SlideShare a Scribd company logo
CISOs and their teams operate against a backdrop of continuous change in the threat
landscape, information security technology, and business conditions. The mission to
protect critical assets across space and time is further complicated by a lack of direct
control over the people and processes that expose the organization to risk through day-
to-day operations.
In-depth research with hundreds of information security leaders revealed
a common thread among the top performers:
Technical skills, while essential, are not enough.
To deliver maximum impact, Information Security must
engage with the business and practice proactive
organizational engagement.
The image cannot be displayed. Your computer may not have enough memory to open the image, or the image may have been corrupted. Restart your computer,
and then open the file again. If the red x still appears, you may have to delete the image and then insert it again.
To drive insight and enable action
on these “soft skills,” IANS has
broken proactive organizational
engagement down into a set of
clearly defined, quantifiable
elements we call The 7 Factors
of CISO Impact.
Our CISO Impact framework provides a
structured, action-oriented approach that
allows you to baseline your performance
and measure progress down to the Factor
and sub-Factor levels as you work towards
b e t t e r p ro a c t i v e o rg a n i z a t i o n a l
engagement.
First step: take the Diagnostic.
The Diagnostic is an online self-
assessment that measures the current
state of your team’s organizational
engagement. Your personal report
provides you with insight into your team’s
strengths and weaknesses, and allows
you to compare the results to those of
your peers.
As you work to improve your skill sets in
each of the 7 Factors, your Diagnostic
results will reflect your progress.
The image cannot be displayed. Your computer may not have enough memory to open the image, or the image may have been corrupted. Restart your
computer, and then open the file again. If the red x still appears, you may have to delete the image and then insert it again.
Then, attend
a CISO Impact
Workshop.
The CISO Impact Workshop is a four-hour
deep dive into one of the 7 Factors of
CISO Impact.
IANS-proprietary worksheets will help you
break down your Factor-specific Diagnostic
results into concrete, step-by-step actions
for improvement.
You’ll experience a new way of thinking
about what you do, and walk away with
insights that will influence the way that you
execute your mission.
A CISO Impact Workshop is a collaborative
hands-on working session.
Wrap-Up
Review lessons
learned and
discuss of how
improvement
will drive
success.Introductions
Get to know your
fellow CISOs
Workshop Orientation
The IANS facilitator
describes the workshop
context, components and
flow for the day
Solo Work
Document your
team’s skills and
processes vs. the
workshop Factor.
Presentations &
Feedback
Present your
workbook
writings and
receive feedback
from your peers.
Research Overview
A discussion of the
research and structure of
the CISO Impact
framework
Diagnostic
An explanation of how
the CISO Impact self-
assessment tool works
What are the 7 Factors?
An overview of the individual
7 Factors of CISO Impact,
and a look at how they all
work together to drive
success.
Small Group
Discussion
Share ideas and
challenges with
your small group
How can you embed information security
into key business processes?
Our research shows that 72% CISOs are still in the very
early stages of integrating information security criteria
into the day-to-day processes of their organization.
What steps can you take to weave information security
into the fabric of processes like software development
and vendor selection?
Factor 3:
Embed Information
Security into Key
Business Processes
At a recent Factor 3 Workshop, we posed the question:
Participants discussed the challenges …
… and through that discussion, shared
thoughts on how to address the problem.
The image cannot be displayed. Your computer may not have enough memory to open the image, or the image may have been corrupted. Restart your computer, and then open the file again. If the red x still appears, you may have to delete the image and then insert it again.
“Goals mis-match is the biggest
obstacle. Our developers are measured
on timely delivery and we’re measured
on security defects. Besides, they think
they’ve got security covered.” “Good news: Awareness is
up and we’re invited to
assess more projects. Bad
news: Awareness is up and
we’re invited to assess more
projects.”
“We’re working to get the
risks of cloud under control
but any employee with a
credit card can spin up a
cloud deployment. “
You’ll walk away with strategies for success
in real-world situations. For example,
you’ll learn how to:
•  Communicate the tangible input that security can have in
high-level business decisions like M&As
•  Establish agreements with Finance and Legal that compel
assessment of new vendors before contracts are signed
•  Learn how to win the agreement of key stakeholders - like the
VP of App Dev, for example - to weave information security
criteria and implement verification steps like code testing into
processes like the SDLC.

More Related Content

What's hot

Key Roles in a Lean or Six Sigma Project with Matt Hansen at StatStuff
Key Roles in a Lean or Six Sigma Project with Matt Hansen at StatStuffKey Roles in a Lean or Six Sigma Project with Matt Hansen at StatStuff
Key Roles in a Lean or Six Sigma Project with Matt Hansen at StatStuff
Matt Hansen
 
Documenting a New Process with SOPs
Documenting a New Process with SOPsDocumenting a New Process with SOPs
Documenting a New Process with SOPs
Matt Hansen
 
Keynote Scrum Gathering Barcelona 2012
Keynote Scrum Gathering Barcelona 2012Keynote Scrum Gathering Barcelona 2012
Keynote Scrum Gathering Barcelona 2012michaelfeathers
 
Get Your Team to Use and Love Project Management Software
Get Your Team to Use and Love Project Management SoftwareGet Your Team to Use and Love Project Management Software
Get Your Team to Use and Love Project Management Software
Orangescrum
 
