SlideShare a Scribd company logo
1 of 16
Download to read offline
The Aegis Programme
What is your Cybersecurity Maturity Score?
Presented by:
Chris Leppard CISSP, PCI QSA, ISO27001 LA
Managing Consultant – GRC / Lead QSA for CNS
Six Degrees – What We Do
Intelligent Growth
The Agile Workspace
Stable Foundations
Core
Infrastructure
Managed
Workplace
Business
Continuity
Cyber Security
Detection &
Defence
Unified
Communications
Simplified
Collaboration
Enterprise
Mobility
Management
Modern
Workplace
Multi-Cloud
Management
Consultancy &
Advisory
Business Insight
& Analytics
Cyber Security
Assessment &
Compliance
Agenda
• CNS Background & Experience
• The Role of Risk Management
• How Aegis Can Help
• Demonstration
• Questions
• Established in 1999
• PCI QSAC since 2008
• Consulting & technology led
• Extensive & varied client list
• Industry & pan-government
accredited
• Security cleared & vetted staff
• All full-time staff
• Acquired by Six Degrees
in 2018
About CNS Group
The Role of Risk Management
“Risk is like fire: If controlled it will
help you; if uncontrolled it will rise
up and destroy you.”
Theodore Roosevelt
Problem #1
Board-level issues
Of businesses have experienced one or more cybersecurity breaches in the past 12 months
Of medium to large enterprises have experienced one or more cybersecurity
breaches in the past 12 months
Or just three in ten businesses have a formal cybersecurity policy or policies in place
43%
27%
72%
Source: Cybersecurity Breaches Survey 2018 – HM Government
Published: 25 April 2018
Problem #2
Confusing and expanding compliance landscape
Data Protection Act 2018
Source: ENISA Threat Landscape Report for 2018
Published: January 2019
Problem #3
A challenging threat landscape
0
1
2
3
4
5
6
7
8
9
10
£0
£5,000
£10,000
£15,000
£20,000
£25,000
£30,000
£35,000
£40,000
Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec
Traditional Cyber Spend
Testing Advisory Solutions Managed Services Internal Maturity Visibility
Assess AssessFix Fix & Manage Manage
Year One Spend £138,000
Year Two Spend £245,000
Year Three Spend £245,000
Total over 3 years £628,000
Problem #4
Unpredictable and ineffective spending
A Aegis |Comprehensive Cybersecurity
Maturity Service
 Provide a concise and contextual reporting mechanism for situational cybersecurity to the board / stakeholders.
 Expedite cybersecurity maturity and visibility
 Show return on investment for cybersecurity spend and organise / prioritise future cybersecurity spend for
greatest risk reduction
 Highlight the greatest areas of cybersecurity weakness for immediate action and identify greatest threats to an
organisation (by type)
 Reduce a client's overall cybersecurity spend over a 3-year period
Primary Objectives
Aegis measures your Cybersecurity Maturity by scoring preparedness and activity across 5 domains:
 Compliance & Accreditation (10 sub-domains)
 Technical Compliance (21 sub-domains)
 Transformation & Maturity (10 sub-domains)
 Events, Alerts & Threat Intelligence (14 sub-domains)
 Governance & Policy (19 sub-domains)
74 Sub-domains selected from and common with
 International Standards Organisation (ISO) 27000/1
 Payment Card Industry (PCI) Data Security Standard (DSS)
 Top 20 Critical Control Set
 Cyber Essentials +
 Sarbanes Oxley
 EU General Data Protection Regulation
 Securities & Exchange Commission (SEC) Office of Compliance, Inspections and Examinations (OCIE)
 Public Services Network (PSN) Code of Connection
Aegis | Overview
Too often, dashboards and reviews omit one of these critical areas
Aegis | Overview
Different versions can be used
• Originally built as cybersecurity maturity across various domains (best practice)
• Best practice version took “best of breed” compliance regimes (5 domains) from :
 ISO 27000/1, PCI DSS, Top 20 CSC’s, Cyber Essentials +, HMG CSP, EU GDPR, NIST CSF, CSA CCM
• Feedback from customers; “love it……..but wish you had it against X or Y regime…..so, now have specific version:
 Best Practice (Original version)
 NIST Cybersecurity Framework
 ISO 27001
 PCI DSS
 Cyber Essentials +
 HMG Cloud Security Principles
 Cloud Security Alliance – Cloud Control Matrix
Aegis | Overview
How we intend to deliver it (lifecycle)
Phase 1
Initial Benchmark
Workshop
(Typically half day to full day event)
Phase 2
Presentation of Findings to
Client Exec
(Initial score, threat landscape,
recommendations, etc.)
1 week after Benchmark
Phase 3
Prioritised Risk Treatment
Plan (RTP)
(Taken from Aegis workstream
output)
Delivered with Presentation
Phase 4
Agreed SFIA level and
dates of return
(Dates set, not changed if at all
possible)
Project Managed
Phase 5
RTP Updates and Review
on Anniversary
(From agreed dates, typically half-
day)
Depends on results
Phase 6
Aegis Benchmark Rerun
(Based on RTP findings)
Run irrespective to demonstrate
done/not done
Year One Spend £138,000
Year Two Spend £245,000
Year Three Spend £245,000
Total over 3 years £628,000
Year One Spend £200,000
Year Two Spend £187,000
Year Three Spend £187,000
Total over 3 years £574,000
Compliance &
Accreditation
18
• Risk Assessment
• RTP
• ISO27001
• PCI DSS
• PSN
• DPA
• CE+
• Regulation
Technical
Compliance
12
• Build Status
• Firewall Ruleset
Review
• Penetration test
• Vulnerability Scans
• Code Review
• Patching
Transformation &
Maturity
4
• Project Status
• Outstanding Items
• Change programme
• Control Coverage
Events & Alerts
18
• SOC Report
• Incident Reporting
• Cyber Emergency
Response Team
• Internal and External
Threat Intelligence
Governance &
Policy
16
• Policy Compliance
• Policy Exceptions
• Governance
• Change Management
DomainsSub-domains
Northwind Traders
AEGIS Score: 68
Aegis
The Bench Marking Dashboard
Year One Spend £138,000
Year Two Spend £245,000
Year Three Spend £245,000
Total over 3 years £628,000
Assess Fix Manage
0
1
2
3
4
5
6
7
8
9
10
£0
£5,000
£10,000
£15,000
£20,000
£25,000
£30,000
£35,000
£40,000
Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec
Aegis Programme Spend
Testing Advisory Solutions Managed Services Internal Maturity Visibility
Year One Spend £200,000
Year Two Spend £187,000
Year Three Spend £187,000
Total over 3 years £574,000
Aegis Cyber Spend for Midsize Organisation
Assurance
London sessions - 25 July | 22 August | 19 September
6dg.co.uk/pen-test-training
READ MORE
Whitepaper:
6dg.co.uk/cyber-security-
maturity-bridging-gap-board/

