SlideShare a Scribd company logo
1 of 27
The Business of Security
Leadership
8 July 2016
ISSA Tampa Bay
Speaker Bio
ISSA International Board of Directors
Security Executive
U.S. Government Expatriate
Author
Business owner
Mentor
Family guy
Ministry leader
Amateur comedian
Keyaan Williams
Keyaan.Williams@ISSA.org
www.linkedin.com/in/keyaan
Outline
ISSA International Updates
The Business of Security Leadership
Summary
Q&A
Updates from the Mother Ship
What is going on at ISSA International?
In case you missed it:
2016 International
Conference
November 2-3, 2016
Hyatt Regency Dallas
Registration is Now Open!
ISSA International Conference
Early registration is closed, but . . .
•One complimentary registration is available for
each Chapter.
•Have a sponsor rent a bus.
•We still want to see you if you are out of work. We
have volunteer opportunities.
ISSA Fellows: 2016 Cycle is now open!
Submit a nomination for a Senior Member,
Fellow, or Distinguished Fellow.
Deadline August 1, 2016 (11:59pm ET)
Special Interest Groups (SIGs)
ISSA SIGs offer additional, targeted
opportunities to get involved.
• Security Education and Awareness
• Women In Security
• Financial SIG
• Healthcare SIG
• Cyber Security Career Lifecycle (CSCL)
Want to serve as a liaison? Contact sigs@issa.org
ISSA CISO Executive Membership
If you are a CISO,
this is a worthwhile membership level that offers
4 executive sessions per year to collaborate with
other CISOs and security leaders.
The Business of Security
Leadership
Some thoughts and perspective about
the role of security in a business.
I am not a security leader. Why do I care?
Everyone should care about security –
especially security people.
I am not a security leader. Why do I care?
You don’t have to be a security leader to
care about or contribute to security
leadership.
I sell security products or services.
Why do I care?
You must have a deep understanding of
your product and your customers to sell it
effectively.
What is the main idea?
Information security is not really about . . .
controls, compliance, or technology.
We are focusing on the wrong problem.
What is security about?
Security is about equipping the
business to operate with the fewest
possible disruptions.
How does security equip the business?
Enhance and support business
initiatives.
How does security equip the business?
Protect confidentiality, integrity, and
availability of business processes.
How does security equip the business?
Identify threats and provide mitigation
and/or timely remediation.
How does security equip the business?
Support resilience of business systems
and services.
Where does security leadership start?
Security leadership starts at the top.
Business leaders must agree on governance for
the enterprise before security can contribute to
the process.
Data
management
Enterprise
architecture
BCM BIA Policy
Everyone agrees on governance. Now what?
Develop a strategy and clearly define programs
and investments you need to genuinely equip
your business.
What else?
Security must operate like the other business
units in an organization.
What do I need to run security like a
business?
Program
Management
Project
Management
Managerial
Accounting
Information
Management
Negotiation Collaboration
Summary
What could we possibly learn
in such a short time?
This applies to everyone, not just security leaders.
Business is about business, and security just contributes.
Security must operate like a business unit to support the
business effectively.
If you aren’t familiar with something we discussed, do
research and learn more.
Q&A
Message me if I couldn’t get
to you during the session.
Thank you
Keyaan Williams
Keyaan.Williams@ISSA.org
www.linkedin.com/in/keyaan

More Related Content

Viewers also liked

Viewers also liked (14)

オープンデータ超入門
オープンデータ超入門オープンデータ超入門
オープンデータ超入門
 
P tgiai doan tc dam lien hop
P tgiai doan tc dam lien hopP tgiai doan tc dam lien hop
P tgiai doan tc dam lien hop
 
Change data capture
Change data captureChange data capture
Change data capture
 
AWS CodeDeploy Getting Started
AWS CodeDeploy Getting StartedAWS CodeDeploy Getting Started
AWS CodeDeploy Getting Started
 
The rise of microservices - containers and orchestration
The rise of microservices - containers and orchestrationThe rise of microservices - containers and orchestration
The rise of microservices - containers and orchestration
 
Ddd reboot (english version)
Ddd reboot (english version)Ddd reboot (english version)
Ddd reboot (english version)
 
SYN 208: Power HDX 3D Applications with Intel and NVIDIA GPUs.
SYN 208: Power HDX 3D Applications with Intel and NVIDIA GPUs. SYN 208: Power HDX 3D Applications with Intel and NVIDIA GPUs.
SYN 208: Power HDX 3D Applications with Intel and NVIDIA GPUs.
 
