Using COBIT 5 Framework for Cybersecurity Assessment · Using COBIT 5 Framework for Cybersecurity...

26
Conference 2018 Conference 2018 Using COBIT 5 Framework for Cybersecurity Assessment Hugh Burley, Trevor Hurst, and Ivor MacKay

Transcript of Using COBIT 5 Framework for Cybersecurity Assessment · Using COBIT 5 Framework for Cybersecurity...

Page 1: Using COBIT 5 Framework for Cybersecurity Assessment · Using COBIT 5 Framework for Cybersecurity Assessment Hugh Burley, Trevor Hurst, and Ivor MacKay. Conference 2018 Speakers Trevor

Conference 2018Conference 2018

Using COBIT 5 Framework for Cybersecurity Assessment

Hugh Burley, Trevor Hurst, and Ivor MacKay

Page 2: Using COBIT 5 Framework for Cybersecurity Assessment · Using COBIT 5 Framework for Cybersecurity Assessment Hugh Burley, Trevor Hurst, and Ivor MacKay. Conference 2018 Speakers Trevor

Conference 2018

Speakers

Trevor Hurst, Chief Information OfficerMinistry of Advanced Education, Skills & Training

Hugh Burley, Manager of Information Security/Information Security OfficerThompson Rivers University/BCNET

Ivor MacKay, Manager, Information TechnologyBCNET

Page 3: Using COBIT 5 Framework for Cybersecurity Assessment · Using COBIT 5 Framework for Cybersecurity Assessment Hugh Burley, Trevor Hurst, and Ivor MacKay. Conference 2018 Speakers Trevor

Conference 2018

Agenda

1. COBIT 5 Refresher2. Why COBIT 53. Assessments4. Q & A

Page 4: Using COBIT 5 Framework for Cybersecurity Assessment · Using COBIT 5 Framework for Cybersecurity Assessment Hugh Burley, Trevor Hurst, and Ivor MacKay. Conference 2018 Speakers Trevor

Conference 2018

COBIT 5 Refresher

Page 5: Using COBIT 5 Framework for Cybersecurity Assessment · Using COBIT 5 Framework for Cybersecurity Assessment Hugh Burley, Trevor Hurst, and Ivor MacKay. Conference 2018 Speakers Trevor

Conference 2018

COBIT PRINCIPLES

Page 6: Using COBIT 5 Framework for Cybersecurity Assessment · Using COBIT 5 Framework for Cybersecurity Assessment Hugh Burley, Trevor Hurst, and Ivor MacKay. Conference 2018 Speakers Trevor

Conference 2018

Meeting Stakeholder Needs

Page 7: Using COBIT 5 Framework for Cybersecurity Assessment · Using COBIT 5 Framework for Cybersecurity Assessment Hugh Burley, Trevor Hurst, and Ivor MacKay. Conference 2018 Speakers Trevor

Conference 2018

COBIT 5 ENABLERS

Page 8: Using COBIT 5 Framework for Cybersecurity Assessment · Using COBIT 5 Framework for Cybersecurity Assessment Hugh Burley, Trevor Hurst, and Ivor MacKay. Conference 2018 Speakers Trevor

Conference 2018

GOVERNANCE VS MANAGEMENT

Page 9: Using COBIT 5 Framework for Cybersecurity Assessment · Using COBIT 5 Framework for Cybersecurity Assessment Hugh Burley, Trevor Hurst, and Ivor MacKay. Conference 2018 Speakers Trevor

Conference 2018

Page 10: Using COBIT 5 Framework for Cybersecurity Assessment · Using COBIT 5 Framework for Cybersecurity Assessment Hugh Burley, Trevor Hurst, and Ivor MacKay. Conference 2018 Speakers Trevor

Conference 2018

Why COBIT 5?

Page 11: Using COBIT 5 Framework for Cybersecurity Assessment · Using COBIT 5 Framework for Cybersecurity Assessment Hugh Burley, Trevor Hurst, and Ivor MacKay. Conference 2018 Speakers Trevor

Conference 2018

Alignment“How do I ensure all of our

Digital investments contribute to Stakeholder Value and enable the strategy of my Institution?

Audit preparation (Risk Management)

Tell a better story (funding)

“How do I ensure benefits are realized and IT risks are

mitigated? How can I prepare for upcoming Audit and/or

review activity?

“How do I better communicate the gaps in our

environment and achieve better funding?