More Related Content

What's hot

Stop Chasing the Version: Compliance with CIPv5 through CIPv99
Stop Chasing the Version: Compliance with CIPv5 through CIPv99 Stop Chasing the Version: Compliance with CIPv5 through CIPv99
Stop Chasing the Version: Compliance with CIPv5 through CIPv99 Tripwire
 
Simplifying Security for Cloud Adoption - Defining your game plan
Simplifying Security for Cloud Adoption - Defining your game planSimplifying Security for Cloud Adoption - Defining your game plan
Simplifying Security for Cloud Adoption - Defining your game planSecurestorm
 
NIST IT Standards for Local Governments 2010
NIST IT Standards for Local Governments 2010NIST IT Standards for Local Governments 2010
NIST IT Standards for Local Governments 2010Donald E. Hester
 
The Measure of Success: Security Metrics to Tell Your Story
The Measure of Success: Security Metrics to Tell Your StoryThe Measure of Success: Security Metrics to Tell Your Story
The Measure of Success: Security Metrics to Tell Your StoryPriyanka Aash
 
The importance of information security risk management
The importance of information security risk managementThe importance of information security risk management
The importance of information security risk managementMichael Francis
 
NIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewNIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewTandhy Simanjuntak
 
Alert Logic - Corporate Overview
Alert Logic - Corporate OverviewAlert Logic - Corporate Overview
Alert Logic - Corporate Overviewbmiller144
 
Introduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security FrameworkIntroduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security FrameworkPECB
 
