SlideShare a Scribd company logo
Holmes and Associates, Inc.
Pushing Cybersecurity “Farther to the Left”
Nov 28, 2023
Kirk Holmes, President
Holmes and Associates, Inc.
kirk@holmesinc.net (301) 346-9115
http://www.holmesinc.net
2
8(a) small business
Team Capabilities
About Holmes and Associates, Inc. and Team
Example Customers
• Transformation experience and connections
• CIO Advisory
• vCISO and vCIO
• Significant organizational transformation experience
We Provide Thought leadership
• STPA-Sec – a key Cybersecurity methodology
• IT Service Management
• Service provider excellence (Baldrige)
ConOps Requirements Design O&M
Construction
ConOps
Requirements
Design
Construction
Cost
To
Correct
Defect
Phase that Defect is Corrected
Cost To Correct
Cost To Correct
Cost To Correct
CostTo Correct
P
h
a
s
e
t
h
a
t
D
e
f
e
c
t
i
s
C
r
e
a
t
e
d
100x+ cost
Security
Concept
Functional
Security
Req’s
Bake-In Bolt-On Patching
1x cost
1x
1x
1x
CISA “Secure-By-
Design” à Fix
defects Early!
How do you do it
more
Systematically,
Consistently, and
Holistically?
ANSWER:
System Theoretic
Process Analysis
for
Security (STPA-Sec)
Goal: Move Cybersecurity To the Left of the Lifecycle
Secure-By-
Design
TARGET
4
What is STPA-Sec? A Leading Edge Approach
System-Theoretic Process Analysis (STPA)
• Complementary to classic methodologies
• Earlier life cycle requirements
• Business alignment & business-driven decisions
• Top-Down decomposition approach
• Consistent models
• Codification
• “Emergent properties”
• Non-technical considerations
Business/
Mission
Threat
Vulnerability
CISA: Secure-by-Design
Responsive
to
Complex Systems have emergent
properties
5
§ STPA-Sec is grounded in real life
operations as it was created by
Holmes colleague Dr. William
Young as a seasoned Air Force
officer who was obtaining a PhD
in Cybersecurity from MIT
§ Real Life example: STPA-Sec was
used for one of the Air Force’s
highest-profile ICBM programs
Does STPA-Sec Methodology Work?
6
Quotes from: “Cybersecurity for DoD Acquisition
Program Execution: Best Practices for the
Major Capability Acquisition Pathway”, Nov 2021
§ “Like all engineering processes, STPA-Sec relies on skilled,
well-trained professionals to perform the analysis.”
§ “The GBSD program made use of STPA-Sec to drive security engineering activities as early
as the material solutions analysis phase of systems development.”
§ “Using STPA-Sec allowed GBSD to design systems that minimize security vulnerabilities
while meeting program requirements and schedule.”
§ “The use of STPA-Sec by the GBSD program was indicated by the Office of the
Director, Operational Test and Evaluation (DOT&E) as a contributing factor in
reducing cybersecurity and schedule risks.”
DoD Confirmed that STPA-Sec is a Best Practice
7
§ Modernization: Complexity
§ Modeling and analyzing cybersecurity before engineering and
acquisitions
§ Vulnerability Management: Scale, transparency, consistency
§ Addressing Known Exploitable Vulnerabilities
§ Insider Threat: Scale, transparency, consistency
§ Management of audit trail logs
§ Employee attrition: Knowledge management and codification
§ Application to Artificial Intelligence governance:
Connection of mission, threat, technology, and vulnerability
Example Common Challenge Areas
8
Holmes and Associates can bring unique and unparalleled thought leadership to
transform cybersecurity throughout an entire organization
The Holmes Team Proposition
1.Lower cybersecurity risk
2.Higher consistency
3.Horizontal and vertical alignment
4.Lower cost
5.Higher speed of execution
6.Enhanced mission protection
Holmes Can Provide:
Workshops
Policy and Process development
Model Building
Skill building
Repository management
Tool building
SECURE BY DESIGN

