SlideShare a Scribd company logo
CHRISTOPHER OPARAUGO
(CISM, CRISC, CGEIT, MBA)
ENTERPRISE SECURITY GOVERNANCE
MAPPING ISO27001 TO
COBIT 4.1 BASED ON
SECURITY SELF
ASSESSMENT
SECURITY/RISK MANAGEMENT
We have recognized that risks
exists due to the confluence of
Assets, Threats, and
Vulnerabilities, and
accordingly mitigating controls
which reduce one or all of
these factors will reduce the
overall risk exposure of the
organization.
Planned improvements
based on findings and
security trends.
Security Policy
Security solution
designed, Implemented
and put into operation
Monitor/Respond to
Incidents during daily
operations
Plan,
Improve
Monitor,
Respond
Regular security
assessment conducted
by an external party.
Assess
Implement
Employ PDCA cycle….
Plan, Do, Check, Act
SEE SECURITY OVER TIME….
Adequate security level
documented in Security
Policy.
4
RISK MANAGEMENT ELEMENTS
5
0%
10%
20%
30%
40%
50%
60%
70%
80%
90%
SecurityPolicy
OrganizationofInformationSecurity
AssetManagement
Humanresourcessecurity
PhysicalandEnviornmentalsecurity
CommunicationandOperationsManagement
AccessControl
Informationsystemacquisition,development…
Informationsecurityincidentmanagement
BusinessContinuityManagement
Compliance
88%
64%
59%
74%
58%
61%
67%
71% 70%
53%
59%
Status
Domain
Compliance per Domain
THE AIM
The mapping of ISO27001 to COBIT
4.1 has enabled me to link IT goals to
business goals that provided data used
in generating an IT Security
Governance balanced scorecard
aligning the data results to - Financial
perspective, customer perspective,
Internal perspective; learning and
growth perspective.
The balanced scorecard (BSC) initially
developed by Kaplan and Norton, is a
performance management system that
should allow enterprises to drive their
strategies on measurement and follow-
up.
These results can be applied to
individual KPIs for staff self
assessment in HR staff development.
6
88%
64%
59%
74%
58%
61%
67%
71%
70%
53%
59%
95%
85%
87%
90%
85%
85%83%
85%
87%
88%
83%
0%
10%
20%
30%
40%
50%
60%
70%
80%
90%
100%
Security Policy
Organization of Information
Security
Asset Management
Human resources security
Physical and Environmental
security
Communication and Operations
Management
Access Control
Information system acquisition,
development and maintenance
Information security incident
management
Business Continuity
Management
Compliance
ISO 27001 Domains
Current State Future State
9
55%
64%
55%
64%
88%
85%
85%
85%
0%
10%
20%
30%
40%
50%
60%
70%
80%
90%
Plan and Organise
Acquire and Implement
Deliver and Support
Monitor and Evaluate
COBIT Domanins
OUR SCORE ISO RATING
10
11
Long-Term
Shareholder
Value
Productivity
Strategy
Growth
Strategy
Financial
Perspective
Improve
Cost
Structure
Increase
Asset
Utilisations
Expand
Revenue
Opportunitie
s
Enhance
Customer
Value
Customer Value Proposition
Customer
Perspective Price Quality Availability SelectionFunctionality Service Partnership Brand
Product/ Service
Attributes
Relationship Image
Operations
Management
Processes
Customer
Management
Processes
Innovation
Processes
Regulatory and
Social Processes
- Supply
- Production
- Distribution
- Risk Management
- Selection
- Acquisition
- Retention
- Growth
- Opportunity ID
- R&D Portfolio
- Design/Develop
- Launch
- Environment
- Safety & Health
- Employment
- Community
Internal
Perspective
Learning &
Growth
Perspective
Human Capital
Information Capital
Organisation Capital
Culture Leadership Alignment Teamwork
Strategy Map
STRATEGIC FOCUS
BELT & BRACES
DAY DREAM
FIGHTING FIT
PANIC STATIONS
Severe
Threat
Landscape
Insignificant
Threat
Landscape
0-12
World-Class
Security Posture
Reactive Security
Posture
X
C
An effective and comprehensive information protection program involves
participation from all functions of the organization.
1. Roadmap
• Develop the shortfalls into task as a measure of working on the gaps
• Strive for ISO 27001 compliance and continuous assessment.
• The exercise has provided useful insight to staff understanding of
Security framework and Controls and should be extended to all
2. Information Security Balanced Score
• To improve on the Information Security balanced score systems using
the gap analysis results from data and figures above.
• To integrate the balanced scorecard into the enterprise governance
balanced scorecard KPI measures.
The mapping of ISO27001 to COBIT 4.1 has enabled me to link IT goals to
business goals that provided data used in generating an IT Security
Governance balanced scorecard aligning the data results to - Financial
perspective, customer perspective, Internal perspective; learning and growth
perspective. These results can be applied to individual KPIs for staff self
CONCLUSION

