Cisco Cybersecurity-Management-Programs 1
Cisco Cybersecurity-Management-Programs 1
Program
whitepaper
Cybersecurity Managment Program
Many organization’s cybersecurity teams (or information succeed at this not because of industry pressure, but
security teams as they used to be known) continue because each aims to improve their organization. Having
to struggle to communicate cybersecurity issues to identified the opportunity, executives evaluate whether
senior leadership. Likewise, senior management also the initiative poses additional risks to their organizations
struggles to effectively articulate cybersecurity strategy and decide whether to accept this additional risk or not.
to technical cybersecurity personnel. It is as though two After accepting such risk, executive sponsors continue
parts of the same organization speak foreign languages to evaluate initiatives toward implementation. Even when
to one another, and each party has a very limited, or no, initiatives are operational, executives still employ strong
knowledge of the other party’s language. However, it does governance methods, including internal audit teams, to
not have to be like this. manage and monitor the effectiveness and efficiency of
these initiatives. This business approach has become
Failure to communicate issues is most often revealed in institutionalized across most enterprise units with the
grassroots cybersecurity initiatives that have evolved into exception of IT and cybersecurity. Key stakeholders
corporate cybersecurity programs. Typically, this resulted in IT and cybersecurity often claim that cybersecurity
from an enterprise in startup mode implementing solutions management programs are too technical, only internal
to address specific technical challenges. Unfortunately, facing, or too complex, to properly develop and
many organizations continue to employ a similar approach implement using this approach.
to secure much larger and more complex environments
against threats that outmatch the capabilities of their The truth is if these same IT and cybersecurity groups
original solutions. No longer simply a technical solution, adopted a common framework and designed their
cybersecurity management has become a business cybersecurity management programs based on said
function in today’s industry. As a business function, a framework, cybersecurity management would truly
greater level of integration with other business units become just a standard business function in their
requires a greater level of transparency and performance enterprises. Unfortunately, the cybersecurity world does
reporting. not agree on a standard cybersecurity framework across
all countries, industries, and states. Analysis of the
The evolution of grassroots cybersecurity programs rarely commonalities and differences between these standard
results in the kind of mature cybersecurity solutions that frameworks show that it is possible to create a universal
are aligned with, and address business needs. And why cybersecurity management framework to address all
should they? The initial programs were designed to solve countries, industries, and states. Such a framework is
technical challenges, such as preventing virus outbreak not firmly associated with any particular cybersecurity
or infection, stopping cyber attackers from compromising standard and can be adapted during implementation to
or stealing valuable information. Such initial cybersecurity address any specific security standard that organizations
efforts were neither designed as business functions nor using it wishes to follow. This paper introduces a
defined in business terms. cybersecurity management framework where it is
apparent that a successful approach is not too technical,
Key Success Factors addresses both internal and external concerns, and is not
overly complex to implement, operationalize, and manage
The following key success factors are common to many over the long term.
successful cybersecurity programs. The programs:
The design of the Cisco cybersecurity management Although addressing cybersecurity challenges with just
framework (CMF) assumes three pillars is perfectly possible, adopting and using
cybersecurity management is a business function. it in that way is difficult and potentially open to error
or misinterpretation. To minimize these issues, these
macro-level pillars must be divided into more manageable
Analysis of the commonalities and differences between chunks. The Cisco CMF subdivides its three macro pillars
these standard frameworks show that it is possible to into seven discrete focus areas:
create a universal cybersecurity management framework
to address all countries, industries, and states. • Executive Management: Key decisions and
accountability required to drive the program
• IT Risk Management: Reducing risk exposure to
The framework, as a business function, is comprised of the organization to a level acceptable to the SLT and
three discrete pillars with each subsequent layer unfolding Board of Directors.
increasing levels of specificity as follows: • Cybersecurity Intelligence: Required to provide
the cybersecurity and IT teams with appropriate
The Executive Management (Strategy) Pillar directs information to achieve and surpass IT Risk
Governance and Planning initiatives that drive the Management goals.
framework forward to operation. • IT and Cybersecurity Assurance: Required to
• The Executive Management Pillar requires people provide evidence to management and especially
to identify why cybersecurity is needed, consider the SLT that their investments in cybersecurity are
the business issues, and then define, document, delivering the benefits they expected.
and publish the direction the required cybersecurity • Secure Network: Required to support secure, on
program will adopt. demand access to information to authorized personnel
no matter where it is located within, or external to, the
The Operations Pillar that defines what the organization.
cybersecurity program must address to comply with the • Secure Systems: Required to provide controlled
requirements specified in the strategy, what supporting access to applications, data and devices according
functions are needed, and what level of reporting/ to the identity of the requesting party. This focus area
governance monitoring should be provided. These also includes how data is protected, whether at rest,
needs are supported through the security intelligence, IT or in transit.
and Cybersecurity Assurance and IT Risk Management • Secure Applications: Required to control access to
operations sub-pillars. data and other networks, systems and applications
• The Operations Pillar requires definitions of according to the identity of the requesting party. For
documented operational standards, processes, internally developed applications, requirements extend
procedures, and other collateral that specify what to how the application was designed, developed and
operators should do and how they should do it. managed throughout the whole development lifecycle.
Cybersecurity Maturity