SlideShare a Scribd company logo
1 of 29
Download to read offline
David A. Cass, CISO Cloud and SaaS Operations
October 5, 2015
Information Security and the
Innovator’s Dilemma
A notable quote
“Strategy without tactics is the slowest route to
victory.
Tactics without Strategy is the noise before defeat.”
- Sun Tzu
Agenda
3
We will review the external, internal factors, and
the threat landscape that is driving change.
We will discuss failure modes and how to
overcome them, and look at innovation drivers.
A framework for innovation
How to execute on an innovation strategy
What’s Changed?
Why CISO’s fail?
Enabling Innovation
Execution
Wrap Up
What’s changed – In the news
!  2015 as the year of escalating breaches
– Retail breaches
!  40 to 60 + million card holders impacted
!  Cost of breaches estimated in the Billions of dollars
– Medical records
!  80 million social security numbers exposed
!  the cost per record breached for healthcare
organizations is $363*
– Entertainment Industry
!  Corporate network taken over
!  Exfiltration of movies
!  Loss of corp. emails, PII, and more..
– Government
!  personnel data of 4.2 million current and former Federal government
employees had been stolen.
!  background investigation records of current, former, and prospective
Federal employees and contractors.
!  More than 21 million SSNs and 5.6 million finger print records
! External Factors
– Emerging Markets
– Outsourcing
What’s Changed?
! External Factors
– Privacy
! > 80 Countries
with Privacy Laws
! US vs. EU vs.
APAC definitions
! Opt in vs. Opt out
What’s Changed?
! External Factors
– Law & Cyber
!  HIPAA, GLBA, MA, CA…
– Cloud
!  Fundamental change to the
way people work
– Mobile Apps
– BYOD
– Social
– Big Data
– IOT
What’s Changed?
!  Internal Factors
– Expectations of
workforce
– Insider threat
– Changes in IT staff
core competencies
– Increased focus on
Risk Management
What’s Changed?
Threat Landscape - Then
•  Captive Workforce
•  Desktops & Laptops
•  Corporate Network with VPN for remote workers
•  Corporate Owned Devices
Enterprises
•  Rouge Individuals
•  Motivated by the challenge
•  Little or no financial gain
Attackers
•  Noisy
•  Server side/infrastructure vulnerabilities
•  Noticeable
•  Damaging & Costly but not complicated to remediate
Attacks
Threat Landscape - Now
• Highly Mobile Workforce
• Smartphones & Tablets
• Use of home Wi-Fi, free Wi-Fi, cellular
connections
• Corporate Owned Devices
Enterprises
• Organized
• Well funded
• Highly skilled
• Organized Crime
• Financial/Political gain
Attackers
• Stealthy
• Applications, Databases, and Social Engineering
• Hard to detect
• Goal is data exfiltration
Attacks
Why CISO’s fail?
Used to be:
Failure to help the business
with:
Innovation Drivers
! Companies are very vulnerable to disruption!
! Low barrier to entry
! Disruption defined:
– The same value delivered in different ways
! Time to market is critical
! Innovation allows companies to pivot
Guidelines / Framework for Innovation
1.  Research first
2.  Innovate process at small scales
– Improves ability to deliver
– Allow everyone to innovate
3.  Share as much as you can
– Break down silos
– Transparency = Speed
Guidelines / Framework for Innovation
4.  Sell it before you make it
– See what works
– Get traction
– Don’t build solutions in search of problems
5.  Act Responsibly
– Reputation
– Say what you do and do what you say!
– Aspirational vs. attainable
How can Security Innovate?
! Understand what is the Critical Business Knowledge
! Business Transformation
! Policies, Standards, Training & Awareness
! Communications at the Board and Exec Level
! Privacy and Security by Design
Innovation
! Critical Business Knowledge
– Define it
! Is it a source of competitive advantage
! Is there a regulatory requirement
– Define a goal
Innovation
! Business Transformation
– What is the experience we want?
– How do we deliver what they want?
– Transparency
Innovation
! Policies & Standards
– Right size them
– 1 page with bullet points
! Training & Awareness
– Deliver the message in the way people consume
info today
Innovation
! Communications at the Board and Exec Level
– Become a better story teller
– Frame the conversation using FORR
! Financial
! Operational
! Reputational
! Regulatory
! Practice Privacy by
Design
– Proactive not Reactive
– Privacy as the Default
Setting
– Privacy Embedded into
Design
Innovation
Innovation
! Practice Privacy by Design
– Full Functionality
– End-to-End Security – Full Life Cycle Protection
– Visibility and Transparency
– Respect for User Privacy
Innovation
! Security by Design
– Protect the data and application
– Security Awareness Training
– Partner with the business
! M&A process
! Cloud
Innovation
! Security by Design
– Risk & Assurance
– Application Security COE
– Security Architecture
– Incident Response
Execution - Focus on Four Principles
! Familiar
! Simple
! Impactful
! Measured
Execution - Putting Innovation to work
! Strategy is the starting point of execution
– Clear and relatively simple
– You need to know what really matters
! To execute you need:
– Alignment
– Agility
– Coordination
Executing Strategy
! Is low price a strategy?
! Strategy is not:
– A string of buzzwords
– Not a vision statement
– Not a financial projection
Executing Strategy
Alignment
AgilityCoordination
Wrap up
! Innovation requires you understand the way the
business works
! Apply the principles for innovation
! Use the strategy execution triad
! We win by accomplishing business goals
Questions?
David Cass
CISO, IBM Cloud & SaaS Operations
E-mail: dcass@us.ibm.com
Twitter: @dcass001
Linkedin: www.linkedin.com/in/dcass001/