Lean project risk factor management
Lean project risk factor managementLean project risk factor management
Lean project risk factor management
Chul-Young Byun
 
Use DevOps to Respond Faster to End Customers
Use DevOps to Respond Faster to End CustomersUse DevOps to Respond Faster to End Customers
Use DevOps to Respond Faster to End Customers
Info-Tech Research Group
 
Common IT Mistakes
Common IT MistakesCommon IT Mistakes
Common IT Mistakes
OutsourceIT
 
Closing a Project
Closing a ProjectClosing a Project
Closing a Project
Matt Hansen
 
Pace IT Troubleshooting Theory
Pace IT Troubleshooting TheoryPace IT Troubleshooting Theory
Pace IT Troubleshooting Theory
Pace IT at Edmonds Community College
 
How to fail in project management
How to fail in project managementHow to fail in project management
How to fail in project managementPrasetyo Nugroho
 
Safety Changer | QHSE solutions for professionals
Safety Changer | QHSE solutions for professionalsSafety Changer | QHSE solutions for professionals
Safety Changer | QHSE solutions for professionals
Safety Changer
 
PCI 3.0 Webcast: Minimizing the Business Impact of the PCI 2.0 - 3.0 Transition
PCI 3.0 Webcast: Minimizing the Business Impact of the PCI 2.0 - 3.0 TransitionPCI 3.0 Webcast: Minimizing the Business Impact of the PCI 2.0 - 3.0 Transition
PCI 3.0 Webcast: Minimizing the Business Impact of the PCI 2.0 - 3.0 Transition
Sally Sheward
 
Project Pre-Assessment Using a Min/Max Analysis with Matt Hansen at StatStuff
Project Pre-Assessment Using a Min/Max Analysis with Matt Hansen at StatStuffProject Pre-Assessment Using a Min/Max Analysis with Matt Hansen at StatStuff
Project Pre-Assessment Using a Min/Max Analysis with Matt Hansen at StatStuff
Matt Hansen
 
The DMAIC Roadmap (Levels 1 & 2) with Matt Hansen at StatStuff
The DMAIC Roadmap (Levels 1 & 2) with Matt Hansen at StatStuffThe DMAIC Roadmap (Levels 1 & 2) with Matt Hansen at StatStuff
The DMAIC Roadmap (Levels 1 & 2) with Matt Hansen at StatStuff
Matt Hansen
 
Truvantis PCI 3.0 Webcast: Minimizing the Business Impact of the PCI-DSS 3.0 ...
Truvantis PCI 3.0 Webcast: Minimizing the Business Impact of the PCI-DSS 3.0 ...Truvantis PCI 3.0 Webcast: Minimizing the Business Impact of the PCI-DSS 3.0 ...
Truvantis PCI 3.0 Webcast: Minimizing the Business Impact of the PCI-DSS 3.0 ...
truvantis
 
How to Make Better Decisions Managing Disasters: Delphi Decision Maker - Real...
How to Make Better Decisions Managing Disasters: Delphi Decision Maker - Real...How to Make Better Decisions Managing Disasters: Delphi Decision Maker - Real...
How to Make Better Decisions Managing Disasters: Delphi Decision Maker - Real...
Connie White
 
Software Development Process Improvement
Software Development Process ImprovementSoftware Development Process Improvement
Software Development Process ImprovementCornelius Mellino
 
Reducing Time Spent On Requirements
Reducing Time Spent On RequirementsReducing Time Spent On Requirements
Reducing Time Spent On Requirements
Byron Workman
 
Risk Assessment with a FMEA Tool
Risk Assessment with a FMEA ToolRisk Assessment with a FMEA Tool
Risk Assessment with a FMEA Tool
Matt Hansen
 
It project management infamous failures, classic mistakes, and best practices
It project management infamous failures, classic mistakes, and best practicesIt project management infamous failures, classic mistakes, and best practices
It project management infamous failures, classic mistakes, and best practices
Mahyar Teymournezhad
 

What's hot (20)

Key Roles in a Lean or Six Sigma Project with Matt Hansen at StatStuff
Key Roles in a Lean or Six Sigma Project with Matt Hansen at StatStuffKey Roles in a Lean or Six Sigma Project with Matt Hansen at StatStuff
Key Roles in a Lean or Six Sigma Project with Matt Hansen at StatStuff
 
Documenting a New Process with SOPs
Documenting a New Process with SOPsDocumenting a New Process with SOPs
Documenting a New Process with SOPs
 
Keynote Scrum Gathering Barcelona 2012
Keynote Scrum Gathering Barcelona 2012Keynote Scrum Gathering Barcelona 2012
Keynote Scrum Gathering Barcelona 2012
 
Get Your Team to Use and Love Project Management Software
Get Your Team to Use and Love Project Management SoftwareGet Your Team to Use and Love Project Management Software
Get Your Team to Use and Love Project Management Software
 
Lean project risk factor management
Lean project risk factor managementLean project risk factor management
Lean project risk factor management
 
Use DevOps to Respond Faster to End Customers
Use DevOps to Respond Faster to End CustomersUse DevOps to Respond Faster to End Customers
Use DevOps to Respond Faster to End Customers
 
