Risk Assessment and Cybersecurity Plan Presented by Ron Fleming - - PowerPoint PPT Presentation

risk assessment and
SMART_READER_LITE
LIVE PREVIEW

Risk Assessment and Cybersecurity Plan Presented by Ron Fleming - - PowerPoint PPT Presentation

Risk Assessment and Cybersecurity Plan Presented by Ron Fleming President, Cross Link Group September 16, 2019 Cross Link Group (CLG) History Started in 1996 to serve only ministries to the glory of God Currently servicing over 50


slide-1
SLIDE 1

Risk Assessment and Cybersecurity Plan

Presented by Ron Fleming President, Cross Link Group September 16, 2019

slide-2
SLIDE 2

Cross Link Group (CLG) History

  • Started in 1996 to serve only ministries to the glory of God
  • Currently servicing over 50 ministries including several financial ministries
  • 23 years of CEO/CIO technology leadership experience in ministry
  • CLG provides technology services in:
  • Cybersecurity and Compliance Risk Assessment
  • Enterprise Technology Assessments and Strategic Planning
  • Large Software Projects Delivery and Rescue
  • Network Infrastructure
  • Service Desk
slide-3
SLIDE 3

What is a Security Framework?

A Logical and Comprehensive Top Down Method to Measure Cybersecurity and Compliance Risk Mitigation

slide-4
SLIDE 4

Cybersecurity Policy Packet

  • Almost 50 industry-related standard policies are necessary for financial

ministries

  • Policies need to based on top national and international standards bodies and

best practices (NIST, COBIT, ITIL, etc.)

  • Policies need to take into consideration data privacy requirements (FDIC, PCI

DSS, HIPAA, NACHA, GDPR, etc.)

  • Policies should help drive Enterprise Risk Management for your ministry
slide-5
SLIDE 5

Policy Dashboard**

**CoNetrixTandem is the tool of choice to provide policy/risk management

slide-6
SLIDE 6

List of Policies**

**CoNetrixTandem is the tool of choice to provide policy/risk management

slide-7
SLIDE 7

Information Cybersecurity Risk Assessment

  • Initial Cybersecurity Risk Assessment informs the organization of compliance/

cybersecurity risks and the process to mitigate those risks

  • Based on industry-related data and questionnaire, a preliminary Risk Residual

dashboard should be followed

  • The Cybersecurity Policy Packet and Risk Assessment results should be

quantified in the Risk Residual dashboard for the organization

  • The Risk Residual dashboard highlights security threats and vulnerabilities

that can be identified and mitigated based on timeline and budget

slide-8
SLIDE 8

Risk Residual Dashboard**

**CoNetrixTandem is the tool of choice to provide policy/risk management

slide-9
SLIDE 9

Security Threats**

**CoNetrixTandem is the tool of choice to provide policy/risk management

slide-10
SLIDE 10

Cybersecurity Risk Management Plan

(Often State and Federal Legislation Required)

  • Evaluate and adjust/accept the threats and vulnerabilities given the org’s risk

tolerance

  • Threats and vulnerabilities are ranked based on severity
  • Business processes/procedures will be defined to address user-related threats
  • A Cybersecurity Partner like Cross Link Group can create the plan and address

the technical threats and vulnerabilities according to priorities and budget

  • All threat mitigation is then reflected in the Risk Residual dashboard and

reported to the organization’s board and leadership

slide-11
SLIDE 11

Cybersecurity Mitigation Costs

  • Cost to not mitigate and loss of reputation given a breach
  • Cost of tooling and licensing
  • Cost to mitigate – technical work to address security vulnerabilities
  • Cost to change – new processes and procedures to do work securely
  • Reasonable timeline – staff availability to change technical environment and

processes/procedures

  • Risk tolerance – how much can an organization risk
slide-12
SLIDE 12

How Can You Get Help?

  • Bring a business card to the CrossOlive/Cross Link Group (CLG) booth and we will

email you a copy of this presentation

  • Have a Cybersecurity Partner like CLG provide a basic cybersecurity assessment
  • Have the Cybersecurity Partner implement a cybersecurity toolset like CoNetrix

Tandem to measure risks

  • Work alongside the Cybersecurity Partner to establish policies, identify risks and

determine your risk tolerance

  • Start a process of addressing vulnerabilities according to level of risk and budget
  • Set a goal to reach a level of risk that is wise in protecting your constituents

**CoNetrixTandem is the tool of choice to provide policy/risk management Cross Link Group is a Partner of CoNetrix