SlideShare a Scribd company logo
1 of 13
From Corporate Enterprise To Homeland Security
                                      Ahmed M. Al Enizy
                                     IT Security Manager
                      International Systems Engineering
   Understanding The Problem
       Defining “Information Security Excellence”
       Key Attribute To Achieving Superiority In
        Information Security




2   12/26/2012
From dashlane
3   12/26/2012
   Why big companies with huge resources got
        hacked?
        ◦ 96% of the attacks not highly difficult
        ◦ 97% of breaches were avoidable through simple or
          intermediate controls
       Why CISOs with big guns failed to prevent the
        hack?
       Why hackers are always able to hit their
        targets?
       Why hackers are always one step ahead?

4   12/26/2012
   Excellence
        ◦ A talent or quality which is unusually good and so
          surpasses ordinary standards.

        ◦ Aristotle once said. "We are what we repeatedly do .
          . . excellence, then, is not an act, but a habit.“

        ◦ The equivalent concept in Muslim philosophy is
         Ihsan




5   12/26/2012
≠
                 Knowledge                       Knowledge
    Time                       Tools     Time                   Tools
                   Money                           Money


                 Opportunity                     Opportunity


                      ?                          Motivation
      ?                          ?       Cause                 Passion
                      ?                             Habit
      ?                          ?       Pride                 Freedom




6   12/26/2012
   Excellence covers the next mile that is giving
        hackers the tactical advantage.

        ◦ There is “something” that ignites hackers minds and
          makes it reach new levels of creativity and dig
          deeper and deeper to find or create this tactical
          advantage which at the end is translated to means
          to hit their targets without any resistance.

        ◦ Does your security capability has this?



7   12/26/2012
Excellence




                                             Quality




With Standards and Frameworks




Without Standards and Frameworks



8    12/26/2012
   Acquiring and maintaining talented
        employees
        ◦ Security talents
            Habit
            Research
            Curiosity
            Discipline
        ◦ Finding and acquiring (Interview and recruitment)
        ◦ Challenging
        ◦ Maintaining



9   12/26/2012
   Center of excellence
         ◦ Refers to a team, a shared facility or an entity that
           provides leadership, evangelization, best practices,
           research, support and/or training for a focus area.
           (Wikipedia)
        Responsibilities
         ◦   Support
         ◦   Guidance
         ◦   Shared Learning
         ◦   Measurements
         ◦   Governance
         (Jon Strickler, agileelements.wordpress.com)


10   12/26/2012
   Excellence in one field depends on excellence
         in other fields
         ◦   Quality
         ◦   Process
         ◦   Project Management
         ◦   Service
         ◦   Assurance
         ◦   Business Analysis
         ◦   Risk and Compliance
         ◦   Human Resources


11   12/26/2012
   Excellence needs a lighthouse to guide it.
        The key element of excellence is the right
         people in the right place.
        Patch the gap between business motivation
         for security (which is reducing money lose)
         and the motivations that ignites security
         specialists to match hackers




12   12/26/2012
13   12/26/2012

More Related Content

What's hot

What's hot (7)

Elf 2011 presentation by Craig Mc Dowell
Elf 2011 presentation by Craig Mc Dowell Elf 2011 presentation by Craig Mc Dowell
Elf 2011 presentation by Craig Mc Dowell
 
Knowledge Management - It's Not a Good Idea If It Can't Be Implemented by Joe...
Knowledge Management - It's Not a Good Idea If It Can't Be Implemented by Joe...Knowledge Management - It's Not a Good Idea If It Can't Be Implemented by Joe...
Knowledge Management - It's Not a Good Idea If It Can't Be Implemented by Joe...
 
ELF 2011 Craig McDowell Learning from the future as it emerges
ELF 2011 Craig McDowell Learning from the future as it emergesELF 2011 Craig McDowell Learning from the future as it emerges
ELF 2011 Craig McDowell Learning from the future as it emerges
 
Blockchain Enabled Crowd Economy
Blockchain Enabled Crowd Economy Blockchain Enabled Crowd Economy
Blockchain Enabled Crowd Economy
 
In the Spotlight: Is Human Capital the Data Center industries most Valuable R...
In the Spotlight: Is Human Capital the Data Center industries most Valuable R...In the Spotlight: Is Human Capital the Data Center industries most Valuable R...
In the Spotlight: Is Human Capital the Data Center industries most Valuable R...
 
Spotlight on Female Entrepreneurs
Spotlight on Female EntrepreneursSpotlight on Female Entrepreneurs
Spotlight on Female Entrepreneurs
 
ICCS Certified
ICCS CertifiedICCS Certified
ICCS Certified
 

Viewers also liked

Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
Lipsita Behera
 

Viewers also liked (9)

War in the 5th domain: Cyber Offensive Capability
War in the 5th domain: Cyber Offensive CapabilityWar in the 5th domain: Cyber Offensive Capability
War in the 5th domain: Cyber Offensive Capability
 
Protecting Industrial Control Systems V1.2, Ahmad Alanazy, 2012
Protecting Industrial Control Systems V1.2, Ahmad Alanazy, 2012Protecting Industrial Control Systems V1.2, Ahmad Alanazy, 2012
Protecting Industrial Control Systems V1.2, Ahmad Alanazy, 2012
 
Dubai Cyber Security 02 Ics Scada Cyber Security Standards, Solution Tips...
Dubai Cyber Security   02   Ics Scada Cyber Security Standards, Solution Tips...Dubai Cyber Security   02   Ics Scada Cyber Security Standards, Solution Tips...
Dubai Cyber Security 02 Ics Scada Cyber Security Standards, Solution Tips...
 
