CISO MindMap 2022 1651468241
CISO MindMap 2022 1651468241
Operations
Acquisition Risk Assessment SOC and NOC Integration Perform ransomware BIA
Network / Application Integration Cost Mergers and Acquisitions Risk Based Approach Tie with BC/DR Plans
SOC Tech stack management
Smart Grid
IOT Use cases Expiration date: June 30, 2023
Credentialing
Smart Cities / Communities
Twitter: @rafeeq_rehman Account Creation/Deletions
Others ...
IoT SaaS Platforms Version: 2022 Single Sign On (SSO, Simplified sign on)
Voice signatures
Password-less authentication
Requirements Face recognition
Design reviews IAM with Zero Trust technologies
Security Testing Project Delivery Lifecycle Privileged access management
Certification and Accreditation Use of public identity OAuth
(Google, FB etc.)
OpenID
Application protection
Strategy and business alignment
Defense-in-depth COSO
Remote Access
COBIT
Encryption Technologies
ISO
Backup/Replication/Multiple Sites Risk Mgmt/Control Frameworks ITIL
Cloud/Hybrid/Multiple Cloud Vendors Security Architecture NIST - relevant NIST standards and guidelines
Software Defined Networking
FAIR
Network Function Virtualization Visibility across multiple frameworks
Zero trust models and roadmap
Resource Management
SASE/SSE strategy, vendors
Roles and Responsibilities
Overlay networks, secure enclaves
Governance Data Ownership, sharing, and data privacy
Multi-Cloud architecture
Conflict Management
Operational Metrics
CCPA, Data Privacy & GDPR Metrics and Reporting Executive Metrics and Reporting
HIPAA and HITECH Explore options for cooperative SOC, collaborative infosec
Code Reviews
Data Discovery
Data Classification
Access Control
Data Centric
Data Loss Prevention - DLP
Partner Access
Approach
1. Re-evaluate ransomware defenses, detection and response capabilities, perform a business impact analysis.
Encryption/Masking
Risk Management
2. Reduce/consolidate security tools/technologies and vendors.
3. Train staff on business acumen, value creation, influencing and human experience to serve business better.
Monitoring and Alerting
Industrial Controls
4. Take an inventory of open source software and make it part of your vulnerability management program.
Systems
PLCs
Operational Technologies
SCADA
5. Build team expertise in technology fields including machine learning (ML) models, model training, API
HMIs
Risk Register
Risk scoring
© Copyright 2012-2022 - Rafeeq Rehman