHeiHei! Study & Travel
 
Нормативно-правовая основа языковой политики в Марий Эл
Нормативно-правовая основа языковой политики в Марий ЭлНормативно-правовая основа языковой политики в Марий Эл
Нормативно-правовая основа языковой политики в Марий Элkidsher
 
Жерӓ №34
Жерӓ №34Жерӓ №34
Жерӓ №34kidsher
 
Татьяна Соловьёва - Мый тымыкын улам саскаже!
Татьяна Соловьёва - Мый тымыкын улам саскаже!Татьяна Соловьёва - Мый тымыкын улам саскаже!
Татьяна Соловьёва - Мый тымыкын улам саскаже!kidsher
 
Жера №41
Жера  №41Жера  №41
Жера №41kidsher
 
Bioenergetics and thermodynamics
Bioenergetics and thermodynamicsBioenergetics and thermodynamics
Bioenergetics and thermodynamicsFatima Fizan
 

Viewers also liked (9)

What is ISO 27001 and why you should get compliant
What is ISO 27001 and why you should get compliant What is ISO 27001 and why you should get compliant
What is ISO 27001 and why you should get compliant
 
Antakshari 2016
Antakshari 2016Antakshari 2016
Antakshari 2016
 
Webinaari 9.12.2015 ulkomailla opiskelusta
Webinaari 9.12.2015 ulkomailla opiskelustaWebinaari 9.12.2015 ulkomailla opiskelusta
Webinaari 9.12.2015 ulkomailla opiskelusta
 
Antakshari 2016
Antakshari 2016Antakshari 2016
Antakshari 2016
 
Нормативно-правовая основа языковой политики в Марий Эл
Нормативно-правовая основа языковой политики в Марий ЭлНормативно-правовая основа языковой политики в Марий Эл
Нормативно-правовая основа языковой политики в Марий Эл
 
Жерӓ №34
Жерӓ №34Жерӓ №34
Жерӓ №34
 
Татьяна Соловьёва - Мый тымыкын улам саскаже!
Татьяна Соловьёва - Мый тымыкын улам саскаже!Татьяна Соловьёва - Мый тымыкын улам саскаже!
Татьяна Соловьёва - Мый тымыкын улам саскаже!
 
Жера №41
Жера  №41Жера  №41
Жера №41
 
Bioenergetics and thermodynamics
Bioenergetics and thermodynamicsBioenergetics and thermodynamics
Bioenergetics and thermodynamics
 

Similar to Stickman Cyber Security By Design

Application Security - Dont leave your AppSec for the last moment Meetup 2104...
Application Security - Dont leave your AppSec for the last moment Meetup 2104...Application Security - Dont leave your AppSec for the last moment Meetup 2104...
Application Security - Dont leave your AppSec for the last moment Meetup 2104...lior mazor
 
The State Of Information and Cyber Security in 2016
The State Of Information and Cyber Security in 2016The State Of Information and Cyber Security in 2016
The State Of Information and Cyber Security in 2016Shannon G., MBA
 
[Risk] Risk Manager for IRAM2 Application
[Risk] Risk Manager for IRAM2 Application[Risk] Risk Manager for IRAM2 Application
[Risk] Risk Manager for IRAM2 ApplicationAffy Morris MSc, ACIM
 
IAM and cybersecurity - June 15
IAM and cybersecurity - June 15IAM and cybersecurity - June 15
IAM and cybersecurity - June 15Capgemini
 
NUS-ISS Digital Architecture Information Session
NUS-ISS Digital Architecture Information SessionNUS-ISS Digital Architecture Information Session
NUS-ISS Digital Architecture Information Sessionengtsze
 
Forcepoint exhibiting in Dublin Tech Job Fair Spring 2019
Forcepoint exhibiting in Dublin Tech Job Fair Spring 2019Forcepoint exhibiting in Dublin Tech Job Fair Spring 2019
Forcepoint exhibiting in Dublin Tech Job Fair Spring 2019TechMeetups
 