Managing The Security Risks Of Your Scada System, Ahmad Alanazy, 2012
Managing The Security Risks Of Your Scada System, Ahmad Alanazy, 2012Managing The Security Risks Of Your Scada System, Ahmad Alanazy, 2012
Managing The Security Risks Of Your Scada System, Ahmad Alanazy, 2012
 
Dubai Cyber Security 01 Ics Scada Cyber Security Solutions and Challenges...
Dubai Cyber Security   01   Ics Scada Cyber Security Solutions and Challenges...Dubai Cyber Security   01   Ics Scada Cyber Security Solutions and Challenges...
Dubai Cyber Security 01 Ics Scada Cyber Security Solutions and Challenges...
 
التعرف على الاختراقات في الشبكات المحلية
التعرف على الاختراقات في الشبكات المحليةالتعرف على الاختراقات في الشبكات المحلية
التعرف على الاختراقات في الشبكات المحلية
 
Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 

Similar to Developing excellence in information security from corporate enterprise to homeland security

Linking competitive intelligence to decisions
Linking competitive intelligence to decisionsLinking competitive intelligence to decisions
Linking competitive intelligence to decisions
David Harkleroad
 
leadership preentation123455#@sdf.mmpptx
leadership preentation123455#@sdf.mmpptxleadership preentation123455#@sdf.mmpptx
leadership preentation123455#@sdf.mmpptx
Najam14
 
92112639-Final-Leadership-Presentation (1).pptx
92112639-Final-Leadership-Presentation (1).pptx92112639-Final-Leadership-Presentation (1).pptx
92112639-Final-Leadership-Presentation (1).pptx
Najam14
 
Knowledge Management
Knowledge ManagementKnowledge Management
Knowledge Management
AdrianMalone
 
Knowledge management and learning organization
Knowledge management and learning organizationKnowledge management and learning organization
Knowledge management and learning organization
Rajan Neupane
 
Chapter 12Managing Business KnowledgeManaging and Using Info.docx
Chapter 12Managing Business KnowledgeManaging and Using Info.docxChapter 12Managing Business KnowledgeManaging and Using Info.docx
Chapter 12Managing Business KnowledgeManaging and Using Info.docx
cravennichole326
 
Building a Long Term Technology Strategy
Building a Long Term Technology StrategyBuilding a Long Term Technology Strategy
Building a Long Term Technology Strategy
Hide Harashima
 
The perils of measurement
The perils of measurementThe perils of measurement
The perils of measurement
Chris Yapp
 
What do schools and classrooms have to offer BPM?
What do schools and classrooms have to offer BPM?What do schools and classrooms have to offer BPM?
What do schools and classrooms have to offer BPM?
BPM Link
 

Similar to Developing excellence in information security from corporate enterprise to homeland security (20)

Linking competitive intelligence to decisions
Linking competitive intelligence to decisionsLinking competitive intelligence to decisions
Linking competitive intelligence to decisions
 
Prime83 at IITKanpur
Prime83 at IITKanpurPrime83 at IITKanpur
Prime83 at IITKanpur
 
Escape velocity engineering the organizational transformation dec 6 2012
Escape velocity engineering the organizational transformation dec 6 2012Escape velocity engineering the organizational transformation dec 6 2012
Escape velocity engineering the organizational transformation dec 6 2012
 
Berea talk march 2012 2
Berea talk march 2012 2Berea talk march 2012 2
Berea talk march 2012 2
 
leadership preentation123455#@sdf.mmpptx
leadership preentation123455#@sdf.mmpptxleadership preentation123455#@sdf.mmpptx
leadership preentation123455#@sdf.mmpptx
 
92112639-Final-Leadership-Presentation (1).pptx
92112639-Final-Leadership-Presentation (1).pptx92112639-Final-Leadership-Presentation (1).pptx
92112639-Final-Leadership-Presentation (1).pptx
 
Knowledge Bite Session - Mark Withers and Anna Withers - Surviving the Squeez...
Knowledge Bite Session - Mark Withers and Anna Withers - Surviving the Squeez...Knowledge Bite Session - Mark Withers and Anna Withers - Surviving the Squeez...
Knowledge Bite Session - Mark Withers and Anna Withers - Surviving the Squeez...
 