More Related Content

What's hot

Achieving integrated mandatory compliance with ISO 31000
Achieving integrated mandatory compliance with ISO 31000Achieving integrated mandatory compliance with ISO 31000
Achieving integrated mandatory compliance with ISO 31000
PECB
 
Safety Performance Outcomes
Safety Performance OutcomesSafety Performance Outcomes
Safety Performance Outcomeswallstreet1
 
PECB Webinar: Enterprise Risk Management - Unsuccessful efforts due to lack o...
PECB Webinar: Enterprise Risk Management - Unsuccessful efforts due to lack o...PECB Webinar: Enterprise Risk Management - Unsuccessful efforts due to lack o...
PECB Webinar: Enterprise Risk Management - Unsuccessful efforts due to lack o...
PECB
 
A World Class Strategy to Sustainable SHEQ
A World Class Strategy to Sustainable SHEQA World Class Strategy to Sustainable SHEQ
A World Class Strategy to Sustainable SHEQ
PECB
 
The Path to Self-Disruption
The Path to Self-DisruptionThe Path to Self-Disruption
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAEIT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
360 BSI
 
ISO 27001 Implementation using Force Field Analysis
ISO 27001 Implementation using Force Field AnalysisISO 27001 Implementation using Force Field Analysis
ISO 27001 Implementation using Force Field Analysis
PECB
 
Management of risk introduction
Management of risk introductionManagement of risk introduction
Management of risk introduction
Spyros Ktenas
 
Carey Fagan - SAFETY & SECURITY WORKSHOP - Panel 1: Standards and regulation ...
Carey Fagan - SAFETY & SECURITY WORKSHOP - Panel 1: Standards and regulation ...Carey Fagan - SAFETY & SECURITY WORKSHOP - Panel 1: Standards and regulation ...
Carey Fagan - SAFETY & SECURITY WORKSHOP - Panel 1: Standards and regulation ...
IBAS International Brazil Air Show
 
Risck intelligence in the energy and resources industry
Risck intelligence in the energy and resources industry Risck intelligence in the energy and resources industry
Risck intelligence in the energy and resources industry
Franco Ferrario
 
Iso 31000 Risk management Principles and guidelines
Iso 31000 Risk management Principles and guidelinesIso 31000 Risk management Principles and guidelines
Iso 31000 Risk management Principles and guidelines
Mohsen Gharakhani
 
Security Policies and Standards
Security Policies and StandardsSecurity Policies and Standards
Security Policies and Standards
primeteacher32
 
Business Continuity Managers’ Action Plan to Face a Cyber Attack
Business Continuity Managers’ Action Plan to Face a Cyber AttackBusiness Continuity Managers’ Action Plan to Face a Cyber Attack
Business Continuity Managers’ Action Plan to Face a Cyber Attack
Continuity and Resilience
 
White paper pragmatic safety solutions
White paper pragmatic safety solutionsWhite paper pragmatic safety solutions
White paper pragmatic safety solutions
Craig Tappel
 
Super Strategies 2014 Risk Strategy Presentation
Super Strategies 2014  Risk Strategy PresentationSuper Strategies 2014  Risk Strategy Presentation
Super Strategies 2014 Risk Strategy PresentationDavid Fernandes
 
