Top Banner
1 CYBER RESILIENCE (BUILDING THE CYBER SECURITY GOVERNANCE) CYBERSECURITY, RISK AND CONTROL Sarwono Sutikno, Dr.Eng.,CISA,CISSP,CISM,CSX-F Cybersecurity Nexus Liaison, ISACA Indonesia Presentasi di DAS BIN ISACA Indonesia, Technical & Collaboration Session Bridge Function H Aston Rasuna Jakarta, 31 Agustus 2016
38

Cyber resilience (building the cyber security governance) isaca id tech ses 31 agustus 2016

Jan 24, 2017

Download

Education

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Cyber resilience (building the cyber security governance)  isaca id tech ses 31 agustus 2016

CYBER RESILIENCE (BUILDING THE CYBER SECURITY GOVERNANCE)CYBERSECURITY, RISK AND CONTROL

Sarwono Sutikno, Dr.Eng.,CISA,CISSP,CISM,CSX-F

Cybersecurity Nexus Liaison, ISACA Indonesia

Presentasi di DAS BINISACA Indonesia, Technical & Collaboration Session

Bridge Function H Aston Rasuna Jakarta, 31 Agustus 2016

Page 2: Cyber resilience (building the cyber security governance)  isaca id tech ses 31 agustus 2016

KESEPAKATAN DISKUSI• Mohon maaf jika gaya/kebiasaan saya di ITB muncul dalam diskusi ini• Niatnya agar Indonesia lebih berdaulat• Boleh buka laptop dan akses internet• Seluruh peserta harus bicara, bertanya, berpendapat, guyon sebagai

pembuka kreatifitas• Sarwono Sutikno hanya fasilitator dan sedang belajar• Semoga saya dan semua insan Indonesia menjadi orang merdeka !!!• Semoga setiap insan Indonesia menjadi khalifah dalam arti tidak ada

yang dapat membatasi potensi seorang insan kecuali impian dirinya dan tuhannya.

Agar efektif berdiskusi

Page 3: Cyber resilience (building the cyber security governance)  isaca id tech ses 31 agustus 2016

BLOOM’S TAXONOMY OF EDUCATIONAL OBJECTIVES

Apply

ComprehendRememberlist, recite

explain, paraphrase

calculate, solve,determine, apply

Analyzecompare, contrast, classify, categorize,

derive, model

Synthesizecreate, construct,

design, improve, produce,

propose

Evaluatejudge, critique, justify,

verify, assess, recommend

Page 4: Cyber resilience (building the cyber security governance)  isaca id tech ses 31 agustus 2016

4

Current:• Cybersecurity Nexus Liaison, ISACA Indonesia Chapter• ISACA Academic Advocate at ITB• Anggota Pembina Yayasan Pendidikan Internal Audit• SME for Information Security Standard for ISO at ISACA HQ• Associate Professor at School of Electrical Engineering and Informatics, Institut Teknologi Bandung• Ketua WG Layanan dan Tata Kelola TI, anggota WG Keamanan Informasi serta Anggota Panitia Teknis 35-01 Program Nasional Penetapan

Standar bidang Teknologi Informasi, BSN – Kominfo. Past:• Ketua Kelompok Kerja Evaluasi TIK Nasional, Dewan TIK Nasional (2007-2008)• Plt Direktur Operasi Sistem PPATK (Indonesia Financial Transaction Reports and Analysis Center, INTRAC), April 2009 – May 2011

Professional Certification:• Professional Engineering (PE), the Principles and Practice of Electrical Engineering, College of Engineering, the University of Texas

at Austin. 2000• IRCA Information Security Management System Lead Auditor Course, 2004• ISACA Certified Information System Auditor (CISA). CISA Number: 0540859, 2005• Brainbench Computer Forensic, 2006• (ISC)2 Certified Information Systems Security Professional (CISSP), No: 118113, 2007• ISACA Certified Information Security Manager (CISM). CISM Number: 0707414, 2007Award:• (ISC)2 Asia Pacific Information Security Leadership Achievements (ISLA) 2011 award in category Senior Information Security

Professional. http://isc2.org/ISLA

Sarwono Sutikno, Dr.Eng.,CISA,CISSP,CISM,CSX-F

Page 5: Cyber resilience (building the cyber security governance)  isaca id tech ses 31 agustus 2016

RISK VS CONTROL

Page 6: Cyber resilience (building the cyber security governance)  isaca id tech ses 31 agustus 2016
Page 7: Cyber resilience (building the cyber security governance)  isaca id tech ses 31 agustus 2016
Page 8: Cyber resilience (building the cyber security governance)  isaca id tech ses 31 agustus 2016
Page 9: Cyber resilience (building the cyber security governance)  isaca id tech ses 31 agustus 2016
Page 10: Cyber resilience (building the cyber security governance)  isaca id tech ses 31 agustus 2016

DEMO

Silakan masuk dengan android anda ke:www.google.com/maps/timelineDimana android anda pada Sabtu yang lalu?Apa komentar anda?(jika app maps perlu update, silakan)

Page 11: Cyber resilience (building the cyber security governance)  isaca id tech ses 31 agustus 2016
Page 12: Cyber resilience (building the cyber security governance)  isaca id tech ses 31 agustus 2016
Page 13: Cyber resilience (building the cyber security governance)  isaca id tech ses 31 agustus 2016
Page 14: Cyber resilience (building the cyber security governance)  isaca id tech ses 31 agustus 2016
Page 15: Cyber resilience (building the cyber security governance)  isaca id tech ses 31 agustus 2016
Page 16: Cyber resilience (building the cyber security governance)  isaca id tech ses 31 agustus 2016

KEAMANAN SIBER?