Cytegic presentation 02 12
Cytegic presentation 02 12Cytegic presentation 02 12
Cytegic presentation 02 12Cytegic
 
How to Use the NIST CSF to Recover from a Healthcare Breach
 How to Use the NIST CSF to Recover from a Healthcare Breach  How to Use the NIST CSF to Recover from a Healthcare Breach
How to Use the NIST CSF to Recover from a Healthcare Breach Symantec
 
Security architecture frameworks
Security architecture frameworksSecurity architecture frameworks
Security architecture frameworksJohn Arnold
 
Nist cybersecurity framework isc2 quantico
Nist cybersecurity framework  isc2 quanticoNist cybersecurity framework  isc2 quantico
Nist cybersecurity framework isc2 quanticoTuan Phan
 
A Pragmatic Approach to SIEM: Buy for Compliance, Use for Security
A Pragmatic Approach to SIEM: Buy for Compliance, Use for SecurityA Pragmatic Approach to SIEM: Buy for Compliance, Use for Security
A Pragmatic Approach to SIEM: Buy for Compliance, Use for SecurityTripwire
 
TrustedAgent GRC for Vulnerability Management
TrustedAgent GRC for Vulnerability ManagementTrustedAgent GRC for Vulnerability Management
TrustedAgent GRC for Vulnerability ManagementTuan Phan
 
PECB Webinar: Risk Treatment according to ISO 27005
PECB Webinar: Risk Treatment according to ISO 27005PECB Webinar: Risk Treatment according to ISO 27005
PECB Webinar: Risk Treatment according to ISO 27005PECB
 
Happiest Minds NIST CSF compliance Brochure
Happiest Minds NIST  CSF compliance BrochureHappiest Minds NIST  CSF compliance Brochure
Happiest Minds NIST CSF compliance BrochureSuresh Kanniappan
 
Security metrics
Security metrics Security metrics
Security metrics PRAYAGRAJ11
 

What's hot (20)

Stop Chasing the Version: Compliance with CIPv5 through CIPv99
Stop Chasing the Version: Compliance with CIPv5 through CIPv99 Stop Chasing the Version: Compliance with CIPv5 through CIPv99
Stop Chasing the Version: Compliance with CIPv5 through CIPv99
 
Simplifying Security for Cloud Adoption - Defining your game plan
Simplifying Security for Cloud Adoption - Defining your game planSimplifying Security for Cloud Adoption - Defining your game plan
Simplifying Security for Cloud Adoption - Defining your game plan
 
NIST IT Standards for Local Governments 2010
NIST IT Standards for Local Governments 2010NIST IT Standards for Local Governments 2010
NIST IT Standards for Local Governments 2010
 
CHIME Lead Forum - Seattle 2015
CHIME Lead Forum - Seattle 2015CHIME Lead Forum - Seattle 2015
CHIME Lead Forum - Seattle 2015
 
The Measure of Success: Security Metrics to Tell Your Story
The Measure of Success: Security Metrics to Tell Your StoryThe Measure of Success: Security Metrics to Tell Your Story
The Measure of Success: Security Metrics to Tell Your Story
 
GRCAlert Capabilities Deck - 2018
GRCAlert Capabilities Deck - 2018GRCAlert Capabilities Deck - 2018
GRCAlert Capabilities Deck - 2018
 
The importance of information security risk management
The importance of information security risk managementThe importance of information security risk management
The importance of information security risk management
 
NIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewNIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An Overview
 
Alert Logic - Corporate Overview
Alert Logic - Corporate OverviewAlert Logic - Corporate Overview
Alert Logic - Corporate Overview
 
Introduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security FrameworkIntroduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security Framework
 
Does audit make us more secure
Does audit make us more secureDoes audit make us more secure
Does audit make us more secure
 
Cytegic presentation 02 12
Cytegic presentation 02 12Cytegic presentation 02 12
Cytegic presentation 02 12
 
How to Use the NIST CSF to Recover from a Healthcare Breach
 How to Use the NIST CSF to Recover from a Healthcare Breach  How to Use the NIST CSF to Recover from a Healthcare Breach
How to Use the NIST CSF to Recover from a Healthcare Breach
 
