This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "OWASP - Cyber Security in the Boardroom"
(Tag: Visual edit) |
m (Tag: Visual edit) |
||
(4 intermediate revisions by the same user not shown) | |||
Line 38: | Line 38: | ||
#* Scenarios | #* Scenarios | ||
− | == | + | ==Selecting and evaluating the head of the Cyber Security Program == |
+ | Head of the Cyber Security Program; Selection & Evaluation Guidelines: | ||
# Background in dealing with information security challenges. | # Background in dealing with information security challenges. | ||
# Deep understanding of the Security Mindset and the Security Culture. | # Deep understanding of the Security Mindset and the Security Culture. | ||
− | # Clear view of what | + | # Clear view of what it means treating security as an ‘enabler’ in the context of the organisation, |
+ | # taking under consideration the business needs, strategy and vision. | ||
# The twin nature of regulatory compliance and the role of the DPO in Data Privacy. | # The twin nature of regulatory compliance and the role of the DPO in Data Privacy. | ||
# Translating Risk from/to Business Needs. | # Translating Risk from/to Business Needs. | ||
Line 59: | Line 61: | ||
# Secure communications (incl. Data-at-Rest, Data-in-Transit, Data-in-Process) | # Secure communications (incl. Data-at-Rest, Data-in-Transit, Data-in-Process) | ||
# Third-Party Risks (incl. Supply Chain) | # Third-Party Risks (incl. Supply Chain) | ||
− | # Containment | + | # Readiness, Containment and Treatment |
− | # Response Plan | + | # Response and Continuity Plan |
== Cyber Threats per Industry/Sector == | == Cyber Threats per Industry/Sector == | ||
+ | * Automotive | ||
+ | * Oil & Gas | ||
+ | * Consumer Products | ||
+ | * Power & Utilities | ||
+ | * Government & Public Sector | ||
+ | * Life Sciences | ||
+ | * Telecommunications & Media | ||
+ | * Real Estate | ||
+ | * Technology | ||
+ | * Mining & Metals | ||
+ | * Private Equity | ||
+ | * Finance & Banking | ||
== Cyber Security Framework == | == Cyber Security Framework == | ||
+ | How to build / consider starting with a framework: | ||
* Policies & Procedures Creation Guidelines | * Policies & Procedures Creation Guidelines | ||
* Data Classification Guidelines | * Data Classification Guidelines | ||
Line 74: | Line 89: | ||
==Footnotes== | ==Footnotes== | ||
− | CCO | + | <nowiki>*</nowiki>CCO: Cheif Cyber Security Officer |
==Licensing== | ==Licensing== | ||
Line 87: | Line 102: | ||
1) A primer on cyber security for the board | 1) A primer on cyber security for the board | ||
− | 2) | + | 2) Selecting and evaluating the head of the cyber security program |
3) Top 10 criteria for leading a cyber security program | 3) Top 10 criteria for leading a cyber security program | ||
Line 107: | Line 122: | ||
== Quick Download == | == Quick Download == | ||
− | * TBA | + | * TBA<div class="center" style="width: auto; margin-left: auto; margin-right: auto;"></div> |
− | |||
− | |||
− | |||
− | |||
− | <div class="center" style="width: auto; margin-left: auto; margin-right: auto;"> | ||
− | |||
− | |||
== News and Events == | == News and Events == | ||
* TBD | * TBD | ||
* TBD | * TBD | ||
− | |||
− | |||
== In Print == | == In Print == | ||
This project can be purchased as a print on demand book from Lulu.com | This project can be purchased as a print on demand book from Lulu.com | ||
− | + | == Donate to OWASP == | |
+ | <div class="center" style="width: auto; margin-left: auto; margin-right: auto;">{{#widget:PayPal Donation | ||
+ | |target=_blank | ||
+ | |budget=Other (Website Donation) }}</div> | ||
==Classifications== | ==Classifications== | ||
Latest revision as of 16:48, 13 December 2019
OWASP - Cyber Security in the BoardroomOWASP Cyber Security in the Boardroom initiative is to provide the board of directors with a better understanding of cyber security & the challenges security professionals face in order for them to protect the companies they represent. Equally, provide cyber security professionals with a better understanding of the board of directors expectations, what their roles and responsibilities are and, how they function. This is in order to help these professionals understand the board's needs and communicate upwards effectively. Initiative Deliverables
A Primer on Cyber Security for the Board
Selecting and evaluating the head of the Cyber Security ProgramHead of the Cyber Security Program; Selection & Evaluation Guidelines:
Top 10 Criteria for leading a Cyber Security program
Cyber Threats per Industry/Sector
Cyber Security FrameworkHow to build / consider starting with a framework:
Footnotes*CCO: Cheif Cyber Security Officer LicensingThe Owasp Cyber Security in the Boardroom Initiative is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one. |
What is Cyber Security in the Boardroom?OWASP cyber security in the Boardroom provides: 1) A primer on cyber security for the board 2) Selecting and evaluating the head of the cyber security program 3) Top 10 criteria for leading a cyber security program 4) Cyber threats per industry/sector 5) Cyber security framework Project Leaders
Contributors
|
Quick Download
News and Events
In PrintThis project can be purchased as a print on demand book from Lulu.com Donate to OWASPClassifications |
- Work in Progress
- Q1
- A1
- Q2
- A2
- Work in Progress
Volunteers
OWASP Cyber Security in the Boardroom Initiative is developed by a worldwide team of volunteers. The primary contributors to date have been:
- Sherif Mansour
- Grigorios Fragkos
- Paul Harragan
Priorities
As of 12th December 2019, the priorities are:
- A Primer on Cyber Security for the Board
- Guidelines for selecting and evaluating the head of the Cyber Security program (e.g. CISO/CSO/CCO)
- Top 10 Criteria for leading a Cyber Security program
- Cyber Threats per Industry Sector
- Cyber Security Framework
PROJECT INFO What does this OWASP project offer you? |
RELEASE(S) INFO What releases are available for this project? | |||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|