SlideShare a Scribd company logo
1 of 8
Download to read offline
CISOs and their teams operate against a backdrop of continuous change in the threat
landscape, information security technology, and business conditions. The mission to
protect critical assets across space and time is further complicated by a lack of direct
control over the people and processes that expose the organization to risk through day-
to-day operations.
In-depth research with hundreds of information security leaders revealed
a common thread among the top performers:
Technical skills, while essential, are not enough.
To deliver maximum impact, Information Security must
engage with the business and practice proactive
organizational engagement.
The image cannot be displayed. Your computer may not have enough memory to open the image, or the image may have been corrupted. Restart your computer,
and then open the file again. If the red x still appears, you may have to delete the image and then insert it again.
To drive insight and enable action
on these “soft skills,” IANS has
broken proactive organizational
engagement down into a set of
clearly defined, quantifiable
elements we call The 7 Factors
of CISO Impact.
Our CISO Impact framework provides a
structured, action-oriented approach that
allows you to baseline your performance
and measure progress down to the Factor
and sub-Factor levels as you work towards
b e t t e r p ro a c t i v e o rg a n i z a t i o n a l
engagement.
First step: take the Diagnostic.
The Diagnostic is an online self-
assessment that measures the current
state of your team’s organizational
engagement. Your personal report
provides you with insight into your team’s
strengths and weaknesses, and allows
you to compare the results to those of
your peers.
As you work to improve your skill sets in
each of the 7 Factors, your Diagnostic
results will reflect your progress.
The image cannot be displayed. Your computer may not have enough memory to open the image, or the image may have been corrupted. Restart your
computer, and then open the file again. If the red x still appears, you may have to delete the image and then insert it again.
Then, attend
a CISO Impact
Workshop.
The CISO Impact Workshop is a four-hour
deep dive into one of the 7 Factors of
CISO Impact.
IANS-proprietary worksheets will help you
break down your Factor-specific Diagnostic
results into concrete, step-by-step actions
for improvement.
You’ll experience a new way of thinking
about what you do, and walk away with
insights that will influence the way that you
execute your mission.
A CISO Impact Workshop is a collaborative
hands-on working session.
Wrap-Up
Review lessons
learned and
discuss of how
improvement
will drive
success.Introductions
Get to know your
fellow CISOs
Workshop Orientation
The IANS facilitator
describes the workshop
context, components and
flow for the day
Solo Work
Document your
team’s skills and
processes vs. the
workshop Factor.
Presentations &
Feedback
Present your
workbook
writings and
receive feedback
from your peers.
Research Overview
A discussion of the
research and structure of
the CISO Impact
framework
Diagnostic
An explanation of how
the CISO Impact self-
assessment tool works
What are the 7 Factors?
An overview of the individual
7 Factors of CISO Impact,
and a look at how they all
work together to drive
success.
Small Group
Discussion
Share ideas and
challenges with
your small group
How can you embed information security
into key business processes?
Our research shows that 72% CISOs are still in the very
early stages of integrating information security criteria
into the day-to-day processes of their organization.
What steps can you take to weave information security
into the fabric of processes like software development
and vendor selection?
Factor 3:
Embed Information
Security into Key
Business Processes
At a recent Factor 3 Workshop, we posed the question:
Participants discussed the challenges …
… and through that discussion, shared
thoughts on how to address the problem.
The image cannot be displayed. Your computer may not have enough memory to open the image, or the image may have been corrupted. Restart your computer, and then open the file again. If the red x still appears, you may have to delete the image and then insert it again.
“Goals mis-match is the biggest
obstacle. Our developers are measured
on timely delivery and we’re measured
on security defects. Besides, they think
they’ve got security covered.” “Good news: Awareness is
up and we’re invited to
assess more projects. Bad
news: Awareness is up and
we’re invited to assess more
projects.”
“We’re working to get the
risks of cloud under control
but any employee with a
credit card can spin up a
cloud deployment. “
You’ll walk away with strategies for success
in real-world situations. For example,
you’ll learn how to:
•  Communicate the tangible input that security can have in
high-level business decisions like M&As
•  Establish agreements with Finance and Legal that compel
assessment of new vendors before contracts are signed
•  Learn how to win the agreement of key stakeholders - like the
VP of App Dev, for example - to weave information security
criteria and implement verification steps like code testing into
processes like the SDLC.