Key considerations for an appropriate scope for all management systems
Key considerations for an appropriate scope for all management systemsKey considerations for an appropriate scope for all management systems
Key considerations for an appropriate scope for all management systems
PECB
 
[D.O.W.N.L.O.A.D] Business Continuity Management System: A Complete Guide to ...
[D.O.W.N.L.O.A.D] Business Continuity Management System: A Complete Guide to ...[D.O.W.N.L.O.A.D] Business Continuity Management System: A Complete Guide to ...
[D.O.W.N.L.O.A.D] Business Continuity Management System: A Complete Guide to ...
rojejo121
 

What's hot (20)

Achieving integrated mandatory compliance with ISO 31000
Achieving integrated mandatory compliance with ISO 31000Achieving integrated mandatory compliance with ISO 31000
Achieving integrated mandatory compliance with ISO 31000
 
Safety Performance Outcomes
Safety Performance OutcomesSafety Performance Outcomes
Safety Performance Outcomes
 
PECB Webinar: Enterprise Risk Management - Unsuccessful efforts due to lack o...
PECB Webinar: Enterprise Risk Management - Unsuccessful efforts due to lack o...PECB Webinar: Enterprise Risk Management - Unsuccessful efforts due to lack o...
PECB Webinar: Enterprise Risk Management - Unsuccessful efforts due to lack o...
 
A World Class Strategy to Sustainable SHEQ
A World Class Strategy to Sustainable SHEQA World Class Strategy to Sustainable SHEQ
A World Class Strategy to Sustainable SHEQ
 
ISS_PS Brochure
ISS_PS BrochureISS_PS Brochure
ISS_PS Brochure
 
TyroneResume[1]
TyroneResume[1]TyroneResume[1]
TyroneResume[1]
 
The Path to Self-Disruption
The Path to Self-DisruptionThe Path to Self-Disruption
The Path to Self-Disruption
 
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAEIT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
 
ISO 27001 Implementation using Force Field Analysis
ISO 27001 Implementation using Force Field AnalysisISO 27001 Implementation using Force Field Analysis
ISO 27001 Implementation using Force Field Analysis
 
HIRimsISO311KandERMFINAL
HIRimsISO311KandERMFINALHIRimsISO311KandERMFINAL
HIRimsISO311KandERMFINAL
 
Management of risk introduction
Management of risk introductionManagement of risk introduction
Management of risk introduction
 
Carey Fagan - SAFETY & SECURITY WORKSHOP - Panel 1: Standards and regulation ...
Carey Fagan - SAFETY & SECURITY WORKSHOP - Panel 1: Standards and regulation ...Carey Fagan - SAFETY & SECURITY WORKSHOP - Panel 1: Standards and regulation ...
Carey Fagan - SAFETY & SECURITY WORKSHOP - Panel 1: Standards and regulation ...
 
Risck intelligence in the energy and resources industry
Risck intelligence in the energy and resources industry Risck intelligence in the energy and resources industry
Risck intelligence in the energy and resources industry
 
Iso 31000 Risk management Principles and guidelines
Iso 31000 Risk management Principles and guidelinesIso 31000 Risk management Principles and guidelines
Iso 31000 Risk management Principles and guidelines
 
Security Policies and Standards
Security Policies and StandardsSecurity Policies and Standards
Security Policies and Standards
 
Business Continuity Managers’ Action Plan to Face a Cyber Attack
Business Continuity Managers’ Action Plan to Face a Cyber AttackBusiness Continuity Managers’ Action Plan to Face a Cyber Attack
Business Continuity Managers’ Action Plan to Face a Cyber Attack
 
White paper pragmatic safety solutions
White paper pragmatic safety solutionsWhite paper pragmatic safety solutions
White paper pragmatic safety solutions
 
Super Strategies 2014 Risk Strategy Presentation
Super Strategies 2014  Risk Strategy PresentationSuper Strategies 2014  Risk Strategy Presentation
Super Strategies 2014 Risk Strategy Presentation
 
Key considerations for an appropriate scope for all management systems
Key considerations for an appropriate scope for all management systemsKey considerations for an appropriate scope for all management systems
Key considerations for an appropriate scope for all management systems
 
[D.O.W.N.L.O.A.D] Business Continuity Management System: A Complete Guide to ...
[D.O.W.N.L.O.A.D] Business Continuity Management System: A Complete Guide to ...[D.O.W.N.L.O.A.D] Business Continuity Management System: A Complete Guide to ...
[D.O.W.N.L.O.A.D] Business Continuity Management System: A Complete Guide to ...
 

