Information Security Program Resources
The Information Security Program comprises of a collection of activities used to..
identify, communicate, and address risk
197
Information Security Program Resources
The Security Program consists of…
Controls, processes, and practices
197
Information Security Program Resources
Controls, processes, and practices within the security program are inteded to increase the resilience of the computing environment and ensure that risks are…
known and handled effectively
197
Trends
Numerous organisations still consider cybersecurity as nonstrategic and tactical with security and privacy not part of initial designs of new procuts because security is not seen as…
an enabler but an impediment
198
Outcomes
The primary outcome of a security program is the realisation of its…
strategy, goals, and objectives
198
Outcome
When a security strategy is aligned with th ebusiness and its risk tolerance and operations, the security program will…
act as a business enabler
198
Outcome
The outcomes that should be part of any information security program include…
199
Outcome
Effective and efficient resource management over the security program and achieving its primary objectives of risk management and risk reduction will lead to a greater confidence in the business regarding the….
resource requests made by the security manager
199
Outcome
An effective information security program will be aligned with other assurance processes and programs within an organisation, including…
199
Charter
A formal, written definition of the obejctives of a program, its main timelines, sources of funding, names of principal leaders and managers, and the business executives sponsoring it
Charter
199
Charter
A program charter document is typically approved by either…
CEO or Executive Leader
This demonstrates tehs upport from executive leadership to a program
199
Charter
An information security program charter gives authority to the security leader to develop or perform several functions including..
199
Charter
Whilst a security manager is the facilitator of a security program, ultimate responsibility or ownership for protecting information in the business is..
at the executive leadership and board of directors level
200
Scope
The process by which management define the departments, business units, affiliates, and locations included in the information security program
Scope
200
Scope
By identifying which parts of the organisation are to be included (in scope) and subject to information security governance and policy, the organisation have…
defined the boundaries of the program
200
Scope
In large organisations, busines sunits or affiliates may have security programs of their own, which are defined as part of…
larger security program
A centralised security program may define the high level policies but each separate business unit has their own processes, personnel, and standards
200
Information Security Processes
Information Security Processes fall into three major categories…
200
Information Security Processes
Information Security Processes category 1:
Risk and compliance processes typically include….
200
Information Security Processes
Information Security Processes category 2:
Architecture processes typically include…
201
Information Security Processes
Information Security Processes category 3:
Security operations processes typically include…
201
3 lines of defence
The three lines of defence functional model used to develop and operate controls
201
Information Security Technologies
Information security utilizes its own portfolio of protective and detective technologies in its function to protect “all things IT”
See breakdown of technologies - LINK
202
Information Security Technologies
There is only one valid reasons for adopting new security technology, which is that it is called for through…
risk analysis and risk treatment
All other reasons are invalid, often a result of peer pressure or emotional decision making.
203