More Related Content

Similar to Advanced Methodologies - System Theoretic Process Analysis for CyberSecurity.pdf

reStart March 25th Nationwide Cleared Virtual Career Fair Employer Directory
reStart March 25th Nationwide Cleared Virtual Career Fair Employer DirectoryreStart March 25th Nationwide Cleared Virtual Career Fair Employer Directory
reStart March 25th Nationwide Cleared Virtual Career Fair Employer Directory
Ken Fuller
 
Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Aicpa tech+panel presentation t6 managing risks and security 2014 v3Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Doeren Mayhew
 
Daniel Csencsits FINAL 1-27-16 (no address)
Daniel Csencsits FINAL 1-27-16 (no address)Daniel Csencsits FINAL 1-27-16 (no address)
Daniel Csencsits FINAL 1-27-16 (no address)
Daniel Csencsits
 
Road to rockstar system analyst
Road to rockstar system analystRoad to rockstar system analyst
Road to rockstar system analyst
Mizno Kruge
 
Designing for Privacy in Amazon Web Services
Designing for Privacy in Amazon Web ServicesDesigning for Privacy in Amazon Web Services
Designing for Privacy in Amazon Web Services
KrzysztofKkol1
 
Siva visual Resume.docx
Siva visual Resume.docxSiva visual Resume.docx
Siva visual Resume.docx
Sivakumar veerachamy
 
Siva visual resume.docx
Siva visual resume.docxSiva visual resume.docx
Siva visual resume.docx
Sivakumar veerachamy
 
RHMR_Consultant_Profile_RRHarris07232016
RHMR_Consultant_Profile_RRHarris07232016RHMR_Consultant_Profile_RRHarris07232016
RHMR_Consultant_Profile_RRHarris07232016
Ronald (RON) Ray Harris
 
Gregory yee _resume
Gregory yee _resumeGregory yee _resume
Gregory yee _resume
Greg Yee
 
Code Review | 2010
Code Review | 2010Code Review | 2010
Code Review | 2010
Klocwork
 
Proschek, Thomas Resume r2
Proschek, Thomas Resume r2Proschek, Thomas Resume r2
Proschek, Thomas Resume r2
Tom Proschek
 
IT Architecture and Architects
IT Architecture and ArchitectsIT Architecture and Architects
IT Architecture and Architects
AndreDovgal1
 
Smart CTO Service
Smart CTO ServiceSmart CTO Service
Smart CTO Service
Atlogys Technical Consulting
 
Burge, Stephen Agile Ba Revised
Burge, Stephen Agile Ba RevisedBurge, Stephen Agile Ba Revised
Burge, Stephen Agile Ba Revised
Stephen Burge
 
Introduction to the CSA Cloud Controls Matrix
Introduction to the CSA Cloud Controls MatrixIntroduction to the CSA Cloud Controls Matrix
Introduction to the CSA Cloud Controls Matrix
John Yeoh
 
Security architecture best practices for saas applications
Security architecture best practices for saas applicationsSecurity architecture best practices for saas applications
Security architecture best practices for saas applications
kanimozhin
 
Quality & Risk Management Challenges When Acquiring Enterprise Systems
Quality & Risk Management Challenges When Acquiring Enterprise SystemsQuality & Risk Management Challenges When Acquiring Enterprise Systems
Quality & Risk Management Challenges When Acquiring Enterprise Systems
Pacific Northwest Software Quality Conference
 
Democratizing security
Democratizing securityDemocratizing security
Democratizing security
Sanjeev Sharma
 
Security & Compliance in the Cloud [2019]
Security & Compliance in the Cloud [2019]Security & Compliance in the Cloud [2019]
Security & Compliance in the Cloud [2019]
Tudor Damian
 
Enterprise Continual Improvement Office Session 208 Timothy Rogers
Enterprise Continual Improvement Office Session 208 Timothy RogersEnterprise Continual Improvement Office Session 208 Timothy Rogers
Enterprise Continual Improvement Office Session 208 Timothy Rogers
trogers77
 

