Template Security For Management
Template Security For Management
Created by SideChannel
Readme: Slides Guidelines
SLIDE
6 NIST scorecard. To fill this you must map your existing technologies and procedures to the detailed NIST 800-171 controls’
list. Alternatively, if you’re engaged in a 3rd party assessment, present the interim results. That way or the other, you’ll need
to populate a NIST 800-171 controls’ spreadsheet to aggregate into a bar chart.
7 Map the various security stakeholders within your organization + description of delivered success.
9 Concise risk metric dashboard that you fill according to your security posture.
Agenda
NIST CSF
of cybersecurity risk to manage it and its • Asset Management
impact on systems, data, employees, and • Governance
IDENTIFY capabilities. • Risk Assessment
• Risk Management
Deep Dive
Strategy
Detect
Respond
Met
Partially Met
Recover
Not Yet Met
0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100%
NUMBER OF CONTROLS
Cyber Security Governance – One Company, One Mission
RI SK PRI O RI T I ZAT I O N
SUCCESSES DELIVERED(xQ20xx)
Employee – Title
ENTERPRISE
Employee – Title RISK
MANAGEMENT Topic Area 1 Include brief description of success seen by
Employee – Title
business and how it reduced risk
ST RAT EGY & G OVE RN A N C E Topic Area 2 Include brief description of success seen by
business and how it reduced risk
Employee – Title DATA
SECURITY &
Employee – Title PRIVACY Topic Area 3 Include brief description of success seen by
Employee – Title COMPLIANCE business and how it reduced risk
Employee – Title
INFORMATION
Topic Area 5 Include brief description of success seen by
Employee – Title business and how it reduced risk
TECHNOLOGY
Employee – Title
Defense – Operational Metrics
Security • Perimeter firewalls blocked XXX inbound events
• Endpoint controls blocked XXX events
Technologies • Other (email protection, IDS, etc.) identified\blocked XXX events
Overall XXXX
Number of
incidents:
Employee account Description:
compromise • Employee clicked phishing link and submitted username/password
example • Analyst responded to compromise and recovered operations for employee
Unresolved Penetration Test Findings > 90 days old % Quarterly < 5% 3% 0% Improving
Measurable events and incident levels are commensurate to a business of our size and industry sector.
Technology solutions and cybersecurity prioritization activities are proving to be effective.