Similar to MAPPING_ISO27001_TO_COBIT4.1

Solve the exercise in security management.pdf
Solve the exercise in security management.pdfSolve the exercise in security management.pdf
Solve the exercise in security management.pdf
sdfghj21
 
Iso 27001 awareness
Iso 27001 awarenessIso 27001 awareness
Iso 27001 awareness
Ãsħâr Ãâlâm
 
Assuring Digital Strategic Initiatives by
Assuring Digital Strategic Initiatives by Assuring Digital Strategic Initiatives by
Assuring Digital Strategic Initiatives by
FirstMutualHoldings
 
The Security Practitioner of the Future
The Security Practitioner of the FutureThe Security Practitioner of the Future
The Security Practitioner of the Future
Resolver Inc.
 
Applying Lean for information security operations centre
Applying Lean for information security operations centreApplying Lean for information security operations centre
Applying Lean for information security operations centre
Naushad Rajani. - CISA, CISSP, CCSP, PMP, DCPP (Privacy)
 
Resume-Amit 1.0
Resume-Amit 1.0Resume-Amit 1.0
Resume-Amit 1.0Amit Verma
 
Developing A Risk Based Information Security Program
Developing A Risk Based Information Security ProgramDeveloping A Risk Based Information Security Program
Developing A Risk Based Information Security ProgramTammy Clark
 
ISO-27001-Beginners-Guide.pdf guidline for implementation
ISO-27001-Beginners-Guide.pdf guidline for implementationISO-27001-Beginners-Guide.pdf guidline for implementation
ISO-27001-Beginners-Guide.pdf guidline for implementation
IrmaBrkic1
 
Targeted Solutions BMS Profile
Targeted Solutions BMS ProfileTargeted Solutions BMS Profile
Targeted Solutions BMS ProfileLeon Geldenhuys
 
Best Practices in Auditing ISO/IEC 27001
Best Practices in Auditing ISO/IEC 27001Best Practices in Auditing ISO/IEC 27001
Best Practices in Auditing ISO/IEC 27001
PECB
 
PECB Webinar: ISO 31000 – Risk Management and how it can help an organization
PECB Webinar: ISO 31000 – Risk Management and how it can help an organizationPECB Webinar: ISO 31000 – Risk Management and how it can help an organization
PECB Webinar: ISO 31000 – Risk Management and how it can help an organization
PECB
 
Risk - IT Services
Risk - IT ServicesRisk - IT Services
Risk - IT Services
Nema Chhaya Buch
 
8 requirements to get iso 27001 certification in sri lanka
8 requirements to get iso 27001 certification in sri lanka8 requirements to get iso 27001 certification in sri lanka
8 requirements to get iso 27001 certification in sri lanka
Anoosha Factocert
 
Implementing Business Aligned Security Strategy Dane Warren Li
Implementing Business Aligned Security Strategy Dane Warren LiImplementing Business Aligned Security Strategy Dane Warren Li
Implementing Business Aligned Security Strategy Dane Warren Li
DaneWarren
 
Nabil Malik - Security performance metrics
Nabil Malik - Security performance metricsNabil Malik - Security performance metrics
Nabil Malik - Security performance metricsnooralmousa
 
Happiest Minds NIST CSF compliance Brochure
Happiest Minds NIST  CSF compliance BrochureHappiest Minds NIST  CSF compliance Brochure
Happiest Minds NIST CSF compliance Brochure
Suresh Kanniappan
 
