SlideShare a Scribd company logo
BUSINESS CASE FOR INFORMATION
SECURITY PROGRAM
Developed and Presented by: William Godwin3/12/2014
© 2014
Background
 Safeguards the company’s most important asset:
CORPORATE INFORMATION
 Establishes a formal program and standard to:
 Safeguard Confidentiality, Integrity, and Availability of information
 Determine the company’s risk appetite
 Categorize data and information assets
 Establish appropriate security control baseline
 Assess risk of compromise
 Comply with governing regulations and corporate governance
Value
 Identify IT Operations as a business enabler
 Establish security benchmarks and determine assessment targets capable of
maturing as threats evolve and become more sophisticated
 Aligns IT Services with the company’s mission
 Delivers long-term information security strategy
 Effectively mitigate threats and risks and reduce incidents
 Drive scalable processes and IT solutions
 Provides insight to…
 Optimize IT operations budget management
 Promote organizational structure to integrate program
 Conducive to organizational maturity
Scope
 Organization Position/Posture
 Data categorization of critical departments
 Risk Appetite
 Determine company’s tolerance to risk exposure
 Business Impact Analysis
 Determine criticality of departments and supporting resources
 Develop Strategy, Plan, Implement and Execute
 Cultivate Continuous Improvement Opportunities
Organization Position/Posture
 Develop strategy for implementation. Reference output from
Data Categorization & Risk Appetite exercise (Ref. slide #6 &
slide #7)
 Garner support from organization leadership
 Large/Enterprise organizations may have multiple executives
 Obtain operational leadership buy-in
 Operational Managers will need to be made aware of their roles
and expectations
 Develop & establish corporate standards and requirements for
information security
Data Categorization
 Defines broad classes of information created, stored, and/or
delivered by the company
 Allows for logical groupings based on criticality to the business
 Determines data sensitivity levels to unauthorized access,
modification or loss of availability
 Aids to …
 Establish security baseline for protecting sensitive data
 Identify business exposure
 Determine impact on company should data become compromised
 Permit executives to organize priority based on criticality of data
Determine & Establish Risk Appetite
 Company may implement appropriate level of
information security control based on the risk appetite.
 Risk Appetite is determined by establishing the sensitivity
of data stored, processed or transmitted by an
information system. (Ref. slide #6)
 Sensitivity is determined by understanding the criticality
of the data to the company’s mission or regulatory
requirements.
Business Impact Analysis
 Categorize and analyze critical business
departments/divisions
 Create priority list of most sensitive business functions
 Create priority list of support resources
 Human Resources
 Information Technology Resources
 Establish information security requirements
 Identify and implement baseline security controls to reduce risk
Strategy, Plan, Implement & Execute
 Strategy
 Identify desired service capability and control coverage – (Ref. slide #10)
 Identify and gather regulatory requirements and corporate governance
 Develop and execute strategic plan for program implementation
 Planning for critical IT assets
 Establish operation authority (typically an executive authorizes system to operate)
 Document system Security Plan
 Develop system IT Contingency Plan
 Develop Configuration Management & Control Plan
 Develop system Incident Response Plan
 Implement security controls as specified within the security plan
 Execute
 Conduct threat assessment
 Conduct initial Risk Assessment
 Mitigate security exposure to acceptable levels
 Conduct final security test to validate control implementation
Information Security Model
Model Terms & Glossary
Capability: Defines “what” information security process or process areas or
disciplines.
Coverage: Defines the “amount” of control and timeline coverage should be
applied.
Control: Managing obligations to the business, stakeholders, customers and
demonstrating it.
Info Security
Mission & Goals
2
3
4
5
100%
50%
75%
25%
Capability
Coverage
Optimal Path
(Timeline)
ROI & Cost-
efficiency
1
Risk & Compliance
Objectives
Control
0%
Capability Processes are … Coverage
1 Ad Hoc & Disorganized 0%
2 Repeatable (generally consistent pattern) 25%
3 Documented and communicated 50%
4 Monitored and measured 75%
5 Measured and improved 100%
Maturing to Proactive Posture
Capability: Process Discovery and Re-engineering to support Information
Security program alignment with business and security
requirements.
Coverage: Integrate required regulations and observe areas for control
enhancement.
Control: Risk and Compliance based categorization and priority of
information assets and processes.
The Degree and complexity of controls are driven by the enterprises risk
appetite and applicable compliance requirements.
SEI, Carnegie Mellon 2008
Primary Drivers
Continuous Improvement Opportunities
 Identify success/fail requirements
 Identify metrics applicable to the organization. Examples
such as…
 Total vulnerabilities
 Residual risk
 Total incidents
 Change in vulnerabilities and incidents
 IT system operational budget change
Conclusion
 Aids organization leaders to identify and assign priority to
business units and supporting IT systems based on criticality
 Enables effective financial planning for IT Operations and
Security
 Ensures compliance with regulatory requirements and
governance
 Enables effective management of risk to IT systems
 Improve IT service capabilities through process maturity

