SlideShare a Scribd company logo
WE AUDITS!
Or “Simple Steps to Make Your Audit(s) Less Painful.”
Your Presenter: Benjamin D. Brooks
Benjamin Brooks’ areas of expertise lie primarily in technical controls, risk
mitigation strategies, and compliance. He is a Subject Matter Expert on the
PCI DSS and a member of the CSO Advisory Team. Before coming to
SecureState, Benjamin worked in the Green Energy and payment card
industries, and is a former member of the US SOCOM Tactical Information
Operations group providing technical capability in the field to US Navy SEALs
and other government organizations. He holds a Bachelors of Political
Science from the University of Illinois and is an (ISC)2 CISSP, PCI QSA, qnd
NIST Level 3 Certifier.
Everyone Hates the Auditor…
• The day of the Audit is announced
• The chaos begins…
… scrambling to gather documents
… double checking “compliance”
… seasoned vets ensure their
retirement funds are maxed
... compliance managers pour over
cryptic tomes of regulations “The auditors are coming, the
auditors are coming!”
Everyone Hates the Auditor…
• The Day of the Audit
• The battle begins…
… new employees are
prepared to be thrown under
the bus
… the auditor digs until they
find damning evidence
… interviewees argue, fight,
and plead their cases
It doesn’t have to be like this
Start with Why…
• Requirement?
• Check-in-the box?
• Wait… Aren’t you an information security professional?
What Does the “Better Audit” Look Like?
If You Are the Auditor… (Technical)
1. Be professional
2. Be knowledgeable
3. Be prepared
If You Are the Auditor… (Personal)
4. No one is ever 100% compliant
5. Yes, you’re a judge: Be fair
6. Remember where you came from
If You Are Being Audited… (Technical)
1. Be professional
2. Be knowledgeable
3. Be prepared
If You Are Being Audited… (Personal)
4. Be Honest
5. Easy as she goes
6. Be Patient
A Two-Way Street, Auditor
Challenge:
1) Be understanding
2) Add value during your trip
A Two-Way Street, System Owner
Challenge:
1) Security is key!
2) Operate your system to
the standard you are held
We hope you’ll learn to love them too!
bbrooks@securestate.com
216 -927- 8525
WE AUDITS!

More Related Content

Viewers also liked

ກົນລະສາດ2 ງານ ແລະ ພະລັງງານ ( Work and Energy)
ກົນລະສາດ2  ງານ ແລະ ພະລັງງານ ( Work and Energy)ກົນລະສາດ2  ງານ ແລະ ພະລັງງານ ( Work and Energy)
ກົນລະສາດ2 ງານ ແລະ ພະລັງງານ ( Work and Energy)
Pem(ເປ່ມ) PHAKVISETH
 
Wortha Look Resume Template
Wortha Look Resume TemplateWortha Look Resume Template
Wortha Look Resume Template
Black River Ventures
 
Fare business con i Social Media
Fare business con i Social MediaFare business con i Social Media
Fare business con i Social Media
Social Media Easy
 
ບົດລາຍງານ ວິຊາ ພະລັງງານຍືນຍົງ (Sustainable energy)
ບົດລາຍງານ ວິຊາ ພະລັງງານຍືນຍົງ  (Sustainable energy)ບົດລາຍງານ ວິຊາ ພະລັງງານຍືນຍົງ  (Sustainable energy)
ບົດລາຍງານ ວິຊາ ພະລັງງານຍືນຍົງ (Sustainable energy)
Pem(ເປ່ມ) PHAKVISETH
 
Presentación DIVVEE SOCIAL WhatsApp +51935978186
Presentación DIVVEE SOCIAL WhatsApp +51935978186 Presentación DIVVEE SOCIAL WhatsApp +51935978186
Presentación DIVVEE SOCIAL WhatsApp +51935978186
Fernandotrave
 
Γ ΓΥΜΝΑΣΙΟΥ ΜΑΘΗΜΑ 42 Η ΠΟΛΙΤΙΚΗ ΔΙΑΙΡΕΣΗ ΤΗΣ ΜΕΤΑΠΟΛΕΜΙΚΗΣ ΕΥΡΩΠΗΣ
Γ ΓΥΜΝΑΣΙΟΥ ΜΑΘΗΜΑ 42 Η ΠΟΛΙΤΙΚΗ ΔΙΑΙΡΕΣΗ ΤΗΣ ΜΕΤΑΠΟΛΕΜΙΚΗΣ ΕΥΡΩΠΗΣΓ ΓΥΜΝΑΣΙΟΥ ΜΑΘΗΜΑ 42 Η ΠΟΛΙΤΙΚΗ ΔΙΑΙΡΕΣΗ ΤΗΣ ΜΕΤΑΠΟΛΕΜΙΚΗΣ ΕΥΡΩΠΗΣ
Γ ΓΥΜΝΑΣΙΟΥ ΜΑΘΗΜΑ 42 Η ΠΟΛΙΤΙΚΗ ΔΙΑΙΡΕΣΗ ΤΗΣ ΜΕΤΑΠΟΛΕΜΙΚΗΣ ΕΥΡΩΠΗΣ
Manolis Savorianakis
 