More Related Content

What's hot

NTXISSACSC1 Conference - Cybersecurity 2014 by Andrea Almeida
NTXISSACSC1 Conference - Cybersecurity 2014 by Andrea AlmeidaNTXISSACSC1 Conference - Cybersecurity 2014 by Andrea Almeida
NTXISSACSC1 Conference - Cybersecurity 2014 by Andrea AlmeidaNorth Texas Chapter of the ISSA
 
Organizational Behavior Question#3
Organizational Behavior Question#3Organizational Behavior Question#3
Organizational Behavior Question#3Waseem Saeed
 
Diversity in Cybersecurity Education - 2016 ICT keynote - M.Rosenquist
Diversity in Cybersecurity Education - 2016 ICT keynote - M.RosenquistDiversity in Cybersecurity Education - 2016 ICT keynote - M.Rosenquist
Diversity in Cybersecurity Education - 2016 ICT keynote - M.RosenquistMatthew Rosenquist
 
BYOD (Bring Your Own Device) Risks And Benefits
BYOD (Bring Your Own Device) Risks And BenefitsBYOD (Bring Your Own Device) Risks And Benefits
BYOD (Bring Your Own Device) Risks And BenefitsModis
 
BYOD (Bring Your Own Device)
BYOD (Bring Your Own Device)BYOD (Bring Your Own Device)
BYOD (Bring Your Own Device)Michael W. Chitwa
 
Unit 05 trends in technology for organizational use
Unit 05 trends in technology for organizational useUnit 05 trends in technology for organizational use
Unit 05 trends in technology for organizational useTony Bollino
 
Aalto cyber-10.4.18
Aalto cyber-10.4.18Aalto cyber-10.4.18
Aalto cyber-10.4.18japijapi
 
Byod in the middle east
Byod in the middle eastByod in the middle east
Byod in the middle eastteam-abr
 
How an Integrated Management system helps you comply with new Cyber Laws and ...
How an Integrated Management system helps you comply with new Cyber Laws and ...How an Integrated Management system helps you comply with new Cyber Laws and ...
How an Integrated Management system helps you comply with new Cyber Laws and ...PECB
 
How to Build a Successful Cybersecurity Program?
How to Build a Successful Cybersecurity Program?How to Build a Successful Cybersecurity Program?
How to Build a Successful Cybersecurity Program?PECB
 