The Cyber Security Leap: From Laggard to Leader
The Cyber Security Leap: From Laggard to LeaderThe Cyber Security Leap: From Laggard to Leader
The Cyber Security Leap: From Laggard to Leaderaccenture
 
Agile Framework
Agile FrameworkAgile Framework
Agile Frameworkhshamim
 
Security: Enabling the Journey to the Cloud
Security: Enabling the Journey to the CloudSecurity: Enabling the Journey to the Cloud
Security: Enabling the Journey to the CloudCapgemini
 
Code to Cloud: Three Trends for Faster, Safer Continuous Delivery
Code to Cloud: Three Trends for Faster, Safer Continuous DeliveryCode to Cloud: Three Trends for Faster, Safer Continuous Delivery
Code to Cloud: Three Trends for Faster, Safer Continuous DeliveryVMware Tanzu
 
The Demystification of successful cybersecurity initiatives.
The Demystification of successful cybersecurity initiatives.The Demystification of successful cybersecurity initiatives.
The Demystification of successful cybersecurity initiatives.FitCEO, Inc. (FCI)
 
TheDemystification_of_SuccessfulCyberSecurity_VIMRO_LB_VH_MHF_10_11_15
TheDemystification_of_SuccessfulCyberSecurity_VIMRO_LB_VH_MHF_10_11_15TheDemystification_of_SuccessfulCyberSecurity_VIMRO_LB_VH_MHF_10_11_15
TheDemystification_of_SuccessfulCyberSecurity_VIMRO_LB_VH_MHF_10_11_15FitCEO, Inc. (FCI)
 
The cyber security leap: From laggard to leader
The cyber security leap: From laggard to leaderThe cyber security leap: From laggard to leader
The cyber security leap: From laggard to leaderAccenture Australia
 
Resume-Amit 1.0
Resume-Amit 1.0Resume-Amit 1.0
Resume-Amit 1.0Amit Verma
 
Agile Risk Management
Agile Risk ManagementAgile Risk Management
Agile Risk ManagementRowan Bunning
 
NY State's cybersecurity legislation requirements for risk management, securi...
NY State's cybersecurity legislation requirements for risk management, securi...NY State's cybersecurity legislation requirements for risk management, securi...
NY State's cybersecurity legislation requirements for risk management, securi...IT Governance Ltd
 
Top Tips on Choosing a vCISO
Top Tips on Choosing a vCISOTop Tips on Choosing a vCISO
Top Tips on Choosing a vCISOCISOSHARE
 

Similar to Stickman Cyber Security By Design (20)

Application Security - Dont leave your AppSec for the last moment Meetup 2104...
Application Security - Dont leave your AppSec for the last moment Meetup 2104...Application Security - Dont leave your AppSec for the last moment Meetup 2104...
Application Security - Dont leave your AppSec for the last moment Meetup 2104...
 
The State Of Information and Cyber Security in 2016
The State Of Information and Cyber Security in 2016The State Of Information and Cyber Security in 2016
The State Of Information and Cyber Security in 2016
 
[Risk] Risk Manager for IRAM2 Application
[Risk] Risk Manager for IRAM2 Application[Risk] Risk Manager for IRAM2 Application
[Risk] Risk Manager for IRAM2 Application
 
IAM and cybersecurity - June 15
IAM and cybersecurity - June 15IAM and cybersecurity - June 15
IAM and cybersecurity - June 15
 
NUS-ISS Digital Architecture Information Session
NUS-ISS Digital Architecture Information SessionNUS-ISS Digital Architecture Information Session
NUS-ISS Digital Architecture Information Session
 
The Cyber Security Leap
The Cyber Security LeapThe Cyber Security Leap
The Cyber Security Leap
 
Forcepoint exhibiting in Dublin Tech Job Fair Spring 2019
Forcepoint exhibiting in Dublin Tech Job Fair Spring 2019Forcepoint exhibiting in Dublin Tech Job Fair Spring 2019
Forcepoint exhibiting in Dublin Tech Job Fair Spring 2019
 