Page 17: Cyber resilience (building the cyber security governance)  isaca id tech ses 31 agustus 2016

Presentation: KamInfo.ID1717

KEAMANAN INFORMASI VERSI ISACA

Information security is a business enabler that is strictly bound to stakeholder trust, either by addressing business risk or by creating value for an enterprise, such as competitive advantage. At a time when the significance of information and related technologies is increasing in every aspect of business and public life, the need to mitigate information risk, which includes protecting information and related IT assets from ever-changing threats, is constantly intensifying.

ISACA defines information security as something that:Ensures that information is readily available (availability), when required, and protected against disclosure to unauthorised users (confidentiality) and improper modification (integrity).

Page 18: Cyber resilience (building the cyber security governance)  isaca id tech ses 31 agustus 2016

Presentation: KamInfo.ID1818

KEAMANAN INFORMASI

......... pemerintah negara Indonesia yang melindungi segenap bangsa Indonesia dan seluruh tumpah darah Indonesia dan untuk memajukan kesejahteraan umum, mencerdaskan kehidupan bangsa, dan ikut melaksanakan ketertiban dunia yang berdasarkan kemerdekaan, perdamaian abadi dan keadilan sosial........

Pemanfaatan INFORMASI sebagai darah nadi kehidupan bangsa dalam perspektif Pertumbuhan Ekonomi untuk Kesejahteraan Rakyat

Page 19: Cyber resilience (building the cyber security governance)  isaca id tech ses 31 agustus 2016

Presentation: KamInfo.ID1919

KEAMANAN NASIONAL

......... pemerintah negara Indonesia yang melindungi segenap bangsa Indonesia dan seluruh tumpah darah Indonesia dan untuk memajukan kesejahteraan umum, mencerdaskan kehidupan bangsa, dan ikut melaksanakan ketertiban dunia yang berdasarkan kemerdekaan, perdamaian abadi dan keadilan sosial........

Pemanfaatan INFORMASI sebagai darah nadi kehidupan bangsa dalam perspektif Pertumbuhan Ekonomi untuk Kesejahteraan Rakyat

Page 20: Cyber resilience (building the cyber security governance)  isaca id tech ses 31 agustus 2016

20

Page 21: Cyber resilience (building the cyber security governance)  isaca id tech ses 31 agustus 2016

NETWORK IS COMPROMISED

Page 22: Cyber resilience (building the cyber security governance)  isaca id tech ses 31 agustus 2016

APT LIFE CYCLE

Page 23: Cyber resilience (building the cyber security governance)  isaca id tech ses 31 agustus 2016

HOW FAST

Page 24: Cyber resilience (building the cyber security governance)  isaca id tech ses 31 agustus 2016

THREAT

Page 25: Cyber resilience (building the cyber security governance)  isaca id tech ses 31 agustus 2016

RISK-BASED CATEGORIZATION CONTROL

Page 26: Cyber resilience (building the cyber security governance)  isaca id tech ses 31 agustus 2016
Page 27: Cyber resilience (building the cyber security governance)  isaca id tech ses 31 agustus 2016

PIRT

Page 28: Cyber resilience (building the cyber security governance)  isaca id tech ses 31 agustus 2016
Page 29: Cyber resilience (building the cyber security governance)  isaca id tech ses 31 agustus 2016
Page 30: Cyber resilience (building the cyber security governance)  isaca id tech ses 31 agustus 2016

The CSX Liaison reports to the chapter president.

Page 31: Cyber resilience (building the cyber security governance)  isaca id tech ses 31 agustus 2016

Presentation: KamInfo.ID31

IMPLEMENTINGFRAMEWORKS TO POPULATE BMIS

ISO 27031

COBIT 5 Enabling Process

Page 32: Cyber resilience (building the cyber security governance)  isaca id tech ses 31 agustus 2016
Page 33: Cyber resilience (building the cyber security governance)  isaca id tech ses 31 agustus 2016

COBIT 5SNI ISO 38500

Internal Control Framework COSO

HUBUNGAN ANTAR KERANGKA

PP60/2008 Sistem Pengendalian

Intern PemerintahTata

Kel

ola

Tata

Kel

ola

TIM

anaj

emen

TI

Panduan Umum Tata Kelola TIK Nas+

Kuesioner Evaluasi Pengendalian Intern TIK

SNI ISO 27001SNI ISO 20000

SNI ISO 15408

Page 34: Cyber resilience (building the cyber security governance)  isaca id tech ses 31 agustus 2016

Sumber: http://www.isaca.org/chapters1/rhode-island/Documents/ISACA-RI-01.pdf

Page 35: Cyber resilience (building the cyber security governance)  isaca id tech ses 31 agustus 2016
Page 36: Cyber resilience (building the cyber security governance)  isaca id tech ses 31 agustus 2016
Page 37: Cyber resilience (building the cyber security governance)  isaca id tech ses 31 agustus 2016

SARAN

•Strategis dan Kebijakan•Kaji manfaat dan risiko cyber•Sumber daya manusia diutamakan

•Kaji risiko dan manfaat perangkat teknologi, manusia, process dan organisasi

Page 38: Cyber resilience (building the cyber security governance)  isaca id tech ses 31 agustus 2016

Q&AISACA.ORG/CYBERISACA CYBERSECURITY TEACHING MATERIALS