cooperative bank of Oromia , Cyber Security governance and management

shiferaw9 59 views 12 slides Jun 13, 2024
Slide 1
Slide 1 of 12
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12

About This Presentation

ERM, cyber


Slide Content

Cyber Security Management Candidate : Shiferaw Bekele Date: December 19, 2022

outlines 01 Security Powers Business 05 Implementation Techniques 06 Wrap-up 04 Justification 03 Thematic Areas 02 Cyber Peace

Security Powers Business Secured system contributes to Business success (profitability of Banking) 01 Secured system brings Trustworthiness from Stakeholders 02 Secured system builds public confidence for further Business operation & production. 03 So, what can we do? 04

Cyber Peace As Cyber Security Management, Keeping Cyber Peace should be our primary Goal. Protecting Information, IS, infrastructure, mission critical system ASSSET So, in which areas shall we focus?

Thematic Areas Bring Peace of Cyber via 1 2 Top-management commitment &buy-in Building Cyber security policies

4 Establishing dedicated Cyber Security department 5 6 Enhancing follow-up and monitoring. Establish robust plan and report approach. 3 Allocating budget & craft cyber security programs

8 Providing diligent and competent security Service. As Cyber Security Management we should search opportunities such as late comer advantages and governments incentives. 7 Creating capacity building capacities.

Risk Assessment, Risk Analysis, Risk Treatment Data at Rest, Data in motion, Data in Use Authentication, Authorization, Accounting Confidentiality, Integrity, Availability Awareness Creation, Training Provision, Culture Cultivation Administrative Security Measure, Technical Security Measure, Physical Security Measure Based on org. risk aptitude, cost benefit analysis , CS Current State & CS Desire State we should focus on: Justification

Risk management, Change management, Incident Management Readiness, Responsiveness, Recovery Top management level, Middle management level, Lower management level Preventive Security Controls, Detective Security Controls, Corrective Security Controls Searching and crafting tools and techniques that enables to deploy Cyber Security programs. Justification …

Capacity Building Capacity on People, Process and Technology. The main pillars we should committed to while governing our cyber security 01 Alignment 03 Defense in Deepth 02 Risk Based Approach 04 Shared Responsibility Implementation Techniques Follow Deming cycle PDCA: plan , do, check, Act

The more we secured the more we profited Our organizational Security Maturity Level directly contributes to our banking profit. The main significance of CSM is to bring high maturity level of COP Bank of Oromia security posture that enables to support business operation mission. Wrap-Up

YOU! THANK
Tags