SlideShare a Scribd company logo
CNIT 160:
Cybersecurity
Responsibilities
2. Information Security 

Governance

Part 1

Pages 16 - 55
Topics in Part 1
• Introduction to Information Security
Governance
• Reason for Security Governance
• Security Governance Activities and
Results
• Business Alignment
• Roles and Responsibilities
Topics in Part 1 

(continued)
• Introduction to Information Security
Governance (continued)
• Monitoring Responsibilities
• Information Security Governance Metrics
• The Security Balanced Scorecard
• Business Model for Information Security
Topics in Part 2
• Security Strategy Development
• Strategy Objectives
• Control Frameworks
• Risk Objectives
• Strategy Resources
• Strategy Development
• Strategy Constraints
Governance
• A process whereby senior management
exerts strategic control over business
functions
• Through policies, objectives, delegation of
authority, and monitoring
• Ensures that business processes
effectively meet vision and objectives
Information Security
Governance
• Focuses on key processes
• Personnel management
• Sourcing
• Risk management
• Configuration management
• Change management
• Access management
Information Security
Governance
• Focuses on key processes (continued)
• Vulnerability management
• Incident management
• Business continuity planning
• Establishment of an effective organization
structure and clear statements of roles and
responsibilities
Information Security
Governance
• Monitor processes with scorecard or
metrics
• Continuous improvement changes
processes to keep them effective and
support ongoing business needs
CNIT 160: Ch 2a: Introduction to Information Security Governance
CNIT 160: Ch 2a: Introduction to Information Security Governance
CNIT 160: Ch 2a: Introduction to Information Security Governance
CNIT 160: Ch 2a: Introduction to Information Security Governance
Reason for Security
Governance
• Organizations are dependent on
information systems
• Must understand priority of
• Confidentiality
• Integrity
• Availability
Security Governance
Activities and Results
• Risk management
• Risk assessments and follow-up actions
to reduce risks
• Process improvement
• Event identification
• Security events and incidents
• Incident response
Security Governance
Activities and Results
• Improved compliance
• With laws, regulations, and standards
• Business continuity and disaster recovery
planning
• Metrics management
• Measure key security events, such as
incidents, policy changes, violations,
audits, and training
Security Governance
Activities and Results
• Resource management
• Allocation of manpower, budget, and
resources
• Improved IT governance
• Increased trust
• From customers, suppliers and partners
• Improved reputation
Business Alignment
• Security program must align with guiding
principles
• Mission
• Why the organization exists
• Goals and objectives
• What achievements it wants to accomplish
• Strategy
• Activities needed to fulfill goals and objectives
Organization's
Characteristics
• Culture
• Asset value
• Risk tolerance
• Legal obligations
• Market conditions
Dr. No
• Security that prevents necessary business
practices
• Leads to "Shadow IT"
• Departments setting up uncontrolled IT
assets
Organization's
Characteristics
• Goals and objectives
• Risk appetite
• Risk-averse organizations have a formal
system of accountability for risk
decisions
Facebook
• https://www.wired.com/2016/11/buy-facebook-propaganda-posters/
Roles and Responsibilities
• Role describes expected activities
Ranks
• In order of increasing seniority
Responsibilities
• Specific
• General
RACI Charts
RACI Charts
Considerations
• When assigning roles in a RACI chart
• Skills
• Segregation of duties
• Conflict of interest
Ch 2a-1
Board of Directors
• Fiduciary duty
• Accountable to shareholders to act in the
best interests of the organization
• Selected for
• Investor representation
• Business experience
• Access to resources
• Appoints the CEO
Five Principles
• From National Association of Corporate
Directors
Executive Management
• Carries out directives from the board of
directors
• Ratifies corporate security policy
• Publicly supporting it
• Leads by example
• Has ultimate responsibility
Executive Management
Security Steering
Committee's Responsibilities
• Risk treatment deliberation and
recommendation
• Discussion and coordination of IT and
security projects
• Review of recent risk assessments
• Discussion of new laws, regulations, and
requirements
• Review of recent security incidents
Business Process and
Business Asset Owners
• Usually nontechnical personnel
• Responsibilities:
• Access grants, revocation, and reviews
• Configuration
• Function definition
• Process definition
• Physical location
Custodial Responsibilities
• IT staff acts as a proxy for asset owners
• Should implement decisions from the asset
owner
• But often the asset owner is uninvolved
and uninformed, instead of periodically
reviewing these decisions
• https://www.nbcnews.com/business/consumer/former-equifax-ceo-blames-one-it-guy-massive-
hack-n807956
Chief Information Security
Officer (CISO)
• Highest-ranking security person
• Develops security strategies
• Similar titles
• Chief Security Officer (CSO)
• Chief Information Risk Officer (CIRO)
• Chief Risk Officer (CRO)
Position of CISO
• Reports to Chief Operating Officer (COO) or
Chief Executive Officer (CEO)
• Sometimes to CIO or legal or someone
else
• Many organizations lack a CISO but have a
manager of information security lower on
the org chart, weakening security posture
• Small to medium-sized orgs may contract
with a virtual CISO for strategy and planning
Rank Sets Tone and Gives
Power
Chief Privacy Officer
• For organization with large amounts of
customer Personally Identifiable
Information (PII)
• Regulations like
• Health Insurance Portability and
Accountability Act (HIPAA)
• Fair Credit Reporting Act (FRCA)
• The Gramm-Leach-Bliley Act (GLBA)
Software Development
• Systems architect
• Systems analyst
• Software engineer/developer
• Software tester
Data Management
• Data manager
• Database architect
• Big data architect
• Database administrator (DBA)
• Database analyst
• Data scientist
Network Management
• Network architect
• Network engineer
• Network administrator
• Telecom engineer
Systems Management
• Systems architect
• Systems analyst
• Storage engineer
• Systems administrator
Operations
• Operations manager
• Operations analyst
• Controls analyst
• Systems operator
• Data entry
• Media manager
Security Operations
• Security architect
• Security engineer
• Security analyst
• Examines logs
• Access administrator
Security Audit
• Security audit manager
• Security auditor
Service Desk
• Service desk manager
• Service desk analyst
• Technical support analyst
Quality Assurance & Other
Roles
• QA manager
• QC manager
• Vendor manager
• Project manager
General Staff Security
Responsibilities
Monitoring Responsibilities
• Confirming that the correct jobs are being
carried out in the correct way
• Controls and internal audit
• Metrics and reporting
• Work measurement
• Performance evaluation
• 360 feedback -- from peers, subordinates,
and management
• Position benchmarking -- comparing job
titles with other organizations
Information Security
Governance Metrics
• Technical metrics, counts of events from
• Firewall, IDS, Anti-malware, DLP, etc.
• Business-related metrics
• Key Risk Indicators (KRIs)
• Key Goal Indicators (KGIs)
• Key Performance Indicators (KPIs)
Return on Security
Investment
• Difficult to quantify
• Because breaches are rare
• Other ways to justify security
• Fiduciary responsibility
• Regulation
• Competitive differentiation
SMART Metrics
Good Considerations for
Metrics
Ch 2a-1
Risk Management
Performance Measurement
Convergence Metrics
• Large organizations with multiple business
units or locations
Value Delivery Metrics
Resource Management
Metrics
Security Balanced
Scorecard
Business Model for
Information Security
Business Model for
Information Security
BMIS Elements and
Dynamic Interconnections
• Elements
• Organization
• People
• Process
• Technology
BMIS Elements and
Dynamic Interconnections
• Dynamic Interconnections
• Culture
• Governing
• Architecture
• Emergence
• Enabling and Support
• Human Factors
Culture
• "a pattern of behaviors, beliefs,
assumptions, attitudes, and ways of doing
things"
• Critical to the success or failure of an
information security program
• Cannot be legislated or controlled directly
Steps to Create Favorable
Security Culture
Governing
Architecture
Architecture
The Zachman Framework
• The dominant architecture architecture
standard
Data Flow Diagram
Emergence
• People learning to do things better
• Can lead to improvements, but also cause
inconsistent results
Enabling and Support
• Technology and business people don't
understand one another
• To fill this gap, create a requirements
document
• Charts listing required and desired
functionality for new technologies
BMIS Enabling and Support
Life Cycle
Human Factors
• Also called Human-Computer Interaction
(HCI)
• Includes User Interface (UI)
• Consistency with other systems
• Typing and data entry methods
• Display and readability
• Error recovery
• Sound
• Voice and biometric recognition
• Ergonomics
• Environment
Human Factors
Example 1:
Adverse Effects of a Policy Change
• New policy
regarding
personal
devices and
company email
• Affects
organization
and processes
• Changed
processes
affect people
and technology
• An outside security audit shows that
servers are months behind in security
patches
• The company uses a vulnerability scanner
to keep up-to date, for compliance
• Why is it failing?
Example 2:
Causes for Process Weakness
• Possible causes:
• Technology --
scanner is
faulty
Example 2:
Causes for Process Weakness
• Possible causes:
• Architecture--
scanner can't
reach all
systems in
network
• Human
factors--
engineers not
using scanner
properly
Example 2:
Causes for Process Weakness
• Possible causes:
• Enabling &
Support--
Interview
engineers about
business
processes
• New networks
have been added
that are not
included in
scanner's
configuration
Example 2:
Causes for Process Weakness
Ch 2a-1
CNIT 160: Ch 2a: Introduction to Information Security Governance