More Related Content

What's hot

Key Roles in a Lean or Six Sigma Project with Matt Hansen at StatStuff
Key Roles in a Lean or Six Sigma Project with Matt Hansen at StatStuffKey Roles in a Lean or Six Sigma Project with Matt Hansen at StatStuff
Key Roles in a Lean or Six Sigma Project with Matt Hansen at StatStuffMatt Hansen
 
Documenting a New Process with SOPs
Documenting a New Process with SOPsDocumenting a New Process with SOPs
Documenting a New Process with SOPsMatt Hansen
 
Keynote Scrum Gathering Barcelona 2012
Keynote Scrum Gathering Barcelona 2012Keynote Scrum Gathering Barcelona 2012
Keynote Scrum Gathering Barcelona 2012michaelfeathers
 
Get Your Team to Use and Love Project Management Software
Get Your Team to Use and Love Project Management SoftwareGet Your Team to Use and Love Project Management Software
Get Your Team to Use and Love Project Management SoftwareOrangescrum
 
Lean project risk factor management
Lean project risk factor managementLean project risk factor management
Lean project risk factor managementChul-Young Byun
 
Use DevOps to Respond Faster to End Customers
Use DevOps to Respond Faster to End CustomersUse DevOps to Respond Faster to End Customers
Use DevOps to Respond Faster to End CustomersInfo-Tech Research Group
 
Common IT Mistakes
Common IT MistakesCommon IT Mistakes
Common IT MistakesOutsourceIT
 
Closing a Project
Closing a ProjectClosing a Project
Closing a ProjectMatt Hansen
 
How to fail in project management
How to fail in project managementHow to fail in project management
How to fail in project managementPrasetyo Nugroho
 
Safety Changer | QHSE solutions for professionals
Safety Changer | QHSE solutions for professionalsSafety Changer | QHSE solutions for professionals
Safety Changer | QHSE solutions for professionalsSafety Changer
 
PCI 3.0 Webcast: Minimizing the Business Impact of the PCI 2.0 - 3.0 Transition
PCI 3.0 Webcast: Minimizing the Business Impact of the PCI 2.0 - 3.0 TransitionPCI 3.0 Webcast: Minimizing the Business Impact of the PCI 2.0 - 3.0 Transition
PCI 3.0 Webcast: Minimizing the Business Impact of the PCI 2.0 - 3.0 TransitionSally Sheward
 
Project Pre-Assessment Using a Min/Max Analysis with Matt Hansen at StatStuff
Project Pre-Assessment Using a Min/Max Analysis with Matt Hansen at StatStuffProject Pre-Assessment Using a Min/Max Analysis with Matt Hansen at StatStuff
Project Pre-Assessment Using a Min/Max Analysis with Matt Hansen at StatStuffMatt Hansen
 
The DMAIC Roadmap (Levels 1 & 2) with Matt Hansen at StatStuff
The DMAIC Roadmap (Levels 1 & 2) with Matt Hansen at StatStuffThe DMAIC Roadmap (Levels 1 & 2) with Matt Hansen at StatStuff
The DMAIC Roadmap (Levels 1 & 2) with Matt Hansen at StatStuffMatt Hansen
 
Truvantis PCI 3.0 Webcast: Minimizing the Business Impact of the PCI-DSS 3.0 ...
Truvantis PCI 3.0 Webcast: Minimizing the Business Impact of the PCI-DSS 3.0 ...Truvantis PCI 3.0 Webcast: Minimizing the Business Impact of the PCI-DSS 3.0 ...
Truvantis PCI 3.0 Webcast: Minimizing the Business Impact of the PCI-DSS 3.0 ...truvantis
 
How to Make Better Decisions Managing Disasters: Delphi Decision Maker - Real...
How to Make Better Decisions Managing Disasters: Delphi Decision Maker - Real...How to Make Better Decisions Managing Disasters: Delphi Decision Maker - Real...
How to Make Better Decisions Managing Disasters: Delphi Decision Maker - Real...Connie White
 
Software Development Process Improvement
Software Development Process ImprovementSoftware Development Process Improvement
Software Development Process ImprovementCornelius Mellino
 
Reducing Time Spent On Requirements
Reducing Time Spent On RequirementsReducing Time Spent On Requirements
Reducing Time Spent On RequirementsByron Workman
 
Risk Assessment with a FMEA Tool
Risk Assessment with a FMEA ToolRisk Assessment with a FMEA Tool
Risk Assessment with a FMEA ToolMatt Hansen
 
It project management infamous failures, classic mistakes, and best practices
It project management infamous failures, classic mistakes, and best practicesIt project management infamous failures, classic mistakes, and best practices
It project management infamous failures, classic mistakes, and best practicesMahyar Teymournezhad
 

What's hot (20)

Key Roles in a Lean or Six Sigma Project with Matt Hansen at StatStuff
Key Roles in a Lean or Six Sigma Project with Matt Hansen at StatStuffKey Roles in a Lean or Six Sigma Project with Matt Hansen at StatStuff
Key Roles in a Lean or Six Sigma Project with Matt Hansen at StatStuff
 
Documenting a New Process with SOPs
Documenting a New Process with SOPsDocumenting a New Process with SOPs
Documenting a New Process with SOPs
 