Security architecture frameworks
Security architecture frameworksSecurity architecture frameworks
Security architecture frameworks
 
Nist cybersecurity framework isc2 quantico
Nist cybersecurity framework  isc2 quanticoNist cybersecurity framework  isc2 quantico
Nist cybersecurity framework isc2 quantico
 
A Pragmatic Approach to SIEM: Buy for Compliance, Use for Security
A Pragmatic Approach to SIEM: Buy for Compliance, Use for SecurityA Pragmatic Approach to SIEM: Buy for Compliance, Use for Security
A Pragmatic Approach to SIEM: Buy for Compliance, Use for Security
 
TrustedAgent GRC for Vulnerability Management
TrustedAgent GRC for Vulnerability ManagementTrustedAgent GRC for Vulnerability Management
TrustedAgent GRC for Vulnerability Management
 
PECB Webinar: Risk Treatment according to ISO 27005
PECB Webinar: Risk Treatment according to ISO 27005PECB Webinar: Risk Treatment according to ISO 27005
PECB Webinar: Risk Treatment according to ISO 27005
 
Happiest Minds NIST CSF compliance Brochure
Happiest Minds NIST  CSF compliance BrochureHappiest Minds NIST  CSF compliance Brochure
Happiest Minds NIST CSF compliance Brochure
 
Security metrics
Security metrics Security metrics
Security metrics
 

Similar to Six Degrees Aegis - What's your cybersecurity maturity score?

Cyber-Security Certifications
Cyber-Security CertificationsCyber-Security Certifications
Cyber-Security CertificationsNithin Sai
 
Webinar-MSP+ Cyber Insurance Fina.pptx
Webinar-MSP+  Cyber Insurance Fina.pptxWebinar-MSP+  Cyber Insurance Fina.pptx
Webinar-MSP+ Cyber Insurance Fina.pptxControlCase
 
Cyber crime with privention
Cyber crime with privention Cyber crime with privention
Cyber crime with privention Manish Dixit Ceh
 
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...PECB
 
Leveraging compliance to raise the bar on security
Leveraging compliance to raise the bar on securityLeveraging compliance to raise the bar on security
Leveraging compliance to raise the bar on securityMike Lemire
 
2018 State of Cyber Resilience Report - Ireland
2018 State of Cyber Resilience Report - Ireland2018 State of Cyber Resilience Report - Ireland
2018 State of Cyber Resilience Report - IrelandAccenture Security
 
Automating Policy Compliance and IT Governance
Automating Policy Compliance and IT GovernanceAutomating Policy Compliance and IT Governance
Automating Policy Compliance and IT GovernanceSasha Nunke
 
Maintaining Data Privacy with Ashish Kirtikar
Maintaining Data Privacy with Ashish KirtikarMaintaining Data Privacy with Ashish Kirtikar
Maintaining Data Privacy with Ashish KirtikarControlCase
 
Adaptive grc life_sciences_case_study
Adaptive grc life_sciences_case_studyAdaptive grc life_sciences_case_study
Adaptive grc life_sciences_case_studyRob Johnston, MBA
 
GLOBAL LIFE SCIENCES COMPANY USES ADAPTIVEGRC SUITE TO MANAGE RISK & COMPLI...
GLOBAL LIFE SCIENCES COMPANY USES  ADAPTIVEGRC SUITE  TO MANAGE RISK & COMPLI...GLOBAL LIFE SCIENCES COMPANY USES  ADAPTIVEGRC SUITE  TO MANAGE RISK & COMPLI...
GLOBAL LIFE SCIENCES COMPANY USES ADAPTIVEGRC SUITE TO MANAGE RISK & COMPLI...D. Scott Clark
 
ICS Cyber Security Effectiveness Measurement
ICS Cyber Security Effectiveness MeasurementICS Cyber Security Effectiveness Measurement
ICS Cyber Security Effectiveness MeasurementAleksey Lukatskiy
 
Comodo SOC service provider
Comodo SOC service providerComodo SOC service provider
Comodo SOC service providerpaulharry03
 
Meaningfull security metrics
Meaningfull security metricsMeaningfull security metrics
Meaningfull security metricsVladimir Jirasek
 
