Upgrade to Pro — share decks privately, control downloads, hide ads and more …

Cybersecurity and Business Analysis

Heather Noggle
July 03, 2024
6

Cybersecurity and Business Analysis

Are you a business analyst curious about or soon to work in cybersecurity? There are some intersection points in the work.

Heather Noggle

July 03, 2024
Tweet

Transcript

  1. Heather Noggle •Public sector HR •Long career as full stack

    developer / BA / PM •Business owner •Board leader
  2. Information Security and Business Analysis Introducing Cyber Hygiene Information Security

    and Business Analysis = Stewardship Information Security and Training for Business Analysts Impact of Information Security Work within Business Analysis Standards and Frameworks and Impact on Business Analysis
  3. Introducing Cyber Hygiene • Password Best Practices • Password Manager

    • Multifactor Authentication • Update (Patch) Software • Cybersecurity Mindset (Awareness) • Antivirus/Antimalware • Know Your Devices • Back Up Your Data • Understand Social Engineering (Fraud) • Own Your Clicks
  4. Why Information Security in Business? “Everyone” needs to secure information

    Each person needs to secure information Everything’s connected, including our fridges and printers Our cars Our devices Information security has therefore become cybersecurity
  5. Cybersecurity Defined People, processes, and technology working together to protect

    the confidentiality, integrity, and availability of data. Keeping private data private and enabling proper access to public data.
  6. Cybersecurity and Training for Business Analysts • IIBA – Certificate

    in Cybersecurity Analysis • ISC2 – Certified in Cybersecurity
  7. Impact of Business Analysis in Cybersecurity • With Change Comes

    Risk • “Shift Left” • Newer Focus in Business Analysis • A Lens to Use in Discussion • Security Built into Functionality
  8. “Shift Left” From production all the way back into concepts

    – security embedded in software development. And before. Requirements need security consideration. Shape conversation.
  9. Security Built Into Functionality • Explicit security requirements • Prompt

    – use that lens to get there • Zero trust • Always verify • Ensure no unintentional state change • Least privilege • Who’s got access? • Why? • Who should never access?
  10. Standards and Frameworks • NIST Cybersecurity Framework – CSF https://www.nist.gov/cyberframework

    • Center for Information Security - CIS v8 https://www.cisecurity.org/controls/cis-controls-list
  11. CIS v8 • 18 Controls • 153 Safeguards (within the

    controls) • Aligned with NIST CSF • Most BA emphasis will be on Protect items
  12. CIS 18 Controls and Intersection with BA • Control 3

    – Data Protection 14 Safeguards • Control 14 – Security Awareness Training 9 Safeguards • Control 16 – Application Software Security 14 Safeguards