Viewers also liked (7)

Sireias
SireiasSireias
Sireias
 
ກົນລະສາດ2 ງານ ແລະ ພະລັງງານ ( Work and Energy)
ກົນລະສາດ2  ງານ ແລະ ພະລັງງານ ( Work and Energy)ກົນລະສາດ2  ງານ ແລະ ພະລັງງານ ( Work and Energy)
ກົນລະສາດ2 ງານ ແລະ ພະລັງງານ ( Work and Energy)
 
Wortha Look Resume Template
Wortha Look Resume TemplateWortha Look Resume Template
Wortha Look Resume Template
 
Fare business con i Social Media
Fare business con i Social MediaFare business con i Social Media
Fare business con i Social Media
 
ບົດລາຍງານ ວິຊາ ພະລັງງານຍືນຍົງ (Sustainable energy)
ບົດລາຍງານ ວິຊາ ພະລັງງານຍືນຍົງ  (Sustainable energy)ບົດລາຍງານ ວິຊາ ພະລັງງານຍືນຍົງ  (Sustainable energy)
ບົດລາຍງານ ວິຊາ ພະລັງງານຍືນຍົງ (Sustainable energy)
 
Presentación DIVVEE SOCIAL WhatsApp +51935978186
Presentación DIVVEE SOCIAL WhatsApp +51935978186 Presentación DIVVEE SOCIAL WhatsApp +51935978186
Presentación DIVVEE SOCIAL WhatsApp +51935978186
 
Γ ΓΥΜΝΑΣΙΟΥ ΜΑΘΗΜΑ 42 Η ΠΟΛΙΤΙΚΗ ΔΙΑΙΡΕΣΗ ΤΗΣ ΜΕΤΑΠΟΛΕΜΙΚΗΣ ΕΥΡΩΠΗΣ
Γ ΓΥΜΝΑΣΙΟΥ ΜΑΘΗΜΑ 42 Η ΠΟΛΙΤΙΚΗ ΔΙΑΙΡΕΣΗ ΤΗΣ ΜΕΤΑΠΟΛΕΜΙΚΗΣ ΕΥΡΩΠΗΣΓ ΓΥΜΝΑΣΙΟΥ ΜΑΘΗΜΑ 42 Η ΠΟΛΙΤΙΚΗ ΔΙΑΙΡΕΣΗ ΤΗΣ ΜΕΤΑΠΟΛΕΜΙΚΗΣ ΕΥΡΩΠΗΣ
Γ ΓΥΜΝΑΣΙΟΥ ΜΑΘΗΜΑ 42 Η ΠΟΛΙΤΙΚΗ ΔΙΑΙΡΕΣΗ ΤΗΣ ΜΕΤΑΠΟΛΕΜΙΚΗΣ ΕΥΡΩΠΗΣ
 

Similar to WeLuvAudits-SecureState2

Slide Deck – Class Session 1 – FRSecure CISSP Mentor Program
Slide Deck – Class Session 1 – FRSecure CISSP Mentor ProgramSlide Deck – Class Session 1 – FRSecure CISSP Mentor Program
Slide Deck – Class Session 1 – FRSecure CISSP Mentor Program
FRSecure
 
Slide Deck - CISSP Mentor Program Class Session 1
Slide Deck - CISSP Mentor Program Class Session 1Slide Deck - CISSP Mentor Program Class Session 1
Slide Deck - CISSP Mentor Program Class Session 1
FRSecure
 
Forensic audit
Forensic auditForensic audit
Forensic audit
Tobias Keller
 
cybersecurity analyst.pptx
cybersecurity analyst.pptxcybersecurity analyst.pptx
cybersecurity analyst.pptx
Boni Yeamin
 
Career In Information security
Career In Information securityCareer In Information security
Career In Information security
Anant Shrivastava
 
Utilizing OSINT in Threat Analytics and Incident Response
Utilizing OSINT in Threat Analytics and Incident ResponseUtilizing OSINT in Threat Analytics and Incident Response
Utilizing OSINT in Threat Analytics and Incident Response
Christopher Beiring
 
Thought Leader Global 2014 Amsterdam: Taking Security seriously -> Going beyo...
Thought Leader Global 2014 Amsterdam: Taking Security seriously -> Going beyo...Thought Leader Global 2014 Amsterdam: Taking Security seriously -> Going beyo...
Thought Leader Global 2014 Amsterdam: Taking Security seriously -> Going beyo...
Claus Cramon Houmann
 