Similar to Advanced Methodologies - System Theoretic Process Analysis for CyberSecurity.pdf (20)

reStart March 25th Nationwide Cleared Virtual Career Fair Employer Directory
reStart March 25th Nationwide Cleared Virtual Career Fair Employer DirectoryreStart March 25th Nationwide Cleared Virtual Career Fair Employer Directory
reStart March 25th Nationwide Cleared Virtual Career Fair Employer Directory
 
Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Aicpa tech+panel presentation t6 managing risks and security 2014 v3Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Aicpa tech+panel presentation t6 managing risks and security 2014 v3
 
Daniel Csencsits FINAL 1-27-16 (no address)
Daniel Csencsits FINAL 1-27-16 (no address)Daniel Csencsits FINAL 1-27-16 (no address)
Daniel Csencsits FINAL 1-27-16 (no address)
 
Road to rockstar system analyst
Road to rockstar system analystRoad to rockstar system analyst
Road to rockstar system analyst
 
Designing for Privacy in Amazon Web Services
Designing for Privacy in Amazon Web ServicesDesigning for Privacy in Amazon Web Services
Designing for Privacy in Amazon Web Services
 
Siva visual Resume.docx
Siva visual Resume.docxSiva visual Resume.docx
Siva visual Resume.docx
 
Siva visual resume.docx
Siva visual resume.docxSiva visual resume.docx
Siva visual resume.docx
 
RHMR_Consultant_Profile_RRHarris07232016
RHMR_Consultant_Profile_RRHarris07232016RHMR_Consultant_Profile_RRHarris07232016
RHMR_Consultant_Profile_RRHarris07232016
 
Gregory yee _resume
Gregory yee _resumeGregory yee _resume
Gregory yee _resume
 
Code Review | 2010
Code Review | 2010Code Review | 2010
Code Review | 2010
 
Proschek, Thomas Resume r2
Proschek, Thomas Resume r2Proschek, Thomas Resume r2
Proschek, Thomas Resume r2
 
IT Architecture and Architects
IT Architecture and ArchitectsIT Architecture and Architects
IT Architecture and Architects
 
Smart CTO Service
Smart CTO ServiceSmart CTO Service
Smart CTO Service
 
Burge, Stephen Agile Ba Revised
Burge, Stephen Agile Ba RevisedBurge, Stephen Agile Ba Revised
Burge, Stephen Agile Ba Revised
 
Introduction to the CSA Cloud Controls Matrix
Introduction to the CSA Cloud Controls MatrixIntroduction to the CSA Cloud Controls Matrix
Introduction to the CSA Cloud Controls Matrix
 
Security architecture best practices for saas applications
Security architecture best practices for saas applicationsSecurity architecture best practices for saas applications
Security architecture best practices for saas applications
 
Quality & Risk Management Challenges When Acquiring Enterprise Systems
Quality & Risk Management Challenges When Acquiring Enterprise SystemsQuality & Risk Management Challenges When Acquiring Enterprise Systems
Quality & Risk Management Challenges When Acquiring Enterprise Systems
 
Democratizing security
Democratizing securityDemocratizing security
Democratizing security
 
Security & Compliance in the Cloud [2019]
Security & Compliance in the Cloud [2019]Security & Compliance in the Cloud [2019]
Security & Compliance in the Cloud [2019]
 
Enterprise Continual Improvement Office Session 208 Timothy Rogers
Enterprise Continual Improvement Office Session 208 Timothy RogersEnterprise Continual Improvement Office Session 208 Timothy Rogers
Enterprise Continual Improvement Office Session 208 Timothy Rogers
 

Recently uploaded

AWS Certified Solutions Architect Associate (SAA-C03)
AWS Certified Solutions Architect Associate (SAA-C03)AWS Certified Solutions Architect Associate (SAA-C03)
AWS Certified Solutions Architect Associate (SAA-C03)
HarpalGohil4
 
