SlideShare a Scribd company logo
8
Most read
11
Most read
Copyright EC-Council 2020. All Rights Reserved.​
What Is Information
Security Management?
Pillars of
Information
Security
Management
Information
Security
Controls
Governance,
Risk, and
Compliance
(GRC)
Audit
Management
Security
program
Management
Third-Party
Risk
Management
(TPRM)
Strategic
Planning
Information
Security
Management
Information Security Controls
Information security controls are safeguards or countermeasures to
reduce or mitigate security risks such as information systems
breaches, data theft, and unauthorized access to information systems.
Information security controls aim to protect the confidentiality,
integrity, and availability of information.
Preventive Detective Corrective
Forms of Security Controls
Compliance Controls
Technical Controls
Procedural Controls
Access Controls
Physical Controls
Types of
Security
Controls
Governance
Risk
Compliance
Governance: Approach led by the
management leaders to manage IT
operations and their alignment
organization's business goals.
Risk management: Identifies, analyzes, and
responds accordingly to risks that might
affect the organization’s security and
business objectives.
Compliance: Identify the applicable
requirements like laws, regulations,
contracts, strategies and policies along with
assessment of the existing compliance, risks
and potential costs of non-compliance.
Establish Security Standards
Enforce Regulations and Best Practices
Determine the Security Posture
Purpose of Cyber Audit
Cyber Audit
Cyber Security Audit
Gap Analysis
Vulnerability
Assessment
Remediation action points
Cyber Incident Response Plan
Employee Training & Awareness
Cyber Strategy Report
Cyber Resilience Assessment
Vulnerability Scanning and Identification
Configuration & Compliance Checks
Malware Detection
Web Application Scanning
Reviewing Data Back-up & Recovery Strategies
Cyber Audit - Process
Third-Party
Risks
Strategic
Reputation
Operational
Transaction
Compliance
Third-Party Risks Management (TPRM)
Third-party risk management (TPRM) is
the process of evaluating and managing
risks associated with third-party
vendors or service providers.
Depending on the nature of services
outsourced, vendors may have access
to your organization's intellectual
property, data, operations, finances,
customer information or other sensitive
information. The risk arises if the
security posture of third-party vendors
are not evaluated and managed with
due diligence.
Background checks to
uncover risk indicators
through detailed
research into suppliers.
Analyzing third-party
capability, policies, and
process.
Remote and on-site
inspections of the third-
party’s risk control
environment.
Ongoing analysis of
various internal and
external data sources to
identify new and
emerging issues in the
third-party portfolio.
Identifying third-party
risks based on the data
harvested from the
internet and proprietary
databases.
Best Practices
for Third-party
Risk
Management
(TPRM)
Strategic
Role of a
CISO
Security
Management
Aligning Cyber
Security
Initiatives
with Business
Objectives
Trends in
Cyber Security
Financial
Planning
Procurement
and Budgeting
Return on
investment
(ROI)
Vendor
Management
The CISO plays a vital role in
devising and implementing
strategic plans to manage security
risks and ensure that they are
aligned with the organization’s
objectives.
Strategic Planning
To Learn More, Visit: www.ciso.eccouncil.org

More Related Content

PPTX
Security management and tools
DOCX
Security Management Strategies and Defense and their uses.
PPTX
IT Governance Roles and Data Governance - Hernan Huwyler
PPTX
Cybersecurity Audit
PDF
Physical Security Management System
PPTX
Security Management | System Administration
PPT
Information Security Background
PPT
1. security management practices
Security management and tools
Security Management Strategies and Defense and their uses.
IT Governance Roles and Data Governance - Hernan Huwyler
Cybersecurity Audit
Physical Security Management System
Security Management | System Administration
Information Security Background
1. security management practices

What's hot (20)

PPT
Information Risk Management Overview
PPTX
Information risk management
PPT
Information Security
PPT
Start With A Great Information Security Plan!
PPTX
Logging, monitoring and auditing
DOCX
Information security management iso27001
PPTX
Ch02 mis-ctrl-appl
PPTX
Importance Of A Security Policy
PPTX
QSA Shares PCI 3.0 Advice & Checklist
PPT
Network security policies
PPTX
Introduction to Cybersecurity Fundamentals
PDF
Equilibrium Security Methodology 030414 Final v2
PDF
Strategy Insights - How to Quantify IT Risks
PPTX
Integrated cyber defense
PPTX
Role management
PDF
Cisa 2013 ch5
PDF
Understanding security operation.pptx
PDF
RiskAllay - Digital Compliance - Prof- Hernan Huwyler MBA CPA
PPT
Security Lifecycle Management
Information Risk Management Overview
Information risk management
Information Security
Start With A Great Information Security Plan!
Logging, monitoring and auditing
Information security management iso27001
Ch02 mis-ctrl-appl
Importance Of A Security Policy
QSA Shares PCI 3.0 Advice & Checklist
Network security policies
Introduction to Cybersecurity Fundamentals
Equilibrium Security Methodology 030414 Final v2
Strategy Insights - How to Quantify IT Risks
Integrated cyber defense
Role management
Cisa 2013 ch5
Understanding security operation.pptx
RiskAllay - Digital Compliance - Prof- Hernan Huwyler MBA CPA
Security Lifecycle Management
Ad

Similar to Information Security Management (20)

