Hello, welcome to the cybersecurity leadership and management of course. We will be discussing cybersecurity leadership model, the yields STS, which is security trust and stability. My name is Cicero Chimbonda, and I am your instructor for this course. Cybersecurity leadership models that yields security, trust, and stability. The ultimate goal of a cybersecurity leadership is to develop a model that results in the success of information security. We will be discussing in this course, how to build security within your leadership model. How to build trust, the importance of trust within your cybersecurity model. And lastly how to build stability. The leadership model which is security, trust, and stability that we are addressing in this course, begins as we talked about at the top with your chief information security officer. UCSDS is the ultimate goal of cybersecurity leaders to develop that model that delivers that confidentiality, integrity, and availability, and you do this by controls. So the leadership model will bring that alignment to the business unit and the management will bring the CIA that's required, confidentiality, integrity, and availability. And then aligning with the business to make sure there's organizational strategy within your cybersecurity program. And as there's adherence or meeting, the regulatory or legal compliance that's required by the regulatory systems and assuring operational excellence, stability, making sure there is availability along those lines. This is done through controls, defining and implementing the proper controls. There are three types of controls that we would be looking at in this course. The first one is administrative controls. These are controls that are in policies, procedures, that reduce the risk. Then we're going to look at physical controls. These are controls that you can see, touch, and lastly technical controls, system controls that are implemented by your information technology department. Cybersecurity, information security, let's look at the general definition. It is to ensure that the enterprise is protected against the disclosure of unauthorized users confidentiality. It is the assurance that there is no improper modification that brings integrity, and assure that there's non-access when required, that is availability. So basically that it's always when required we need to make sure the system, that's availability component. As you recall, the definition of being secure is to protect your assets. Each organization has different assets that they need to protect, and those assets are protected from actors, those bad actors out there, we're trying to penetrate. These are some of the assets that organizations will protect data. Now in this millennial in this century, our equity is our data, data is where corporations are looking to monetize the corporate assets, their employees, intellectual property, systems, these are different assets that a corporation will protect from bad actors. Bad actors are your crime, organization crimes, nation states, insider threats, 40% of tax from 2019, even 2020 were attributed to insider threats, and then activists and script kiddies. So in order for you to bring that security, information security, you need to assure confidentiality, assure integrity, and assure availability doing this we will tackle how to build, okay? How do we build security? So we build security by achieving and aligning the CIA to STS to align into the OS/RS/OE. Well, how do we build security? Well, security, confidentiality, organizational strategy, that's that alignment, okay? You make sure that your confidentiality and organizational strategies are aligned. You bring in controls. So controls are these elements that will help you build your security. Let's look at some of these controls. As we talked about it, there are administrative controls. And an administrative control that you implement to assure security is your cybersecurity program. That's where he begins. You need to develop a successful cybersecurity program. You need to develop a cybersecurity task force, we talked about that in the last course, where you're partnering up and making sure you have the right task force available. Then you're doing annual risk assessment. This is an administrative control to ensure that you are building security. You institute pen testing or vulnerability scanning, user awareness training, and incident response program. These are all not exclusive, there are many other administrative controls, I'm just giving you some samples of administrative controls that can help you build security around your organization. Physical controls, you need to assure that there's a central location where your cybersecurity will be run out of. It could be a virtual, it could be cloud, it could be physical in terms of where you're operating that center but it will always have a brick and mortar, right? Or a place or location whether it's from somebody's house, typically from a SOC center. And you need to make sure your team is in place, having a security team, if you're enforcement having, guards or military, having the personnel. And then you need to have physical means of those individuals getting the entry points whether the entry badges, their biometric systems out there. Building security cameras, those are physical, and then alarms and alerts. These are sample not exclusive but samples of physical controls that builds trust. Lastly, technical controls. These are controls that will be implemented by your IT Department and you can have a perimeter protection with next gen firewalls, multifactor authentication for your access identity access management tools. Having IDS or IPS which is your intrusion detection systems, or your intrusion protection systems, prevention systems. So again this is prevent, monitor, respond systems, and