Establishing a Portfolio Approach for Managing Cybersecurity Programs - Part 2

 

Establishing a Portfolio Approach for Managing Cybersecurity Programs

 

 


Joe AndersonJoe Anderson, COO | LinkedIn

The present decade has seen Cybersecurity breaches across Government, Private, and Non-Profit systems. Needless to mention how it is impacting individual privacy and personal information. Many of us have been the victims of information breaches due to failed Cybersecurity approaches. Agencies and businesses have managed Cybersecurity as ad-hoc reactionary projects, and many government agencies lack a coherent acquisition strategy that aligns with the organization’s Cybersecurity strategy. This ad-hoc approach is not working in today’s environment, especially when considering the massive amounts of data and transactions occurring in areas of Defense and Intelligence, Homeland Security, Healthcare, Regulatory Compliance, Census Information, and Digital Commerce.

 

Thank you for all your feedback for Part One. In the second segment, our intent is to cover a few essential components of the Cybersecurity Program such as Knowledge Management, Project Management, and Talent Management.

 

 

  Knowledge Management - Knowledge Management is becoming a critical function of the Cybersecurity program. The knowledge management process increases the effectiveness of the Cybersecurity program by institutionalizing the decision-making and continuous learning activities.  The knowledge management process and tools enable the Cybersecurity organization to effectively identify, document, and communicate information and status regarding Cybersecurity projects, vulnerabilities, threats, security events, and incidents occurring in the environment, as well as provide guidelines and standard operating procedures (SOPs) for IT and asset owners.  The CISO is responsible for assuring that knowledge management projects are identified, planned, initiated, and executed. Today’s CISO defines and designs the Cybersecurity organization’s knowledge management framework as well as decides the tools and technology used to implement and administer the system. A mature knowledge management system uses Cloud technology to collect, maintain, and communicate Cybersecurity content to allow leadership to easily understand the status of security-related projects and programs. A well-designed and correctly implemented knowledge management system provides the CISO and asset owners the insight using KPIs, metrics, and information of interest, and the dashboards for visualizing and communicating the progress of the Cybersecurity projects.

 

  Project Management - Applying project management principles to the Cybersecurity program keeps security-related initiatives on budget and on schedule. Additional benefits include strategic alignment, streamlining project execution, optimizing resource capacity and allocation, instilling a culture of continuous improvement, a more effective problem resolution and risk management. There are important details and standard project artifacts as part of the project management activities that are not included in the POA&M process. For example, well-defined project deliverables and roles and responsibilities, WBS, resource assignments and task schedules, project risk tracking and mitigation, communication planning, quality assurance, and continuous improvement. A mature project management approach provides the CISO with fundamental information about specific projects and statuses needed to create and maintain the integrated master plan and schedule. The integrated master plan and schedule is required by the CISO for managing resource allocation and capacity, budgeting, monitoring and control of the Cybersecurity program portfolio.

 

 

  Talent Management - As Cybersecurity vulnerabilities and threats increase and become more sophisticated, risk rises for those programs that do not have the correct skill-sets or enough talent. Every CISO requires a Cyber talent management approach that best leverages internal staff, contractors, and outsourcing. A highly trained and skilled Cyber workforce greatly reduces risks to the organization. However achieving this requires the CISO to define, and assess the Cyber workforce needs, and develop, design, train, and retain Cyber talent.  Fortunately, there are proven approaches and tools that the CISO can utilize to perform these functions to strengthen the Cyber workforce. Accomplishing this requires assessing the talent-gaps within the Cyber workforce and aligning the talent management plan with the organization’s Cyber goals. It is critical that the Cyber talent strategy is supported by the organization’s acquisition strategy. Acquisition alignment and support allows the CISO to attract the right talent, grow the workforce, and create an environment where cyber employees and contractors are retained. It is the CISO’s responsibility to define the workforce requirements, establish talent benchmarks, evaluate potential risks caused by gaps in talent and skill-sets, and to define career paths. Defining a clear and concise career path significantly improves the organization’s ability to source, recruit, and retain Cyber talent, and it supports the job analysis, skills assessment, training, and talent forecasting process.

 

Talent Management

 


 

ASSYST’s portfolio and project management approach for Cybersecurity programs provides CISO’s with capability in areas that include risk management, policy and compliance, managing vulnerabilities, knowledge management, project management, and talent management. We apply industry best practices and standards, including NIST CSF, DOD RMF, PMBOK, ISO 27001, ISO 20000, ISO 9001, and CMMI Level 3. We support Cybersecurity programs for the Centers for Medicare and Medicaid Services (CMS), Department of Defense (DoD), Securities and Exchange Commission (SEC), Defense Human Resources Activity (DHRA) National Security Education Program (NSEP), Department of State (DoS), and Department of Interior (DoI), and State and Local Government.

 

Please use the link below to reach us.

 

 

Click here to reach ASSYST

 

See more articles