kennalogo-new.png
  • Facebook
  • LinkedIn
  • Twitter
  • YouTube

Cyber Business Support Limited.  The Old Fire Station, 1 Abbey Road, Barrow-in-Furness, Cumbria, LA14 1XH

www.cyberbusinessupport.com | info@cyberbusinesssupport.com

Company number : 11190120.  VAT number : 288991326. 

© 2018 by Cyber Business Support Limited.  All rights reserved.

Privacy Notice

  • Nick Thomas

Breaking the Divide Between Governance and Operational Cybersecurity

Updated: Sep 13, 2018


Out compliance auditing service has helped numerous organisations to maintain operational and governance compliance; yesterday, CISO Sean Atkinson shared his experience of the divide many are facing.




Governance in cybersecurity

Governance is an important topic in cybersecurity, as it describes the policies and processes which determine how organizations detect, prevent, and respond to cyber incidents. In many organizations, there is a division between governance and management. Those who work in governance tend to emphasize strategic planning, whereas management deals with the day-to-day operationalized approach to security. Sometimes this results in different leadership perspectives.


Making the organizational move from a divided hierarchy to one in which strategy informs operation (and operation informs strategy) is a difficult challenge. Communication is key to effectively managing expectations, messaging, and security posture throughout the process.


Detect, prioritize, and control

Operational controls – the real-life response to a cybersecurity incident – should be the focus of any security program. Managing these controls and reporting to a governance structure may not require the knowledge of operationalization, but instead may rely on an agreed-upon level of confidence in respect to risk management involving both governance and operational leadership.


In addition to working alongside governance experts, operational controls managers should measure their security posture against a framework or baseline such as the CIS Controls™ or NIST Cyber Security Framework. Conducting such an assessment is important, as understanding your organization’s compliance levels is key to finding weaknesses in the organizational controls as well as the prioritization of investment for strengthening controls.


In a previous blog post I discussed calculating your risk-reduction ROI; after identifying weaker controls, we can start to use this single calculation to define what provides the greatest level of return on investment as well as the greatest reduction in risk. In future blog posts, risk will be discussed with respect to quantitative analysis, using a Monte Carlo simulation to demonstrate how a single risk and control mitigation can provide an overall reduction in risk to the whole organization.


With clearer reporting and analysis of risk reduction, we can bridge the gap between governance and operational security, leading to better strategic decision making and a more unified approach to the cyber threat landscape.

Download the CIS Controls


Credit Sean Atkinson, Chief Information Security Officer and author for CIS,O Blog

2 views