CISO Leadership Workshop Overview
The Chief Information Security Office (CISO) workshop helps accelerate security program modernization with reference strategies built using Zero Trust principles.
The workshop covers all aspects of a comprehensive security program including strategic initiatives, roles and responsibilities, success metrics, maturity models, and more.
A CISO (Chief Information Security Officer) has a complex role within a company. They have a wide array of tasks to perform, that involves many differing parts, which the average individual is not always aware of.
CISO Mind Map is an overview of responsibilities and ever expanding role of the CISO. This Security Leadership poster made by SANS shows exactly the matters a CISO needs to mind when creating a world class IT Security team. It also highlights the essential features necessary of a Security Operations Centre (SOC).
To make this chart more practical, I put them into the tables and will update it with some technologies and thoughts applied in my daily work. This update will last a long term. It will be put into navigation bar for easy access.
Note: ISO = Information Security Office
Another CISO Mind Map example:
Note: The original image concept was created by Rafeeq Rehman and later redesigned by Momentum Partners.
===================================================================
The workshop covers all aspects of a comprehensive security program including strategic initiatives, roles and responsibilities, success metrics, maturity models, and more.
CISO Workshop
Note: Ciso Workshop Videos : https://learn.microsoft.com/en-us/security/ciso-workshop/the-ciso-workshop
The workshop videos (about 4 hours total) and slides are organized into these discussions:
- Introduction and Overview of the CISO Workshop
- Part A - Key Context and Fundamentals
- Trends impacting security from the threat environment, technology, and business transformations
- Evolution of security roles and responsibilities, including key best practices and trends to monitor
- Recommended strategy and strategic initiatives to improve your program: the role of Zero Trust in strategy, the (low) cost for attackers to buy tools and passwords, learnings on getting reliable information, and a business analysis of ransomware attacks.
- Part B - Business Alignment
- Engaging business leaders on security – guidance to have a conversation in the language of leaders to explain security, key metrics to measure success of a program, and how to get support for security goals.
- Risk Insights – discusses the dual mission of security to reduce risk to the organization and enable business goals, shares tips on aligning security business goals and business risk, and shares insights on the types of attacker motivations organization’s face.
- Security Integration - guidance for successfully integrating security teams together and integrating security into IT and Business processes. Including an in-depth discussion of how to build a posture management program – an operational team focused on preventive controls (which complements the security operations (SecOps/SOC) team focused on detection, response, and recovery)
- Business Resilience – discusses how business resilience is the north star of the security program across all the security disciplines that requires balancing security investments (before, during, and after an incident) and creating a strong feedback loop. This section also includes discussion of the impact of unbalanced strategies (which is a common antipattern).
- Maturity models describing real world journeys for Risk Insights, Security Integration, and Business Resilience – including specific concrete actions to help you move up to the next level
- Part C – Security Disciplines
- Access Control - discusses how the Zero Trust approach is transforming access control, including identity and network access converging into a single coherent approach, and the emergence of the Known-Trusted-Allowed model (which updates the classic authenticated/authorized approach).
- Security Operations – discusses key leadership aspects of a security operations capability, often called SecOps or a Security Operations Center (SOC) including critical success metrics, key touchpoints with business leaders and functions, and the most important cultural elements.
- Asset Protection – discusses two key imperatives for teams that manage and secure assets (often IT Operations or Workload operations in DevOps). These teams must prioritize security work based on business criticality and must strive to efficiently scale security across the large, growing, and continuously evolving set of assets in the technical estate.
- Security Governance – discusses the role of Security Governance as a bridge between the world of business goals and technology and how this role is changing with the advent of cloud, digital and zero trust transformations. This section also covers key components of security governance including risk, compliance, security architecture, posture management, (strategic) threat intelligence, and more.
- Innovation Security - discussion of how application security evolves into a modern approach (including DevSecOps) and key focus areas to drive success of this capability.
- Security Governance Maturity models describing real world journeys for Security Architecture, Posture Management, and IT Security Maintenance – including specific concrete actions to help you move up to the next level
- Next Steps/Closing – wraps up the workshop with key quick wins and next steps
Imperative: Coverage for commom attack chains (Insider and external threats)
Microsoft Digital Defense Report:
https://aka.ms/MDDR = https://www.microsoft.com/en-us/security/business/microsoft-digital-defense-report-2022
Mindmap
Resources:
- Cyber Security Mind Map Examples:
- 网络安全绪论
- 扫描与防御技术
- 口令破解及防御技术
- 拒绝服务供给与防御技术
- Web及防御技术
- 计算机病毒
- 网络安全发展与未来
- 企业安全工作要点思维导图
- Free Cloud Mind Map Website: Mind Mup2 - https://drive.mindmup.com/
![]() |
SANS Cisco Mind Map |
A CISO (Chief Information Security Officer) has a complex role within a company. They have a wide array of tasks to perform, that involves many differing parts, which the average individual is not always aware of.
CISO Mind Map is an overview of responsibilities and ever expanding role of the CISO. This Security Leadership poster made by SANS shows exactly the matters a CISO needs to mind when creating a world class IT Security team. It also highlights the essential features necessary of a Security Operations Centre (SOC).