Keynote Scrum Gathering Barcelona 2012
Keynote Scrum Gathering Barcelona 2012Keynote Scrum Gathering Barcelona 2012
Keynote Scrum Gathering Barcelona 2012
 
Get Your Team to Use and Love Project Management Software
Get Your Team to Use and Love Project Management SoftwareGet Your Team to Use and Love Project Management Software
Get Your Team to Use and Love Project Management Software
 
Lean project risk factor management
Lean project risk factor managementLean project risk factor management
Lean project risk factor management
 
Use DevOps to Respond Faster to End Customers
Use DevOps to Respond Faster to End CustomersUse DevOps to Respond Faster to End Customers
Use DevOps to Respond Faster to End Customers
 
Common IT Mistakes
Common IT MistakesCommon IT Mistakes
Common IT Mistakes
 
Closing a Project
Closing a ProjectClosing a Project
Closing a Project
 
Pace IT Troubleshooting Theory
Pace IT Troubleshooting TheoryPace IT Troubleshooting Theory
Pace IT Troubleshooting Theory
 
How to fail in project management
How to fail in project managementHow to fail in project management
How to fail in project management
 
Safety Changer | QHSE solutions for professionals
Safety Changer | QHSE solutions for professionalsSafety Changer | QHSE solutions for professionals
Safety Changer | QHSE solutions for professionals
 
PCI 3.0 Webcast: Minimizing the Business Impact of the PCI 2.0 - 3.0 Transition
PCI 3.0 Webcast: Minimizing the Business Impact of the PCI 2.0 - 3.0 TransitionPCI 3.0 Webcast: Minimizing the Business Impact of the PCI 2.0 - 3.0 Transition
PCI 3.0 Webcast: Minimizing the Business Impact of the PCI 2.0 - 3.0 Transition
 
Project Pre-Assessment Using a Min/Max Analysis with Matt Hansen at StatStuff
Project Pre-Assessment Using a Min/Max Analysis with Matt Hansen at StatStuffProject Pre-Assessment Using a Min/Max Analysis with Matt Hansen at StatStuff
Project Pre-Assessment Using a Min/Max Analysis with Matt Hansen at StatStuff
 
The DMAIC Roadmap (Levels 1 & 2) with Matt Hansen at StatStuff
The DMAIC Roadmap (Levels 1 & 2) with Matt Hansen at StatStuffThe DMAIC Roadmap (Levels 1 & 2) with Matt Hansen at StatStuff
The DMAIC Roadmap (Levels 1 & 2) with Matt Hansen at StatStuff
 
Truvantis PCI 3.0 Webcast: Minimizing the Business Impact of the PCI-DSS 3.0 ...
Truvantis PCI 3.0 Webcast: Minimizing the Business Impact of the PCI-DSS 3.0 ...Truvantis PCI 3.0 Webcast: Minimizing the Business Impact of the PCI-DSS 3.0 ...
Truvantis PCI 3.0 Webcast: Minimizing the Business Impact of the PCI-DSS 3.0 ...
 
How to Make Better Decisions Managing Disasters: Delphi Decision Maker - Real...
How to Make Better Decisions Managing Disasters: Delphi Decision Maker - Real...How to Make Better Decisions Managing Disasters: Delphi Decision Maker - Real...
How to Make Better Decisions Managing Disasters: Delphi Decision Maker - Real...
 
Software Development Process Improvement
Software Development Process ImprovementSoftware Development Process Improvement
Software Development Process Improvement
 
Reducing Time Spent On Requirements
Reducing Time Spent On RequirementsReducing Time Spent On Requirements
Reducing Time Spent On Requirements
 
Risk Assessment with a FMEA Tool
Risk Assessment with a FMEA ToolRisk Assessment with a FMEA Tool
Risk Assessment with a FMEA Tool
 
It project management infamous failures, classic mistakes, and best practices
It project management infamous failures, classic mistakes, and best practicesIt project management infamous failures, classic mistakes, and best practices
It project management infamous failures, classic mistakes, and best practices
 

Viewers also liked (7)

Sec1 chp 1what it takes
Sec1 chp 1what it takes Sec1 chp 1what it takes
Sec1 chp 1what it takes
 
Teresa Doner Clerical
Teresa Doner ClericalTeresa Doner Clerical
Teresa Doner Clerical
 
Kineticom hot jobs 11.30
Kineticom hot jobs 11.30Kineticom hot jobs 11.30
Kineticom hot jobs 11.30
 
Sec5 leadership and vision
Sec5 leadership and visionSec5 leadership and vision
Sec5 leadership and vision
 
Matar per a “sanejar”.
Matar per a “sanejar”.  Matar per a “sanejar”.
Matar per a “sanejar”.
 