Ingrid Moerman, iMinds - UGent, iMinds The Conference 2013
Ingrid Moerman, iMinds - UGent, iMinds The Conference 2013Ingrid Moerman, iMinds - UGent, iMinds The Conference 2013
Ingrid Moerman, iMinds - UGent, iMinds The Conference 2013imec
 
Seclore Corporate Profile
Seclore Corporate ProfileSeclore Corporate Profile
Seclore Corporate Profilepatelhiranya
 
Going_Mobile_101_IIMC_v5
Going_Mobile_101_IIMC_v5Going_Mobile_101_IIMC_v5
Going_Mobile_101_IIMC_v5Steve Markey
 
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon SwainNTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon SwainNorth Texas Chapter of the ISSA
 
BYOD: D for Device or D for Disaster?
BYOD: D for Device or D for Disaster?BYOD: D for Device or D for Disaster?
BYOD: D for Device or D for Disaster?Marketing Team
 

What's hot (19)

NTXISSACSC1 Conference - Cybersecurity 2014 by Andrea Almeida
NTXISSACSC1 Conference - Cybersecurity 2014 by Andrea AlmeidaNTXISSACSC1 Conference - Cybersecurity 2014 by Andrea Almeida
NTXISSACSC1 Conference - Cybersecurity 2014 by Andrea Almeida
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)
 
Organizational Behavior Question#3
Organizational Behavior Question#3Organizational Behavior Question#3
Organizational Behavior Question#3
 
Diversity in Cybersecurity Education - 2016 ICT keynote - M.Rosenquist
Diversity in Cybersecurity Education - 2016 ICT keynote - M.RosenquistDiversity in Cybersecurity Education - 2016 ICT keynote - M.Rosenquist
Diversity in Cybersecurity Education - 2016 ICT keynote - M.Rosenquist
 
BYOD (Bring Your Own Device) Risks And Benefits
BYOD (Bring Your Own Device) Risks And BenefitsBYOD (Bring Your Own Device) Risks And Benefits
BYOD (Bring Your Own Device) Risks And Benefits
 
BYOD (Bring Your Own Device)
BYOD (Bring Your Own Device)BYOD (Bring Your Own Device)
BYOD (Bring Your Own Device)
 
Unit 05 trends in technology for organizational use
Unit 05 trends in technology for organizational useUnit 05 trends in technology for organizational use
Unit 05 trends in technology for organizational use
 
Aalto cyber-10.4.18
Aalto cyber-10.4.18Aalto cyber-10.4.18
Aalto cyber-10.4.18
 
Byod in the middle east
Byod in the middle eastByod in the middle east
Byod in the middle east
 
IT compliance
IT complianceIT compliance
IT compliance
 
How an Integrated Management system helps you comply with new Cyber Laws and ...
How an Integrated Management system helps you comply with new Cyber Laws and ...How an Integrated Management system helps you comply with new Cyber Laws and ...
How an Integrated Management system helps you comply with new Cyber Laws and ...
 
How to Build a Successful Cybersecurity Program?
How to Build a Successful Cybersecurity Program?How to Build a Successful Cybersecurity Program?
How to Build a Successful Cybersecurity Program?
 
CyberSecurity_for_the_IoT
CyberSecurity_for_the_IoTCyberSecurity_for_the_IoT
CyberSecurity_for_the_IoT
 
Review questions
Review questionsReview questions
Review questions
 
Ingrid Moerman, iMinds - UGent, iMinds The Conference 2013
Ingrid Moerman, iMinds - UGent, iMinds The Conference 2013Ingrid Moerman, iMinds - UGent, iMinds The Conference 2013
Ingrid Moerman, iMinds - UGent, iMinds The Conference 2013
 
Seclore Corporate Profile
Seclore Corporate ProfileSeclore Corporate Profile
Seclore Corporate Profile
 
Going_Mobile_101_IIMC_v5
Going_Mobile_101_IIMC_v5Going_Mobile_101_IIMC_v5
Going_Mobile_101_IIMC_v5
 
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon SwainNTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
 
BYOD: D for Device or D for Disaster?
BYOD: D for Device or D for Disaster?BYOD: D for Device or D for Disaster?
BYOD: D for Device or D for Disaster?
 

