This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "OWASP - Cyber Security in the Boardroom"
(testing something) (Tag: Visual edit) |
m (Tag: Visual edit) |
||
(29 intermediate revisions by the same user not shown) | |||
Line 4: | Line 4: | ||
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |- | {| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |- | ||
− | | | + | | style="border-right: 1px dotted gray;padding-right:25px;" valign="top" | |
− | == | + | ==OWASP - Cyber Security in the Boardroom== |
− | + | OWASP Cyber Security in the Boardroom initiative is to provide the board of directors with a better understanding of cyber security & the challenges security professionals face in order for them to protect the companies they represent. | |
− | Equally, provide cyber security professionals with a better understanding of the board of directors, what their roles and responsibilities are | + | Equally, provide cyber security professionals with a better understanding of the board of directors expectations, what their roles and responsibilities are and, how they function. This is in order to help these professionals understand the board's needs and communicate upwards effectively. |
− | == | + | ==Initiative Deliverables== |
+ | # A Primer on Cyber Security for the Board | ||
+ | # Guidelines for selecting and evaluating the head of the Cyber Security program (e.g. CISO/CSO/CCO* ) | ||
+ | # Top 10 Criteria for leading a Cyber Security program | ||
+ | # Cyber Threats per Industry Sector | ||
+ | # Cyber Security Framework | ||
− | + | ==A Primer on Cyber Security for the Board== | |
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
# '''Overview of Cyber Security for a Board of Directors''' | # '''Overview of Cyber Security for a Board of Directors''' | ||
#* The Main Concepts of Cyber Security | #* The Main Concepts of Cyber Security | ||
Line 30: | Line 27: | ||
#* Responding to a Cyber Security Incident | #* Responding to a Cyber Security Incident | ||
#* Cyber Security Myths and Misconceptions | #* Cyber Security Myths and Misconceptions | ||
− | #* Cyber Security | + | #* Cyber Security and Corporate Responsibility |
# '''Overview of the Board of Directors for Cyber Security Professionals''' | # '''Overview of the Board of Directors for Cyber Security Professionals''' | ||
#* Roles and Responsibilities of the Board | #* Roles and Responsibilities of the Board | ||
#* Board of Director Liabilities | #* Board of Director Liabilities | ||
#* Corporate Governance | #* Corporate Governance | ||
− | #* Company Strategy | + | #* Company Strategy and the role of Cyber Security |
# '''Appendix''' | # '''Appendix''' | ||
#* Useful Cyber Security References | #* Useful Cyber Security References | ||
Line 41: | Line 38: | ||
#* Scenarios | #* Scenarios | ||
− | == | + | ==Selecting and evaluating the head of the Cyber Security Program == |
− | + | Head of the Cyber Security Program; Selection & Evaluation Guidelines: | |
+ | # Background in dealing with information security challenges. | ||
+ | # Deep understanding of the Security Mindset and the Security Culture. | ||
+ | # Clear view of what it means treating security as an ‘enabler’ in the context of the organisation, | ||
+ | # taking under consideration the business needs, strategy and vision. | ||
+ | # The twin nature of regulatory compliance and the role of the DPO in Data Privacy. | ||
+ | # Translating Risk from/to Business Needs. | ||
+ | # Addressing and communicating the “so what” question(s). | ||
+ | # The functional role of IT Security and how InfoSec deals with GRC, including the legal issues. | ||
+ | # Expert input on the fast-evolving digital ecosystem. | ||
+ | # Be able to distinguish between skills gap challenges versus talent acquisition oversights. | ||
+ | # Measure risk, compliance and maturity. | ||
− | + | == Top 10 Criteria for leading a Cyber Security program == | |
+ | # Establish segregation of duties and ownership of responsibilities for the cyber security program | ||
+ | # Managing risks in an evolving cyber landscape (Management Buy-in, Strategy, Planning, Governance, etc.) | ||
+ | # Organisational culture (security culture, mindset) | ||
+ | # Sector-focused prioritization of risks, types of attacks, threat actors. | ||
+ | # Mission Critical vs Business Critical; systems, networks and data. | ||
+ | # Digital Ecosystem (Architecture, Infrastructure, Cloud, Deployment, Physical Security, IAM, etc.) | ||
+ | # Secure communications (incl. Data-at-Rest, Data-in-Transit, Data-in-Process) | ||
+ | # Third-Party Risks (incl. Supply Chain) | ||
+ | # Readiness, Containment and Treatment | ||
+ | # Response and Continuity Plan | ||
− | == | + | == Cyber Threats per Industry/Sector == |
+ | * Automotive | ||
+ | * Oil & Gas | ||
+ | * Consumer Products | ||
+ | * Power & Utilities | ||
+ | * Government & Public Sector | ||
+ | * Life Sciences | ||
+ | * Telecommunications & Media | ||
+ | * Real Estate | ||
+ | * Technology | ||
+ | * Mining & Metals | ||
+ | * Private Equity | ||
+ | * Finance & Banking | ||
− | + | == Cyber Security Framework == | |
+ | How to build / consider starting with a framework: | ||
+ | * Policies & Procedures Creation Guidelines | ||
+ | * Data Classification Guidelines | ||
+ | * Compliance | ||
+ | * Information Security Risk Management | ||
+ | * Information Security Incident Management | ||
+ | * Information Systems Continuity Management | ||
+ | * Third-Party Security | ||
− | + | ==Footnotes== | |
− | * | + | <nowiki>*</nowiki>CCO: Cheif Cyber Security Officer |
+ | ==Licensing== | ||