MCGlobalTech Cyber Capability Statement_Final
MCGlobalTech Cyber Capability Statement_FinalMCGlobalTech Cyber Capability Statement_Final
MCGlobalTech Cyber Capability Statement_FinalWilliam McBorrough
 
CompTIA CASP+ | Everything you need to know about the new exam
CompTIA CASP+ | Everything you need to know about the new examCompTIA CASP+ | Everything you need to know about the new exam
CompTIA CASP+ | Everything you need to know about the new examInfosec
 
PPT-Security-for-Management.pptx
PPT-Security-for-Management.pptxPPT-Security-for-Management.pptx
PPT-Security-for-Management.pptxRSAArcher
 

Similar to Six Degrees Aegis - What's your cybersecurity maturity score? (20)

Cybersecurity-Audit-A-Case-Study-for-SME.pdf
Cybersecurity-Audit-A-Case-Study-for-SME.pdfCybersecurity-Audit-A-Case-Study-for-SME.pdf
Cybersecurity-Audit-A-Case-Study-for-SME.pdf
 
Cyber-Security Certifications
Cyber-Security CertificationsCyber-Security Certifications
Cyber-Security Certifications
 
Webinar-MSP+ Cyber Insurance Fina.pptx
Webinar-MSP+  Cyber Insurance Fina.pptxWebinar-MSP+  Cyber Insurance Fina.pptx
Webinar-MSP+ Cyber Insurance Fina.pptx
 
Cyber crime with privention
Cyber crime with privention Cyber crime with privention
Cyber crime with privention
 
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
 
Leveraging compliance to raise the bar on security
Leveraging compliance to raise the bar on securityLeveraging compliance to raise the bar on security
Leveraging compliance to raise the bar on security
 
2018 State of Cyber Resilience Report - Ireland
2018 State of Cyber Resilience Report - Ireland2018 State of Cyber Resilience Report - Ireland
2018 State of Cyber Resilience Report - Ireland
 
Automating Policy Compliance and IT Governance
Automating Policy Compliance and IT GovernanceAutomating Policy Compliance and IT Governance
Automating Policy Compliance and IT Governance
 
Maintaining Data Privacy with Ashish Kirtikar
Maintaining Data Privacy with Ashish KirtikarMaintaining Data Privacy with Ashish Kirtikar
Maintaining Data Privacy with Ashish Kirtikar
 
Adaptive grc life_sciences_case_study
Adaptive grc life_sciences_case_studyAdaptive grc life_sciences_case_study
Adaptive grc life_sciences_case_study
 
GLOBAL LIFE SCIENCES COMPANY USES ADAPTIVEGRC SUITE TO MANAGE RISK & COMPLI...
GLOBAL LIFE SCIENCES COMPANY USES  ADAPTIVEGRC SUITE  TO MANAGE RISK & COMPLI...GLOBAL LIFE SCIENCES COMPANY USES  ADAPTIVEGRC SUITE  TO MANAGE RISK & COMPLI...
GLOBAL LIFE SCIENCES COMPANY USES ADAPTIVEGRC SUITE TO MANAGE RISK & COMPLI...
 
File1
File1File1
File1
 
ICS Cyber Security Effectiveness Measurement
ICS Cyber Security Effectiveness MeasurementICS Cyber Security Effectiveness Measurement
ICS Cyber Security Effectiveness Measurement
 
Comodo SOC service provider
Comodo SOC service providerComodo SOC service provider
Comodo SOC service provider
 
Meaningfull security metrics
Meaningfull security metricsMeaningfull security metrics
Meaningfull security metrics
 
MCGlobalTech Cyber Capability Statement_Final
MCGlobalTech Cyber Capability Statement_FinalMCGlobalTech Cyber Capability Statement_Final
MCGlobalTech Cyber Capability Statement_Final
 
CRISC Course Preview
CRISC Course PreviewCRISC Course Preview
CRISC Course Preview
 
Diskusi buku: Securing an IT Organization through Governance, Risk Management...
Diskusi buku: Securing an IT Organization through Governance, Risk Management...Diskusi buku: Securing an IT Organization through Governance, Risk Management...
Diskusi buku: Securing an IT Organization through Governance, Risk Management...
 
