Topic 3 - Information security program development and management
Topic 3 - Information security program development and management
Topic 3
Information Security Program
The Information Security Program
Preceding steps:
• Development of security strategy
• Performing a gap analysis
• Development of roadmap
Information Security Program
Risk management
• Develop comprehensive understanding of the organisation
• To a level acceptable to the organisation
• With finger on the pulse for emerging risks
Value delivery
• Demonstrate benefit
• Efficient delivery
Information Security Program Outcomes
Resource management
• Utilise team members well
• Implement security processes and practices
• Embed security in business
Performance measurement
• Monitor and report progress
• Strategic, tactical and operational metrics
Levels
• Strategic
• Management
• Operational
Monitoring approaches
• Continuous monitoring of security events
• Evaluating success of security investments
Information security management performances
Metrics and Monitoring
Effectiveness of technical architecture
• Issue reoccurrence
• Standardisation
• Baked-in security
• Resource utilisation
Operational performance
• Incident identification, notification and resolution
• Frequency and severity of incidents
Monitoring and communication
Common InfoSec Program Challenges
3. Why is it important to define agreed metrics for the information security program?
4. How does data leak prevention stop sensitive data leaving the organisation?