Common IT Mistakes
Common IT MistakesCommon IT Mistakes
Common IT Mistakes
 
Closing a Project
Closing a ProjectClosing a Project
Closing a Project
 
Pace IT Troubleshooting Theory
Pace IT Troubleshooting TheoryPace IT Troubleshooting Theory
Pace IT Troubleshooting Theory
 
How to fail in project management
How to fail in project managementHow to fail in project management
How to fail in project management
 
Safety Changer | QHSE solutions for professionals
Safety Changer | QHSE solutions for professionalsSafety Changer | QHSE solutions for professionals
Safety Changer | QHSE solutions for professionals
 
PCI 3.0 Webcast: Minimizing the Business Impact of the PCI 2.0 - 3.0 Transition
PCI 3.0 Webcast: Minimizing the Business Impact of the PCI 2.0 - 3.0 TransitionPCI 3.0 Webcast: Minimizing the Business Impact of the PCI 2.0 - 3.0 Transition
PCI 3.0 Webcast: Minimizing the Business Impact of the PCI 2.0 - 3.0 Transition
 
Project Pre-Assessment Using a Min/Max Analysis with Matt Hansen at StatStuff
Project Pre-Assessment Using a Min/Max Analysis with Matt Hansen at StatStuffProject Pre-Assessment Using a Min/Max Analysis with Matt Hansen at StatStuff
Project Pre-Assessment Using a Min/Max Analysis with Matt Hansen at StatStuff
 
The DMAIC Roadmap (Levels 1 & 2) with Matt Hansen at StatStuff
The DMAIC Roadmap (Levels 1 & 2) with Matt Hansen at StatStuffThe DMAIC Roadmap (Levels 1 & 2) with Matt Hansen at StatStuff
The DMAIC Roadmap (Levels 1 & 2) with Matt Hansen at StatStuff
 
Truvantis PCI 3.0 Webcast: Minimizing the Business Impact of the PCI-DSS 3.0 ...
Truvantis PCI 3.0 Webcast: Minimizing the Business Impact of the PCI-DSS 3.0 ...Truvantis PCI 3.0 Webcast: Minimizing the Business Impact of the PCI-DSS 3.0 ...
Truvantis PCI 3.0 Webcast: Minimizing the Business Impact of the PCI-DSS 3.0 ...
 
How to Make Better Decisions Managing Disasters: Delphi Decision Maker - Real...
How to Make Better Decisions Managing Disasters: Delphi Decision Maker - Real...How to Make Better Decisions Managing Disasters: Delphi Decision Maker - Real...
How to Make Better Decisions Managing Disasters: Delphi Decision Maker - Real...
 
Software Development Process Improvement
Software Development Process ImprovementSoftware Development Process Improvement
Software Development Process Improvement
 
Reducing Time Spent On Requirements
Reducing Time Spent On RequirementsReducing Time Spent On Requirements
Reducing Time Spent On Requirements
 
Risk Assessment with a FMEA Tool
Risk Assessment with a FMEA ToolRisk Assessment with a FMEA Tool
Risk Assessment with a FMEA Tool
 
It project management infamous failures, classic mistakes, and best practices
It project management infamous failures, classic mistakes, and best practicesIt project management infamous failures, classic mistakes, and best practices
It project management infamous failures, classic mistakes, and best practices
 

Viewers also liked

Sec1 chp 1what it takes
Sec1 chp 1what it takes Sec1 chp 1what it takes
Sec1 chp 1what it takes
Texas Agrilife Extension Service
 
Teresa Doner Clerical
Teresa Doner ClericalTeresa Doner Clerical
Teresa Doner ClericalTeresa Doner
 
Kineticom hot jobs 11.30
Kineticom hot jobs 11.30Kineticom hot jobs 11.30
Kineticom hot jobs 11.30cclishem
 
Sec5 leadership and vision
Sec5 leadership and visionSec5 leadership and vision
Sec5 leadership and vision
Texas Agrilife Extension Service
 
Matar per a “sanejar”.
Matar per a “sanejar”.  Matar per a “sanejar”.
Matar per a “sanejar”.
Jesús Frare Garcia
 
7 M-CARE: Fizyolojik ihtiyaçlar
7 M-CARE: Fizyolojik ihtiyaçlar7 M-CARE: Fizyolojik ihtiyaçlar
7 M-CARE: Fizyolojik ihtiyaçlar
Karel Van Isacker
 
Programación PASA
Programación PASAProgramación PASA
Programación PASA
Verónica Galán
 

Viewers also liked (7)

Sec1 chp 1what it takes
Sec1 chp 1what it takes Sec1 chp 1what it takes
Sec1 chp 1what it takes
 
Teresa Doner Clerical
Teresa Doner ClericalTeresa Doner Clerical
Teresa Doner Clerical
 
Kineticom hot jobs 11.30
Kineticom hot jobs 11.30Kineticom hot jobs 11.30
Kineticom hot jobs 11.30
 
Sec5 leadership and vision
Sec5 leadership and visionSec5 leadership and vision
Sec5 leadership and vision
 
Matar per a “sanejar”.
Matar per a “sanejar”.  Matar per a “sanejar”.
Matar per a “sanejar”.
 
