100% found this document useful (3 votes)
407 views

Template Security For Management

This document provides templates for presenting information on cybersecurity to management. It includes slides on framing cybersecurity using the NIST framework, a NIST scorecard to assess controls, mapping security stakeholders and metrics, and a risk dashboard. Key slides cover the NIST CSF, operational security metrics like firewall events, examples of security incidents, and a risk dashboard tracking issues like data breaches and unresolved audit items over time. The presentation is designed to communicate the cybersecurity strategy, controls, governance structure and risk posture to leadership in a concise yet informative manner.

Uploaded by

071027684warid
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
100% found this document useful (3 votes)
407 views

Template Security For Management

This document provides templates for presenting information on cybersecurity to management. It includes slides on framing cybersecurity using the NIST framework, a NIST scorecard to assess controls, mapping security stakeholders and metrics, and a risk dashboard. Key slides cover the NIST CSF, operational security metrics like firewall events, examples of security incidents, and a risk dashboard tracking issues like data breaches and unresolved audit items over time. The presentation is designed to communicate the cybersecurity strategy, controls, governance structure and risk posture to leadership in a concise yet informative manner.

Uploaded by

071027684warid
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 9

The Definitive

‘Security for Management’


Presentation Template

Created by SideChannel
Readme: Slides Guidelines
SLIDE

4 General framing of NIST framework as common language.

5 NIST CSF deep dive to use per specific needs.

6 NIST scorecard. To fill this you must map your existing technologies and procedures to the detailed NIST 800-171 controls’
list. Alternatively, if you’re engaged in a 3rd party assessment, present the interim results. That way or the other, you’ll need
to populate a NIST 800-171 controls’ spreadsheet to aggregate into a bar chart.

7 Map the various security stakeholders within your organization + description of delivered success.

8 • Operational metrics, divided to two parts:


• Security technologies – the example in this slides includes events from firewall and endpoint. In real life you’ll
include the outputs of your entire security stack.
• Security team - overall number + selected examples. We suggest to pick three that represent the events in the
given timeframe. Each example can trigger elaboration on the related security risk and needs.

9 Concise risk metric dashboard that you fill according to your security posture.
Agenda

• Cyber Security Strategy

• NIST Cyber Security Framework Scorecard

• Cyber Security Governance

• Defense – Operational Metrics

• Defense – Risk Matrix Dashboard


Cyber Security Strategy
Design, implement and continually improve a cyber discipline
aligned to the National Institute of Standards and Technology
cybersecurity framework (NIST CSF)

IDENTIFY PROTECT DETECT RESPOND RECOVER


BUSINESS OPPORTUNITY KEY ENABLERS
Develop the organizational understanding • Business Context

NIST CSF
of cybersecurity risk to manage it and its • Asset Management
impact on systems, data, employees, and • Governance
IDENTIFY capabilities. • Risk Assessment
• Risk Management

Deep Dive
Strategy

Develop and implement the appropriate • Access Control


safeguards to ensure delivery of critical • Awareness and Training
infrastructure services. • Data Security
PROTECT • Information Protection
Policies and Procedures
• Proactive Maintenance
• Protective Technology

Develop and implement the appropriate • Anomaly and Event


activities to identify the occurrence of a Detection
DETECT cybersecurity event. • Security Continuous
Monitoring
• Detection Processes

Develop and implement the appropriate • Incident Response


activities to take action regarding a Planning
RESPOND detected cybersecurity event. • Communications
• Analysis
• Mitigation

Develop and implement the appropriate • Incident Recovery


activities to maintain plans for resilience Planning
RECOVER and to restore any capabilities that were • Communications
impaired due to a cybersecurity event.
NIST Cyber Security Framework Scorecard
Identify NIST CSF
Start Current Target Trend
Metric
Controls
35% 55% 80% Improving
Met
Protect
NIST CORE FUNCTIONS

Detect

Respond
Met

Partially Met
Recover
Not Yet Met

0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100%
NUMBER OF CONTROLS
Cyber Security Governance – One Company, One Mission
RI SK PRI O RI T I ZAT I O N
SUCCESSES DELIVERED(xQ20xx)
Employee – Title
ENTERPRISE
Employee – Title RISK
MANAGEMENT Topic Area 1 Include brief description of success seen by
Employee – Title
business and how it reduced risk

ST RAT EGY & G OVE RN A N C E Topic Area 2 Include brief description of success seen by
business and how it reduced risk
Employee – Title DATA
SECURITY &
Employee – Title PRIVACY Topic Area 3 Include brief description of success seen by
Employee – Title COMPLIANCE business and how it reduced risk

Topic Area 4 Include brief description of success seen by


TECHNICAL EXECUTION business and how it reduced risk

Employee – Title
INFORMATION
Topic Area 5 Include brief description of success seen by
Employee – Title business and how it reduced risk
TECHNOLOGY
Employee – Title
Defense – Operational Metrics
Security • Perimeter firewalls blocked XXX inbound events
• Endpoint controls blocked XXX events
Technologies • Other (email protection, IDS, etc.) identified\blocked XXX events

Overall XXXX
Number of
incidents:
Employee account Description:
compromise • Employee clicked phishing link and submitted username/password
example • Analyst responded to compromise and recovered operations for employee

Elaboration point: data or PII lost and impact


Security Malware Description:
Team installation via • Employee’s laptop was vulnerable to exploit and was compromised
Selected malicious • Analyst detected malware, contained, and quarantined laptop
advertising website • Analyst worked with Helpdesk to recover operations for employee
Examples
Elaboration point: time lost for desktop support team to remediate and business impact to use

Employee accessed Description:


or attempted • Analyst detected attempts, researched incident and monitored employee
access to • Employee’s network history and / or laptop is secured for HR investigation
prohibited • Analysts work with HR and / or Legal
websites
Elaboration point: insider threat, IP loss, or reputation damage

Technology solutions and resource investments are proving to be effective


Defense – Cyber Security Risk Metric Dashboard
Update
Cybersecurity Risk Metric Period Target 1Q2018 2Q2018 3Q2018 4Q2018 Trend

Severity 1 Cybersecurity Incidents Reported Quarterly 0 0 0 Steady

Unresolved Cybersecurity Audit Items > 30 days old Quarterly 0 0 0 Steady

Data Breaches Quarterly 0 0 0 Steady

Unresolved Penetration Test Findings > 90 days old % Quarterly < 5% 3% 0% Improving

Tier-1 Applications Availability % Quarterly 99.75% 99.985% 100% Improving

Employee Cybersecurity Training Completion % Bi-Annually 100% 89.5% Steady

Cybersecurity investment (% of annual IT budget devoted to


Quarterly 5% 3% 3.5% Improving
IT security, risk and privacy)

Measurable events and incident levels are commensurate to a business of our size and industry sector.
Technology solutions and cybersecurity prioritization activities are proving to be effective.

You might also like