C3NXyl7WYAAdJEd.jpg:largeC3NXyl7WYAAdJEd.jpg:large
SANS Cisco Mind Map

A CISO (Chief Information Security Officer) has a complex role within a company. They have a wide array of tasks to perform, that involves many differing parts, which the average individual is not always aware of.

CISO Mind Map is an overview of responsibilities and ever expanding role of the CISO.  This Security Leadership poster made by SANS shows exactly the matters a CISO needs to mind when creating a world class IT Security team. It also highlights the essential features necessary of a Security Operations Centre (SOC).

To make this chart more practical, I put them into the tables and will update it with some technologies and thoughts applied in my daily work. This update will last a long term. It will be put into navigation bar for easy access.

Security Operations

Prevention
Detection
Response
  • Data Protection
    • IBM Guardium
  • Network Security
    • Network IPS
    • Firewall
      • Cisco
      • CheckPoint
      • Fortigate
      • Juniper
      • Palo Alto
      • etc
  • Application Security
    • OWASP
    • WASC
    • Qualys WAS
    • IBM Appscan
    • HP Fortify
    • VeraCode
  • Endpoint Security
    • Host IPS
    • AntiVirus
    • AntiSpam
    • Endpoint Encryption
  • Secure Configurations
  • Active Defense
  • Patching
    • WSUS
  • Web Filtering
    • Cisco IronPort
  • Email Filtering
    • ProofProint
  • Log Management / SIEM
    • IBM Qradar
    • ArcSight
  • Continuous Monitoring
  • Network Security Monitoring
    • Solarwinds
    • PRTG
    • MRTG
  • NetFlow Analysis
  • Threat Hunting
  • Penetration Testing
    • Kali
  • Red Team
  • Vulnerability Scanning
    • Nessus
    • Qualys
  • Human Sensor
  • Data Loss Prevention (DLP)
    • Symantec DLP
  • Security Operation Center (SOC)
  • Threat Intelligence
    • Symantec ATP
    • FireEye
  • Threat Modeling
    • Microsoft STRIDE Tool
  • Incident Handling Plan
    • Document
  • Breach Preparation
  • Tabletop Exercise
  • Forensic Analysis
    • SANS SIFT
    • Paladin
  • Crisis Management
  • Breach Communication

Legal and Regulatory

CompliancePrivacyAuditInvestigation
  • PCI
  • SOX
  • HIPAA
  • FFIEC, CAT
  • FERPA
  • NERC CIP
  • NISP SP 800-37 and 800-53
  • Public Service of Ontario Act, 2006 (PSOA).
  • Employment Standards Act (Ontario) (ESA)
  • Privacy Shield
  • EU GDPR
  • SSAE 16
  • SOC 2
  • ISO27001
  • FISMA and FedRAMP
  • NIST SP 800-53A
  • COSO
  • eDiscovery
  • Forensics
    • SANS SIFT
    • Paladin
Intellectual PropertyContract ReviewCustomer RequirmentsLawsuit Risk
& Acts
  • Documents
  • Documents
  • Documents

Risk Management
Risk FrameworkRisk Assessment MethodologyBusiness Impact Analysis
  • FAIR
  • NIST RMF
  • OCTAVE
  • TARA
Risk Assessment ProcessRisk Analysis and QuantificationSecurity Awareness
  • Training
  • Lunch Learn
  • Communication
Vulnerability ManagementVendor Risk ManagementPhysical Security
  • Qualys
  • Badge 
  • Gate / Turnstile
  • Camera
Disaster Recovery (DR)Business Continuity PlanningRisk Treatment
  • Mitigation Planning Verification
  • Remediation
  • Cyber Insurance
Policies and Procedures
  • Code of Conduct
    • Accessibility Policy – Providing Services to People with Disabilities
    • Appropriate Use of Information and Computing Resources Policy
    • Financial Policies and Procedures, including Procurement & Contract Management Policy
    • Adjudication Guideline
    • Guidance for Staff on Invitations to Third Party Functions and Other Gifts
    • Guidelines to Personal Trading Rules
    • Information and Records Management Policy
    • Media Relations Policy
    • Political Activity Policy
    • Respectful Workplace Policy
    • Security/Safety and Emergency Procedures
    • Travel, Meal and Hospitality Expenses Policy
    • Your Guide to Working at the Company
  • Policy on Protecting Information When Outside the Office
  • Security Classification Guidance
  • Proper recordkeeping and appropriate records management: relevant principles and best practices
  • Classification Scheme and Retention Schedule – Transitory Records Schedule

Business Enablement
Product SecurityCloud ComputingMobile
  • Secure DevOps
  • Secure Development Lifecycle
  • Bug Bounties
  • Web, Mobile, Cloud AppSec
  • Cloud Security Architecture
  • Cloud Guidelines
  • BYOD (Bring Your Own Device)
  • Mobile Policy
Emerging TechnologiesMergers and Acquisitions
  • Internet of Things (IoT)
  • Augmented Reality (AR)
  • Virtual Reality (VR)
  • Block Chain
  • Security Due Diligence

Governance

StrategyBusiness AlignmentRisk Management
  • Team Charter
  • Roadmap
  • Security Posture
Program FrameworksControl FrameworksProgram Structure
  • NIST CSF
  • ISO27000
  • NIST 800-53
  • CIS Controls
Program ManagementCommunications PlanRoles and Responsibilities
Workforce PlanningResource ManagemnetData Classification
  • Documentation
Security PolicyCreate a Security CultureSecurity Training
  • Security Handbook
  • Policy
  • Awareness Training
    • Wombat
  • Role-Based Training
Metrics and ReportingIT Portfolio ManagementChange Management
  • CIBCO Spotfire
  • ITIL
Board Communications
  • Information Security Steering Board

Identify and Access Management

Provisioning/
Deprovisioning
Single Sign On
(SSO)
Federated Single Sing on (FSSO)
Multi-Factor Authentication
Role-Based Access Control (RBAC)
Identity Store (LDAP, ActiveDirectory)

Leadership Skills

Business StrategyIndustry KnowledgeBusiness Acumen
Communication SkillsPresentation SkillsStrategic Planning
Technical LeadershipSecurity ConsultingStakeholder Management
  • ISO Charter
  • Advisory 
  • Group / Team Mail Box 
    • Coloring Categorie
NegotiationsMission and VisionValues and Culture
Roadmap DevelopmentBusiness Case DevelopmentProject Management
  • Company / Organization Wide Information Security RoadMap
  • Project Charter
Employee DevelopmentFinancial PlanningBudgeting
InnovationMarketingLeading Change
Customer RelationshipsTeam BuildingMentoring
  • ISO Team Dashboard
    • Project Portfolio
    • Operational Activities

Note: ISO = Information Security Office

Another CISO Mind Map example:

1*OmfkD0OsrHCEGeWA-0ruBQ.png?resize=800%2C522&ssl=11*OmfkD0OsrHCEGeWA-0ruBQ.png?resize=800%2C522&ssl=1

Note: The original image concept was created by Rafeeq Rehman and later redesigned by Momentum Partners.