7 M-CARE: Fizyolojik ihtiyaçlar
7 M-CARE: Fizyolojik ihtiyaçlar7 M-CARE: Fizyolojik ihtiyaçlar
7 M-CARE: Fizyolojik ihtiyaçlar
 
Programación PASA
Programación PASAProgramación PASA
Programación PASA
 

Similar to What is an IANS CISO Workshop? Factor 3

What is an IANS CISO Workshop? Factor 2
What is an IANS CISO Workshop? Factor 2What is an IANS CISO Workshop? Factor 2
What is an IANS CISO Workshop? Factor 2
IANS
 
What is an IANS CISO Workshop? Factor 6
What is an IANS CISO Workshop? Factor 6What is an IANS CISO Workshop? Factor 6
What is an IANS CISO Workshop? Factor 6
IANS
 
What is an IANS CISO Workshop? Factor 1
What is an IANS CISO Workshop? Factor 1What is an IANS CISO Workshop? Factor 1
What is an IANS CISO Workshop? Factor 1
IANS
 
What is an IANS CISO Impact Roundtable?
What is an IANS CISO Impact Roundtable?What is an IANS CISO Impact Roundtable?
What is an IANS CISO Impact Roundtable?
IANS
 
Balbix-New-CISO-Board-Deck.pptx
Balbix-New-CISO-Board-Deck.pptxBalbix-New-CISO-Board-Deck.pptx
Balbix-New-CISO-Board-Deck.pptx
jjvdneut
 
Balbix-New-CISO-Board-Deck.pptx
Balbix-New-CISO-Board-Deck.pptxBalbix-New-CISO-Board-Deck.pptx
Balbix-New-CISO-Board-Deck.pptx
jjvdneut
 
Information Security - Back to Basics - Own Your Vulnerabilities
Information Security - Back to Basics - Own Your VulnerabilitiesInformation Security - Back to Basics - Own Your Vulnerabilities
Information Security - Back to Basics - Own Your Vulnerabilities
Jack Nichelson
 
Complete network security protection for sme's within limited resources
Complete network security protection for sme's within limited resourcesComplete network security protection for sme's within limited resources
Complete network security protection for sme's within limited resources
IJNSA Journal
 
Enterprise Architecture in the Boardroom with Dragon1
Enterprise Architecture in the Boardroom with Dragon1Enterprise Architecture in the Boardroom with Dragon1
Enterprise Architecture in the Boardroom with Dragon1
Dragon1 Inc.
 
1 (1)
1 (1)1 (1)
COMPLETE NETWORK SECURITY PROTECTION FOR SME’SWITHIN LIMITED RESOURCES
COMPLETE NETWORK SECURITY PROTECTION FOR SME’SWITHIN LIMITED RESOURCESCOMPLETE NETWORK SECURITY PROTECTION FOR SME’SWITHIN LIMITED RESOURCES
COMPLETE NETWORK SECURITY PROTECTION FOR SME’SWITHIN LIMITED RESOURCES
IJNSA Journal
 
Software management
Software managementSoftware management
Software management
smumbahelp
 
Organization And Technical Aspects Of The Workflow
Organization And Technical Aspects Of The WorkflowOrganization And Technical Aspects Of The Workflow
Organization And Technical Aspects Of The Workflow
Michelle Singh
 
DIRECTIONSRate each statement by how well the behavior describe.docx
DIRECTIONSRate each statement by how well the behavior describe.docxDIRECTIONSRate each statement by how well the behavior describe.docx
DIRECTIONSRate each statement by how well the behavior describe.docx
cuddietheresa
 
hroughout the fifty-odd years of software development, the ind.docx
hroughout the fifty-odd years of software development, the ind.docxhroughout the fifty-odd years of software development, the ind.docx
hroughout the fifty-odd years of software development, the ind.docx
pooleavelina
 
INTERNAL Assign no 207( JAIPUR NATIONAL UNI)
INTERNAL Assign no   207( JAIPUR NATIONAL UNI)INTERNAL Assign no   207( JAIPUR NATIONAL UNI)
INTERNAL Assign no 207( JAIPUR NATIONAL UNI)
Partha_bappa
 
Managing Riskin InformationSystemsPowered by vLab Solu.docx
Managing Riskin InformationSystemsPowered by vLab Solu.docxManaging Riskin InformationSystemsPowered by vLab Solu.docx
Managing Riskin InformationSystemsPowered by vLab Solu.docx
jessiehampson
 
44 Introduction Identifying and assessing risks is.docx
44 Introduction Identifying and assessing risks is.docx44 Introduction Identifying and assessing risks is.docx
44 Introduction Identifying and assessing risks is.docx
blondellchancy
 
How To Plan a Software Project
How To Plan a Software ProjectHow To Plan a Software Project
How To Plan a Software Project
HowToPlanASoftwareProject
 

Similar to What is an IANS CISO Workshop? Factor 3 (20)

What is an IANS CISO Workshop? Factor 2
What is an IANS CISO Workshop? Factor 2What is an IANS CISO Workshop? Factor 2
What is an IANS CISO Workshop? Factor 2
 
What is an IANS CISO Workshop? Factor 6
What is an IANS CISO Workshop? Factor 6What is an IANS CISO Workshop? Factor 6
What is an IANS CISO Workshop? Factor 6
 
What is an IANS CISO Workshop? Factor 1
What is an IANS CISO Workshop? Factor 1What is an IANS CISO Workshop? Factor 1
What is an IANS CISO Workshop? Factor 1
 
What is an IANS CISO Impact Roundtable?
What is an IANS CISO Impact Roundtable?What is an IANS CISO Impact Roundtable?
What is an IANS CISO Impact Roundtable?
 
