(Class Note) Module 9 - Security Program Management
(Class Note) Module 9 - Security Program Management
Lecture 9
Security Program
Management
1
RMIT Classification: Trusted
Session Objectives
22
RMIT Classification: Trusted
the stakeholders.
regulations.
33
RMIT Classification: Trusted
44
RMIT Classification: Trusted
stakeholders.
55
RMIT Classification: Trusted
to security
66
RMIT Classification: Trusted
77
RMIT Classification: Trusted
• They must first ensure the proper working operations of all the
defined earlier.
88
RMIT Classification: Trusted
utmost importance.
99
RMIT Classification: Trusted
• So, treating one risk is fine, but demonstrating that all the risks
10
10
RMIT Classification: Trusted
• This ability to ensure that nothing has been left to chance instills
11
11
RMIT Classification: Trusted
same irregularities.
12
12
RMIT Classification: Trusted
and policies.
13
13
RMIT Classification: Trusted
etc.
14
14
RMIT Classification: Trusted
15
15
RMIT Classification: Trusted
16
16
RMIT Classification: Trusted
17
17
RMIT Classification: Trusted
Decide (1)
Monitor process.
18
18
RMIT Classification: Trusted
Decide (2)
• The main actors are the governing body and the CISO.
allocate resources.
• The result of the Decide process is an ISMS business plan for the
next period.
19
19
RMIT Classification: Trusted
Decide (3)
(Maintain)
20
20
RMIT Classification: Trusted
DO (1)
• The Do process carries out the ISMS plan based on the objectives
21
21
RMIT Classification: Trusted
DO (2)
• The results of this process will be evaluated using metrics and key
22
22
RMIT Classification: Trusted
Monitor (1)
23
23
RMIT Classification: Trusted
Monitor (2)
24
24
RMIT Classification: Trusted
Example (1)
certain exceptions.
25
25
RMIT Classification: Trusted
Example (2)
26
26
RMIT Classification: Trusted
Example (3)
At the next review of the program, the governing body will thus be
27
27
RMIT Classification: Trusted
ISMS
28
28
RMIT Classification: Trusted
• Provision of resources
29
29
RMIT Classification: Trusted
• Performance evaluation
30
30
RMIT Classification: Trusted
31
31
RMIT Classification: Trusted
stakeholders are included in program management.
32
32
RMIT Classification: Trusted
management process.
33
33
RMIT Classification: Trusted
• Metrics and KPI provides all the metrics needed for reporting as
34
34
RMIT Classification: Trusted
• The ISO 27001/2 standard is probably the best source to verify the
completeness of a program.
35
35
RMIT Classification: Trusted
recommended by standards
• Planning improvements
• Identifying controls
36
36
RMIT Classification: Trusted
• Plan (1) and Catalog ( inventory ) of controls (2) are studied here
but metrics (3) and report (4) will be studied in other weeks
37
37
RMIT Classification: Trusted
Plan (1)
• Projects that are part of the plan can be categorized by the type of
38
38
RMIT Classification: Trusted
Plan (2)
communication
39
39
RMIT Classification: Trusted
Plan (3)
summarized as a reminder.
40
40
RMIT Classification: Trusted
Example (1.)
41
41
RMIT Classification: Trusted
Example (2.)
42
42
RMIT Classification: Trusted
43
43
RMIT Classification: Trusted
44
44
RMIT Classification: Trusted
logical access.
45
45
RMIT Classification: Trusted
Saves time for employees and saves 10 percent of help desk time
used for password resets. Reduces the risk of internal and external
data.
46
46
RMIT Classification: Trusted
47
47
RMIT Classification: Trusted
program.
48
48
RMIT Classification: Trusted
• Program management
49
49
RMIT Classification: Trusted
the projects of the Plan will act and for what purpose, ensures
resources.
50
50
RMIT Classification: Trusted
51
51
RMIT Classification: Trusted
52
52
RMIT Classification: Trusted
Audit
controls.
53
53
RMIT Classification: Trusted
54
54
RMIT Classification: Trusted
the auditors’ work and help reduce the indirect costs of each
audit.
55
55
RMIT Classification: Trusted
• Internal organization
56
56
RMIT Classification: Trusted
57
57
RMIT Classification: Trusted
58
58
RMIT Classification: Trusted
59
59
RMIT Classification: Trusted
60
60
RMIT Classification: Trusted
61
61
RMIT Classification: Trusted
• CISO and team produce report using metrics or KPIs resulting from
62
62
RMIT Classification: Trusted
• Audit findings
63
63