More Related Content

PPTX
Security Operations Center (SOC) Essentials for the SME
PDF
Alienvault how to build a security operations center (on a budget) (2017, a...
PPTX
Security Operation Center Fundamental
PDF
NIST 800-30 Intro to Conducting Risk Assessments - Part 1
PDF
Security operations center-SOC Presentation-مرکز عملیات امنیت
PDF
Cyber Security Governance
PDF
NIST cybersecurity framework
PDF
Cybersecurity Roadmap Development for Executives
Security Operations Center (SOC) Essentials for the SME
Alienvault how to build a security operations center (on a budget) (2017, a...
Security Operation Center Fundamental
NIST 800-30 Intro to Conducting Risk Assessments - Part 1
Security operations center-SOC Presentation-مرکز عملیات امنیت
Cyber Security Governance
NIST cybersecurity framework
Cybersecurity Roadmap Development for Executives

What's hot (20)

PDF
Cyber Threat Intelligence
PPTX
Security operation center (SOC)
PPTX
Optimizing Security Operations: 5 Keys to Success
PDF
Cybersecurity roadmap : Global healthcare security architecture
PPTX
SOC Architecture Workshop - Part 1
PDF
Threat Intelligence
PDF
Security operations center 5 security controls
PDF
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
PDF
Building Security Operation Center
PPTX
Cyber Threat Intelligence.pptx
PPTX
Security Operation Center - Design & Build
PDF
Strategy considerations for building a security operations center
PPT
Planning and Deploying an Effective Vulnerability Management Program
PPTX
Cybersecurity Risk Management Framework Strategy Workshop
PDF
Cybersecurity concepts & Defense best practises
PDF
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
PDF
Global Cyber Threat Intelligence
PDF
Cybersecurity Incident Management Powerpoint Presentation Slides
PDF
Cybersecurity Employee Training
PPTX
Effective Security Operation Center - present by Reza Adineh
Cyber Threat Intelligence
Security operation center (SOC)
Optimizing Security Operations: 5 Keys to Success
Cybersecurity roadmap : Global healthcare security architecture
SOC Architecture Workshop - Part 1
Threat Intelligence
Security operations center 5 security controls
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
Building Security Operation Center
Cyber Threat Intelligence.pptx
Security Operation Center - Design & Build
Strategy considerations for building a security operations center
Planning and Deploying an Effective Vulnerability Management Program
Cybersecurity Risk Management Framework Strategy Workshop
Cybersecurity concepts & Defense best practises
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
Global Cyber Threat Intelligence
Cybersecurity Incident Management Powerpoint Presentation Slides
Cybersecurity Employee Training
Effective Security Operation Center - present by Reza Adineh
Ad

Similar to Business case for information security program (20)

PPT
Securing Information Servicesv1.0
PPT
Testing
PPT
Process Maturity Assessment
PPT
Convergence innovative integration of security
PDF
Rosetta Stone x Compliance ONETRUST-1.pdf
PDF
Qatar Proposal
PPTX
D1 security and risk management v1.62
PPT
Gs Us Roadmap For A World Class Information Security Management System– Isoie...
PPTX
Presentation1.pptx
PPT
Developing A Risk Based Information Security Program
PPT
Start With A Great Information Security Plan!
PDF
Business case for enterprise continuity planning
PDF
Happiest Minds NIST CSF compliance Brochure
PDF
Ch3 cism 2014
PPT
Supplement To Student Guide Seminar 03 A 3 Nov09
PDF
Ch4 cism 2014
PDF
New technologies - Amer Haza'a
DOCX
Saikiran_CV_Operational Risk_updated
DOCX
Saikiran_CV_Operational Risk_updated
PDF
2023-it-roadmap-for-cybersecurity-techcnical
Securing Information Servicesv1.0
Testing
Process Maturity Assessment
Convergence innovative integration of security
Rosetta Stone x Compliance ONETRUST-1.pdf
Qatar Proposal
D1 security and risk management v1.62
Gs Us Roadmap For A World Class Information Security Management System– Isoie...
Presentation1.pptx
Developing A Risk Based Information Security Program
Start With A Great Information Security Plan!
Business case for enterprise continuity planning
Happiest Minds NIST CSF compliance Brochure
Ch3 cism 2014
Supplement To Student Guide Seminar 03 A 3 Nov09
Ch4 cism 2014
New technologies - Amer Haza'a
Saikiran_CV_Operational Risk_updated
Saikiran_CV_Operational Risk_updated
2023-it-roadmap-for-cybersecurity-techcnical
Ad

