Time
1 hour 2 minutes
Difficulty
Advanced
CEU/CPE
1

Video Transcription

00:00
hello and welcome back to revenue protection as a C. So
00:07
in this module, we will learn why is important to be strategic in managing risk
00:18
as a C So you will wear many hats. Um,
00:22
you know the graphic that's currently on the screen, um, shows that we will manage identity and access network applications well managed our responses to breaches compliance. Third party risks a business continuity plan. Mobility,
00:41
um, cloud
00:43
the whole digital transformation process. It goes on and on
00:47
to be successful and managing all of these different aspects of being a C. So you have to take a very strategic approach.
00:57
Um,
00:59
not the sledgehammer, but the scalpel
01:06
as the sea. So you must lead the wrist strategy. You must learn to speak the language of the business
01:12
in a quantifiable way.
01:15
Don't go into board meetings or executive presentations with heat maps, talking about high, medium and low levels of risk.
01:26
I heard this analogy on a podcast. I can't remember which one it was, but
01:32
the ah individual say how many of us would accept a job if when we asked what the salary waas we got a response like it was, is high or is medium
01:46
or is low
01:48
without actually having
01:49
ah, quantitative number a tangible number to go along with that.
01:57
I dare say not many of us will. They set that job offer.
02:00
So why do we go into meetings presenting heat maps that say the organization has high risk or medium risk?
02:08
I'm a practitioner of the fair method,
02:13
and what fair allows you to do is quantify risk based off of scenarios. So you generate a scenario you interview.
02:23
Um, you know, subject matter experts around that particular scenario, and then you put together a forecast or model that will quantify, um, that risks to a reasonable level. So at least you can go in and say,
02:42
If we don't implement this guy's security control,
02:45
this is the amount of risk that we have not
02:49
no, we have high risk if we don't implement. You know, I ps i ds. What is that tie back to? What's the threat community that could exploit that? How many times over the year is that likely to be exploited if it's a breach of confidentiality or availability? What's that going to cost us?
03:08
Go in with hard numbers or is
03:12
as as specific as you can get, but not with heat charts. The heat maps speaking to people that
03:21
with a high degree of certainty, I can say have strong business backgrounds and understand forecast models who live in Exhale with,
03:30
you know, a power point with red, yellow and green. Don't don't don't do that
03:38
taught risk in that security.
03:39
Understand what the crown jewels are? Are you implementing security controls to protect something
03:47
that really is not work free and protected that has no real material value if it was exploited?
03:55
Um, so this goes back to meeting with the department heads and understanding what each department
04:04
has in the way of crown jewels and implementing systems around protecting those crown jewels,
04:11
um, and then using security as a competitive differentiator. When we started off, I mentioned that security
04:20
can be used to generate revenue, so a couple examples of that are, if you are again business to business focused company and you deliver a product. But, say, a SAS product,
04:36
there are compliance and regulatory things that you can achieve that will differentiate you from the competitors that may tip a deal in your company's favor.
04:51
Um, during a bake off isil. 27,000 and one sought to compliance GDP are CCP a few dealing with the federal government Fed ramp compliance
05:04
in today's um, you know Lance Gate With a new day a new breach,
05:13
companies that are undergoing digital transformation are looking for companies that can protect their digital assets in the cloud and you will receive in battle questionnaires,
05:27
and you will be scored on how well you do on those. There are also a lot of tools out there if you are, the third party is being monitored that companies will monitor the year security posture from an external.
05:41
Our perspective. It'll be passive of scanning, but they will be able to paint a somewhat of a
05:49
holistic picture of your cybersecurity hygiene.
05:54
So it is definitely in your favor to go ahead and do these things. If budget dictates right, I sold 27,001 should be a good foundational compliance for any organization that has I T and Security um,
06:12
departments
06:13
sought to type two if you're in the cloud living in cloud service. This is an excellent way to highlight
06:19
with third party validation that you are protecting your clients data GDP are it's not going away. We've seen some very hefty fines. Companies will, especially in the national companies, will ask where their data is.
06:35
They'll ask you privacy by design questions. They'll ask you about cross board a data transfer.
06:42
Um, so go ahead and get those things out of the way
06:46
and use those things as a competitive differentiator and track with deals lost or deals. One because of complies
06:58
compliance efforts that
07:00
you implement it or ones that you need to implement to justify to the board or your boss the CEO like, Hey, if we had had this, we wouldn't have lost his deal or
07:14
because we did have. This is why we beat our competitors,
07:18
those friends a
07:20
into tangible dollars. And it's a win win again for everybody in the organization

Up Next

Revenue Protection as a CISO

In this course you will learn strategies to transform the way your security program is viewed.

Instructed By

Instructor Profile Image
Terence Jackson
Chief Information Security and Privacy Officer
Instructor