Balbix-New-CISO-Board-Deck.pptx
Balbix-New-CISO-Board-Deck.pptxBalbix-New-CISO-Board-Deck.pptx
Balbix-New-CISO-Board-Deck.pptx
 
Balbix-New-CISO-Board-Deck.pptx
Balbix-New-CISO-Board-Deck.pptxBalbix-New-CISO-Board-Deck.pptx
Balbix-New-CISO-Board-Deck.pptx
 
Information Security - Back to Basics - Own Your Vulnerabilities
Information Security - Back to Basics - Own Your VulnerabilitiesInformation Security - Back to Basics - Own Your Vulnerabilities
Information Security - Back to Basics - Own Your Vulnerabilities
 
Complete network security protection for sme's within limited resources
Complete network security protection for sme's within limited resourcesComplete network security protection for sme's within limited resources
Complete network security protection for sme's within limited resources
 
Enterprise Architecture in the Boardroom with Dragon1
Enterprise Architecture in the Boardroom with Dragon1Enterprise Architecture in the Boardroom with Dragon1
Enterprise Architecture in the Boardroom with Dragon1
 
1 (1)
1 (1)1 (1)
1 (1)
 
COMPLETE NETWORK SECURITY PROTECTION FOR SME’SWITHIN LIMITED RESOURCES
COMPLETE NETWORK SECURITY PROTECTION FOR SME’SWITHIN LIMITED RESOURCESCOMPLETE NETWORK SECURITY PROTECTION FOR SME’SWITHIN LIMITED RESOURCES
COMPLETE NETWORK SECURITY PROTECTION FOR SME’SWITHIN LIMITED RESOURCES
 
Software management
Software managementSoftware management
Software management
 
Organization And Technical Aspects Of The Workflow
Organization And Technical Aspects Of The WorkflowOrganization And Technical Aspects Of The Workflow
Organization And Technical Aspects Of The Workflow
 
DIRECTIONSRate each statement by how well the behavior describe.docx
DIRECTIONSRate each statement by how well the behavior describe.docxDIRECTIONSRate each statement by how well the behavior describe.docx
DIRECTIONSRate each statement by how well the behavior describe.docx
 
So you want to be a CISO - 5 steps to Success
So you want to be a CISO - 5 steps to SuccessSo you want to be a CISO - 5 steps to Success
So you want to be a CISO - 5 steps to Success
 
hroughout the fifty-odd years of software development, the ind.docx
hroughout the fifty-odd years of software development, the ind.docxhroughout the fifty-odd years of software development, the ind.docx
hroughout the fifty-odd years of software development, the ind.docx
 
INTERNAL Assign no 207( JAIPUR NATIONAL UNI)
INTERNAL Assign no   207( JAIPUR NATIONAL UNI)INTERNAL Assign no   207( JAIPUR NATIONAL UNI)
INTERNAL Assign no 207( JAIPUR NATIONAL UNI)
 
Managing Riskin InformationSystemsPowered by vLab Solu.docx
Managing Riskin InformationSystemsPowered by vLab Solu.docxManaging Riskin InformationSystemsPowered by vLab Solu.docx
Managing Riskin InformationSystemsPowered by vLab Solu.docx
 
44 Introduction Identifying and assessing risks is.docx
44 Introduction Identifying and assessing risks is.docx44 Introduction Identifying and assessing risks is.docx
44 Introduction Identifying and assessing risks is.docx
 
How To Plan a Software Project
How To Plan a Software ProjectHow To Plan a Software Project
How To Plan a Software Project
 

More from IANS

Application Security - Making It Work
Application Security - Making It WorkApplication Security - Making It Work
Application Security - Making It Work
IANS
 
The 7 Factors of CISO Impact at RSA 2015
The 7 Factors of CISO Impact at RSA 2015The 7 Factors of CISO Impact at RSA 2015
The 7 Factors of CISO Impact at RSA 2015
IANS
 
The 7 Factors of CISO Impact
The 7 Factors of CISO ImpactThe 7 Factors of CISO Impact
The 7 Factors of CISO ImpactIANS
 
What is an IANS Connector Event? - Factor 6
What is an IANS Connector Event? - Factor 6What is an IANS Connector Event? - Factor 6
What is an IANS Connector Event? - Factor 6
IANS
 
What is an IANS Connector Event? - Factor 5
What is an IANS Connector Event? - Factor 5What is an IANS Connector Event? - Factor 5
What is an IANS Connector Event? - Factor 5
IANS
 
What is an IANS Connector Event? - Factor 3
What is an IANS Connector Event? - Factor 3What is an IANS Connector Event? - Factor 3
What is an IANS Connector Event? - Factor 3
IANS
 