+ | The Owasp Cyber Security in the Boardroom Initiative is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one. | ||
− | == | + | | style="padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;" valign="top" | |
− | + | == What is Cyber Security in the Boardroom? == | |
+ | OWASP cyber security in the Boardroom provides: | ||
+ | 1) A primer on cyber security for the board | ||
− | + | 2) Selecting and evaluating the head of the cyber security program | |
− | + | 3) Top 10 criteria for leading a cyber security program | |
+ | 4) Cyber threats per industry/sector | ||
− | + | 5) Cyber security framework | |
− | * | + | == Project Leaders == |
+ | * Sherif Mansour | ||
+ | * Grigorios Fragkos | ||
− | + | == Contributors == | |
− | + | * Paul Harragan | |
− | + | | style="padding-left:25px;width:200px;" valign="top" | | |
+ | == Quick Download == | ||
+ | * TBA<div class="center" style="width: auto; margin-left: auto; margin-right: auto;"></div> | ||
== News and Events == | == News and Events == | ||
− | * | + | * TBD |
− | * | + | * TBD |
− | |||
− | |||
== In Print == | == In Print == | ||
This project can be purchased as a print on demand book from Lulu.com | This project can be purchased as a print on demand book from Lulu.com | ||
− | + | == Donate to OWASP == | |
+ | <div class="center" style="width: auto; margin-left: auto; margin-right: auto;">{{#widget:PayPal Donation | ||
+ | |target=_blank | ||
+ | |budget=Other (Website Donation) }}</div> | ||
==Classifications== | ==Classifications== | ||
{| width="200" cellpadding="2" | {| width="200" cellpadding="2" | ||
|- | |- | ||
− | | rowspan="2" | + | | rowspan="2" width="50%" valign="top" align="center" | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]] |
− | | | + | | width="50%" valign="top" align="center" | [[File:Owasp-builders-small.png|link=Builders]] |
|- | |- | ||
− | | | + | | width="50%" valign="top" align="center" | [[File:Owasp-defenders-small.png|link=Defenders]] |
|- | |- | ||
| colspan="2" align="center" | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] | | colspan="2" align="center" | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] | ||
Line 104: | Line 152: | ||
=FAQs= | =FAQs= | ||
+ | ; Work in Progress | ||
+ | ; | ||
; Q1 | ; Q1 | ||
: A1 | : A1 | ||
Line 111: | Line 161: | ||
= Acknowledgements = | = Acknowledgements = | ||
+ | ; Work in Progress | ||
+ | |||
==Volunteers== | ==Volunteers== | ||
− | + | OWASP Cyber Security in the Boardroom Initiative is developed by a worldwide team of volunteers. The primary contributors to date have been: | |
− | |||
− | |||
− | |||
− | + | * Sherif Mansour | |
− | * | + | * Grigorios Fragkos |
− | * | + | * Paul Harragan |
= Road Map and Getting Involved = | = Road Map and Getting Involved = | ||
− | |||
− | |||
− | |||
− | |||
− | + | == Priorities == | |
− | + | As of 12th December 2019, the priorities are: | |
− | + | * A Primer on Cyber Security for the Board | |
− | * | + | * Guidelines for selecting and evaluating the head of the Cyber Security program (e.g. CISO/CSO/CCO) |
− | * | + | * Top 10 Criteria for leading a Cyber Security program |
+ | * Cyber Threats per Industry Sector | ||
+ | * Cyber Security Framework | ||
Latest revision as of 16:48, 13 December 2019
OWASP - Cyber Security in the BoardroomOWASP Cyber Security in the Boardroom initiative is to provide the board of directors with a better understanding of cyber security & the challenges security professionals face in order for them to protect the companies they represent. Equally, provide cyber security professionals with a better understanding of the board of directors expectations, what their roles and responsibilities are and, how they function. This is in order to help these professionals understand the board's needs and communicate upwards effectively. Initiative Deliverables
A Primer on Cyber Security for the Board
Selecting and evaluating the head of the Cyber Security ProgramHead of the Cyber Security Program; Selection & Evaluation Guidelines:
Top 10 Criteria for leading a Cyber Security program
Cyber Threats per Industry/Sector
Cyber Security FrameworkHow to build / consider starting with a framework:
Footnotes*CCO: Cheif Cyber Security Officer LicensingThe Owasp Cyber Security in the Boardroom Initiative is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one. |
What is Cyber Security in the Boardroom?OWASP cyber security in the Boardroom provides: 1) A primer on cyber security for the board 2) Selecting and evaluating the head of the cyber security program 3) Top 10 criteria for leading a cyber security program 4) Cyber threats per industry/sector 5) Cyber security framework Project Leaders
Contributors
|
Quick Download
News and Events
In PrintThis project can be purchased as a print on demand book from Lulu.com Donate to OWASPClassifications |
- Work in Progress
- Q1
- A1
- Q2
- A2
- Work in Progress
Volunteers
OWASP Cyber Security in the Boardroom Initiative is developed by a worldwide team of volunteers. The primary contributors to date have been:
- Sherif Mansour
- Grigorios Fragkos
- Paul Harragan
Priorities
As of 12th December 2019, the priorities are:
- A Primer on Cyber Security for the Board
- Guidelines for selecting and evaluating the head of the Cyber Security program (e.g. CISO/CSO/CCO)
- Top 10 Criteria for leading a Cyber Security program
- Cyber Threats per Industry Sector
- Cyber Security Framework
PROJECT INFO What does this OWASP project offer you? |
RELEASE(S) INFO What releases are available for this project? | |||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|