SlideShare a Scribd company logo
Building Security Models To Help Make Business Decisions  Dave Cullinane Gordon Shevlin Preston Wood William Tang  04/29/09 | Session ID: PROF-403
Common Questions from Exec Mgmt ,[object Object],[object Object],[object Object],Provide insight to solve these challenges and real world examples Understand methodology and approach to leverage security and business metrics effectively Make more informed business decisions and prove security return on investment (ROI) Educate + Learn = Apply
Agenda  Obtain Security & Business Metrics Establish a Security Framework Prove Security Return on Investment (ROI) Develop Forward Looking Strategy & Models
Security Framework
Security Controls Mapping
Security Controls Mapping
Security Gap Analysis
Agenda  Obtain Security & Business Metrics Establish a Security Framework Prove Security Return on Investment (ROI) Develop Forward Looking Strategy & Models
Obtain Business & Security Metrics
Obtain Business & Security Metrics
Agenda  Obtain Security & Business Metrics Establish a Security Framework Prove Security Return on Investment (ROI) Develop Forward Looking Strategy & Models
Prove Security ROI ,[object Object],[object Object],[object Object],[object Object],[object Object]
Agenda  Obtain Security & Business Metrics Establish a Security Framework Prove Security Return on Investment (ROI) Develop Forward Looking Strategy & Models
Develop Security Strategy & Models
Q&A

More Related Content

Viewers also liked

Psicología de las masas y análisis del yo
Psicología de las masas y análisis del yoPsicología de las masas y análisis del yo
Psicología de las masas y análisis del yo
Alvaro Barrios Requena
 
Safe inlet The Device For Road security
Safe inlet The Device For Road securitySafe inlet The Device For Road security
Safe inlet The Device For Road security
Marino Salvatore
 
從104會考看閱讀教學 02尋讀與精讀
從104會考看閱讀教學   02尋讀與精讀從104會考看閱讀教學   02尋讀與精讀
從104會考看閱讀教學 02尋讀與精讀
黃 韻如
 
The excretory system Morad
The excretory system MoradThe excretory system Morad
The excretory system Morad
craentredosrios
 
Những câunóihayvềtìnhyêu&cuộcsống2
Những câunóihayvềtìnhyêu&cuộcsống2Những câunóihayvềtìnhyêu&cuộcsống2
Những câunóihayvềtìnhyêu&cuộcsống2
Daklak Training College
 
animal facts
animal factsanimal facts
animal facts
AnyChild
 
Indian marriage
Indian marriageIndian marriage
Indian marriage
SOUNAK PRAMANIK
 
活動四北極熊論證
活動四北極熊論證活動四北極熊論證
活動四北極熊論證
bell5
 
Ionic y angular.js
Ionic y angular.jsIonic y angular.js
Ionic y angular.js
GDG Cali
 
Business analysis1.9 - business side
Business analysis1.9 - business sideBusiness analysis1.9 - business side
Business analysis1.9 - business side
Anton Galitskiy
 
Indian Stock Market
Indian Stock MarketIndian Stock Market
Indian Stock Market
Dr Saif Siddiqui
 
Planeacion ultimate bachillerato
Planeacion ultimate bachilleratoPlaneacion ultimate bachillerato
Planeacion ultimate bachillerato
andres muñoz
 

Viewers also liked (12)

Psicología de las masas y análisis del yo
Psicología de las masas y análisis del yoPsicología de las masas y análisis del yo
Psicología de las masas y análisis del yo
 
Safe inlet The Device For Road security
Safe inlet The Device For Road securitySafe inlet The Device For Road security
Safe inlet The Device For Road security
 
從104會考看閱讀教學 02尋讀與精讀
從104會考看閱讀教學   02尋讀與精讀從104會考看閱讀教學   02尋讀與精讀
從104會考看閱讀教學 02尋讀與精讀
 
The excretory system Morad
The excretory system MoradThe excretory system Morad
The excretory system Morad
 
Những câunóihayvềtìnhyêu&cuộcsống2
Những câunóihayvềtìnhyêu&cuộcsống2Những câunóihayvềtìnhyêu&cuộcsống2
Những câunóihayvềtìnhyêu&cuộcsống2
 
animal facts
animal factsanimal facts
animal facts
 
Indian marriage
Indian marriageIndian marriage
Indian marriage
 
活動四北極熊論證
活動四北極熊論證活動四北極熊論證
活動四北極熊論證
 
Ionic y angular.js
Ionic y angular.jsIonic y angular.js
Ionic y angular.js
 
Business analysis1.9 - business side
Business analysis1.9 - business sideBusiness analysis1.9 - business side
Business analysis1.9 - business side
 
Indian Stock Market
Indian Stock MarketIndian Stock Market
Indian Stock Market
 
Planeacion ultimate bachillerato
Planeacion ultimate bachilleratoPlaneacion ultimate bachillerato
Planeacion ultimate bachillerato
 

Similar to RSA Conference 09 - Building Security Models to Support Business Decisions 090429

Old Presentation on Security Metrics 2005
Old Presentation on Security Metrics 2005Old Presentation on Security Metrics 2005
Old Presentation on Security Metrics 2005
Anton Chuvakin
 