SYN 321: Securing the Published Browser
SYN 321: Securing the Published BrowserSYN 321: Securing the Published Browser
SYN 321: Securing the Published Browser
 
2016 Cyber Threat Defense Report
2016 Cyber Threat Defense Report2016 Cyber Threat Defense Report
2016 Cyber Threat Defense Report
 
The Why, How and What of Digital Business Transformation in the Cloud
The Why, How and What of Digital Business Transformation in the CloudThe Why, How and What of Digital Business Transformation in the Cloud
The Why, How and What of Digital Business Transformation in the Cloud
 
Liberating facts from the scientific literature - Jisc Digifest 2016
Liberating facts from the scientific literature - Jisc Digifest 2016Liberating facts from the scientific literature - Jisc Digifest 2016
Liberating facts from the scientific literature - Jisc Digifest 2016
 
バックアップと障害復旧から考えるOracle Database, MySQL, PostgreSQLの違い
バックアップと障害復旧から考えるOracle Database, MySQL, PostgreSQLの違いバックアップと障害復旧から考えるOracle Database, MySQL, PostgreSQLの違い
バックアップと障害復旧から考えるOracle Database, MySQL, PostgreSQLの違い
 
商用DBからPostgreSQLへ まず知っておいて欲しいまとめ
商用DBからPostgreSQLへ まず知っておいて欲しいまとめ商用DBからPostgreSQLへ まず知っておいて欲しいまとめ
商用DBからPostgreSQLへ まず知っておいて欲しいまとめ
 
Be a Creative Superhero. Save the World
Be a Creative Superhero. Save the WorldBe a Creative Superhero. Save the World
Be a Creative Superhero. Save the World
 

Similar to The Business of Security Leadership

ISACA Vancouver Risk IT Workshop - April 15 2010
ISACA Vancouver Risk IT Workshop - April 15 2010ISACA Vancouver Risk IT Workshop - April 15 2010
ISACA Vancouver Risk IT Workshop - April 15 2010
guestc6f137f
 
ISACA Vancouver Risk IT Workshop - April 15 2010
ISACA Vancouver Risk IT Workshop - April 15 2010ISACA Vancouver Risk IT Workshop - April 15 2010
ISACA Vancouver Risk IT Workshop - April 15 2010
pgpmikey
 
Independent-Fall-2015-Edition
Independent-Fall-2015-EditionIndependent-Fall-2015-Edition
Independent-Fall-2015-Edition
Todd C. Schultze
 
ACUACandUJurnalSummer_14_FinalWeb
ACUACandUJurnalSummer_14_FinalWebACUACandUJurnalSummer_14_FinalWeb
ACUACandUJurnalSummer_14_FinalWeb
LaDonna Flynn
 
Sas institute project presentation
Sas institute   project presentationSas institute   project presentation
Sas institute project presentation
aghussien
 
The-Network-Javed_joa_Eng_0516
The-Network-Javed_joa_Eng_0516The-Network-Javed_joa_Eng_0516
The-Network-Javed_joa_Eng_0516
Euro-cloud Euro
 
2015 IANS Decision Support Overview (1)
2015 IANS Decision Support Overview (1)2015 IANS Decision Support Overview (1)
2015 IANS Decision Support Overview (1)
Bryan Adams
 

Similar to The Business of Security Leadership (20)

What are the Job Prospects After Doing CISA.pptx
What are the Job Prospects After Doing CISA.pptxWhat are the Job Prospects After Doing CISA.pptx
What are the Job Prospects After Doing CISA.pptx
 
CSP Overview of Services Brochure 2023
CSP Overview of Services Brochure 2023CSP Overview of Services Brochure 2023
CSP Overview of Services Brochure 2023
 
Top 10 Interview Questions for Risk Analyst.pptx
Top 10 Interview Questions for Risk Analyst.pptxTop 10 Interview Questions for Risk Analyst.pptx
Top 10 Interview Questions for Risk Analyst.pptx
 
The Advantage — Summer 2023
The Advantage — Summer 2023The Advantage — Summer 2023
The Advantage — Summer 2023
 
ISACA Vancouver Risk IT Workshop - April 15 2010
ISACA Vancouver Risk IT Workshop - April 15 2010ISACA Vancouver Risk IT Workshop - April 15 2010
ISACA Vancouver Risk IT Workshop - April 15 2010
 
ISACA Vancouver Risk IT Workshop - April 15 2010
ISACA Vancouver Risk IT Workshop - April 15 2010ISACA Vancouver Risk IT Workshop - April 15 2010
ISACA Vancouver Risk IT Workshop - April 15 2010
 
Independent-Fall-2015-Edition
Independent-Fall-2015-EditionIndependent-Fall-2015-Edition
Independent-Fall-2015-Edition
 
ACUACandUJurnalSummer_14_FinalWeb
ACUACandUJurnalSummer_14_FinalWebACUACandUJurnalSummer_14_FinalWeb
ACUACandUJurnalSummer_14_FinalWeb
 
Sas institute project presentation
Sas institute   project presentationSas institute   project presentation
Sas institute project presentation
 
The-Network-Javed_joa_Eng_0516
The-Network-Javed_joa_Eng_0516The-Network-Javed_joa_Eng_0516
The-Network-Javed_joa_Eng_0516
 
Cleared Job Fair Job Seeker Handbook June 5, 2014, Tysons Corner, VA
Cleared Job Fair Job Seeker Handbook June 5, 2014, Tysons Corner, VACleared Job Fair Job Seeker Handbook June 5, 2014, Tysons Corner, VA
Cleared Job Fair Job Seeker Handbook June 5, 2014, Tysons Corner, VA
 