What is an IANS Connector Event? - Factor 1
What is an IANS Connector Event? - Factor 1What is an IANS Connector Event? - Factor 1
What is an IANS Connector Event? - Factor 1
IANS
 

More from IANS (7)

Application Security - Making It Work
Application Security - Making It WorkApplication Security - Making It Work
Application Security - Making It Work
 
The 7 Factors of CISO Impact at RSA 2015
The 7 Factors of CISO Impact at RSA 2015The 7 Factors of CISO Impact at RSA 2015
The 7 Factors of CISO Impact at RSA 2015
 
The 7 Factors of CISO Impact
The 7 Factors of CISO ImpactThe 7 Factors of CISO Impact
The 7 Factors of CISO Impact
 
What is an IANS Connector Event? - Factor 6
What is an IANS Connector Event? - Factor 6What is an IANS Connector Event? - Factor 6
What is an IANS Connector Event? - Factor 6
 
What is an IANS Connector Event? - Factor 5
What is an IANS Connector Event? - Factor 5What is an IANS Connector Event? - Factor 5
What is an IANS Connector Event? - Factor 5
 
What is an IANS Connector Event? - Factor 3
What is an IANS Connector Event? - Factor 3What is an IANS Connector Event? - Factor 3
What is an IANS Connector Event? - Factor 3
 
What is an IANS Connector Event? - Factor 1
What is an IANS Connector Event? - Factor 1What is an IANS Connector Event? - Factor 1
What is an IANS Connector Event? - Factor 1
 

Recently uploaded

Senior Project and Engineering Leader Jim Smith.pdf
Senior Project and Engineering Leader Jim Smith.pdfSenior Project and Engineering Leader Jim Smith.pdf
Senior Project and Engineering Leader Jim Smith.pdf
Jim Smith
 
CV Ensio Suopanki1.pdf ENGLISH Russian Finnish German
CV Ensio Suopanki1.pdf ENGLISH Russian Finnish GermanCV Ensio Suopanki1.pdf ENGLISH Russian Finnish German
CV Ensio Suopanki1.pdf ENGLISH Russian Finnish German
EUS+ Management & Consulting Excellence
 
原版制作(CDU毕业证书)查尔斯达尔文大学毕业证PDF成绩单一模一样
原版制作(CDU毕业证书)查尔斯达尔文大学毕业证PDF成绩单一模一样原版制作(CDU毕业证书)查尔斯达尔文大学毕业证PDF成绩单一模一样
原版制作(CDU毕业证书)查尔斯达尔文大学毕业证PDF成绩单一模一样
tdt5v4b
 
Training- integrated management system (iso)
Training- integrated management system (iso)Training- integrated management system (iso)
Training- integrated management system (iso)
akaash13
 
SOCIO-ANTHROPOLOGY FACULTY OF NURSING.....
SOCIO-ANTHROPOLOGY FACULTY OF NURSING.....SOCIO-ANTHROPOLOGY FACULTY OF NURSING.....
SOCIO-ANTHROPOLOGY FACULTY OF NURSING.....
juniourjohnstone
 
原版制作(澳洲WSU毕业证书)西悉尼大学毕业证文凭证书一模一样
原版制作(澳洲WSU毕业证书)西悉尼大学毕业证文凭证书一模一样原版制作(澳洲WSU毕业证书)西悉尼大学毕业证文凭证书一模一样
原版制作(澳洲WSU毕业证书)西悉尼大学毕业证文凭证书一模一样
tdt5v4b
 
TCS AI for Business Study – Key Findings
TCS AI for Business Study – Key FindingsTCS AI for Business Study – Key Findings
TCS AI for Business Study – Key Findings
Tata Consultancy Services
 
一比一原版杜克大学毕业证(Duke毕业证)成绩单留信认证
一比一原版杜克大学毕业证(Duke毕业证)成绩单留信认证一比一原版杜克大学毕业证(Duke毕业证)成绩单留信认证
一比一原版杜克大学毕业证(Duke毕业证)成绩单留信认证
gcljeuzdu
 
在线办理(UVic毕业证书)维多利亚大学毕业证录取通知书一模一样
在线办理(UVic毕业证书)维多利亚大学毕业证录取通知书一模一样在线办理(UVic毕业证书)维多利亚大学毕业证录取通知书一模一样
在线办理(UVic毕业证书)维多利亚大学毕业证录取通知书一模一样
tdt5v4b
 
W.H.Bender Quote 65 - The Team Member and Guest Experience
W.H.Bender Quote 65 - The Team Member and Guest ExperienceW.H.Bender Quote 65 - The Team Member and Guest Experience
W.H.Bender Quote 65 - The Team Member and Guest Experience
William (Bill) H. Bender, FCSI
 
W.H.Bender Quote 66 - ServPoints Sequence of Service™ should be Identified fo...
W.H.Bender Quote 66 - ServPoints Sequence of Service™ should be Identified fo...W.H.Bender Quote 66 - ServPoints Sequence of Service™ should be Identified fo...
W.H.Bender Quote 66 - ServPoints Sequence of Service™ should be Identified fo...
William (Bill) H. Bender, FCSI
 
