Recommended to do list for IT manager/CIOs &CISOs
So you have started a new job in a new organisation… your keen to strut your stuff, to leave your imprint, but not sure where you should start or focus on… Over last 15 years I’ve provided virtual CISO services and guidance to many CISOs, CEOs, CIOs, IT Managers etc.?Of late I have been finding that a lot of companies are just throwing people into roles. All of a sudden a third line engineer, is now looking after security for the organisation, or a manager from another team is now made the CISO.?In my experience, it’s a bad practice to throw people into such an important role without A LOT of security experience.?However, if you’re in that role, or plan on appointing someone into such a role, here is my checklist for what you/they need to be doing to be successful, and ensuring your business is successful from a security front, not to mention ensuring your organisation doesn’t get hacked.
Understand the landscape and the people
- Goals
- Vision
- Strategy
- Initiatives
- Products & services etc
- How the business works
- The people and their roles/responsibilities
- What teams make up its operations
- What team does what, and who oversees each team
- How do the other teams work and interact from a tech and non-tech perspective
- What dependencies tech wise do they have
- What pain points do they have
- What are their future plans/requirements from a tech and non-tech perspective.
- SLA’s
Identify policies & procedures
- What do they have
- What are the requirements
- When are audits undertaken, such as schedules
- Who is involved?
- What Governance requirements does the organisation have and the details
- Any outsourcing in place
- Any planned acquisitions (with acquisitions comes potentially inherited security and tech risks)
Tech controls & Benchmarks
领英推荐
People – Training & Phishing, building organisational awareness of cyber risks
This area is arguably the most important.?We know 90-95% of organisations are breached via Layer 8 (The human Layer).?Determine:
- If so what was the latest results?
- How often, results, is the training effective?
Monitoring & Response
Cyber Insurance Coverage
- Most companies think their 1M ML cover is enough, usually in a breach its not
Risk Analysis
At each stage above you should be performing some base risk analysis to:
Put it all together
At this stage you should have a complete picture of the organisation.
- People
- Resources
- New tools
- Systems
- Processes
- Cross-departmental resourcing
I hope this article has given you some insight as to areas of focus and how to be successful in your role.?If you would like any further information or guidance, please reach out!
General Manager Risk, Safety, Compliance and ESG at Waveconn
2 年Great reading Dan Weis