Insight into Security Leader Success Part 2
Insight into Security Leader Success Part 2Insight into Security Leader Success Part 2
Insight into Security Leader Success Part 2
Security Executive Council
 
Planning for-and implementing ISO 27001
Planning for-and implementing ISO 27001Planning for-and implementing ISO 27001
Planning for-and implementing ISO 27001
Yerlin Sturdivant
 

Similar to MAPPING_ISO27001_TO_COBIT4.1 (20)

Solve the exercise in security management.pdf
Solve the exercise in security management.pdfSolve the exercise in security management.pdf
Solve the exercise in security management.pdf
 
Iso 27001 awareness
Iso 27001 awarenessIso 27001 awareness
Iso 27001 awareness
 
Assuring Digital Strategic Initiatives by
Assuring Digital Strategic Initiatives by Assuring Digital Strategic Initiatives by
Assuring Digital Strategic Initiatives by
 
The Security Practitioner of the Future
The Security Practitioner of the FutureThe Security Practitioner of the Future
The Security Practitioner of the Future
 
Cv HASSAN RIAZ
Cv HASSAN RIAZCv HASSAN RIAZ
Cv HASSAN RIAZ
 
Applying Lean for information security operations centre
Applying Lean for information security operations centreApplying Lean for information security operations centre
Applying Lean for information security operations centre
 
Resume-Amit 1.0
Resume-Amit 1.0Resume-Amit 1.0
Resume-Amit 1.0
 
Developing A Risk Based Information Security Program
Developing A Risk Based Information Security ProgramDeveloping A Risk Based Information Security Program
Developing A Risk Based Information Security Program
 
ISO-27001-Beginners-Guide.pdf guidline for implementation
ISO-27001-Beginners-Guide.pdf guidline for implementationISO-27001-Beginners-Guide.pdf guidline for implementation
ISO-27001-Beginners-Guide.pdf guidline for implementation
 
Targeted Solutions BMS Profile
Targeted Solutions BMS ProfileTargeted Solutions BMS Profile
Targeted Solutions BMS Profile
 
Best Practices in Auditing ISO/IEC 27001
Best Practices in Auditing ISO/IEC 27001Best Practices in Auditing ISO/IEC 27001
Best Practices in Auditing ISO/IEC 27001
 
PECB Webinar: ISO 31000 – Risk Management and how it can help an organization
PECB Webinar: ISO 31000 – Risk Management and how it can help an organizationPECB Webinar: ISO 31000 – Risk Management and how it can help an organization
PECB Webinar: ISO 31000 – Risk Management and how it can help an organization
 
Risk - IT Services
Risk - IT ServicesRisk - IT Services
Risk - IT Services
 
8 requirements to get iso 27001 certification in sri lanka
8 requirements to get iso 27001 certification in sri lanka8 requirements to get iso 27001 certification in sri lanka
8 requirements to get iso 27001 certification in sri lanka
 
Implementing Business Aligned Security Strategy Dane Warren Li
Implementing Business Aligned Security Strategy Dane Warren LiImplementing Business Aligned Security Strategy Dane Warren Li
Implementing Business Aligned Security Strategy Dane Warren Li
 
Nabil Malik - Security performance metrics
Nabil Malik - Security performance metricsNabil Malik - Security performance metrics
Nabil Malik - Security performance metrics
 
Mahalakshmi_Profile
Mahalakshmi_ProfileMahalakshmi_Profile
Mahalakshmi_Profile
 
Happiest Minds NIST CSF compliance Brochure
Happiest Minds NIST  CSF compliance BrochureHappiest Minds NIST  CSF compliance Brochure
Happiest Minds NIST CSF compliance Brochure
 
Insight into Security Leader Success Part 2
Insight into Security Leader Success Part 2Insight into Security Leader Success Part 2
Insight into Security Leader Success Part 2
 
Planning for-and implementing ISO 27001
Planning for-and implementing ISO 27001Planning for-and implementing ISO 27001
Planning for-and implementing ISO 27001
 

MAPPING_ISO27001_TO_COBIT4.1