CompTIA CASP+ | Everything you need to know about the new exam
CompTIA CASP+ | Everything you need to know about the new examCompTIA CASP+ | Everything you need to know about the new exam
CompTIA CASP+ | Everything you need to know about the new exam
 
PPT-Security-for-Management.pptx
PPT-Security-for-Management.pptxPPT-Security-for-Management.pptx
PPT-Security-for-Management.pptx
 

More from Six Degrees

Four Steps to the Cloud: Plotting Your Digital Transition Journey
Four Steps to the Cloud: Plotting Your Digital Transition JourneyFour Steps to the Cloud: Plotting Your Digital Transition Journey
Four Steps to the Cloud: Plotting Your Digital Transition JourneySix Degrees
 
Five Benefits Of Moving Your Legacy Workload To The Cloud
Five Benefits Of Moving Your Legacy Workload To The CloudFive Benefits Of Moving Your Legacy Workload To The Cloud
Five Benefits Of Moving Your Legacy Workload To The CloudSix Degrees
 
Cybersecurity for manufacturing - Five practical steps, by Six Degrees
Cybersecurity for manufacturing - Five practical steps, by Six DegreesCybersecurity for manufacturing - Five practical steps, by Six Degrees
Cybersecurity for manufacturing - Five practical steps, by Six DegreesSix Degrees
 
Six Degrees: Securing your business data - Nov 29 2018
Six Degrees: Securing your business data - Nov 29 2018Six Degrees: Securing your business data - Nov 29 2018
Six Degrees: Securing your business data - Nov 29 2018Six Degrees
 
The business value of Microsoft Azure and cloud transformation
The business value of Microsoft Azure and cloud transformationThe business value of Microsoft Azure and cloud transformation
The business value of Microsoft Azure and cloud transformationSix Degrees
 
Microsoft's Modern Workplace - productivity and collaboration in Finance
Microsoft's Modern Workplace - productivity and collaboration in FinanceMicrosoft's Modern Workplace - productivity and collaboration in Finance
Microsoft's Modern Workplace - productivity and collaboration in FinanceSix Degrees
 
Citrix Secure Digital Perimeter (for Six Degrees 171018)
Citrix Secure Digital Perimeter (for Six Degrees 171018)Citrix Secure Digital Perimeter (for Six Degrees 171018)
Citrix Secure Digital Perimeter (for Six Degrees 171018)Six Degrees
 
Six Degrees Minimising IT Risk in Retail presentation
Six Degrees Minimising IT Risk in Retail presentationSix Degrees Minimising IT Risk in Retail presentation
Six Degrees Minimising IT Risk in Retail presentationSix Degrees
 

More from Six Degrees (8)

Four Steps to the Cloud: Plotting Your Digital Transition Journey
Four Steps to the Cloud: Plotting Your Digital Transition JourneyFour Steps to the Cloud: Plotting Your Digital Transition Journey
Four Steps to the Cloud: Plotting Your Digital Transition Journey
 
Five Benefits Of Moving Your Legacy Workload To The Cloud
Five Benefits Of Moving Your Legacy Workload To The CloudFive Benefits Of Moving Your Legacy Workload To The Cloud
Five Benefits Of Moving Your Legacy Workload To The Cloud
 
Cybersecurity for manufacturing - Five practical steps, by Six Degrees
Cybersecurity for manufacturing - Five practical steps, by Six DegreesCybersecurity for manufacturing - Five practical steps, by Six Degrees
Cybersecurity for manufacturing - Five practical steps, by Six Degrees
 
Six Degrees: Securing your business data - Nov 29 2018
Six Degrees: Securing your business data - Nov 29 2018Six Degrees: Securing your business data - Nov 29 2018
Six Degrees: Securing your business data - Nov 29 2018
 
The business value of Microsoft Azure and cloud transformation
The business value of Microsoft Azure and cloud transformationThe business value of Microsoft Azure and cloud transformation
The business value of Microsoft Azure and cloud transformation
 
Microsoft's Modern Workplace - productivity and collaboration in Finance
Microsoft's Modern Workplace - productivity and collaboration in FinanceMicrosoft's Modern Workplace - productivity and collaboration in Finance
Microsoft's Modern Workplace - productivity and collaboration in Finance
 
Citrix Secure Digital Perimeter (for Six Degrees 171018)
Citrix Secure Digital Perimeter (for Six Degrees 171018)Citrix Secure Digital Perimeter (for Six Degrees 171018)
Citrix Secure Digital Perimeter (for Six Degrees 171018)
 