7 M-CARE: Fizyolojik ihtiyaçlar
7 M-CARE: Fizyolojik ihtiyaçlar7 M-CARE: Fizyolojik ihtiyaçlar
7 M-CARE: Fizyolojik ihtiyaçlar
 
Programación PASA
Programación PASAProgramación PASA
Programación PASA
 

Similar to What is an IANS CISO Workshop? Factor 3

What is an IANS CISO Workshop? Factor 2
What is an IANS CISO Workshop? Factor 2What is an IANS CISO Workshop? Factor 2
What is an IANS CISO Workshop? Factor 2IANS
 
What is an IANS CISO Workshop? Factor 6
What is an IANS CISO Workshop? Factor 6What is an IANS CISO Workshop? Factor 6
What is an IANS CISO Workshop? Factor 6IANS
 
What is an IANS CISO Workshop? Factor 1
What is an IANS CISO Workshop? Factor 1What is an IANS CISO Workshop? Factor 1
What is an IANS CISO Workshop? Factor 1IANS
 
What is an IANS CISO Impact Roundtable?
What is an IANS CISO Impact Roundtable?What is an IANS CISO Impact Roundtable?
What is an IANS CISO Impact Roundtable?IANS
 
Balbix-New-CISO-Board-Deck.pptx
Balbix-New-CISO-Board-Deck.pptxBalbix-New-CISO-Board-Deck.pptx
Balbix-New-CISO-Board-Deck.pptxjjvdneut
 
Balbix-New-CISO-Board-Deck.pptx
Balbix-New-CISO-Board-Deck.pptxBalbix-New-CISO-Board-Deck.pptx
Balbix-New-CISO-Board-Deck.pptxjjvdneut
 
Information Security - Back to Basics - Own Your Vulnerabilities
Information Security - Back to Basics - Own Your VulnerabilitiesInformation Security - Back to Basics - Own Your Vulnerabilities
Information Security - Back to Basics - Own Your VulnerabilitiesJack Nichelson
 
Complete network security protection for sme's within limited resources
Complete network security protection for sme's within limited resourcesComplete network security protection for sme's within limited resources
Complete network security protection for sme's within limited resourcesIJNSA Journal
 
Enterprise Architecture in the Boardroom with Dragon1
Enterprise Architecture in the Boardroom with Dragon1Enterprise Architecture in the Boardroom with Dragon1
Enterprise Architecture in the Boardroom with Dragon1Dragon1 Inc.
 
COMPLETE NETWORK SECURITY PROTECTION FOR SME’SWITHIN LIMITED RESOURCES
COMPLETE NETWORK SECURITY PROTECTION FOR SME’SWITHIN LIMITED RESOURCESCOMPLETE NETWORK SECURITY PROTECTION FOR SME’SWITHIN LIMITED RESOURCES
COMPLETE NETWORK SECURITY PROTECTION FOR SME’SWITHIN LIMITED RESOURCESIJNSA Journal
 
Software management
Software managementSoftware management
Software managementsmumbahelp
 
Organization And Technical Aspects Of The Workflow
Organization And Technical Aspects Of The WorkflowOrganization And Technical Aspects Of The Workflow
Organization And Technical Aspects Of The WorkflowMichelle Singh
 
DIRECTIONSRate each statement by how well the behavior describe.docx
DIRECTIONSRate each statement by how well the behavior describe.docxDIRECTIONSRate each statement by how well the behavior describe.docx
DIRECTIONSRate each statement by how well the behavior describe.docxcuddietheresa
 
hroughout the fifty-odd years of software development, the ind.docx
hroughout the fifty-odd years of software development, the ind.docxhroughout the fifty-odd years of software development, the ind.docx
hroughout the fifty-odd years of software development, the ind.docxpooleavelina
 
INTERNAL Assign no 207( JAIPUR NATIONAL UNI)
INTERNAL Assign no   207( JAIPUR NATIONAL UNI)INTERNAL Assign no   207( JAIPUR NATIONAL UNI)
INTERNAL Assign no 207( JAIPUR NATIONAL UNI)Partha_bappa
 
Managing Riskin InformationSystemsPowered by vLab Solu.docx
Managing Riskin InformationSystemsPowered by vLab Solu.docxManaging Riskin InformationSystemsPowered by vLab Solu.docx
Managing Riskin InformationSystemsPowered by vLab Solu.docxjessiehampson
 
44 Introduction Identifying and assessing risks is.docx
44 Introduction Identifying and assessing risks is.docx44 Introduction Identifying and assessing risks is.docx
44 Introduction Identifying and assessing risks is.docxblondellchancy
 

Similar to What is an IANS CISO Workshop? Factor 3 (20)

What is an IANS CISO Workshop? Factor 2
What is an IANS CISO Workshop? Factor 2What is an IANS CISO Workshop? Factor 2
What is an IANS CISO Workshop? Factor 2
 
What is an IANS CISO Workshop? Factor 6
What is an IANS CISO Workshop? Factor 6What is an IANS CISO Workshop? Factor 6
What is an IANS CISO Workshop? Factor 6
 
What is an IANS CISO Workshop? Factor 1
What is an IANS CISO Workshop? Factor 1What is an IANS CISO Workshop? Factor 1
What is an IANS CISO Workshop? Factor 1
 
What is an IANS CISO Impact Roundtable?
What is an IANS CISO Impact Roundtable?What is an IANS CISO Impact Roundtable?
What is an IANS CISO Impact Roundtable?
 