2019 FRecure CISSP Mentor Program: Session Two
2019 FRecure CISSP Mentor Program: Session Two2019 FRecure CISSP Mentor Program: Session Two
2019 FRecure CISSP Mentor Program: Session Two
FRSecure
 
Anton Chuvakin - So You Got That SIEM, NOW What Do You Do?
Anton Chuvakin - So You Got That SIEM, NOW What Do You Do?Anton Chuvakin - So You Got That SIEM, NOW What Do You Do?
Anton Chuvakin - So You Got That SIEM, NOW What Do You Do?Source Conference
 
CISO Case Study 2011 V2
CISO Case Study  2011 V2CISO Case Study  2011 V2
CISO Case Study 2011 V2
candy_alexander
 
Financial Expert Witness Issues: How to Handle the Dangerous Financial Expert...
Financial Expert Witness Issues: How to Handle the Dangerous Financial Expert...Financial Expert Witness Issues: How to Handle the Dangerous Financial Expert...
Financial Expert Witness Issues: How to Handle the Dangerous Financial Expert...
DecosimoCPAs
 
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Shawn Tuma
 
How to assess and manage cyber risk
How to assess and manage cyber riskHow to assess and manage cyber risk
How to assess and manage cyber risk
Stephen Cobb
 
Penetration Testing and Vulnerability Assessments: Examining the SEC and FINR...
Penetration Testing and Vulnerability Assessments: Examining the SEC and FINR...Penetration Testing and Vulnerability Assessments: Examining the SEC and FINR...
Penetration Testing and Vulnerability Assessments: Examining the SEC and FINR...
TruShield Security Solutions
 
How to Boost your Cyber Risk Management Program and Capabilities?
How to Boost your Cyber Risk Management Program and Capabilities?How to Boost your Cyber Risk Management Program and Capabilities?
How to Boost your Cyber Risk Management Program and Capabilities?
PECB
 
What Suppliers Don't Tell You About Security?
What Suppliers Don't Tell You About Security?What Suppliers Don't Tell You About Security?
What Suppliers Don't Tell You About Security?
PECB
 
People are the biggest risk
People are the biggest riskPeople are the biggest risk
People are the biggest riskEvan Francen
 
2018 CISSP Mentor Program Session 2
2018 CISSP Mentor Program Session 22018 CISSP Mentor Program Session 2
2018 CISSP Mentor Program Session 2
FRSecure
 
How to Secure America
How to Secure AmericaHow to Secure America
How to Secure America
SecurityStudio
 
Bauer, Jerry, Burns & McDonnell, Coping with Environmental Agency Inspections...
Bauer, Jerry, Burns & McDonnell, Coping with Environmental Agency Inspections...Bauer, Jerry, Burns & McDonnell, Coping with Environmental Agency Inspections...
Bauer, Jerry, Burns & McDonnell, Coping with Environmental Agency Inspections...
Kevin Perry
 

Similar to WeLuvAudits-SecureState2 (20)

Slide Deck – Class Session 1 – FRSecure CISSP Mentor Program
Slide Deck – Class Session 1 – FRSecure CISSP Mentor ProgramSlide Deck – Class Session 1 – FRSecure CISSP Mentor Program
Slide Deck – Class Session 1 – FRSecure CISSP Mentor Program
 
Slide Deck - CISSP Mentor Program Class Session 1
Slide Deck - CISSP Mentor Program Class Session 1Slide Deck - CISSP Mentor Program Class Session 1
Slide Deck - CISSP Mentor Program Class Session 1
 
Forensic audit
Forensic auditForensic audit
Forensic audit
 
cybersecurity analyst.pptx
cybersecurity analyst.pptxcybersecurity analyst.pptx
cybersecurity analyst.pptx
 
Career In Information security
Career In Information securityCareer In Information security
Career In Information security
 
Utilizing OSINT in Threat Analytics and Incident Response
Utilizing OSINT in Threat Analytics and Incident ResponseUtilizing OSINT in Threat Analytics and Incident Response
Utilizing OSINT in Threat Analytics and Incident Response
 
Thought Leader Global 2014 Amsterdam: Taking Security seriously -> Going beyo...
Thought Leader Global 2014 Amsterdam: Taking Security seriously -> Going beyo...Thought Leader Global 2014 Amsterdam: Taking Security seriously -> Going beyo...
Thought Leader Global 2014 Amsterdam: Taking Security seriously -> Going beyo...
 