ESA for Business
ESA for BusinessESA for Business
ESA for Business
Maganathin Veeraragaloo
 
ASMC 2017 - Rudy Neefs - Van bedrijfspolitieman naar kritieke businesspartner
ASMC 2017 - Rudy Neefs - Van bedrijfspolitieman naar kritieke businesspartnerASMC 2017 - Rudy Neefs - Van bedrijfspolitieman naar kritieke businesspartner
ASMC 2017 - Rudy Neefs - Van bedrijfspolitieman naar kritieke businesspartner
PlatformSecurityManagement
 
Gs Us Roadmap For A World Class Information Security Management System– Isoie...
Gs Us Roadmap For A World Class Information Security Management System– Isoie...Gs Us Roadmap For A World Class Information Security Management System– Isoie...
Gs Us Roadmap For A World Class Information Security Management System– Isoie...
Tammy Clark
 
CIS333 – Assignments and Rubrics © 2017 Strayer Unive.docx
CIS333 – Assignments and Rubrics   © 2017 Strayer Unive.docxCIS333 – Assignments and Rubrics   © 2017 Strayer Unive.docx
CIS333 – Assignments and Rubrics © 2017 Strayer Unive.docx
AASTHA76
 
NIST Critical Security Framework (CSF)
NIST Critical Security Framework (CSF) NIST Critical Security Framework (CSF)
NIST Critical Security Framework (CSF)
Priyanka Aash
 
Security Policies and Implementation IssuesLecture 5How to D.docx
Security Policies and Implementation IssuesLecture 5How to D.docxSecurity Policies and Implementation IssuesLecture 5How to D.docx
Security Policies and Implementation IssuesLecture 5How to D.docx
jeffreye3
 
2023-it-roadmap-for-cybersecurity-techcnical
2023-it-roadmap-for-cybersecurity-techcnical2023-it-roadmap-for-cybersecurity-techcnical
2023-it-roadmap-for-cybersecurity-techcnical
Jack585826
 
Managing Products Portfolios
Managing Products PortfoliosManaging Products Portfolios
Managing Products Portfolios
Pierre Gagne
 
Business case for Information Security program
Business case for Information Security programBusiness case for Information Security program
Business case for Information Security program
William Godwin
 
Business case for information security program
Business case for information security programBusiness case for information security program
Business case for information security program
William Godwin
 
Simplifying Security for Cloud Adoption - Defining your game plan
Simplifying Security for Cloud Adoption - Defining your game planSimplifying Security for Cloud Adoption - Defining your game plan
Simplifying Security for Cloud Adoption - Defining your game plan
Securestorm
 
7-lessons-learned-from-bsimm
7-lessons-learned-from-bsimm7-lessons-learned-from-bsimm
7-lessons-learned-from-bsimm
Marie Peters
 
CIS333 – Assignments and Rubrics Assignment 1 Creatin.docx
CIS333 – Assignments and Rubrics  Assignment 1 Creatin.docxCIS333 – Assignments and Rubrics  Assignment 1 Creatin.docx
CIS333 – Assignments and Rubrics Assignment 1 Creatin.docx
AASTHA76
 
CIS333 – Networking Security Fundamentals © 2017 Stray.docx
 CIS333 – Networking Security Fundamentals  © 2017 Stray.docx CIS333 – Networking Security Fundamentals  © 2017 Stray.docx
CIS333 – Networking Security Fundamentals © 2017 Stray.docx
aryan532920
 
CIS333 – Networking Security Fundamentals © 2017 Stray.docx
CIS333 – Networking Security Fundamentals  © 2017 Stray.docxCIS333 – Networking Security Fundamentals  © 2017 Stray.docx
CIS333 – Networking Security Fundamentals © 2017 Stray.docx
AASTHA76
 
Battle Tested Application Security
Battle Tested Application SecurityBattle Tested Application Security
Battle Tested Application Security
Ty Sbano
 
CIS333 – Assignments and Rubrics Assignment 1 Creating an.docx
CIS333 – Assignments and Rubrics Assignment 1 Creating an.docxCIS333 – Assignments and Rubrics Assignment 1 Creating an.docx
CIS333 – Assignments and Rubrics Assignment 1 Creating an.docx
sleeperharwell
 
Leverage Data Strategy as a Catalyst for Innovation
Leverage Data Strategy as a Catalyst for InnovationLeverage Data Strategy as a Catalyst for Innovation
Leverage Data Strategy as a Catalyst for Innovation
Glorium Tech
 
Secure Software Development Models and Methods integrated with CMMI.ppt
Secure Software Development Models and Methods integrated with CMMI.pptSecure Software Development Models and Methods integrated with CMMI.ppt
Secure Software Development Models and Methods integrated with CMMI.ppt
Neha Sharma
 

Similar to RSA Conference 09 - Building Security Models to Support Business Decisions 090429 (20)

Old Presentation on Security Metrics 2005
Old Presentation on Security Metrics 2005Old Presentation on Security Metrics 2005
Old Presentation on Security Metrics 2005
 
