SlideShare a Scribd company logo
01PROFILING
02ASSESSMENT
03RESULTS
Internal
security
profile
External
security
environment
Business
risk
appetite
Strategic roadmap to
achieve the desired
maturity level
Current state
visualisation
Maturity
Risk
Impact
Likelihood
ASSURITY
A
Broadgate
Product
83
Understanding your
business critical assets
Calculating your risk
exposure
Prioritising areas requiring
focus and investment
ASSURITY ADDRESSES THESE INFORMATION SECURITY CHALLENGES
“Reducing business risks by optimising your information security investments”
ASSURITY
A Broadgate Product
Key Benefits
Optimizing security budgetQualified cyber ‘value at risk’
Quick win recommendations
ASSURITY
Information security assurance
Improved compliance
Strategic roadmap
+44 (0) 203 326 8000 info@broadgateconsultants.com www.broadgateconsultants.com
Information security assurance
Demonstrating information security assurance to your clients,
suppliers, regulators, shareholders and insurers
Optimising security budget
Avoiding unnecessary security investments typically results in
a 30% reduction in redundant operational security expenditure,
support and maintenance
Qualified cyber 'value at risk’
Financial value of corporate assets at risk is defined for input into
broader business risk modelling
Improved compliance
Security health check defines current information security
maturity levels
Quick win recommendations
Expose low cost, short term, tactical security improvement
initiatives which can be achieved quickly
Strategic roadmap Defined plan to reach your desired maturity level
A visualised current state of cyber risk maturity
83
CURRENT
STATE
TARGET
1. Information risk management 3.54.55
2. Network security 3.53.20
3. User education and awareness 3.52.40
4. Malware prevention 3.53.70
5 Removable media controls 3 51 23
€$
£
Likelihood
Impact
Quick wins
Security Project 1
Education & Awareness
Remediation Plan
CYBER AT RISK SCORE GAP ANALYSIS AGAINST TARGET
MATURITY LEVEL
MATURITY ASSESSMENT HEATMAP STRATEGIC ROADMAP
• Likelihood of security breach
• Company profile & risk appetite
• Internal & external threats
• Benchmark against desired target state
• Identify deficiencies & strengths
• Help focus attention
• Visualise likely high impact risks
• Scope remediation planning
• Prioritise resolutions
• Quick wins & strategic roadmap
• Investment & resource planning
• Measuring & reviewing progression
ReportASSURITY
Key Business BenefitsASSURITY

More Related Content

What's hot

Business case for enterprise continuity planning
Business case for enterprise continuity planningBusiness case for enterprise continuity planning
Business case for enterprise continuity planning
William Godwin
 
Justifying Utility Security Investments
 Justifying Utility Security Investments Justifying Utility Security Investments
Justifying Utility Security Investments
Black & Veatch
 
Risk Management on the Internet
Risk Management on the InternetRisk Management on the Internet
Risk Management on the Internet
sekiur
 
Integrating-Cyber-Security-for-Increased-Effectiveness
Integrating-Cyber-Security-for-Increased-EffectivenessIntegrating-Cyber-Security-for-Increased-Effectiveness
Integrating-Cyber-Security-for-Increased-EffectivenessAyham Kochaji
 
Cyber risk management-white-paper-v8 (2) 2015
Cyber risk management-white-paper-v8 (2) 2015Cyber risk management-white-paper-v8 (2) 2015
Cyber risk management-white-paper-v8 (2) 2015
Accounting_Whitepapers
 
Presentation to Irish ISSA Conference 12-May-11
Presentation to Irish ISSA Conference 12-May-11Presentation to Irish ISSA Conference 12-May-11
Presentation to Irish ISSA Conference 12-May-11
Michael Ofarrell
 
Business case for information security program
Business case for information security programBusiness case for information security program
Business case for information security programWilliam Godwin
 
Why Comply? Does your business need ISO27001
Why Comply? Does your business need ISO27001Why Comply? Does your business need ISO27001
Why Comply? Does your business need ISO27001
Matthew Olney
 