2019 FRecure CISSP Mentor Program: Session Two
2019 FRecure CISSP Mentor Program: Session Two2019 FRecure CISSP Mentor Program: Session Two
2019 FRecure CISSP Mentor Program: Session Two
 
Anton Chuvakin - So You Got That SIEM, NOW What Do You Do?
Anton Chuvakin - So You Got That SIEM, NOW What Do You Do?Anton Chuvakin - So You Got That SIEM, NOW What Do You Do?
Anton Chuvakin - So You Got That SIEM, NOW What Do You Do?
 
CISO Case Study 2011 V2
CISO Case Study  2011 V2CISO Case Study  2011 V2
CISO Case Study 2011 V2
 
Financial Expert Witness Issues: How to Handle the Dangerous Financial Expert...
Financial Expert Witness Issues: How to Handle the Dangerous Financial Expert...Financial Expert Witness Issues: How to Handle the Dangerous Financial Expert...
Financial Expert Witness Issues: How to Handle the Dangerous Financial Expert...
 
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
 
How to assess and manage cyber risk
How to assess and manage cyber riskHow to assess and manage cyber risk
How to assess and manage cyber risk
 
Penetration Testing and Vulnerability Assessments: Examining the SEC and FINR...
Penetration Testing and Vulnerability Assessments: Examining the SEC and FINR...Penetration Testing and Vulnerability Assessments: Examining the SEC and FINR...
Penetration Testing and Vulnerability Assessments: Examining the SEC and FINR...
 
How to Boost your Cyber Risk Management Program and Capabilities?
How to Boost your Cyber Risk Management Program and Capabilities?How to Boost your Cyber Risk Management Program and Capabilities?
How to Boost your Cyber Risk Management Program and Capabilities?
 
What Suppliers Don't Tell You About Security?
What Suppliers Don't Tell You About Security?What Suppliers Don't Tell You About Security?
What Suppliers Don't Tell You About Security?
 
People are the biggest risk
People are the biggest riskPeople are the biggest risk
People are the biggest risk
 
2018 CISSP Mentor Program Session 2
2018 CISSP Mentor Program Session 22018 CISSP Mentor Program Session 2
2018 CISSP Mentor Program Session 2
 
How to Secure America
How to Secure AmericaHow to Secure America
How to Secure America
 
Bauer, Jerry, Burns & McDonnell, Coping with Environmental Agency Inspections...
Bauer, Jerry, Burns & McDonnell, Coping with Environmental Agency Inspections...Bauer, Jerry, Burns & McDonnell, Coping with Environmental Agency Inspections...
Bauer, Jerry, Burns & McDonnell, Coping with Environmental Agency Inspections...
 

WeLuvAudits-SecureState2

  • 1. WE AUDITS! Or “Simple Steps to Make Your Audit(s) Less Painful.”
  • 2. Your Presenter: Benjamin D. Brooks Benjamin Brooks’ areas of expertise lie primarily in technical controls, risk mitigation strategies, and compliance. He is a Subject Matter Expert on the PCI DSS and a member of the CSO Advisory Team. Before coming to SecureState, Benjamin worked in the Green Energy and payment card industries, and is a former member of the US SOCOM Tactical Information Operations group providing technical capability in the field to US Navy SEALs and other government organizations. He holds a Bachelors of Political Science from the University of Illinois and is an (ISC)2 CISSP, PCI QSA, qnd NIST Level 3 Certifier.
  • 3. Everyone Hates the Auditor… • The day of the Audit is announced • The chaos begins… … scrambling to gather documents … double checking “compliance” … seasoned vets ensure their retirement funds are maxed ... compliance managers pour over cryptic tomes of regulations “The auditors are coming, the auditors are coming!”
  • 4. Everyone Hates the Auditor… • The Day of the Audit • The battle begins… … new employees are prepared to be thrown under the bus … the auditor digs until they find damning evidence … interviewees argue, fight, and plead their cases
  • 5. It doesn’t have to be like this
  • 6. Start with Why… • Requirement? • Check-in-the box? • Wait… Aren’t you an information security professional?
  • 7. What Does the “Better Audit” Look Like?
  • 8. If You Are the Auditor… (Technical) 1. Be professional 2. Be knowledgeable 3. Be prepared
  • 9. If You Are the Auditor… (Personal) 4. No one is ever 100% compliant 5. Yes, you’re a judge: Be fair 6. Remember where you came from
  • 10. If You Are Being Audited… (Technical) 1. Be professional 2. Be knowledgeable 3. Be prepared
  • 11. If You Are Being Audited… (Personal) 4. Be Honest 5. Easy as she goes 6. Be Patient
  • 12. A Two-Way Street, Auditor Challenge: 1) Be understanding 2) Add value during your trip
  • 13. A Two-Way Street, System Owner Challenge: 1) Security is key! 2) Operate your system to the standard you are held
  • 14. We hope you’ll learn to love them too! bbrooks@securestate.com 216 -927- 8525 WE AUDITS!