Balbix-New-CISO-Board-Deck.pptx
Balbix-New-CISO-Board-Deck.pptxBalbix-New-CISO-Board-Deck.pptx
Balbix-New-CISO-Board-Deck.pptx
 
Balbix-New-CISO-Board-Deck.pptx
Balbix-New-CISO-Board-Deck.pptxBalbix-New-CISO-Board-Deck.pptx
Balbix-New-CISO-Board-Deck.pptx
 
Information Security - Back to Basics - Own Your Vulnerabilities
Information Security - Back to Basics - Own Your VulnerabilitiesInformation Security - Back to Basics - Own Your Vulnerabilities
Information Security - Back to Basics - Own Your Vulnerabilities
 
Complete network security protection for sme's within limited resources
Complete network security protection for sme's within limited resourcesComplete network security protection for sme's within limited resources
Complete network security protection for sme's within limited resources
 
Enterprise Architecture in the Boardroom with Dragon1
Enterprise Architecture in the Boardroom with Dragon1Enterprise Architecture in the Boardroom with Dragon1
Enterprise Architecture in the Boardroom with Dragon1
 
1 (1)
1 (1)1 (1)
1 (1)
 
COMPLETE NETWORK SECURITY PROTECTION FOR SME’SWITHIN LIMITED RESOURCES
COMPLETE NETWORK SECURITY PROTECTION FOR SME’SWITHIN LIMITED RESOURCESCOMPLETE NETWORK SECURITY PROTECTION FOR SME’SWITHIN LIMITED RESOURCES
COMPLETE NETWORK SECURITY PROTECTION FOR SME’SWITHIN LIMITED RESOURCES
 
Software management
Software managementSoftware management
Software management
 
Organization And Technical Aspects Of The Workflow
Organization And Technical Aspects Of The WorkflowOrganization And Technical Aspects Of The Workflow
Organization And Technical Aspects Of The Workflow
 
DIRECTIONSRate each statement by how well the behavior describe.docx
DIRECTIONSRate each statement by how well the behavior describe.docxDIRECTIONSRate each statement by how well the behavior describe.docx
DIRECTIONSRate each statement by how well the behavior describe.docx
 
So you want to be a CISO - 5 steps to Success
So you want to be a CISO - 5 steps to SuccessSo you want to be a CISO - 5 steps to Success
So you want to be a CISO - 5 steps to Success
 
hroughout the fifty-odd years of software development, the ind.docx
hroughout the fifty-odd years of software development, the ind.docxhroughout the fifty-odd years of software development, the ind.docx
hroughout the fifty-odd years of software development, the ind.docx
 
INTERNAL Assign no 207( JAIPUR NATIONAL UNI)
INTERNAL Assign no   207( JAIPUR NATIONAL UNI)INTERNAL Assign no   207( JAIPUR NATIONAL UNI)
INTERNAL Assign no 207( JAIPUR NATIONAL UNI)
 
Managing Riskin InformationSystemsPowered by vLab Solu.docx
Managing Riskin InformationSystemsPowered by vLab Solu.docxManaging Riskin InformationSystemsPowered by vLab Solu.docx
Managing Riskin InformationSystemsPowered by vLab Solu.docx
 
44 Introduction Identifying and assessing risks is.docx
44 Introduction Identifying and assessing risks is.docx44 Introduction Identifying and assessing risks is.docx
44 Introduction Identifying and assessing risks is.docx
 
How To Plan a Software Project
How To Plan a Software ProjectHow To Plan a Software Project
How To Plan a Software Project
 

More from IANS

Application Security - Making It Work
Application Security - Making It WorkApplication Security - Making It Work
Application Security - Making It WorkIANS
 
The 7 Factors of CISO Impact at RSA 2015
The 7 Factors of CISO Impact at RSA 2015The 7 Factors of CISO Impact at RSA 2015
The 7 Factors of CISO Impact at RSA 2015IANS
 
The 7 Factors of CISO Impact
The 7 Factors of CISO ImpactThe 7 Factors of CISO Impact
The 7 Factors of CISO ImpactIANS
 