The Cyber Security Leap: From Laggard to Leader
The Cyber Security Leap: From Laggard to LeaderThe Cyber Security Leap: From Laggard to Leader
The Cyber Security Leap: From Laggard to Leader
 
Agile Framework
Agile FrameworkAgile Framework
Agile Framework
 
Sec1391
Sec1391Sec1391
Sec1391
 
Security: Enabling the Journey to the Cloud
Security: Enabling the Journey to the CloudSecurity: Enabling the Journey to the Cloud
Security: Enabling the Journey to the Cloud
 
Code to Cloud: Three Trends for Faster, Safer Continuous Delivery
Code to Cloud: Three Trends for Faster, Safer Continuous DeliveryCode to Cloud: Three Trends for Faster, Safer Continuous Delivery
Code to Cloud: Three Trends for Faster, Safer Continuous Delivery
 
The Demystification of successful cybersecurity initiatives.
The Demystification of successful cybersecurity initiatives.The Demystification of successful cybersecurity initiatives.
The Demystification of successful cybersecurity initiatives.
 
TheDemystification_of_SuccessfulCyberSecurity_VIMRO_LB_VH_MHF_10_11_15
TheDemystification_of_SuccessfulCyberSecurity_VIMRO_LB_VH_MHF_10_11_15TheDemystification_of_SuccessfulCyberSecurity_VIMRO_LB_VH_MHF_10_11_15
TheDemystification_of_SuccessfulCyberSecurity_VIMRO_LB_VH_MHF_10_11_15
 
The cyber security leap: From laggard to leader
The cyber security leap: From laggard to leaderThe cyber security leap: From laggard to leader
The cyber security leap: From laggard to leader
 
The value of assurance webinar, 28 April 2020
The value of assurance webinar, 28 April 2020The value of assurance webinar, 28 April 2020
The value of assurance webinar, 28 April 2020
 
Resume-Amit 1.0
Resume-Amit 1.0Resume-Amit 1.0
Resume-Amit 1.0
 
Agile Risk Management
Agile Risk ManagementAgile Risk Management
Agile Risk Management
 
NY State's cybersecurity legislation requirements for risk management, securi...
NY State's cybersecurity legislation requirements for risk management, securi...NY State's cybersecurity legislation requirements for risk management, securi...
NY State's cybersecurity legislation requirements for risk management, securi...
 
Top Tips on Choosing a vCISO
Top Tips on Choosing a vCISOTop Tips on Choosing a vCISO
Top Tips on Choosing a vCISO
 

Recently uploaded

Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 

Recently uploaded (20)

Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 

Stickman Cyber Security By Design

  • 1. © 2016 Stickman Consulting Pty Ltd 1 Stickman - Cyber security by design By Ajay Unni, CEO, Stickman
  • 2. © 2016 Stickman Consulting Pty Ltd 2 Why should cyber security be by design? • The cyber and security world is dynamic and changing constantly • Organisations needs are not the same, customisation is key to keep ahead of the dynamic nature of cyber security • Cyber security must be proactively managed within organisations by way considering it as a key component of from the beginning of any product or service
  • 3. © 2016 Stickman Consulting Pty Ltd 3 Accomplishing cyber security by design requires a strong: Framework Roadmap Implementation Tiers
  • 4. © 2016 Stickman Consulting Pty Ltd 4 Cyber Security Framework
  • 5. © 2016 Stickman Consulting Pty Ltd 5 Framework Program of work 1: Prioritise & Scope 2: Orient 3: Current Profile 4. Risk Assessment5: Target Profile 6: Prioritise Gaps 7: Implementation Action Plan Cyber Security Program of Work
  • 6. © 2016 Stickman Consulting Pty Ltd 6 Implementation Tiers Tier 1: Partial Tier 2: Risk Informed Informed Tier 3: Repeatable Tier 4: Adaptive Cyber Security Implementation Tiers
  • 7. © 2016 Stickman Consulting Pty Ltd 7 P: 1800 785 626 E: ajay.unni@stickman.com.au www.stickman.com.au Level 11, Suite 2, 210 George Street, Sydney NSW 2000 Thank you!