What is an RPA CoE? Session 2 – CoE Roles
What is an RPA CoE?  Session 2 – CoE RolesWhat is an RPA CoE?  Session 2 – CoE Roles
What is an RPA CoE? Session 2 – CoE Roles
DianaGray10
 
Must Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during MigrationMust Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during Migration
Mydbops
 
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
DanBrown980551
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
Fwdays
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving
 
GlobalLogic Java Community Webinar #18 “How to Improve Web Application Perfor...
GlobalLogic Java Community Webinar #18 “How to Improve Web Application Perfor...GlobalLogic Java Community Webinar #18 “How to Improve Web Application Perfor...
GlobalLogic Java Community Webinar #18 “How to Improve Web Application Perfor...
GlobalLogic Ukraine
 
Introducing BoxLang : A new JVM language for productivity and modularity!
Introducing BoxLang : A new JVM language for productivity and modularity!Introducing BoxLang : A new JVM language for productivity and modularity!
Introducing BoxLang : A new JVM language for productivity and modularity!
Ortus Solutions, Corp
 
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid ResearchHarnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Neo4j
 
Discover the Unseen: Tailored Recommendation of Unwatched Content
Discover the Unseen: Tailored Recommendation of Unwatched ContentDiscover the Unseen: Tailored Recommendation of Unwatched Content
Discover the Unseen: Tailored Recommendation of Unwatched Content
ScyllaDB
 
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
"Scaling RAG Applications to serve millions of users",  Kevin Goedecke"Scaling RAG Applications to serve millions of users",  Kevin Goedecke
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
Fwdays
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
Javier Junquera
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
c5vrf27qcz
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
Antonios Katsarakis
 
Christine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptxChristine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptx
christinelarrosa
 
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham HillinQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
LizaNolte
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
Miro Wengner
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
Ivo Velitchkov
 
Containers & AI - Beauty and the Beast!?!
Containers & AI - Beauty and the Beast!?!Containers & AI - Beauty and the Beast!?!
Containers & AI - Beauty and the Beast!?!
Tobias Schneck
 
Session 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdfSession 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdf
UiPathCommunity
 

Recently uploaded (20)

AWS Certified Solutions Architect Associate (SAA-C03)
AWS Certified Solutions Architect Associate (SAA-C03)AWS Certified Solutions Architect Associate (SAA-C03)
AWS Certified Solutions Architect Associate (SAA-C03)
 
What is an RPA CoE? Session 2 – CoE Roles
What is an RPA CoE?  Session 2 – CoE RolesWhat is an RPA CoE?  Session 2 – CoE Roles
What is an RPA CoE? Session 2 – CoE Roles
 
Must Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during MigrationMust Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during Migration
 
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
 
GlobalLogic Java Community Webinar #18 “How to Improve Web Application Perfor...
GlobalLogic Java Community Webinar #18 “How to Improve Web Application Perfor...GlobalLogic Java Community Webinar #18 “How to Improve Web Application Perfor...
GlobalLogic Java Community Webinar #18 “How to Improve Web Application Perfor...
 
Introducing BoxLang : A new JVM language for productivity and modularity!
Introducing BoxLang : A new JVM language for productivity and modularity!Introducing BoxLang : A new JVM language for productivity and modularity!
Introducing BoxLang : A new JVM language for productivity and modularity!
 
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid ResearchHarnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
 
Discover the Unseen: Tailored Recommendation of Unwatched Content
Discover the Unseen: Tailored Recommendation of Unwatched ContentDiscover the Unseen: Tailored Recommendation of Unwatched Content
Discover the Unseen: Tailored Recommendation of Unwatched Content
 
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
"Scaling RAG Applications to serve millions of users",  Kevin Goedecke"Scaling RAG Applications to serve millions of users",  Kevin Goedecke
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
 
Christine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptxChristine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptx
 
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham HillinQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
 
Containers & AI - Beauty and the Beast!?!
Containers & AI - Beauty and the Beast!?!Containers & AI - Beauty and the Beast!?!
Containers & AI - Beauty and the Beast!?!
 