What is an IANS Connector Event? - Factor 6
What is an IANS Connector Event? - Factor 6What is an IANS Connector Event? - Factor 6
What is an IANS Connector Event? - Factor 6IANS
 
What is an IANS Connector Event? - Factor 5
What is an IANS Connector Event? - Factor 5What is an IANS Connector Event? - Factor 5
What is an IANS Connector Event? - Factor 5IANS
 
What is an IANS Connector Event? - Factor 3
What is an IANS Connector Event? - Factor 3What is an IANS Connector Event? - Factor 3
What is an IANS Connector Event? - Factor 3IANS
 
What is an IANS Connector Event? - Factor 1
What is an IANS Connector Event? - Factor 1What is an IANS Connector Event? - Factor 1
What is an IANS Connector Event? - Factor 1IANS
 

More from IANS (7)

Application Security - Making It Work
Application Security - Making It WorkApplication Security - Making It Work
Application Security - Making It Work
 
The 7 Factors of CISO Impact at RSA 2015
The 7 Factors of CISO Impact at RSA 2015The 7 Factors of CISO Impact at RSA 2015
The 7 Factors of CISO Impact at RSA 2015
 
The 7 Factors of CISO Impact
The 7 Factors of CISO ImpactThe 7 Factors of CISO Impact
The 7 Factors of CISO Impact
 
What is an IANS Connector Event? - Factor 6
What is an IANS Connector Event? - Factor 6What is an IANS Connector Event? - Factor 6
What is an IANS Connector Event? - Factor 6
 
What is an IANS Connector Event? - Factor 5
What is an IANS Connector Event? - Factor 5What is an IANS Connector Event? - Factor 5
What is an IANS Connector Event? - Factor 5
 
What is an IANS Connector Event? - Factor 3
What is an IANS Connector Event? - Factor 3What is an IANS Connector Event? - Factor 3
What is an IANS Connector Event? - Factor 3
 
What is an IANS Connector Event? - Factor 1
What is an IANS Connector Event? - Factor 1What is an IANS Connector Event? - Factor 1
What is an IANS Connector Event? - Factor 1
 

Recently uploaded

LPC Operations Review PowerPoint | Operations Review
LPC Operations Review PowerPoint | Operations ReviewLPC Operations Review PowerPoint | Operations Review
LPC Operations Review PowerPoint | Operations Reviewthomas851723
 
LPC Facility Design And Re-engineering Presentation
LPC Facility Design And Re-engineering PresentationLPC Facility Design And Re-engineering Presentation
LPC Facility Design And Re-engineering Presentationthomas851723
 
GENUINE Babe,Call Girls IN Badarpur Delhi | +91-8377087607
GENUINE Babe,Call Girls IN Badarpur  Delhi | +91-8377087607GENUINE Babe,Call Girls IN Badarpur  Delhi | +91-8377087607
GENUINE Babe,Call Girls IN Badarpur Delhi | +91-8377087607dollysharma2066
 
Fifteenth Finance Commission Presentation
Fifteenth Finance Commission PresentationFifteenth Finance Commission Presentation
Fifteenth Finance Commission Presentationmintusiprd
 
LPC Warehouse Management System For Clients In The Business Sector
LPC Warehouse Management System For Clients In The Business SectorLPC Warehouse Management System For Clients In The Business Sector
LPC Warehouse Management System For Clients In The Business Sectorthomas851723
 
CEO of Google, Sunder Pichai's biography
CEO of Google, Sunder Pichai's biographyCEO of Google, Sunder Pichai's biography
CEO of Google, Sunder Pichai's biographyHafizMuhammadAbdulla5
 
Risk management in surgery (bailey and love).pptx
Risk management in surgery (bailey and love).pptxRisk management in surgery (bailey and love).pptx
Risk management in surgery (bailey and love).pptxSaujanya Jung Pandey
 
VIP Kolkata Call Girl Rajarhat 👉 8250192130 Available With Room
VIP Kolkata Call Girl Rajarhat 👉 8250192130  Available With RoomVIP Kolkata Call Girl Rajarhat 👉 8250192130  Available With Room
VIP Kolkata Call Girl Rajarhat 👉 8250192130 Available With Roomdivyansh0kumar0
 
Day 0- Bootcamp Roadmap for PLC Bootcamp
Day 0- Bootcamp Roadmap for PLC BootcampDay 0- Bootcamp Roadmap for PLC Bootcamp
Day 0- Bootcamp Roadmap for PLC BootcampPLCLeadershipDevelop
 
LPC User Requirements for Automated Storage System Presentation
LPC User Requirements for Automated Storage System PresentationLPC User Requirements for Automated Storage System Presentation
LPC User Requirements for Automated Storage System Presentationthomas851723
 
{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, Mumbai
{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, Mumbai{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, Mumbai
{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, MumbaiPooja Nehwal
 