Business case for information security program

  • 1. BUSINESS CASE FOR INFORMATION SECURITY PROGRAM Developed and Presented by: William Godwin3/12/2014 © 2014
  • 2. Background  Safeguards the company’s most important asset: CORPORATE INFORMATION  Establishes a formal program and standard to:  Safeguard Confidentiality, Integrity, and Availability of information  Determine the company’s risk appetite  Categorize data and information assets  Establish appropriate security control baseline  Assess risk of compromise  Comply with governing regulations and corporate governance
  • 3. Value  Identify IT Operations as a business enabler  Establish security benchmarks and determine assessment targets capable of maturing as threats evolve and become more sophisticated  Aligns IT Services with the company’s mission  Delivers long-term information security strategy  Effectively mitigate threats and risks and reduce incidents  Drive scalable processes and IT solutions  Provides insight to…  Optimize IT operations budget management  Promote organizational structure to integrate program  Conducive to organizational maturity
  • 4. Scope  Organization Position/Posture  Data categorization of critical departments  Risk Appetite  Determine company’s tolerance to risk exposure  Business Impact Analysis  Determine criticality of departments and supporting resources  Develop Strategy, Plan, Implement and Execute  Cultivate Continuous Improvement Opportunities
  • 5. Organization Position/Posture  Develop strategy for implementation. Reference output from Data Categorization & Risk Appetite exercise (Ref. slide #6 & slide #7)  Garner support from organization leadership  Large/Enterprise organizations may have multiple executives  Obtain operational leadership buy-in  Operational Managers will need to be made aware of their roles and expectations  Develop & establish corporate standards and requirements for information security
  • 6. Data Categorization  Defines broad classes of information created, stored, and/or delivered by the company  Allows for logical groupings based on criticality to the business  Determines data sensitivity levels to unauthorized access, modification or loss of availability  Aids to …  Establish security baseline for protecting sensitive data  Identify business exposure  Determine impact on company should data become compromised  Permit executives to organize priority based on criticality of data
  • 7. Determine & Establish Risk Appetite  Company may implement appropriate level of information security control based on the risk appetite.  Risk Appetite is determined by establishing the sensitivity of data stored, processed or transmitted by an information system. (Ref. slide #6)  Sensitivity is determined by understanding the criticality of the data to the company’s mission or regulatory requirements.
  • 8. Business Impact Analysis  Categorize and analyze critical business departments/divisions  Create priority list of most sensitive business functions  Create priority list of support resources  Human Resources  Information Technology Resources  Establish information security requirements  Identify and implement baseline security controls to reduce risk
  • 9. Strategy, Plan, Implement & Execute  Strategy  Identify desired service capability and control coverage – (Ref. slide #10)  Identify and gather regulatory requirements and corporate governance  Develop and execute strategic plan for program implementation  Planning for critical IT assets  Establish operation authority (typically an executive authorizes system to operate)  Document system Security Plan  Develop system IT Contingency Plan  Develop Configuration Management & Control Plan  Develop system Incident Response Plan  Implement security controls as specified within the security plan  Execute  Conduct threat assessment  Conduct initial Risk Assessment  Mitigate security exposure to acceptable levels  Conduct final security test to validate control implementation
  • 10. Information Security Model Model Terms & Glossary Capability: Defines “what” information security process or process areas or disciplines. Coverage: Defines the “amount” of control and timeline coverage should be applied. Control: Managing obligations to the business, stakeholders, customers and demonstrating it. Info Security Mission & Goals 2 3 4 5 100% 50% 75% 25% Capability Coverage Optimal Path (Timeline) ROI & Cost- efficiency 1 Risk & Compliance Objectives Control 0% Capability Processes are … Coverage 1 Ad Hoc & Disorganized 0% 2 Repeatable (generally consistent pattern) 25% 3 Documented and communicated 50% 4 Monitored and measured 75% 5 Measured and improved 100% Maturing to Proactive Posture Capability: Process Discovery and Re-engineering to support Information Security program alignment with business and security requirements. Coverage: Integrate required regulations and observe areas for control enhancement. Control: Risk and Compliance based categorization and priority of information assets and processes. The Degree and complexity of controls are driven by the enterprises risk appetite and applicable compliance requirements. SEI, Carnegie Mellon 2008 Primary Drivers
  • 11. Continuous Improvement Opportunities  Identify success/fail requirements  Identify metrics applicable to the organization. Examples such as…  Total vulnerabilities  Residual risk  Total incidents  Change in vulnerabilities and incidents  IT system operational budget change
  • 12. Conclusion  Aids organization leaders to identify and assign priority to business units and supporting IT systems based on criticality  Enables effective financial planning for IT Operations and Security  Ensures compliance with regulatory requirements and governance  Enables effective management of risk to IT systems  Improve IT service capabilities through process maturity