Security Process Improvement – How to Stop Worrying and Love Maturity Models

No ratings

Presented at CISOnewyork 2016 by

There is no shortage of information security maturity models — COBIT, C2M2, Cybersecurity Capability Maturity Model, ISO/IEC 21827:2008, Sensitive Data Maturity Model, and many more. Each of them complete with a set of activities that mostly exist at a high level and are intended to protect data, specifically, sensitive data. Join Gabriel Gumbs and discussion leaders Ramin Safai and Mark Viola for this executive boardroom discussion on selecting and adopting processes improvement strategies, the pros and cons of existing maturity models and best practices for prioritizing the protection of sensitive data.