then you have encryption and certification, certificate authority, CA systems, and then host/endpoint protections to mitigate against anti virus or viruses or malware. So again these are technical controls that build trust within your organization to bring confidentiality, to align to your organizational strategy. We looked at this the last course, and again, I just wanted to put it out there, STS with the security, trust, stability. These are some of the controls you want to put in place, again, they will increase your posture delivering that cycle. Let's look at how to build trust. So assist those through the cybersecurity leadership task force wants to build trust. This is done by aligning integrity and your regulatory system. So you build trust, assuring that the integrity of your systems are there. That tampering or modification of your data, no one is able to do that. So you do that with controls. Let's look at some administrative control. Assuring that legal regulatory and compliance procedures are in place. Again, you work with your compliance officer or your legal staff or consulting to make sure that the procedures are in place. Making sure that annual risk assessment has been done, making sure that the on boarding off boarding procedures are in place. Making sure that there is a proper procedures for legal holds, forensics, and investigation and also periodically instituting fishing, social engineering testing. That's an administrative control that can provide integrity because you can feed into your board, your legal in your stakeholders and your shareholders how you fare in the metrics of these components. Physical controls that can build trust is having barricades. Again, these you can take a form of preventative means, having safes and secure enclosures, having a key token management system, a fingerprint system and even systems where disks, physical disks that has WORM capabilities, Write Once Read Many. Technical controls, DLP, which is a data loss prevention, the ability to stop exfiltration of data outside your organization. Having the ability to have IAM system, identity access system. Archiving, compliance, e-discovery systems that it can help your legal departments in case their investigations are made, having a business and financial records, proper business tools such as ERP Or CRMs. And then having training, proper training software, firm elements training systems. These were all build trust into your leadership. Again, this is another slide that shows the minimizing of risk. We looked at this last one, confidentiality, integrity, availability. This is where a business continuity, high availability will take in place. So building stability. The CISO through the cybersecurity leadership task force committee wants to build stability. I'm sorry, leadership task force committee wants to build stability. You do this again, stability is availability, so stability you want to make sure the availability of resources are there. You want to make sure that operational excellence is in place, that the trust for data to be available when they're supposed to be available, that there's no downtime. That you're meeting the 999 for your service level agreement for example. Disaster recovery and business continuity plan is an administrative control. Making sure that there is proper change management program. This assures stability that you're not introducing vulnerabilities as you're making changes is to your organization. Following processes like SDLC, software development life cycle, having supervisory and performance training and reviews. Having job rotations, segregation of duties. These are all administrative controls that can assure operational excellence. Then in the physical side, you have network operations, NOC, where you can have power and cooling for continuous operations. Having a network devices such as the routers, appliances, switches, hubs, physical appliances. Then you have servers, workstations, printers, other peripherals, and then redundant fiber, SDWAN, software-defined wide area network appliance, not necessarily the software side but the appliance. Again, these are physical components that can help you build stability or trust. Again, technical, enterprise device management. These are tools that can help manage the endpoints such as mobile devices, your laptops, your iPads, having a system that can do that, that can help you figure out what's down, where gaps are in terms of vulnerabilities are being introduced so that your users are being reliant. Asset management systems, making sure that you have a good life cycle managing your assets. Hot standby router protocol. This is a protocol that can assure stability, HSRP is an example of where you have one IP address that is associated with two different types of IPs, or two different DNS. And and so when you're connecting handshaking between circuits your IP address, that single IP addresses pointing to two different devices, again, HSRP. Virtualization or cloud computing, back-up and recovery systems. These are all technical systems or solutions to assure stability, high availability, and ultimately delivery operational excellence. In conclusion, your chief information security officer with its leadership task force committee must assure that the cybersecurity controls are in place to deliver at the lower end managing confidentiality, integrity, availability, you bring those. And then at the high end leadership, making sure that there's alignment to your organizational strategy, making sure you're adhering to your regulatory systems or illegal systems, and delivering that operational excellence. As we looked at in this course, it's done by three types of controls, administrative controls, physical controls, and technical controls. This ends our course, and I will see you next time. Thank you.