Simplifying Security for Cloud Adoption - Defining your game plan
Simplifying Security for Cloud Adoption - Defining your game planSimplifying Security for Cloud Adoption - Defining your game plan
Simplifying Security for Cloud Adoption - Defining your game plan
Securestorm
 
Organizational Resilience Management - an Integrated GRC Approach
Organizational Resilience Management - an Integrated GRC ApproachOrganizational Resilience Management - an Integrated GRC Approach
Organizational Resilience Management - an Integrated GRC Approach
PECB
 
The challenges for the internal auditor
The challenges for the internal auditorThe challenges for the internal auditor
The challenges for the internal auditorRodoljub Kajganić
 
5 Steps to Securing Your Company's Crown Jewels
5 Steps to Securing Your Company's Crown Jewels5 Steps to Securing Your Company's Crown Jewels
5 Steps to Securing Your Company's Crown Jewels
IBM Security
 
Business Continuity requires a Security Architecture to reduce risk and cost
Business Continuity requires a Security Architecture to reduce risk and costBusiness Continuity requires a Security Architecture to reduce risk and cost
Business Continuity requires a Security Architecture to reduce risk and cost
PECB
 
Finding and Protecting Your Organizations Crown Jewels
Finding and Protecting Your Organizations Crown JewelsFinding and Protecting Your Organizations Crown Jewels
Finding and Protecting Your Organizations Crown Jewels
Doug Landoll
 
Information security governance
Information security governanceInformation security governance
Information security governance
Koen Maris
 
Cyber-attacks
Cyber-attacksCyber-attacks
Securing Your "Crown Jewels": Do You Have What it Takes?
Securing Your "Crown Jewels": Do You Have What it Takes?Securing Your "Crown Jewels": Do You Have What it Takes?
Securing Your "Crown Jewels": Do You Have What it Takes?
IBM Security
 
Crown jewels risk assessment - Cost-effective risk identification
Crown jewels risk assessment - Cost-effective risk identificationCrown jewels risk assessment - Cost-effective risk identification
Crown jewels risk assessment - Cost-effective risk identification
Priyanka Aash
 
Cyber Security Risk Management
Cyber Security Risk ManagementCyber Security Risk Management
Cyber Security Risk ManagementShaun Sloan
 

What's hot (20)

Business case for enterprise continuity planning
Business case for enterprise continuity planningBusiness case for enterprise continuity planning
Business case for enterprise continuity planning
 
Justifying Utility Security Investments
 Justifying Utility Security Investments Justifying Utility Security Investments
Justifying Utility Security Investments
 
Risk Management on the Internet
Risk Management on the InternetRisk Management on the Internet
Risk Management on the Internet
 
Integrating-Cyber-Security-for-Increased-Effectiveness
Integrating-Cyber-Security-for-Increased-EffectivenessIntegrating-Cyber-Security-for-Increased-Effectiveness
Integrating-Cyber-Security-for-Increased-Effectiveness
 
Cyber risk management-white-paper-v8 (2) 2015
Cyber risk management-white-paper-v8 (2) 2015Cyber risk management-white-paper-v8 (2) 2015
Cyber risk management-white-paper-v8 (2) 2015
 
Presentation to Irish ISSA Conference 12-May-11
Presentation to Irish ISSA Conference 12-May-11Presentation to Irish ISSA Conference 12-May-11
Presentation to Irish ISSA Conference 12-May-11
 
Business case for information security program
Business case for information security programBusiness case for information security program
Business case for information security program
 
Why Comply? Does your business need ISO27001
Why Comply? Does your business need ISO27001Why Comply? Does your business need ISO27001
Why Comply? Does your business need ISO27001
 
Simplifying Security for Cloud Adoption - Defining your game plan
Simplifying Security for Cloud Adoption - Defining your game planSimplifying Security for Cloud Adoption - Defining your game plan
Simplifying Security for Cloud Adoption - Defining your game plan
 