Similar to IS and the Innovator's Dilemma DCass_Final

The top trends changing the landscape of Information Management
The top trends changing the landscape of Information ManagementThe top trends changing the landscape of Information Management
The top trends changing the landscape of Information ManagementVelrada
 
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...EC-Council
 
Protiviti Australia Webinar IT Priorities Survey 2015
Protiviti Australia Webinar IT Priorities Survey 2015Protiviti Australia Webinar IT Priorities Survey 2015
Protiviti Australia Webinar IT Priorities Survey 2015Grant Barker
 
Deconstructing Data Breach Cost
Deconstructing Data Breach CostDeconstructing Data Breach Cost
Deconstructing Data Breach CostResilient Systems
 
Putting data science into perspective
Putting data science into perspectivePutting data science into perspective
Putting data science into perspectiveSravan Ankaraju
 
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...AIIM International
 
Best practices to mitigate data breach risk
Best practices to mitigate data breach riskBest practices to mitigate data breach risk
Best practices to mitigate data breach riskLivingstone Advisory
 
Marketing Program Overview_Sal A _2012 v2.1
Marketing Program Overview_Sal A _2012 v2.1Marketing Program Overview_Sal A _2012 v2.1
Marketing Program Overview_Sal A _2012 v2.1Sal Abramo
 
Ravi i ot-security
Ravi i ot-securityRavi i ot-security
Ravi i ot-securityskumartarget
 
BA Masterclass - Top IT trends that can impact your role - SLIDES
BA Masterclass - Top IT trends that can impact your role - SLIDESBA Masterclass - Top IT trends that can impact your role - SLIDES
BA Masterclass - Top IT trends that can impact your role - SLIDESPete Clouston
 
BSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing businessBSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing businessJoel Cardella
 
Security architecture rajagiri talk march 2011
Security architecture  rajagiri talk march 2011Security architecture  rajagiri talk march 2011
Security architecture rajagiri talk march 2011subramanian K
 
BIS "Is Your Company at Risk for a Security Breach?"
BIS "Is Your Company at Risk for a Security Breach?"BIS "Is Your Company at Risk for a Security Breach?"
BIS "Is Your Company at Risk for a Security Breach?"ChristiAKannapel
 
Digital Forensics 101 – How is it used to protect an Organization’s Data?
Digital Forensics 101 – How is it used to protect an Organization’s Data?Digital Forensics 101 – How is it used to protect an Organization’s Data?
Digital Forensics 101 – How is it used to protect an Organization’s Data?PECB
 
Fast IT Mariano O'Kon, Cisco Live Cancun 2014
Fast IT Mariano O'Kon, Cisco Live Cancun 2014Fast IT Mariano O'Kon, Cisco Live Cancun 2014
Fast IT Mariano O'Kon, Cisco Live Cancun 2014Felipe Lamus
 
Security and Compliance
Security and ComplianceSecurity and Compliance
Security and ComplianceBankingdotcom
 
Information security: importance of having defined policy & process
Information security: importance of having defined policy & processInformation security: importance of having defined policy & process
Information security: importance of having defined policy & processInformation Technology Society Nepal
 

Similar to IS and the Innovator's Dilemma DCass_Final (20)

Information & Cyber Security Risk
Information & Cyber Security RiskInformation & Cyber Security Risk
Information & Cyber Security Risk
 
The top trends changing the landscape of Information Management
The top trends changing the landscape of Information ManagementThe top trends changing the landscape of Information Management
The top trends changing the landscape of Information Management
 
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
 
Protiviti Australia Webinar IT Priorities Survey 2015
Protiviti Australia Webinar IT Priorities Survey 2015Protiviti Australia Webinar IT Priorities Survey 2015
Protiviti Australia Webinar IT Priorities Survey 2015
 