Effective models of Innovation Adoption in Higher Education
Effective models of Innovation Adoption in Higher EducationEffective models of Innovation Adoption in Higher Education
Effective models of Innovation Adoption in Higher Education
 
Knowledge Management
Knowledge ManagementKnowledge Management
Knowledge Management
 
Orchestrating Dynamic Capabilities to Win Under Deep uncertainty
Orchestrating Dynamic Capabilities to Win Under Deep uncertaintyOrchestrating Dynamic Capabilities to Win Under Deep uncertainty
Orchestrating Dynamic Capabilities to Win Under Deep uncertainty
 
Knowledge management and learning organization
Knowledge management and learning organizationKnowledge management and learning organization
Knowledge management and learning organization
 
The Secret Sauce for Innovation (shortform)
The Secret Sauce for Innovation (shortform) The Secret Sauce for Innovation (shortform)
The Secret Sauce for Innovation (shortform)
 
Chapter 12Managing Business KnowledgeManaging and Using Info.docx
Chapter 12Managing Business KnowledgeManaging and Using Info.docxChapter 12Managing Business KnowledgeManaging and Using Info.docx
Chapter 12Managing Business KnowledgeManaging and Using Info.docx
 
Guerilla ROI
Guerilla ROIGuerilla ROI
Guerilla ROI
 
Building a Long Term Technology Strategy
Building a Long Term Technology StrategyBuilding a Long Term Technology Strategy
Building a Long Term Technology Strategy
 
The perils of measurement
The perils of measurementThe perils of measurement
The perils of measurement
 
What do schools and classrooms have to offer BPM?
What do schools and classrooms have to offer BPM?What do schools and classrooms have to offer BPM?
What do schools and classrooms have to offer BPM?
 
How To Select Your Dreamteam by Verhaert
How To Select Your Dreamteam by VerhaertHow To Select Your Dreamteam by Verhaert
How To Select Your Dreamteam by Verhaert
 
Dell B2B: APT by Brilliant Noise
Dell B2B: APT by Brilliant NoiseDell B2B: APT by Brilliant Noise
Dell B2B: APT by Brilliant Noise
 
Everything To Everybody? Making Your Denodo Implementation a Huge Success
Everything To Everybody? Making Your Denodo Implementation a Huge SuccessEverything To Everybody? Making Your Denodo Implementation a Huge Success
Everything To Everybody? Making Your Denodo Implementation a Huge Success
 

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Recently uploaded (20)

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 

Developing excellence in information security from corporate enterprise to homeland security

  • 1. From Corporate Enterprise To Homeland Security Ahmed M. Al Enizy IT Security Manager International Systems Engineering
  • 2. Understanding The Problem  Defining “Information Security Excellence”  Key Attribute To Achieving Superiority In Information Security 2 12/26/2012
  • 3. From dashlane 3 12/26/2012
  • 4. Why big companies with huge resources got hacked? ◦ 96% of the attacks not highly difficult ◦ 97% of breaches were avoidable through simple or intermediate controls  Why CISOs with big guns failed to prevent the hack?  Why hackers are always able to hit their targets?  Why hackers are always one step ahead? 4 12/26/2012
  • 5. Excellence ◦ A talent or quality which is unusually good and so surpasses ordinary standards. ◦ Aristotle once said. "We are what we repeatedly do . . . excellence, then, is not an act, but a habit.“ ◦ The equivalent concept in Muslim philosophy is Ihsan 5 12/26/2012
  • 6. Knowledge Knowledge Time Tools Time Tools Money Money Opportunity Opportunity ? Motivation ? ? Cause Passion ? Habit ? ? Pride Freedom 6 12/26/2012
  • 7. Excellence covers the next mile that is giving hackers the tactical advantage. ◦ There is “something” that ignites hackers minds and makes it reach new levels of creativity and dig deeper and deeper to find or create this tactical advantage which at the end is translated to means to hit their targets without any resistance. ◦ Does your security capability has this? 7 12/26/2012
  • 8. Excellence Quality With Standards and Frameworks Without Standards and Frameworks 8 12/26/2012
  • 9. Acquiring and maintaining talented employees ◦ Security talents  Habit  Research  Curiosity  Discipline ◦ Finding and acquiring (Interview and recruitment) ◦ Challenging ◦ Maintaining 9 12/26/2012
  • 10. Center of excellence ◦ Refers to a team, a shared facility or an entity that provides leadership, evangelization, best practices, research, support and/or training for a focus area. (Wikipedia)  Responsibilities ◦ Support ◦ Guidance ◦ Shared Learning ◦ Measurements ◦ Governance (Jon Strickler, agileelements.wordpress.com) 10 12/26/2012
  • 11. Excellence in one field depends on excellence in other fields ◦ Quality ◦ Process ◦ Project Management ◦ Service ◦ Assurance ◦ Business Analysis ◦ Risk and Compliance ◦ Human Resources 11 12/26/2012
  • 12. Excellence needs a lighthouse to guide it.  The key element of excellence is the right people in the right place.  Patch the gap between business motivation for security (which is reducing money lose) and the motivations that ignites security specialists to match hackers 12 12/26/2012
  • 13. 13 12/26/2012