Page 12: Using COBIT 5 Framework for Cybersecurity Assessment · Using COBIT 5 Framework for Cybersecurity Assessment Hugh Burley, Trevor Hurst, and Ivor MacKay. Conference 2018 Speakers Trevor

Conference 2018

OAGBC General Computing Controls Report

http://www.bcauditor.com/sites/default/files/publications/reports/OAGBC%20General%20Computing%20Controls%20Report_FINAL.pdf

Page 13: Using COBIT 5 Framework for Cybersecurity Assessment · Using COBIT 5 Framework for Cybersecurity Assessment Hugh Burley, Trevor Hurst, and Ivor MacKay. Conference 2018 Speakers Trevor

Conference 2018

COBIT Maturity

Page 14: Using COBIT 5 Framework for Cybersecurity Assessment · Using COBIT 5 Framework for Cybersecurity Assessment Hugh Burley, Trevor Hurst, and Ivor MacKay. Conference 2018 Speakers Trevor

Conference 2018

COBIT Maturity

Page 15: Using COBIT 5 Framework for Cybersecurity Assessment · Using COBIT 5 Framework for Cybersecurity Assessment Hugh Burley, Trevor Hurst, and Ivor MacKay. Conference 2018 Speakers Trevor

Conference 2018

Assessments

Page 16: Using COBIT 5 Framework for Cybersecurity Assessment · Using COBIT 5 Framework for Cybersecurity Assessment Hugh Burley, Trevor Hurst, and Ivor MacKay. Conference 2018 Speakers Trevor

Conference 2018

Assessment vs Audit

Or is it really Gap Analysis vs. Internal Audit vs. Pre-Assessment

Page 17: Using COBIT 5 Framework for Cybersecurity Assessment · Using COBIT 5 Framework for Cybersecurity Assessment Hugh Burley, Trevor Hurst, and Ivor MacKay. Conference 2018 Speakers Trevor

Conference 2018

Differences Between the COBIT 4.1 and the COBIT 5

Page 18: Using COBIT 5 Framework for Cybersecurity Assessment · Using COBIT 5 Framework for Cybersecurity Assessment Hugh Burley, Trevor Hurst, and Ivor MacKay. Conference 2018 Speakers Trevor

APO12 Manage Risk

APO13 Manage Security

BAI06 Manage Changes

DSS02 Manage Service Requests and Incidents

Page 19: Using COBIT 5 Framework for Cybersecurity Assessment · Using COBIT 5 Framework for Cybersecurity Assessment Hugh Burley, Trevor Hurst, and Ivor MacKay. Conference 2018 Speakers Trevor

Conference 2018

Assessment Methodology

Page 20: Using COBIT 5 Framework for Cybersecurity Assessment · Using COBIT 5 Framework for Cybersecurity Assessment Hugh Burley, Trevor Hurst, and Ivor MacKay. Conference 2018 Speakers Trevor

Conference 2018

KEY AREA: RISK

a) Levelofriskacceptanceb) Riskreviewc) Riskapproval

KEY AREA: MANAGING SECURITY

Page 21: Using COBIT 5 Framework for Cybersecurity Assessment · Using COBIT 5 Framework for Cybersecurity Assessment Hugh Burley, Trevor Hurst, and Ivor MacKay. Conference 2018 Speakers Trevor

Conference 2018

Risk Assessment Consequence Table

Page 22: Using COBIT 5 Framework for Cybersecurity Assessment · Using COBIT 5 Framework for Cybersecurity Assessment Hugh Burley, Trevor Hurst, and Ivor MacKay. Conference 2018 Speakers Trevor

Conference 2018

KEY AREA: MANAGING CHANGE

a) Methods of assessing change and its risks

b) Approval process

KEY AREA: MANAGE SERVICE REQUESTS AND INCIDENTS

a) Problem trackingb) Evidence of reviewing Incidents and

Requests

Page 23: Using COBIT 5 Framework for Cybersecurity Assessment · Using COBIT 5 Framework for Cybersecurity Assessment Hugh Burley, Trevor Hurst, and Ivor MacKay. Conference 2018 Speakers Trevor

Conference 2018

Self-Assessment

Page 24: Using COBIT 5 Framework for Cybersecurity Assessment · Using COBIT 5 Framework for Cybersecurity Assessment Hugh Burley, Trevor Hurst, and Ivor MacKay. Conference 2018 Speakers Trevor

Conference 2018

Self-Assessmenthttp://www.isaca.org/COBIT/Pages/Self-Assessment-Guide.aspx

Page 25: Using COBIT 5 Framework for Cybersecurity Assessment · Using COBIT 5 Framework for Cybersecurity Assessment Hugh Burley, Trevor Hurst, and Ivor MacKay. Conference 2018 Speakers Trevor

Conference 2018

Self-Assessmenthttp://www.isaca.org/COBIT/Pages/COBIT-5-PAM.aspx

Page 26: Using COBIT 5 Framework for Cybersecurity Assessment · Using COBIT 5 Framework for Cybersecurity Assessment Hugh Burley, Trevor Hurst, and Ivor MacKay. Conference 2018 Speakers Trevor

Conference 2018

Info~Tech