ESA for Business
ESA for BusinessESA for Business
ESA for Business
 
ASMC 2017 - Rudy Neefs - Van bedrijfspolitieman naar kritieke businesspartner
ASMC 2017 - Rudy Neefs - Van bedrijfspolitieman naar kritieke businesspartnerASMC 2017 - Rudy Neefs - Van bedrijfspolitieman naar kritieke businesspartner
ASMC 2017 - Rudy Neefs - Van bedrijfspolitieman naar kritieke businesspartner
 
Gs Us Roadmap For A World Class Information Security Management System– Isoie...
Gs Us Roadmap For A World Class Information Security Management System– Isoie...Gs Us Roadmap For A World Class Information Security Management System– Isoie...
Gs Us Roadmap For A World Class Information Security Management System– Isoie...
 
CIS333 – Assignments and Rubrics © 2017 Strayer Unive.docx
CIS333 – Assignments and Rubrics   © 2017 Strayer Unive.docxCIS333 – Assignments and Rubrics   © 2017 Strayer Unive.docx
CIS333 – Assignments and Rubrics © 2017 Strayer Unive.docx
 
NIST Critical Security Framework (CSF)
NIST Critical Security Framework (CSF) NIST Critical Security Framework (CSF)
NIST Critical Security Framework (CSF)
 
Security Policies and Implementation IssuesLecture 5How to D.docx
Security Policies and Implementation IssuesLecture 5How to D.docxSecurity Policies and Implementation IssuesLecture 5How to D.docx
Security Policies and Implementation IssuesLecture 5How to D.docx
 
2023-it-roadmap-for-cybersecurity-techcnical
2023-it-roadmap-for-cybersecurity-techcnical2023-it-roadmap-for-cybersecurity-techcnical
2023-it-roadmap-for-cybersecurity-techcnical
 
Managing Products Portfolios
Managing Products PortfoliosManaging Products Portfolios
Managing Products Portfolios
 
Business case for Information Security program
Business case for Information Security programBusiness case for Information Security program
Business case for Information Security program
 
Business case for information security program
Business case for information security programBusiness case for information security program
Business case for information security program
 
Simplifying Security for Cloud Adoption - Defining your game plan
Simplifying Security for Cloud Adoption - Defining your game planSimplifying Security for Cloud Adoption - Defining your game plan
Simplifying Security for Cloud Adoption - Defining your game plan
 
7-lessons-learned-from-bsimm
7-lessons-learned-from-bsimm7-lessons-learned-from-bsimm
7-lessons-learned-from-bsimm
 
CIS333 – Assignments and Rubrics Assignment 1 Creatin.docx
CIS333 – Assignments and Rubrics  Assignment 1 Creatin.docxCIS333 – Assignments and Rubrics  Assignment 1 Creatin.docx
CIS333 – Assignments and Rubrics Assignment 1 Creatin.docx
 
CIS333 – Networking Security Fundamentals © 2017 Stray.docx
 CIS333 – Networking Security Fundamentals  © 2017 Stray.docx CIS333 – Networking Security Fundamentals  © 2017 Stray.docx
CIS333 – Networking Security Fundamentals © 2017 Stray.docx
 
CIS333 – Networking Security Fundamentals © 2017 Stray.docx
CIS333 – Networking Security Fundamentals  © 2017 Stray.docxCIS333 – Networking Security Fundamentals  © 2017 Stray.docx
CIS333 – Networking Security Fundamentals © 2017 Stray.docx
 
Battle Tested Application Security
Battle Tested Application SecurityBattle Tested Application Security
Battle Tested Application Security
 
CIS333 – Assignments and Rubrics Assignment 1 Creating an.docx
CIS333 – Assignments and Rubrics Assignment 1 Creating an.docxCIS333 – Assignments and Rubrics Assignment 1 Creating an.docx
CIS333 – Assignments and Rubrics Assignment 1 Creating an.docx
 
Leverage Data Strategy as a Catalyst for Innovation
Leverage Data Strategy as a Catalyst for InnovationLeverage Data Strategy as a Catalyst for Innovation
Leverage Data Strategy as a Catalyst for Innovation
 
Secure Software Development Models and Methods integrated with CMMI.ppt
Secure Software Development Models and Methods integrated with CMMI.pptSecure Software Development Models and Methods integrated with CMMI.ppt
Secure Software Development Models and Methods integrated with CMMI.ppt
 

Recently uploaded

Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Operating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptxOperating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptx
Pravash Chandra Das
 
Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!
GDSC PJATK
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
HarisZaheer8
 
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
alexjohnson7307
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Jeffrey Haguewood
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
Hiike
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 

Recently uploaded (20)

Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Operating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptxOperating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptx
 
Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
 
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 

RSA Conference 09 - Building Security Models to Support Business Decisions 090429

Editor's Notes

  1. Security funding and support can’t rely on regulatory drivers. Its time CISOs, Risk Mgmt officers, and other groups demonstrate security ROI and communicate security strategy in terms that executive management understands.
  2. Understand the ‘forces’ that result in a change to the effectiveness of the security framework.