PPTX
Basic terms and scope of audit in cyber security
PDF
Understanding Risk Management in Information Security
PDF
3.Understanding Third Party IT Risk.pdf
PPTX
Third-Party and Vendor Risk Management (VRM) Features.pptx
PDF
Cyber Audit | Cyber Crime | Network Security | Cyber Security Audit- 2023.pdf
PDF
An Overview of Cyber Risk Management
PPTX
Third-Party Risk Management Best Practices for Financial Enterprises
PDF
Third-Party Risk Management (TPRM) | Risk Assessment Questionnaires
PPTX
Third Party Risk Management
PPTX
Keep Calm and Comply: 3 Keys to GDPR Success
PDF
Mitigating Data Breach Risks: How a Data Privacy and Security Advisor Can Help
PPTX
SDET UNIT 5.pptx
PDF
Risk & Advisory Services: Quarterly Risk Advisor Nov. 2015
PPTX
Presentation_IA Focus
PPTX
Information Security and Risk Management.pptx
PPTX
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
PDF
The Process of Conducting a Cyber Security Audit.pdf
PDF
Questions for a Risk Analyst Interview - Get Ready for Success.pdf
PDF
𝐑𝐢𝐬𝐤 𝐀𝐧𝐚𝐥𝐲𝐬𝐭 𝐈𝐧𝐭𝐞𝐫𝐯𝐢𝐞𝐰 𝐐𝐮𝐞𝐬𝐭𝐢𝐨𝐧𝐬
PDF
GDPR Audit - GDPR gap analysis cost Data Protection People.pdf
Basic terms and scope of audit in cyber security
Understanding Risk Management in Information Security
3.Understanding Third Party IT Risk.pdf
Third-Party and Vendor Risk Management (VRM) Features.pptx
Cyber Audit | Cyber Crime | Network Security | Cyber Security Audit- 2023.pdf
An Overview of Cyber Risk Management
Third-Party Risk Management Best Practices for Financial Enterprises
Third-Party Risk Management (TPRM) | Risk Assessment Questionnaires
Third Party Risk Management
Keep Calm and Comply: 3 Keys to GDPR Success
Mitigating Data Breach Risks: How a Data Privacy and Security Advisor Can Help
SDET UNIT 5.pptx
Risk & Advisory Services: Quarterly Risk Advisor Nov. 2015
Presentation_IA Focus
Information Security and Risk Management.pptx
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
The Process of Conducting a Cyber Security Audit.pdf
Questions for a Risk Analyst Interview - Get Ready for Success.pdf
𝐑𝐢𝐬𝐤 𝐀𝐧𝐚𝐥𝐲𝐬𝐭 𝐈𝐧𝐭𝐞𝐫𝐯𝐢𝐞𝐰 𝐐𝐮𝐞𝐬𝐭𝐢𝐨𝐧𝐬
GDPR Audit - GDPR gap analysis cost Data Protection People.pdf
Ad

More from EC-Council (20)

PPTX
Skills that make network security training easy
PPTX
Can Cloud Solutions Transform Network Security
PPTX
What makes blockchain secure: Key Characteristics & Security Architecture
PPTX
6 Most Popular Threat Modeling Methodologies
PPTX
Journey from CCNA to Certified Network Defender v2
PDF
HOW TO TROUBLESHOOT SECURITY INCIDENTS IN A CLOUD ENVIRONMENT?
PPTX
Red Team vs. Blue Team
PPTX
Types of Malware (CEH v11)
PDF
Why Threat Intelligence Is a Must for Every Organization?
PDF
Why Digital Forensics as a Career?
PPTX
Cryptography in Blockchain
PPTX
A Brief Introduction to Penetration Testing
PPTX
Computer Hacking Forensic Investigator - CHFI
PPTX
Pasta Threat Modeling
PPTX
Blockchain: Fundamentals & Opportunities​
PPTX
Types of malware threats
PPTX
What's new in​ CEHv11?
PPTX
Business Continuity & Disaster Recovery
PPTX
Threat Intelligence Data Collection & Acquisition
PPTX
Most Common Application Level Attacks
Skills that make network security training easy
Can Cloud Solutions Transform Network Security
What makes blockchain secure: Key Characteristics & Security Architecture
6 Most Popular Threat Modeling Methodologies
Journey from CCNA to Certified Network Defender v2
HOW TO TROUBLESHOOT SECURITY INCIDENTS IN A CLOUD ENVIRONMENT?
Red Team vs. Blue Team
Types of Malware (CEH v11)
Why Threat Intelligence Is a Must for Every Organization?
Why Digital Forensics as a Career?
Cryptography in Blockchain
A Brief Introduction to Penetration Testing
Computer Hacking Forensic Investigator - CHFI
Pasta Threat Modeling
Blockchain: Fundamentals & Opportunities​
Types of malware threats
What's new in​ CEHv11?
Business Continuity & Disaster Recovery
Threat Intelligence Data Collection & Acquisition
Most Common Application Level Attacks

Recently uploaded (20)

PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PPTX
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
PDF
VCE English Exam - Section C Student Revision Booklet
PPTX
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
RMMM.pdf make it easy to upload and study
PDF
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
Microbial disease of the cardiovascular and lymphatic systems
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PDF
O7-L3 Supply Chain Operations - ICLT Program
PPTX
Cell Structure & Organelles in detailed.
PPTX
Institutional Correction lecture only . . .
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PPTX
Week 4 Term 3 Study Techniques revisited.pptx
Supply Chain Operations Speaking Notes -ICLT Program
102 student loan defaulters named and shamed – Is someone you know on the list?
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
Module 4: Burden of Disease Tutorial Slides S2 2025
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
VCE English Exam - Section C Student Revision Booklet
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
RMMM.pdf make it easy to upload and study
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
Renaissance Architecture: A Journey from Faith to Humanism
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
Microbial disease of the cardiovascular and lymphatic systems
STATICS OF THE RIGID BODIES Hibbelers.pdf
O7-L3 Supply Chain Operations - ICLT Program
Cell Structure & Organelles in detailed.
Institutional Correction lecture only . . .
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
Week 4 Term 3 Study Techniques revisited.pptx

Information Security Management