Organizational Resilience Management - an Integrated GRC Approach
Organizational Resilience Management - an Integrated GRC ApproachOrganizational Resilience Management - an Integrated GRC Approach
Organizational Resilience Management - an Integrated GRC Approach
 
The challenges for the internal auditor
The challenges for the internal auditorThe challenges for the internal auditor
The challenges for the internal auditor
 
5 Steps to Securing Your Company's Crown Jewels
5 Steps to Securing Your Company's Crown Jewels5 Steps to Securing Your Company's Crown Jewels
5 Steps to Securing Your Company's Crown Jewels
 
Business Continuity requires a Security Architecture to reduce risk and cost
Business Continuity requires a Security Architecture to reduce risk and costBusiness Continuity requires a Security Architecture to reduce risk and cost
Business Continuity requires a Security Architecture to reduce risk and cost
 
Finding and Protecting Your Organizations Crown Jewels
Finding and Protecting Your Organizations Crown JewelsFinding and Protecting Your Organizations Crown Jewels
Finding and Protecting Your Organizations Crown Jewels
 
Information security governance
Information security governanceInformation security governance
Information security governance
 
Cyber-attacks
Cyber-attacksCyber-attacks
Cyber-attacks
 
Internal Audit
Internal AuditInternal Audit
Internal Audit
 
Securing Your "Crown Jewels": Do You Have What it Takes?
Securing Your "Crown Jewels": Do You Have What it Takes?Securing Your "Crown Jewels": Do You Have What it Takes?
Securing Your "Crown Jewels": Do You Have What it Takes?
 
Crown jewels risk assessment - Cost-effective risk identification
Crown jewels risk assessment - Cost-effective risk identificationCrown jewels risk assessment - Cost-effective risk identification
Crown jewels risk assessment - Cost-effective risk identification
 
Cyber Security Risk Management
Cyber Security Risk ManagementCyber Security Risk Management
Cyber Security Risk Management
 

Similar to ASSURITY (2)

Small Business Playbook for Security and Compliance Success.pdf
Small Business Playbook for Security and Compliance Success.pdfSmall Business Playbook for Security and Compliance Success.pdf
Small Business Playbook for Security and Compliance Success.pdf
elizabethrdusek
 
Small Business Playbook for Security and Compliance Success.pptx
Small Business Playbook for Security and Compliance Success.pptxSmall Business Playbook for Security and Compliance Success.pptx
Small Business Playbook for Security and Compliance Success.pptx
elizabethrdusek
 
Strategic Insights on IT & Cyber Risk Assessments.pdf
Strategic Insights on IT & Cyber Risk Assessments.pdfStrategic Insights on IT & Cyber Risk Assessments.pdf
Strategic Insights on IT & Cyber Risk Assessments.pdf
lilabroughton259
 
Cybersecurity Risk Management for Financial Institutions
Cybersecurity Risk Management for Financial InstitutionsCybersecurity Risk Management for Financial Institutions
Cybersecurity Risk Management for Financial Institutions
Sarah Cirelli
 
NQA Your Risk Assurance Partner
NQA Your Risk Assurance PartnerNQA Your Risk Assurance Partner
NQA Your Risk Assurance Partner
NQA
 
Generali France Risk care – Insurer Innovation Award 2023
Generali France Risk care – Insurer Innovation Award 2023Generali France Risk care – Insurer Innovation Award 2023
Generali France Risk care – Insurer Innovation Award 2023
The Digital Insurer
 
BCP Expo Presentation and company overview final ver. 1.0
BCP Expo Presentation and company overview final ver. 1.0BCP Expo Presentation and company overview final ver. 1.0
BCP Expo Presentation and company overview final ver. 1.0Julian Samuels
 
BCP Expo Presentation and company overview final ver. 1.0
BCP Expo Presentation and company overview final ver. 1.0BCP Expo Presentation and company overview final ver. 1.0
BCP Expo Presentation and company overview final ver. 1.0Julian Samuels
 
