2018 - How to Assess the Maturity of your Security Program
We are continuously improving our security programs and controls – to protect against new threats, keep up with evolving compliance requirements, or to just get better at what we are doing. But how can we quantify the impact of these efforts on the overall maturity of our organization's security posture?
The ability to express maturity in a consistent fashion helps to communicate the value of our initiatives to executives and provide an objective way to visualize gaps and identify priorities on the path to a robust security program.
In this talk, we will discuss the challenges and importance of measuring the maturity of a security program, available solutions, and then dive into how our team combined NIST's Cybersecurity Framework with a defined way of expressing maturity to solve this problem.
Attendees will leave with ideas on how to assess and measure the maturity of a security program, using methods beyond check-the-box compliance frameworks.
Видео 2018 - How to Assess the Maturity of your Security Program канала LASCON
The ability to express maturity in a consistent fashion helps to communicate the value of our initiatives to executives and provide an objective way to visualize gaps and identify priorities on the path to a robust security program.
In this talk, we will discuss the challenges and importance of measuring the maturity of a security program, available solutions, and then dive into how our team combined NIST's Cybersecurity Framework with a defined way of expressing maturity to solve this problem.
Attendees will leave with ideas on how to assess and measure the maturity of a security program, using methods beyond check-the-box compliance frameworks.
Видео 2018 - How to Assess the Maturity of your Security Program канала LASCON
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
Creating a Security Metrics Program: How to Measure Success - SANS ICS Security Summit 2019Cybersecurity Maturity OverviewMulti-tenant architecture in 20 minutesBeer:30 - Physical Security AssessmentJuly 2017 - Ben Gardiner - Threat Assessment and Attack TreesProcess MeasurementIoT Security: The Ugly Truth, Mike Muller CTO, ARMHow Israel Rules The World Of Cyber Security | VICE on HBOUnderstanding IEC 62443 and Cybersecurity Standards - Mocana Webinar of 12/11/19NIST 800-171 assessment, from an auditor's perspectiveThe Cybersecurity Maturity Model Certification (CMMC) In a Nut ShellWebinar - The Cybersecurity Maturity Model Certification (CMMC) 1.0Securing ICS Using the NIST Cybersecurity Framework and Fortinet Best Practices for the Real WorldMeasuring Cybersecurity Maturity with the NIST CSF - Josh SokolNIST Cybersecurity Framework and PCI DSSWhy societies collapse | Jared Diamond2015 - Static Analysis Security Testing for Dummies… and YouNETWORK SECURITY - OVERVIEW OF CRYPTOGRAPHIC ALGORITHMSGARTNER OT Security Model & Architecture | OT ICS SCADA Cybersecurity | Industry 4.0The NIST Cybersecurity Framework 4 Step Guide