This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "OWASP - Cyber Security in the Boardroom"
m (Edit) (Tag: Visual edit) |
m (Added more content) (Tag: Visual edit) |
||
Line 21: | Line 21: | ||
==A Primer on Cyber Security for the Board== | ==A Primer on Cyber Security for the Board== | ||
− | |||
# '''Overview of Cyber Security for a Board of Directors''' | # '''Overview of Cyber Security for a Board of Directors''' | ||
#* The Main Concepts of Cyber Security | #* The Main Concepts of Cyber Security | ||
Line 38: | Line 37: | ||
#* Useful Board of Directors References | #* Useful Board of Directors References | ||
#* Scenarios | #* Scenarios | ||
+ | |||
+ | ==Guidelines for selecting and evaluating the head of the Cyber Security program == | ||
+ | |||
+ | # | ||
+ | |||
+ | == Top 10 Criteria for leading a Cyber Security program == | ||
+ | # Establish segregation of duties and ownership of responsibilities for the cyber security program | ||
+ | # Managing risks in an evolving cyber landscape (Management Buy-in, Strategy, Planning, Governance, etc.) | ||
+ | # Organisational culture (security culture, mindset) | ||
+ | # Sector-focused prioritization of risks, types of attacks, threat actors. | ||
+ | # Mission Critical vs Business Critical; systems, networks and data. | ||
+ | # Digital Ecosystem (Architecture, Infrastructure, Cloud, Deployment, Physical Security, IAM, etc.) | ||
+ | # Secure communications (incl. Data-at-Rest, Data-in-Transit, Data-in-Process) | ||
+ | # Third-Party Risks (incl. Supply Chain) | ||
+ | # Containment | ||
+ | # Response Plan | ||
+ | |||
+ | == Cyber Threats per Industry Sector == | ||
+ | |||
+ | == Cyber Security Framework == | ||
+ | * Policies & Procedures Creation Guidelines | ||
+ | * Data Classification Guidelines | ||
+ | * Compliance | ||
+ | * Information Security Risk Management | ||
+ | * Information Security Incident Management | ||
+ | * Information Systems Continuity Management | ||
+ | * Third-Party Security | ||
==Licensing== | ==Licensing== |
Revision as of 14:01, 13 December 2019
OWASP - Cyber Security in the BoardroomOwasp Cyber Security in the Boardroom Initiative is to provide the board of directors with a better understanding of cyber security & the challenges security professionals face order for them protect the companies they represent. Equally, provide cyber security professionals with a better understanding of the board of directors, what their roles and responsibilities are & how they function. This is in order to help these professionals understand the board's needs and communicate upwards effectively. Initiative Deliverables
A Primer on Cyber Security for the Board
Guidelines for selecting and evaluating the head of the Cyber Security programTop 10 Criteria for leading a Cyber Security program
Cyber Threats per Industry SectorCyber Security Framework
LicensingThe Owasp Cyber Security in the Boardroom Initiative is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one. |
What is Cyber Security in the Boardroom?OWASP Cyber Security in the Boardroom provides:
PresentationLink to presentation
Project Leaders
Related Projects |
Quick Download
Donate to OWASPNews and Events
In PrintThis project can be purchased as a print on demand book from Lulu.com
Classifications
|
- Q1
- A1
- Q2
- A2
Volunteers
XXX is developed by a worldwide team of volunteers. The primary contributors to date have been:
- xxx
- xxx
Others
- xxx
- xxx
As of XXX, the priorities are:
- xxx
- xxx
- xxx
Involvement in the development and promotion of XXX is actively encouraged! You do not have to be a security expert in order to contribute. Some of the ways you can help:
- xxx
- xxx
PROJECT INFO What does this OWASP project offer you? |
RELEASE(S) INFO What releases are available for this project? | |||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|