Protect your hybrid workforce across the attack chain
Protect your hybrid workforce across the attack chainProtect your hybrid workforce across the attack chain
Protect your hybrid workforce across the attack chain
David J Rosenthal
 
NUS-ISS Learning Day 2019-Architecting security in the digital age
NUS-ISS Learning Day 2019-Architecting security in the digital ageNUS-ISS Learning Day 2019-Architecting security in the digital age
NUS-ISS Learning Day 2019-Architecting security in the digital age
NUS-ISS
 
Webinar-MSP+ Cyber Insurance Fina.pptx
Webinar-MSP+  Cyber Insurance Fina.pptxWebinar-MSP+  Cyber Insurance Fina.pptx
Webinar-MSP+ Cyber Insurance Fina.pptx
ControlCase
 
MCGlobalTech Commercial Cybersecurity Capability Statement
MCGlobalTech Commercial Cybersecurity Capability StatementMCGlobalTech Commercial Cybersecurity Capability Statement
MCGlobalTech Commercial Cybersecurity Capability StatementWilliam McBorrough
 
Accenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber ResilienceAccenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber Resilience
accenture
 
Choosing the Right Cybersecurity Services: A Guide for Businesses
Choosing the Right Cybersecurity Services: A Guide for BusinessesChoosing the Right Cybersecurity Services: A Guide for Businesses
Choosing the Right Cybersecurity Services: A Guide for Businesses
basilmph
 
Accenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber ResilienceAccenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber Resilience
accenture
 
Risk avoidance
Risk avoidanceRisk avoidance
Risk avoidance
sapna moodautia
 
Cyber TPRM - the journey ahead
Cyber TPRM - the journey aheadCyber TPRM - the journey ahead
Cyber TPRM - the journey ahead
Kevin Duffey
 

Similar to ASSURITY (2) (20)

Small Business Playbook for Security and Compliance Success.pdf
Small Business Playbook for Security and Compliance Success.pdfSmall Business Playbook for Security and Compliance Success.pdf
Small Business Playbook for Security and Compliance Success.pdf
 
Small Business Playbook for Security and Compliance Success.pptx
Small Business Playbook for Security and Compliance Success.pptxSmall Business Playbook for Security and Compliance Success.pptx
Small Business Playbook for Security and Compliance Success.pptx
 
Strategic Insights on IT & Cyber Risk Assessments.pdf
Strategic Insights on IT & Cyber Risk Assessments.pdfStrategic Insights on IT & Cyber Risk Assessments.pdf
Strategic Insights on IT & Cyber Risk Assessments.pdf
 
Cybersecurity Risk Management for Financial Institutions
Cybersecurity Risk Management for Financial InstitutionsCybersecurity Risk Management for Financial Institutions
Cybersecurity Risk Management for Financial Institutions
 
CDCATInsurance 2016
CDCATInsurance 2016CDCATInsurance 2016
CDCATInsurance 2016
 
NQA Your Risk Assurance Partner
NQA Your Risk Assurance PartnerNQA Your Risk Assurance Partner
NQA Your Risk Assurance Partner
 
Simple Safe Steps to Cyber Security
Simple Safe Steps to Cyber SecuritySimple Safe Steps to Cyber Security
Simple Safe Steps to Cyber Security
 
Generali France Risk care – Insurer Innovation Award 2023
Generali France Risk care – Insurer Innovation Award 2023Generali France Risk care – Insurer Innovation Award 2023
Generali France Risk care – Insurer Innovation Award 2023
 
Qatar Proposal
Qatar ProposalQatar Proposal
Qatar Proposal
 
BCP Expo Presentation and company overview final ver. 1.0
BCP Expo Presentation and company overview final ver. 1.0BCP Expo Presentation and company overview final ver. 1.0
BCP Expo Presentation and company overview final ver. 1.0
 
BCP Expo Presentation and company overview final ver. 1.0
BCP Expo Presentation and company overview final ver. 1.0BCP Expo Presentation and company overview final ver. 1.0
BCP Expo Presentation and company overview final ver. 1.0
 