Six Degrees Minimising IT Risk in Retail presentation
Six Degrees Minimising IT Risk in Retail presentationSix Degrees Minimising IT Risk in Retail presentation
Six Degrees Minimising IT Risk in Retail presentation
 

Recently uploaded

The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024christinemoorman
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Dipal Arora
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMANIlamathiKannappan
 
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Tina Ji
 
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis UsageNeil Kimberley
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Neil Kimberley
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...lizamodels9
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...anilsa9823
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communicationskarancommunications
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfPaul Menig
 
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...lizamodels9
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth MarketingShawn Pang
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsApsara Of India
 
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...lizamodels9
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...lizamodels9
 
Non Text Magic Studio Magic Design for Presentations L&P.pptx
Non Text Magic Studio Magic Design for Presentations L&P.pptxNon Text Magic Studio Magic Design for Presentations L&P.pptx
Non Text Magic Studio Magic Design for Presentations L&P.pptxAbhayThakur200703
 

Recently uploaded (20)

The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
 
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
 
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdf
 
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
 
Best Practices for Implementing an External Recruiting Partnership
Best Practices for Implementing an External Recruiting PartnershipBest Practices for Implementing an External Recruiting Partnership
Best Practices for Implementing an External Recruiting Partnership
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
 
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
 
Non Text Magic Studio Magic Design for Presentations L&P.pptx
Non Text Magic Studio Magic Design for Presentations L&P.pptxNon Text Magic Studio Magic Design for Presentations L&P.pptx
Non Text Magic Studio Magic Design for Presentations L&P.pptx
 

Six Degrees Aegis - What's your cybersecurity maturity score?