Introduction to LPC - Facility Design And Re-Engineering
Introduction to LPC - Facility Design And Re-EngineeringIntroduction to LPC - Facility Design And Re-Engineering
Introduction to LPC - Facility Design And Re-Engineeringthomas851723
 
Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...
Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...
Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...Pooja Nehwal
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Ameerpet high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls Ameerpet high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls Ameerpet high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls Ameerpet high-profile Call Girladitipandeya
 
CALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual serviceanilsa9823
 
Call now : 9892124323 Nalasopara Beautiful Call Girls Vasai virar Best Call G...
Call now : 9892124323 Nalasopara Beautiful Call Girls Vasai virar Best Call G...Call now : 9892124323 Nalasopara Beautiful Call Girls Vasai virar Best Call G...
Call now : 9892124323 Nalasopara Beautiful Call Girls Vasai virar Best Call G...Pooja Nehwal
 

Recently uploaded (20)

LPC Operations Review PowerPoint | Operations Review
LPC Operations Review PowerPoint | Operations ReviewLPC Operations Review PowerPoint | Operations Review
LPC Operations Review PowerPoint | Operations Review
 
LPC Facility Design And Re-engineering Presentation
LPC Facility Design And Re-engineering PresentationLPC Facility Design And Re-engineering Presentation
LPC Facility Design And Re-engineering Presentation
 
GENUINE Babe,Call Girls IN Badarpur Delhi | +91-8377087607
GENUINE Babe,Call Girls IN Badarpur  Delhi | +91-8377087607GENUINE Babe,Call Girls IN Badarpur  Delhi | +91-8377087607
GENUINE Babe,Call Girls IN Badarpur Delhi | +91-8377087607
 
Fifteenth Finance Commission Presentation
Fifteenth Finance Commission PresentationFifteenth Finance Commission Presentation
Fifteenth Finance Commission Presentation
 
LPC Warehouse Management System For Clients In The Business Sector
LPC Warehouse Management System For Clients In The Business SectorLPC Warehouse Management System For Clients In The Business Sector
LPC Warehouse Management System For Clients In The Business Sector
 
CEO of Google, Sunder Pichai's biography
CEO of Google, Sunder Pichai's biographyCEO of Google, Sunder Pichai's biography
CEO of Google, Sunder Pichai's biography
 
Risk management in surgery (bailey and love).pptx
Risk management in surgery (bailey and love).pptxRisk management in surgery (bailey and love).pptx
Risk management in surgery (bailey and love).pptx
 
VIP Kolkata Call Girl Rajarhat 👉 8250192130 Available With Room
VIP Kolkata Call Girl Rajarhat 👉 8250192130  Available With RoomVIP Kolkata Call Girl Rajarhat 👉 8250192130  Available With Room
VIP Kolkata Call Girl Rajarhat 👉 8250192130 Available With Room
 
Call Girls Service Tilak Nagar @9999965857 Delhi 🫦 No Advance VVIP 🍎 SERVICE
Call Girls Service Tilak Nagar @9999965857 Delhi 🫦 No Advance  VVIP 🍎 SERVICECall Girls Service Tilak Nagar @9999965857 Delhi 🫦 No Advance  VVIP 🍎 SERVICE
Call Girls Service Tilak Nagar @9999965857 Delhi 🫦 No Advance VVIP 🍎 SERVICE
 
Day 0- Bootcamp Roadmap for PLC Bootcamp
Day 0- Bootcamp Roadmap for PLC BootcampDay 0- Bootcamp Roadmap for PLC Bootcamp
Day 0- Bootcamp Roadmap for PLC Bootcamp
 
LPC User Requirements for Automated Storage System Presentation
LPC User Requirements for Automated Storage System PresentationLPC User Requirements for Automated Storage System Presentation
LPC User Requirements for Automated Storage System Presentation
 
{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, Mumbai
{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, Mumbai{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, Mumbai
{ 9892124323 }} Call Girls & Escorts in Hotel JW Marriott juhu, Mumbai
 
sauth delhi call girls in Defence Colony🔝 9953056974 🔝 escort Service
sauth delhi call girls in Defence Colony🔝 9953056974 🔝 escort Servicesauth delhi call girls in Defence Colony🔝 9953056974 🔝 escort Service
sauth delhi call girls in Defence Colony🔝 9953056974 🔝 escort Service
 
Introduction to LPC - Facility Design And Re-Engineering
Introduction to LPC - Facility Design And Re-EngineeringIntroduction to LPC - Facility Design And Re-Engineering
Introduction to LPC - Facility Design And Re-Engineering
 
Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...
Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...
Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Ameerpet high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls Ameerpet high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls Ameerpet high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls Ameerpet high-profile Call Girl
 
Becoming an Inclusive Leader - Bernadette Thompson
Becoming an Inclusive Leader - Bernadette ThompsonBecoming an Inclusive Leader - Bernadette Thompson
Becoming an Inclusive Leader - Bernadette Thompson
 
CALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual service
 
Call now : 9892124323 Nalasopara Beautiful Call Girls Vasai virar Best Call G...
Call now : 9892124323 Nalasopara Beautiful Call Girls Vasai virar Best Call G...Call now : 9892124323 Nalasopara Beautiful Call Girls Vasai virar Best Call G...
Call now : 9892124323 Nalasopara Beautiful Call Girls Vasai virar Best Call G...
 
