Home

Welcome to my web site. The aim is to provide an overview of my skill set and the type of work I undertake. However, much of this work is sensitive so I can only discuss it online at a very high level. Please contact me if you wish to explore opportunities in more detail.

Risk Management

There are many approaches to Risk Assessment and Risk Management, but most are an iterative process where risk scenarios are identified, assessed, treated with controls, and the residual risk accepted, transferred or treated to reduce it further.

Some risk management methodologies create exhaustive lists of information assets, the business impact if they are compromised, and the threats and vulnerabilities that may result in a compromise. Other methodologies are more scenario based and lend themselves to a more strategic approach that aligns information risk management to other risk disciplines, such as operational risk or holistic enterprise risk.

My risk management experience includes eleven years in the Global IT Risk Management team of a FTSE 10 pharmaceutical company, four years in the IT Risk Advisory function of a Big Four management consultancy and a year as a contract risk manager providing information assurance to a mutual insurance company.

Examples of my Governance, Risk and Compliance expertise include:

  • Information Lifecycle Risk Assessment
  • GRC tool selection and procurement
  • Information Security Forum’s Information Risk Assessment Methodology (IRAM2)
  • Supplier and Third Party Risk Assessment (SOC2, SSAE16)
  • Cloud Computing Risk Assessment
  • Risk of Mergers, Acquisitions and Divestments
Click to verify

I am Certified in Risk and Information System Controls, having scored in the top 5% of the December 2016 exam.

Security Management

Wikipedia defines Security Management as “… the identification of an organization’s assets (including information assets), followed by the development, documentation, and implementation of policies and procedures for protecting these assets.” The problem is, this sounds a lot like Information Risk Management.

I would suggest that the difference between the two is that Security Management implies a coherent Information Security Management System (ISMS) to ensure that all aspects of security have been considered and appropriately controlled.

Security Management projects that I have been involved with are generally a combination of:

  • Assessing security maturity against a framework, such as ISO27001 or Cyber Essentials.
  • Producing a gap analysis between current maturity and desired maturity.
  • Creating a programme plan or roadmap to reach the desired maturity.
  • Managing projects to deliver aspects of the roadmap
  • Conducting interim maturity assessments to gain assurance that the programme is on course to reach its goals
  • Supporting certification exercises to demonstrate that the maturity goals have been met.
Click to verify

I am a Certified Information Security Manager and achieved an ISACA geographic excellence award for being the highest scoring candidate EMEA in the December 2015 exams.

 

 

 

Click to verify

I have been a Certified Information Systems Security Professional for fifteen years, meeting the required Continuing Professional Education requirements for five three year recertification cycles.

Security Architecture

Security Architecture” can be interpreted in many different ways. Some definitions focus on the high level building blocks by which security systems are put together, other definitions apply a security context to Enterprise Architecture, others focus on delivering artifacts such as non-Functional Security Requirements,  ensuring that security is considered throughout a Software or System Development Lifecycle.

My preferred approach is to combine elements of the Sherwood Applied Business Security Architecture (SABSA) and The Open Group Architecture Framework (TOGAF) as described by the TOGAF-SABSA Integration Working Group.

This approach ensures that security is considered at every point in the TOGAF Architecture Development Method and is the basis of the Security Architecture course I developed and delivered as part of EY’s internal IT Advisory Architecture training.

Overview of Security-Related Artifacts in the TOGAF ADM (Copyright © 2011 The Open Group and The SABSA Institute)

I have been TOGAF 9.1 Level 1 and 2 certified since 2013.

About

Senior-Level Information Risk & CyberSecurity Professional

Steve Greenham is now available for positions within the UK for contracting only


* CISO * Security & Risk Management * Policy Development * Audit *
* IT Governance * Compliance * Cloud Security * Vendor Management *
* Strategic Planning * Offshoring and Outsourcing * Consultancy *
* Mergers, Acquisitions & Divestments * Incident Management *
* Leading Virtual Teams * Security Technology & Architecture *
* ISO27001 * PCI-DSS * Data Protection *

My extensive Risk and Security expertise spans a broad range of business functions and industry sectors including Pharmaceuticals, Financial Services, Travel & Leisure, Outsourcing, Power and Utilities, Oil and Gas and Retail.

GlaxoSmithKline sponsored me to undertake a Master’s degree in Information Security, with Royal Holloway College, University of London, where I graduated with distinction.