  • 1. The Aegis Programme What is your Cybersecurity Maturity Score? Presented by: Chris Leppard CISSP, PCI QSA, ISO27001 LA Managing Consultant – GRC / Lead QSA for CNS
  • 2. Six Degrees – What We Do Intelligent Growth The Agile Workspace Stable Foundations Core Infrastructure Managed Workplace Business Continuity Cyber Security Detection & Defence Unified Communications Simplified Collaboration Enterprise Mobility Management Modern Workplace Multi-Cloud Management Consultancy & Advisory Business Insight & Analytics Cyber Security Assessment & Compliance
  • 3. Agenda • CNS Background & Experience • The Role of Risk Management • How Aegis Can Help • Demonstration • Questions
  • 4. • Established in 1999 • PCI QSAC since 2008 • Consulting & technology led • Extensive & varied client list • Industry & pan-government accredited • Security cleared & vetted staff • All full-time staff • Acquired by Six Degrees in 2018 About CNS Group
  • 5. The Role of Risk Management “Risk is like fire: If controlled it will help you; if uncontrolled it will rise up and destroy you.” Theodore Roosevelt
  • 6. Problem #1 Board-level issues Of businesses have experienced one or more cybersecurity breaches in the past 12 months Of medium to large enterprises have experienced one or more cybersecurity breaches in the past 12 months Or just three in ten businesses have a formal cybersecurity policy or policies in place 43% 27% 72% Source: Cybersecurity Breaches Survey 2018 – HM Government Published: 25 April 2018
  • 7. Problem #2 Confusing and expanding compliance landscape Data Protection Act 2018
  • 8. Source: ENISA Threat Landscape Report for 2018 Published: January 2019 Problem #3 A challenging threat landscape
  • 9. 0 1 2 3 4 5 6 7 8 9 10 £0 £5,000 £10,000 £15,000 £20,000 £25,000 £30,000 £35,000 £40,000 Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec Traditional Cyber Spend Testing Advisory Solutions Managed Services Internal Maturity Visibility Assess AssessFix Fix & Manage Manage Year One Spend £138,000 Year Two Spend £245,000 Year Three Spend £245,000 Total over 3 years £628,000 Problem #4 Unpredictable and ineffective spending
  • 10. A Aegis |Comprehensive Cybersecurity Maturity Service  Provide a concise and contextual reporting mechanism for situational cybersecurity to the board / stakeholders.  Expedite cybersecurity maturity and visibility  Show return on investment for cybersecurity spend and organise / prioritise future cybersecurity spend for greatest risk reduction  Highlight the greatest areas of cybersecurity weakness for immediate action and identify greatest threats to an organisation (by type)  Reduce a client's overall cybersecurity spend over a 3-year period Primary Objectives
  • 11. Aegis measures your Cybersecurity Maturity by scoring preparedness and activity across 5 domains:  Compliance & Accreditation (10 sub-domains)  Technical Compliance (21 sub-domains)  Transformation & Maturity (10 sub-domains)  Events, Alerts & Threat Intelligence (14 sub-domains)  Governance & Policy (19 sub-domains) 74 Sub-domains selected from and common with  International Standards Organisation (ISO) 27000/1  Payment Card Industry (PCI) Data Security Standard (DSS)  Top 20 Critical Control Set  Cyber Essentials +  Sarbanes Oxley  EU General Data Protection Regulation  Securities & Exchange Commission (SEC) Office of Compliance, Inspections and Examinations (OCIE)  Public Services Network (PSN) Code of Connection Aegis | Overview Too often, dashboards and reviews omit one of these critical areas
  • 12. Aegis | Overview Different versions can be used • Originally built as cybersecurity maturity across various domains (best practice) • Best practice version took “best of breed” compliance regimes (5 domains) from :  ISO 27000/1, PCI DSS, Top 20 CSC’s, Cyber Essentials +, HMG CSP, EU GDPR, NIST CSF, CSA CCM • Feedback from customers; “love it……..but wish you had it against X or Y regime…..so, now have specific version:  Best Practice (Original version)  NIST Cybersecurity Framework  ISO 27001  PCI DSS  Cyber Essentials +  HMG Cloud Security Principles  Cloud Security Alliance – Cloud Control Matrix
  • 13. Aegis | Overview How we intend to deliver it (lifecycle) Phase 1 Initial Benchmark Workshop (Typically half day to full day event) Phase 2 Presentation of Findings to Client Exec (Initial score, threat landscape, recommendations, etc.) 1 week after Benchmark Phase 3 Prioritised Risk Treatment Plan (RTP) (Taken from Aegis workstream output) Delivered with Presentation Phase 4 Agreed SFIA level and dates of return (Dates set, not changed if at all possible) Project Managed Phase 5 RTP Updates and Review on Anniversary (From agreed dates, typically half- day) Depends on results Phase 6 Aegis Benchmark Rerun (Based on RTP findings) Run irrespective to demonstrate done/not done
  • 14. Year One Spend £138,000 Year Two Spend £245,000 Year Three Spend £245,000 Total over 3 years £628,000 Year One Spend £200,000 Year Two Spend £187,000 Year Three Spend £187,000 Total over 3 years £574,000 Compliance & Accreditation 18 • Risk Assessment • RTP • ISO27001 • PCI DSS • PSN • DPA • CE+ • Regulation Technical Compliance 12 • Build Status • Firewall Ruleset Review • Penetration test • Vulnerability Scans • Code Review • Patching Transformation & Maturity 4 • Project Status • Outstanding Items • Change programme • Control Coverage Events & Alerts 18 • SOC Report • Incident Reporting • Cyber Emergency Response Team • Internal and External Threat Intelligence Governance & Policy 16 • Policy Compliance • Policy Exceptions • Governance • Change Management DomainsSub-domains Northwind Traders AEGIS Score: 68 Aegis The Bench Marking Dashboard
  • 15. Year One Spend £138,000 Year Two Spend £245,000 Year Three Spend £245,000 Total over 3 years £628,000 Assess Fix Manage 0 1 2 3 4 5 6 7 8 9 10 £0 £5,000 £10,000 £15,000 £20,000 £25,000 £30,000 £35,000 £40,000 Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec Aegis Programme Spend Testing Advisory Solutions Managed Services Internal Maturity Visibility Year One Spend £200,000 Year Two Spend £187,000 Year Three Spend £187,000 Total over 3 years £574,000 Aegis Cyber Spend for Midsize Organisation Assurance
  • 16. London sessions - 25 July | 22 August | 19 September 6dg.co.uk/pen-test-training READ MORE Whitepaper: 6dg.co.uk/cyber-security- maturity-bridging-gap-board/