A data-centric program
A data-centric program A data-centric program
A data-centric program
 
Deconstructing Data Breach Cost
Deconstructing Data Breach CostDeconstructing Data Breach Cost
Deconstructing Data Breach Cost
 
Co3 rsc r5
Co3 rsc r5Co3 rsc r5
Co3 rsc r5
 
Putting data science into perspective
Putting data science into perspectivePutting data science into perspective
Putting data science into perspective
 
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
 
Best practices to mitigate data breach risk
Best practices to mitigate data breach riskBest practices to mitigate data breach risk
Best practices to mitigate data breach risk
 
Marketing Program Overview_Sal A _2012 v2.1
Marketing Program Overview_Sal A _2012 v2.1Marketing Program Overview_Sal A _2012 v2.1
Marketing Program Overview_Sal A _2012 v2.1
 
Ravi i ot-security
Ravi i ot-securityRavi i ot-security
Ravi i ot-security
 
BA Masterclass - Top IT trends that can impact your role - SLIDES
BA Masterclass - Top IT trends that can impact your role - SLIDESBA Masterclass - Top IT trends that can impact your role - SLIDES
BA Masterclass - Top IT trends that can impact your role - SLIDES
 
BSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing businessBSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing business
 
Security architecture rajagiri talk march 2011
Security architecture  rajagiri talk march 2011Security architecture  rajagiri talk march 2011
Security architecture rajagiri talk march 2011
 
BIS "Is Your Company at Risk for a Security Breach?"
BIS "Is Your Company at Risk for a Security Breach?"BIS "Is Your Company at Risk for a Security Breach?"
BIS "Is Your Company at Risk for a Security Breach?"
 
Digital Forensics 101 – How is it used to protect an Organization’s Data?
Digital Forensics 101 – How is it used to protect an Organization’s Data?Digital Forensics 101 – How is it used to protect an Organization’s Data?
Digital Forensics 101 – How is it used to protect an Organization’s Data?
 
Fast IT Mariano O'Kon, Cisco Live Cancun 2014
Fast IT Mariano O'Kon, Cisco Live Cancun 2014Fast IT Mariano O'Kon, Cisco Live Cancun 2014
Fast IT Mariano O'Kon, Cisco Live Cancun 2014
 
Security and Compliance
Security and ComplianceSecurity and Compliance
Security and Compliance
 
Information security: importance of having defined policy & process
Information security: importance of having defined policy & processInformation security: importance of having defined policy & process
Information security: importance of having defined policy & process
 