Public Speaking Tips to Help You Be A Strong Leader.pdf
Public Speaking Tips to Help You Be A Strong Leader.pdfPublic Speaking Tips to Help You Be A Strong Leader.pdf
Public Speaking Tips to Help You Be A Strong Leader.pdf
Pinta Partners
 
Leadership Ethics and Change, Purpose to Impact Plan
Leadership Ethics and Change, Purpose to Impact PlanLeadership Ethics and Change, Purpose to Impact Plan
Leadership Ethics and Change, Purpose to Impact Plan
Muhammad Adil Jamil
 
Case Analysis - The Sky is the Limit | Principles of Management
Case Analysis - The Sky is the Limit | Principles of ManagementCase Analysis - The Sky is the Limit | Principles of Management
Case Analysis - The Sky is the Limit | Principles of Management
A. F. M. Rubayat-Ul Jannat
 
在线办理(Murdoch毕业证书)莫道克大学毕业证电子版成绩单一模一样
在线办理(Murdoch毕业证书)莫道克大学毕业证电子版成绩单一模一样在线办理(Murdoch毕业证书)莫道克大学毕业证电子版成绩单一模一样
在线办理(Murdoch毕业证书)莫道克大学毕业证电子版成绩单一模一样
tdt5v4b
 
Comparing Stability and Sustainability in Agile Systems
Comparing Stability and Sustainability in Agile SystemsComparing Stability and Sustainability in Agile Systems
Comparing Stability and Sustainability in Agile Systems
Rob Healy
 
Protected Workmen required today for growth
Protected Workmen required today for growthProtected Workmen required today for growth
Protected Workmen required today for growth
rivaraj2711
 

Recently uploaded (17)

Senior Project and Engineering Leader Jim Smith.pdf
Senior Project and Engineering Leader Jim Smith.pdfSenior Project and Engineering Leader Jim Smith.pdf
Senior Project and Engineering Leader Jim Smith.pdf
 
CV Ensio Suopanki1.pdf ENGLISH Russian Finnish German
CV Ensio Suopanki1.pdf ENGLISH Russian Finnish GermanCV Ensio Suopanki1.pdf ENGLISH Russian Finnish German
CV Ensio Suopanki1.pdf ENGLISH Russian Finnish German
 
原版制作(CDU毕业证书)查尔斯达尔文大学毕业证PDF成绩单一模一样
原版制作(CDU毕业证书)查尔斯达尔文大学毕业证PDF成绩单一模一样原版制作(CDU毕业证书)查尔斯达尔文大学毕业证PDF成绩单一模一样
原版制作(CDU毕业证书)查尔斯达尔文大学毕业证PDF成绩单一模一样
 
Training- integrated management system (iso)
Training- integrated management system (iso)Training- integrated management system (iso)
Training- integrated management system (iso)
 
SOCIO-ANTHROPOLOGY FACULTY OF NURSING.....
SOCIO-ANTHROPOLOGY FACULTY OF NURSING.....SOCIO-ANTHROPOLOGY FACULTY OF NURSING.....
SOCIO-ANTHROPOLOGY FACULTY OF NURSING.....
 
原版制作(澳洲WSU毕业证书)西悉尼大学毕业证文凭证书一模一样
原版制作(澳洲WSU毕业证书)西悉尼大学毕业证文凭证书一模一样原版制作(澳洲WSU毕业证书)西悉尼大学毕业证文凭证书一模一样
原版制作(澳洲WSU毕业证书)西悉尼大学毕业证文凭证书一模一样
 
TCS AI for Business Study – Key Findings
TCS AI for Business Study – Key FindingsTCS AI for Business Study – Key Findings
TCS AI for Business Study – Key Findings
 
一比一原版杜克大学毕业证(Duke毕业证)成绩单留信认证
一比一原版杜克大学毕业证(Duke毕业证)成绩单留信认证一比一原版杜克大学毕业证(Duke毕业证)成绩单留信认证
一比一原版杜克大学毕业证(Duke毕业证)成绩单留信认证
 
在线办理(UVic毕业证书)维多利亚大学毕业证录取通知书一模一样
在线办理(UVic毕业证书)维多利亚大学毕业证录取通知书一模一样在线办理(UVic毕业证书)维多利亚大学毕业证录取通知书一模一样
在线办理(UVic毕业证书)维多利亚大学毕业证录取通知书一模一样
 
W.H.Bender Quote 65 - The Team Member and Guest Experience
W.H.Bender Quote 65 - The Team Member and Guest ExperienceW.H.Bender Quote 65 - The Team Member and Guest Experience
W.H.Bender Quote 65 - The Team Member and Guest Experience
 
W.H.Bender Quote 66 - ServPoints Sequence of Service™ should be Identified fo...
W.H.Bender Quote 66 - ServPoints Sequence of Service™ should be Identified fo...W.H.Bender Quote 66 - ServPoints Sequence of Service™ should be Identified fo...
W.H.Bender Quote 66 - ServPoints Sequence of Service™ should be Identified fo...
 
