Course Title: Management of Information Security, 6th ed. - Whitman & Mattord
Learning Objectives:
List and describe the functional components of an information security program.
Discuss how to plan and staff an organization’s information security program based on its size.
Explain the internal and external factors influencing an information security program.
Describe typical job titles and functions in an information security program.
Discuss components of a security education, training, and awareness program.
Explain the role of project management in information security.
Definition: An information security program encompasses personnel, plans, policies, and initiatives related to information security.
Key Variables in Structuring InfoSec Programs:
Organizational culture
Size of the organization
Security personnel budget
Security capital budget
Risk Assessment
Risk Management
Systems Testing
Compliance
Centralized Authentication
Incident Response
Large Organizations:
Complex structures with specialized groups for InfoSec functions.
Functions split into distinct groups.
Medium-Sized Organizations:
May implement a multi-tiered approach, often with fewer dedicated teams.
May have limited full-time security staff.
Small Organizations:
Typically one security administrator, may utilize general IT staff for security roles.
Generally less susceptible to insider threats due to small size.
Goals of SETA:
Reduce accidental security breaches.
Improve employee behavior and awareness regarding security policies.
Program Components:
Trainings tailored to user categories (general, managerial, technical).
Use various delivery methods (one-on-one, online training, seminars).
Information security is a series of continuous projects.
Benefits of Project Management:
Ensures no steps are missed in project execution.
Enhances productivity and provides clear project direction.
Measures performance to maintain quality and budget expectations.
Certifications:
Various organizations (ISC)2, ISACA, etc. offer certifications to validate expertise.
Some key certifications include:
CISSP (Certified Information Systems Security Professional)
CISM (Certified Information Security Manager)
CISA (Certified Information Systems Auditor)
InfoSec program structures vary with organizational size and culture.
Professional certifications play an essential role in establishing credibility in the field.
Effective training and awareness initiatives can significantly mitigate risks associated with information security.