IS and the Innovator's Dilemma DCass_Final

  • 1. David A. Cass, CISO Cloud and SaaS Operations October 5, 2015 Information Security and the Innovator’s Dilemma
  • 2. A notable quote “Strategy without tactics is the slowest route to victory. Tactics without Strategy is the noise before defeat.” - Sun Tzu
  • 3. Agenda 3 We will review the external, internal factors, and the threat landscape that is driving change. We will discuss failure modes and how to overcome them, and look at innovation drivers. A framework for innovation How to execute on an innovation strategy What’s Changed? Why CISO’s fail? Enabling Innovation Execution Wrap Up
  • 4. What’s changed – In the news !  2015 as the year of escalating breaches – Retail breaches !  40 to 60 + million card holders impacted !  Cost of breaches estimated in the Billions of dollars – Medical records !  80 million social security numbers exposed !  the cost per record breached for healthcare organizations is $363* – Entertainment Industry !  Corporate network taken over !  Exfiltration of movies !  Loss of corp. emails, PII, and more.. – Government !  personnel data of 4.2 million current and former Federal government employees had been stolen. !  background investigation records of current, former, and prospective Federal employees and contractors. !  More than 21 million SSNs and 5.6 million finger print records
  • 6. ! External Factors – Privacy ! > 80 Countries with Privacy Laws ! US vs. EU vs. APAC definitions ! Opt in vs. Opt out What’s Changed?
  • 7. ! External Factors – Law & Cyber !  HIPAA, GLBA, MA, CA… – Cloud !  Fundamental change to the way people work – Mobile Apps – BYOD – Social – Big Data – IOT What’s Changed?
  • 8. !  Internal Factors – Expectations of workforce – Insider threat – Changes in IT staff core competencies – Increased focus on Risk Management What’s Changed?
  • 9. Threat Landscape - Then •  Captive Workforce •  Desktops & Laptops •  Corporate Network with VPN for remote workers •  Corporate Owned Devices Enterprises •  Rouge Individuals •  Motivated by the challenge •  Little or no financial gain Attackers •  Noisy •  Server side/infrastructure vulnerabilities •  Noticeable •  Damaging & Costly but not complicated to remediate Attacks
  • 10. Threat Landscape - Now • Highly Mobile Workforce • Smartphones & Tablets • Use of home Wi-Fi, free Wi-Fi, cellular connections • Corporate Owned Devices Enterprises • Organized • Well funded • Highly skilled • Organized Crime • Financial/Political gain Attackers • Stealthy • Applications, Databases, and Social Engineering • Hard to detect • Goal is data exfiltration Attacks
  • 11. Why CISO’s fail? Used to be: Failure to help the business with:
  • 12. Innovation Drivers ! Companies are very vulnerable to disruption! ! Low barrier to entry ! Disruption defined: – The same value delivered in different ways ! Time to market is critical ! Innovation allows companies to pivot
  • 13. Guidelines / Framework for Innovation 1.  Research first 2.  Innovate process at small scales – Improves ability to deliver – Allow everyone to innovate 3.  Share as much as you can – Break down silos – Transparency = Speed
  • 14. Guidelines / Framework for Innovation 4.  Sell it before you make it – See what works – Get traction – Don’t build solutions in search of problems 5.  Act Responsibly – Reputation – Say what you do and do what you say! – Aspirational vs. attainable
  • 15. How can Security Innovate? ! Understand what is the Critical Business Knowledge ! Business Transformation ! Policies, Standards, Training & Awareness ! Communications at the Board and Exec Level ! Privacy and Security by Design
  • 16. Innovation ! Critical Business Knowledge – Define it ! Is it a source of competitive advantage ! Is there a regulatory requirement – Define a goal
  • 17. Innovation ! Business Transformation – What is the experience we want? – How do we deliver what they want? – Transparency
  • 18. Innovation ! Policies & Standards – Right size them – 1 page with bullet points ! Training & Awareness – Deliver the message in the way people consume info today
  • 19. Innovation ! Communications at the Board and Exec Level – Become a better story teller – Frame the conversation using FORR ! Financial ! Operational ! Reputational ! Regulatory
  • 20. ! Practice Privacy by Design – Proactive not Reactive – Privacy as the Default Setting – Privacy Embedded into Design Innovation
  • 21. Innovation ! Practice Privacy by Design – Full Functionality – End-to-End Security – Full Life Cycle Protection – Visibility and Transparency – Respect for User Privacy
  • 22. Innovation ! Security by Design – Protect the data and application – Security Awareness Training – Partner with the business ! M&A process ! Cloud
  • 23. Innovation ! Security by Design – Risk & Assurance – Application Security COE – Security Architecture – Incident Response
  • 24. Execution - Focus on Four Principles ! Familiar ! Simple ! Impactful ! Measured
  • 25. Execution - Putting Innovation to work ! Strategy is the starting point of execution – Clear and relatively simple – You need to know what really matters ! To execute you need: – Alignment – Agility – Coordination
  • 26. Executing Strategy ! Is low price a strategy? ! Strategy is not: – A string of buzzwords – Not a vision statement – Not a financial projection
  • 28. Wrap up ! Innovation requires you understand the way the business works ! Apply the principles for innovation ! Use the strategy execution triad ! We win by accomplishing business goals
  • 29. Questions? David Cass CISO, IBM Cloud & SaaS Operations E-mail: dcass@us.ibm.com Twitter: @dcass001 Linkedin: www.linkedin.com/in/dcass001/