Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 12

Cyber Security Management

Candidate : Shiferaw Bekele


Date: December 19, 2022
outlines
Security Powers
01 Business
04 Justification

Implementation
02 Cyber Peace 05 Techniques

03 Thematic Areas 06 Wrap-up


Secured system contributes to Business
01 success (profitability of Banking)

02 Secured system brings Trustworthiness


Security from Stakeholders

Powers
Secured system builds public confidence for
Business 03 further Business operation & production.

So, what can we do?


04
Cyber Peace

As Cyber Security
Management,

Keeping Cyber Protecting So, in which


Peace should be
Information, IS, areas shall we
our primary Goal.
focus?
infrastructure,
mission critical
system ASSSET
Thematic Areas
Bring Peace of Cyber via

Building Cyber
1
security policies

2 Top-management
commitment &buy-in
Allocating budget & craft 3

cyber security programs

4
Establishing dedicated
Cyber Security department

Establish robust plan and 5

report approach.

6 Enhancing follow-up
and monitoring.
Creating capacity 7

building capacities.

8
Providing diligent and
competent security Service.

As Cyber Security Management we should search


opportunities such as late comer advantages and
governments incentives.
Justification
Based on org. risk aptitude, cost benefit analysis , CS
Current State & CS Desire State we should focus on:
Risk Assessment, Risk Data at Rest, Data in motion,
Analysis, Risk Treatment Data in Use

Authentication, Confidentiality, Integrity,


Authorization, Availability
Accounting

Awareness Creation, Administrative Security


Training Provision, Measure, Technical Security
Culture Cultivation Measure, Physical Security
Measure
Justification …

Risk management, Readiness, Responsiveness,


Change management, Recovery
Incident Management

Top management level, Preventive Security Controls,


Middle management Detective Security Controls,
level, Lower Corrective Security Controls
management level

Searching and crafting tools and techniques that


enables to deploy Cyber Security programs.
Implementation Techniques
Capacity Building Capacity on People, Process and Technology.
The main pillars we should committed to while governing our cyber
security

Risk Based
Alignment
01 02 Approach

Defense in Shared
03 Deepth 04 Responsibility

Follow Deming cycle PDCA: plan, do, check, Act


Wrap-Up
The more we secured the more we profited

Our organizational Security Maturity Level directly


contributes to our banking profit.

The main significance of CSM is to bring high


maturity level of COP Bank of Oromia security
posture that enables to support business
operation mission.
THANK YOU!

You might also like