4. " Most of the major breach reports are
documenting the human component
,compounds most breaches .!"
"over 95 percent of all incidents
investigated recognize “human error”
as a contributing factor"
IBM Cyber Security Index Report .
"Inadvertent
human error
18. Cheese!
Consumer sites are they behaving
:Compliance
Peer review is it easy to use: Operations
Objective to Technology Match:
Credit card/Escalation process
19. Compliance
Total Cost of Ownership
Threat to Technology Match
Incident Response Strategy
Security
20. The Standard
Change Process
Service Introduction
Problem management
Escalation Processe
22. Each Event is 0.25 80% achievable =0.2 The Maths
Dependent Events
0.2+0.2+.2+.2=0.8
Previously 0.32
A Dramatic improvement by
using a Leveraged Strategy
23. • If you would like my worksheet matching
the strategy to cyber essentials and sans
top 20 please email me at cio@vciso.co
• Linkedin with me at
uk.linkedin/1davidclarke
• Twitter @1davidclarke