Public Speaking Tips to Help You Be A Strong Leader.pdf
Public Speaking Tips to Help You Be A Strong Leader.pdfPublic Speaking Tips to Help You Be A Strong Leader.pdf
Public Speaking Tips to Help You Be A Strong Leader.pdf
 
Leadership Ethics and Change, Purpose to Impact Plan
Leadership Ethics and Change, Purpose to Impact PlanLeadership Ethics and Change, Purpose to Impact Plan
Leadership Ethics and Change, Purpose to Impact Plan
 
Case Analysis - The Sky is the Limit | Principles of Management
Case Analysis - The Sky is the Limit | Principles of ManagementCase Analysis - The Sky is the Limit | Principles of Management
Case Analysis - The Sky is the Limit | Principles of Management
 
在线办理(Murdoch毕业证书)莫道克大学毕业证电子版成绩单一模一样
在线办理(Murdoch毕业证书)莫道克大学毕业证电子版成绩单一模一样在线办理(Murdoch毕业证书)莫道克大学毕业证电子版成绩单一模一样
在线办理(Murdoch毕业证书)莫道克大学毕业证电子版成绩单一模一样
 
Comparing Stability and Sustainability in Agile Systems
Comparing Stability and Sustainability in Agile SystemsComparing Stability and Sustainability in Agile Systems
Comparing Stability and Sustainability in Agile Systems
 
Protected Workmen required today for growth
Protected Workmen required today for growthProtected Workmen required today for growth
Protected Workmen required today for growth
 

What is an IANS CISO Workshop? Factor 3

  • 1. CISOs and their teams operate against a backdrop of continuous change in the threat landscape, information security technology, and business conditions. The mission to protect critical assets across space and time is further complicated by a lack of direct control over the people and processes that expose the organization to risk through day- to-day operations. In-depth research with hundreds of information security leaders revealed a common thread among the top performers: Technical skills, while essential, are not enough. To deliver maximum impact, Information Security must engage with the business and practice proactive organizational engagement.
  • 2. The image cannot be displayed. Your computer may not have enough memory to open the image, or the image may have been corrupted. Restart your computer, and then open the file again. If the red x still appears, you may have to delete the image and then insert it again. To drive insight and enable action on these “soft skills,” IANS has broken proactive organizational engagement down into a set of clearly defined, quantifiable elements we call The 7 Factors of CISO Impact. Our CISO Impact framework provides a structured, action-oriented approach that allows you to baseline your performance and measure progress down to the Factor and sub-Factor levels as you work towards b e t t e r p ro a c t i v e o rg a n i z a t i o n a l engagement.
  • 3. First step: take the Diagnostic. The Diagnostic is an online self- assessment that measures the current state of your team’s organizational engagement. Your personal report provides you with insight into your team’s strengths and weaknesses, and allows you to compare the results to those of your peers. As you work to improve your skill sets in each of the 7 Factors, your Diagnostic results will reflect your progress. The image cannot be displayed. Your computer may not have enough memory to open the image, or the image may have been corrupted. Restart your computer, and then open the file again. If the red x still appears, you may have to delete the image and then insert it again.
  • 4. Then, attend a CISO Impact Workshop. The CISO Impact Workshop is a four-hour deep dive into one of the 7 Factors of CISO Impact. IANS-proprietary worksheets will help you break down your Factor-specific Diagnostic results into concrete, step-by-step actions for improvement. You’ll experience a new way of thinking about what you do, and walk away with insights that will influence the way that you execute your mission.
  • 5. A CISO Impact Workshop is a collaborative hands-on working session. Wrap-Up Review lessons learned and discuss of how improvement will drive success.Introductions Get to know your fellow CISOs Workshop Orientation The IANS facilitator describes the workshop context, components and flow for the day Solo Work Document your team’s skills and processes vs. the workshop Factor. Presentations & Feedback Present your workbook writings and receive feedback from your peers. Research Overview A discussion of the research and structure of the CISO Impact framework Diagnostic An explanation of how the CISO Impact self- assessment tool works What are the 7 Factors? An overview of the individual 7 Factors of CISO Impact, and a look at how they all work together to drive success. Small Group Discussion Share ideas and challenges with your small group
  • 6. How can you embed information security into key business processes? Our research shows that 72% CISOs are still in the very early stages of integrating information security criteria into the day-to-day processes of their organization. What steps can you take to weave information security into the fabric of processes like software development and vendor selection? Factor 3: Embed Information Security into Key Business Processes At a recent Factor 3 Workshop, we posed the question:
  • 7. Participants discussed the challenges … … and through that discussion, shared thoughts on how to address the problem. The image cannot be displayed. Your computer may not have enough memory to open the image, or the image may have been corrupted. Restart your computer, and then open the file again. If the red x still appears, you may have to delete the image and then insert it again. “Goals mis-match is the biggest obstacle. Our developers are measured on timely delivery and we’re measured on security defects. Besides, they think they’ve got security covered.” “Good news: Awareness is up and we’re invited to assess more projects. Bad news: Awareness is up and we’re invited to assess more projects.” “We’re working to get the risks of cloud under control but any employee with a credit card can spin up a cloud deployment. “
  • 8. You’ll walk away with strategies for success in real-world situations. For example, you’ll learn how to: •  Communicate the tangible input that security can have in high-level business decisions like M&As •  Establish agreements with Finance and Legal that compel assessment of new vendors before contracts are signed •  Learn how to win the agreement of key stakeholders - like the VP of App Dev, for example - to weave information security criteria and implement verification steps like code testing into processes like the SDLC.