Protect your hybrid workforce across the attack chain
Protect your hybrid workforce across the attack chainProtect your hybrid workforce across the attack chain
Protect your hybrid workforce across the attack chain
 
NUS-ISS Learning Day 2019-Architecting security in the digital age
NUS-ISS Learning Day 2019-Architecting security in the digital ageNUS-ISS Learning Day 2019-Architecting security in the digital age
NUS-ISS Learning Day 2019-Architecting security in the digital age
 
Webinar-MSP+ Cyber Insurance Fina.pptx
Webinar-MSP+  Cyber Insurance Fina.pptxWebinar-MSP+  Cyber Insurance Fina.pptx
Webinar-MSP+ Cyber Insurance Fina.pptx
 
MCGlobalTech Commercial Cybersecurity Capability Statement
MCGlobalTech Commercial Cybersecurity Capability StatementMCGlobalTech Commercial Cybersecurity Capability Statement
MCGlobalTech Commercial Cybersecurity Capability Statement
 
Accenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber ResilienceAccenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber Resilience
 
Choosing the Right Cybersecurity Services: A Guide for Businesses
Choosing the Right Cybersecurity Services: A Guide for BusinessesChoosing the Right Cybersecurity Services: A Guide for Businesses
Choosing the Right Cybersecurity Services: A Guide for Businesses
 
Accenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber ResilienceAccenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber Resilience
 
Risk avoidance
Risk avoidanceRisk avoidance
Risk avoidance
 
Cyber TPRM - the journey ahead
Cyber TPRM - the journey aheadCyber TPRM - the journey ahead
Cyber TPRM - the journey ahead
 

ASSURITY (2)

  • 1. 01PROFILING 02ASSESSMENT 03RESULTS Internal security profile External security environment Business risk appetite Strategic roadmap to achieve the desired maturity level Current state visualisation Maturity Risk Impact Likelihood ASSURITY A Broadgate Product 83 Understanding your business critical assets Calculating your risk exposure Prioritising areas requiring focus and investment ASSURITY ADDRESSES THESE INFORMATION SECURITY CHALLENGES “Reducing business risks by optimising your information security investments” ASSURITY A Broadgate Product Key Benefits Optimizing security budgetQualified cyber ‘value at risk’ Quick win recommendations ASSURITY Information security assurance Improved compliance Strategic roadmap
  • 2. +44 (0) 203 326 8000 info@broadgateconsultants.com www.broadgateconsultants.com Information security assurance Demonstrating information security assurance to your clients, suppliers, regulators, shareholders and insurers Optimising security budget Avoiding unnecessary security investments typically results in a 30% reduction in redundant operational security expenditure, support and maintenance Qualified cyber 'value at risk’ Financial value of corporate assets at risk is defined for input into broader business risk modelling Improved compliance Security health check defines current information security maturity levels Quick win recommendations Expose low cost, short term, tactical security improvement initiatives which can be achieved quickly Strategic roadmap Defined plan to reach your desired maturity level A visualised current state of cyber risk maturity 83 CURRENT STATE TARGET 1. Information risk management 3.54.55 2. Network security 3.53.20 3. User education and awareness 3.52.40 4. Malware prevention 3.53.70 5 Removable media controls 3 51 23 €$ £ Likelihood Impact Quick wins Security Project 1 Education & Awareness Remediation Plan CYBER AT RISK SCORE GAP ANALYSIS AGAINST TARGET MATURITY LEVEL MATURITY ASSESSMENT HEATMAP STRATEGIC ROADMAP • Likelihood of security breach • Company profile & risk appetite • Internal & external threats • Benchmark against desired target state • Identify deficiencies & strengths • Help focus attention • Visualise likely high impact risks • Scope remediation planning • Prioritise resolutions • Quick wins & strategic roadmap • Investment & resource planning • Measuring & reviewing progression ReportASSURITY Key Business BenefitsASSURITY