Protecting the Core of Your Network
Protecting the Core of Your Network Protecting the Core of Your Network
Protecting the Core of Your Network
 
BlueVoyant: 7 Experts Share Key Questions To Ask When Evaluating Providers
BlueVoyant: 7 Experts Share Key Questions To Ask When Evaluating ProvidersBlueVoyant: 7 Experts Share Key Questions To Ask When Evaluating Providers
BlueVoyant: 7 Experts Share Key Questions To Ask When Evaluating Providers
 
learning-heroes-course-brochure
learning-heroes-course-brochurelearning-heroes-course-brochure
learning-heroes-course-brochure
 
2015 IANS Decision Support Overview (1)
2015 IANS Decision Support Overview (1)2015 IANS Decision Support Overview (1)
2015 IANS Decision Support Overview (1)
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
 
Fortinet: The New CISO – From Technology to Business Focused Leadership
Fortinet: The New CISO – From Technology to Business Focused LeadershipFortinet: The New CISO – From Technology to Business Focused Leadership
Fortinet: The New CISO – From Technology to Business Focused Leadership
 
The 10 most trusted identity and access management solution providers 2018
The 10 most trusted identity and access management solution providers 2018The 10 most trusted identity and access management solution providers 2018
The 10 most trusted identity and access management solution providers 2018
 
Table of Experts: Insights into Cyber Security
Table of Experts: Insights into Cyber SecurityTable of Experts: Insights into Cyber Security
Table of Experts: Insights into Cyber Security
 
Storage Security Governance
Storage Security GovernanceStorage Security Governance
Storage Security Governance
 

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 

The Business of Security Leadership

  • 1. The Business of Security Leadership 8 July 2016 ISSA Tampa Bay
  • 2. Speaker Bio ISSA International Board of Directors Security Executive U.S. Government Expatriate Author Business owner Mentor Family guy Ministry leader Amateur comedian Keyaan Williams Keyaan.Williams@ISSA.org www.linkedin.com/in/keyaan
  • 3. Outline ISSA International Updates The Business of Security Leadership Summary Q&A
  • 4. Updates from the Mother Ship What is going on at ISSA International?
  • 5. In case you missed it: 2016 International Conference November 2-3, 2016 Hyatt Regency Dallas Registration is Now Open!
  • 6. ISSA International Conference Early registration is closed, but . . . •One complimentary registration is available for each Chapter. •Have a sponsor rent a bus. •We still want to see you if you are out of work. We have volunteer opportunities.
  • 7. ISSA Fellows: 2016 Cycle is now open! Submit a nomination for a Senior Member, Fellow, or Distinguished Fellow. Deadline August 1, 2016 (11:59pm ET)
  • 8. Special Interest Groups (SIGs) ISSA SIGs offer additional, targeted opportunities to get involved. • Security Education and Awareness • Women In Security • Financial SIG • Healthcare SIG • Cyber Security Career Lifecycle (CSCL) Want to serve as a liaison? Contact sigs@issa.org
  • 9. ISSA CISO Executive Membership If you are a CISO, this is a worthwhile membership level that offers 4 executive sessions per year to collaborate with other CISOs and security leaders.
  • 10. The Business of Security Leadership Some thoughts and perspective about the role of security in a business.
  • 11. I am not a security leader. Why do I care? Everyone should care about security – especially security people.
  • 12. I am not a security leader. Why do I care? You don’t have to be a security leader to care about or contribute to security leadership.
  • 13. I sell security products or services. Why do I care? You must have a deep understanding of your product and your customers to sell it effectively.
  • 14. What is the main idea? Information security is not really about . . . controls, compliance, or technology. We are focusing on the wrong problem.
  • 15. What is security about? Security is about equipping the business to operate with the fewest possible disruptions.
  • 16. How does security equip the business? Enhance and support business initiatives.
  • 17. How does security equip the business? Protect confidentiality, integrity, and availability of business processes.
  • 18. How does security equip the business? Identify threats and provide mitigation and/or timely remediation.
  • 19. How does security equip the business? Support resilience of business systems and services.
  • 20. Where does security leadership start? Security leadership starts at the top. Business leaders must agree on governance for the enterprise before security can contribute to the process. Data management Enterprise architecture BCM BIA Policy
  • 21. Everyone agrees on governance. Now what? Develop a strategy and clearly define programs and investments you need to genuinely equip your business.
  • 22. What else? Security must operate like the other business units in an organization.
  • 23. What do I need to run security like a business? Program Management Project Management Managerial Accounting Information Management Negotiation Collaboration
  • 24. Summary What could we possibly learn in such a short time?
  • 25. This applies to everyone, not just security leaders. Business is about business, and security just contributes. Security must operate like a business unit to support the business effectively. If you aren’t familiar with something we discussed, do research and learn more.
  • 26. Q&A Message me if I couldn’t get to you during the session.