Aligning Security with Business
Wearing two hats
Wearing two hats
Adherence to laws, regulations, standards, and policies
Current performance versus desired performance
Overall management of the organization's IT resources
Policies, Standards, Procedures, and Guidelins
Import and Export Controls
Intellectual Property
Laws, regulations, standards, and policies
Other Privacy Laws
Vulnerability plus threat, equals risk
Spotting risks early so the organization can prepare for them.
Managing and Prioritizing Risks
CIS, ISO, NIST etc.
Identify, assess, and prioritize risk
Risk Management Terminologies
Reduce, transfer, accept, or avoid the risk
Physical, Technical, Administrative, etc.
U.S. Privacy Laws
No one should be trusted by default