1 / 15

Show Me the Money

Learn the 5 crucial steps to secure funding for your IT security initiatives. Discover how to align policies and procedures, identify critical data, perform risk assessments, and effectively demonstrate the need for investment. This guide, presented by Rob Garbee, a seasoned Technical Security Analyst, provides actionable insights and tips to help you get the funding you need.

corrinej
Télécharger la présentation

Show Me the Money

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Show Me the Money 5 Steps to get funding for IT Security

  2. Pssst.. Who is this guy? • Rob Garbee • Technical Security Analyst • 20 or so years in IT • Banking, DOD, HIPAA • CISSP • What does all that mean?

  3. I’m Just Like you… • A minion trying to figure it out

  4. Why do this stuff

  5. Lets Get Started

  6. Step 1 - Policies and Procedures (or whatever you call them) • Are you and your company following them • Do procedures align with policy • Are procedures documented • Identify gaps and document them

  7. Step 2 Speak to your management team • What keeps them up at night • What are you responsible for • Where is your important data • How much is that data worth • Note these items

  8. Step 3Perform an inventory • Where is your stuff • Where is your important data • If you don’t know how can you protect it

  9. Before we move on you should now have the following STOP • What the important data is • Where the important data lives • How much the important data is worth • Policy discrepancies

  10. Step 4Risk Assessment • Use the data you have collected • Logical Risk Assessment • Physical Risk Assessment

  11. Step 4Risk Assessment (British mathematician and professor of statistics at the University of Wisconsin

  12. Step 5Demonstrate the results • Use the data that you have collected • Hard to argue with their own words • Demonstrate the need by use of monetary loss • Report, PowerPoint, etc.

  13. If we have done it right..

  14. Show Me the Money 5 Steps to get funding for IT Security

  15. Additional stuff • Use external resources if needed • Use free tools if needed • Nessus • Security Onion

More Related