Rohini Sector 16 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 16 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 16 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 16 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 

What is an IANS CISO Workshop? Factor 3

  • 1. CISOs and their teams operate against a backdrop of continuous change in the threat landscape, information security technology, and business conditions. The mission to protect critical assets across space and time is further complicated by a lack of direct control over the people and processes that expose the organization to risk through day- to-day operations. In-depth research with hundreds of information security leaders revealed a common thread among the top performers: Technical skills, while essential, are not enough. To deliver maximum impact, Information Security must engage with the business and practice proactive organizational engagement.
  • 2. The image cannot be displayed. Your computer may not have enough memory to open the image, or the image may have been corrupted. Restart your computer, and then open the file again. If the red x still appears, you may have to delete the image and then insert it again. To drive insight and enable action on these “soft skills,” IANS has broken proactive organizational engagement down into a set of clearly defined, quantifiable elements we call The 7 Factors of CISO Impact. Our CISO Impact framework provides a structured, action-oriented approach that allows you to baseline your performance and measure progress down to the Factor and sub-Factor levels as you work towards b e t t e r p ro a c t i v e o rg a n i z a t i o n a l engagement.
  • 3. First step: take the Diagnostic. The Diagnostic is an online self- assessment that measures the current state of your team’s organizational engagement. Your personal report provides you with insight into your team’s strengths and weaknesses, and allows you to compare the results to those of your peers. As you work to improve your skill sets in each of the 7 Factors, your Diagnostic results will reflect your progress. The image cannot be displayed. Your computer may not have enough memory to open the image, or the image may have been corrupted. Restart your computer, and then open the file again. If the red x still appears, you may have to delete the image and then insert it again.
  • 4. Then, attend a CISO Impact Workshop. The CISO Impact Workshop is a four-hour deep dive into one of the 7 Factors of CISO Impact. IANS-proprietary worksheets will help you break down your Factor-specific Diagnostic results into concrete, step-by-step actions for improvement. You’ll experience a new way of thinking about what you do, and walk away with insights that will influence the way that you execute your mission.
  • 5. A CISO Impact Workshop is a collaborative hands-on working session. Wrap-Up Review lessons learned and discuss of how improvement will drive success.Introductions Get to know your fellow CISOs Workshop Orientation The IANS facilitator describes the workshop context, components and flow for the day Solo Work Document your team’s skills and processes vs. the workshop Factor. Presentations & Feedback Present your workbook writings and receive feedback from your peers. Research Overview A discussion of the research and structure of the CISO Impact framework Diagnostic An explanation of how the CISO Impact self- assessment tool works What are the 7 Factors? An overview of the individual 7 Factors of CISO Impact, and a look at how they all work together to drive success. Small Group Discussion Share ideas and challenges with your small group
  • 6. How can you embed information security into key business processes? Our research shows that 72% CISOs are still in the very early stages of integrating information security criteria into the day-to-day processes of their organization. What steps can you take to weave information security into the fabric of processes like software development and vendor selection? Factor 3: Embed Information Security into Key Business Processes At a recent Factor 3 Workshop, we posed the question:
  • 7. Participants discussed the challenges … … and through that discussion, shared thoughts on how to address the problem. The image cannot be displayed. Your computer may not have enough memory to open the image, or the image may have been corrupted. Restart your computer, and then open the file again. If the red x still appears, you may have to delete the image and then insert it again. “Goals mis-match is the biggest obstacle. Our developers are measured on timely delivery and we’re measured on security defects. Besides, they think they’ve got security covered.” “Good news: Awareness is up and we’re invited to assess more projects. Bad news: Awareness is up and we’re invited to assess more projects.” “We’re working to get the risks of cloud under control but any employee with a credit card can spin up a cloud deployment. “
  • 8. You’ll walk away with strategies for success in real-world situations. For example, you’ll learn how to: •  Communicate the tangible input that security can have in high-level business decisions like M&As •  Establish agreements with Finance and Legal that compel assessment of new vendors before contracts are signed •  Learn how to win the agreement of key stakeholders - like the VP of App Dev, for example - to weave information security criteria and implement verification steps like code testing into processes like the SDLC.