Session 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdfSession 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdf
 

Advanced Methodologies - System Theoretic Process Analysis for CyberSecurity.pdf

  • 1. Holmes and Associates, Inc. Pushing Cybersecurity “Farther to the Left” Nov 28, 2023 Kirk Holmes, President Holmes and Associates, Inc. kirk@holmesinc.net (301) 346-9115 http://www.holmesinc.net
  • 2. 2 8(a) small business Team Capabilities About Holmes and Associates, Inc. and Team Example Customers • Transformation experience and connections • CIO Advisory • vCISO and vCIO • Significant organizational transformation experience We Provide Thought leadership • STPA-Sec – a key Cybersecurity methodology • IT Service Management • Service provider excellence (Baldrige)
  • 3. ConOps Requirements Design O&M Construction ConOps Requirements Design Construction Cost To Correct Defect Phase that Defect is Corrected Cost To Correct Cost To Correct Cost To Correct CostTo Correct P h a s e t h a t D e f e c t i s C r e a t e d 100x+ cost Security Concept Functional Security Req’s Bake-In Bolt-On Patching 1x cost 1x 1x 1x CISA “Secure-By- Design” à Fix defects Early! How do you do it more Systematically, Consistently, and Holistically? ANSWER: System Theoretic Process Analysis for Security (STPA-Sec) Goal: Move Cybersecurity To the Left of the Lifecycle Secure-By- Design TARGET
  • 4. 4 What is STPA-Sec? A Leading Edge Approach System-Theoretic Process Analysis (STPA) • Complementary to classic methodologies • Earlier life cycle requirements • Business alignment & business-driven decisions • Top-Down decomposition approach • Consistent models • Codification • “Emergent properties” • Non-technical considerations Business/ Mission Threat Vulnerability CISA: Secure-by-Design Responsive to Complex Systems have emergent properties
  • 5. 5 § STPA-Sec is grounded in real life operations as it was created by Holmes colleague Dr. William Young as a seasoned Air Force officer who was obtaining a PhD in Cybersecurity from MIT § Real Life example: STPA-Sec was used for one of the Air Force’s highest-profile ICBM programs Does STPA-Sec Methodology Work?
  • 6. 6 Quotes from: “Cybersecurity for DoD Acquisition Program Execution: Best Practices for the Major Capability Acquisition Pathway”, Nov 2021 § “Like all engineering processes, STPA-Sec relies on skilled, well-trained professionals to perform the analysis.” § “The GBSD program made use of STPA-Sec to drive security engineering activities as early as the material solutions analysis phase of systems development.” § “Using STPA-Sec allowed GBSD to design systems that minimize security vulnerabilities while meeting program requirements and schedule.” § “The use of STPA-Sec by the GBSD program was indicated by the Office of the Director, Operational Test and Evaluation (DOT&E) as a contributing factor in reducing cybersecurity and schedule risks.” DoD Confirmed that STPA-Sec is a Best Practice
  • 7. 7 § Modernization: Complexity § Modeling and analyzing cybersecurity before engineering and acquisitions § Vulnerability Management: Scale, transparency, consistency § Addressing Known Exploitable Vulnerabilities § Insider Threat: Scale, transparency, consistency § Management of audit trail logs § Employee attrition: Knowledge management and codification § Application to Artificial Intelligence governance: Connection of mission, threat, technology, and vulnerability Example Common Challenge Areas
  • 8. 8 Holmes and Associates can bring unique and unparalleled thought leadership to transform cybersecurity throughout an entire organization The Holmes Team Proposition 1.Lower cybersecurity risk 2.Higher consistency 3.Horizontal and vertical alignment 4.Lower cost 5.Higher speed of execution 6.Enhanced mission protection Holmes Can Provide: Workshops Policy and Process development Model Building Skill building Repository management Tool building SECURE BY DESIGN