To make this chart more practical, I put them into the tables and will update it with some technologies and thoughts applied in my daily work. This update will last a long term. It will be put into navigation bar for easy access.
Security Operations
Prevention
|
Detection
|
Response
|
|
|
|
Legal and Regulatory
Compliance | Privacy | Audit | Investigation |
|
|
|
|
Intellectual Property | Contract Review | Customer Requirments | Lawsuit Risk & Acts |
|
|
|
|
Risk Management
Risk Framework | Risk Assessment Methodology | Business Impact Analysis |
|
|
|
Risk Assessment Process | Risk Analysis and Quantification | Security Awareness |
|
||
Vulnerability Management | Vendor Risk Management | Physical Security |
|
|
|
Disaster Recovery (DR) | Business Continuity Planning | Risk Treatment |
|
||
Policies and Procedures | ||
|
Business Enablement
Product Security | Cloud Computing | Mobile |
|
|
|
Emerging Technologies | Mergers and Acquisitions | |
|
|
Governance
Strategy | Business Alignment | Risk Management |
| ||
Program Frameworks | Control Frameworks | Program Structure |
|
| |
Program Management | Communications Plan | Roles and Responsibilities |
Workforce Planning | Resource Managemnet | Data Classification |
| ||
Security Policy | Create a Security Culture | Security Training |
|
| |
Metrics and Reporting | IT Portfolio Management | Change Management |
|
| |
Board Communications | ||
|
Identify and Access Management
Provisioning/
Deprovisioning
|
Single Sign On
(SSO)
|
Federated Single Sing on (FSSO)
|
Multi-Factor Authentication
|
Role-Based Access Control (RBAC)
| Identity Store (LDAP, ActiveDirectory) |
Leadership Skills
Business Strategy | Industry Knowledge | Business Acumen |
Communication Skills | Presentation Skills | Strategic Planning |
Technical Leadership | Security Consulting | Stakeholder Management |
|
| |
Negotiations | Mission and Vision | Values and Culture |
Roadmap Development | Business Case Development | Project Management |
|
| |
Employee Development | Financial Planning | Budgeting |
Innovation | Marketing | Leading Change |
Customer Relationships | Team Building | Mentoring |
|
Note: ISO = Information Security Office
Another CISO Mind Map example:
Note: The original image concept was created by Rafeeq Rehman and later redesigned by Momentum Partners.
===================================================================
CISO Job
What is the job of Chief Information Security Officer (CISO) in ISO 27001?
Compliance:
- Develop the list of interested parties related to information security (see also How to identify interested parties according to ISO 27001 and ISO 22301)
- Develop the list of requirements from interested parties
- Remain in continuous contact with authorities and special interest groups
- Coordinate all efforts related to personal data protection
Documentation:
- Propose the draft of main information security documents – e.g., Information security policy, Classification policy, Access control policy, Acceptable use of assets, Risk assessment and risk treatment methodology, Statement of Applicability, Risk treatment plan, etc.
- Be responsible for reviewing and updating main documents
- Risk management:
- Teach employees how to perform risk assessment
- Coordinate the whole process of risk assessment (see also: ISO 27001 risk assessment & treatment – 6 basic steps)
- Propose the selection of safeguards
- Propose the deadlines for safeguards implementation
Human resources management:
- Perform background verification checks of job candidates
- Prepare the training and awareness plan for information security (see also How to perform training & awareness for ISO 27001 and ISO 22301)
- Perform continuous activities related to awareness raising
- Performing induction training on security topics for new employees
- Propose disciplinary actions against employees who performed the security breach
Relationship with top management:
- Communicate the benefits of information security (see also Four key benefits of ISO 27001 implementation)
- Propose information security objectives (see also ISO 27001 control objectives – Why are they important?)
- Report on the results of measuring
- Propose security improvements and corrective actions
- Propose budget and other required resources for protecting the information
- Report important requirements of interested parties
- Notify top management about the main risks
- Report about the implementation of safeguards
- Advise top executives on all security matters
Improvements:
- Ensure that all corrective actions are performed
- Verify if the corrective actions have eliminated the cause of nonconformities
Asset management:
- Maintain an inventory of all important information assets
- Delete the records that are not needed any more
- Dispose of media and equipment no longer in use, in a secure way
Third parties:
- Perform risk assessment for activities to be outsourced
- Perform background check for candidates for outsourcing partners
- Define security clauses that must be part of an agreement
Communication:
- Define which type of communication channels are acceptable and which are not
- Prepare communication equipment to be used in case of an emergency / disaster
Incident management:
- Receive information about security incidents
- Coordinate response to security incidents
- Prepare evidence for legal action following an incident
- Analyze incidents in order to prevent their recurrence
Business continuity:
- Coordinate the business impact analysis process and the creation of response plans
- Coordinate exercising and testing
- Perform post-incident review of the recovery plans
Technical:
- Approve appropriate methods for the protection of mobile devices, computer networks and other communication channels
- Propose authentication methods, password policy, encryption methods, etc.
- Propose rules for secure teleworking
- Define required security features of Internet services
- Define principles for secure development of information systems
- Review logs of user activities in order to recognize suspicious behavior
No comments