More Related Content

PDF
CNIT 160: Ch 3a: Risk Management Concepts & Implementing a Program
PDF
CNIT 160: Ch 3d: Operational Risk Management
PDF
CNIT 160 4b: Security Program Management (Part 2)
PDF
CNIT 160 Ch 4b: Security Program Management
PDF
Ch 3a: Risk Management Concepts
PDF
CNIT 160 Ch 4a: Information Security Programs
PDF
CNIT 160 Ch 4a: Information Security Programs
PDF
CNIT 160: Ch 3c: The Risk Management Life Cycle
CNIT 160: Ch 3a: Risk Management Concepts & Implementing a Program
CNIT 160: Ch 3d: Operational Risk Management
CNIT 160 4b: Security Program Management (Part 2)
CNIT 160 Ch 4b: Security Program Management
Ch 3a: Risk Management Concepts
CNIT 160 Ch 4a: Information Security Programs
CNIT 160 Ch 4a: Information Security Programs
CNIT 160: Ch 3c: The Risk Management Life Cycle

What's hot (20)

PDF
CNIT 160: Ch 3c: The Risk Management Life Cycle
PDF
CNIT 160 Ch 4b: Security Program Management
PDF
CNIT 160 3a Information Risk Management
PDF
CNIT 160 Ch 4c: Security Program Development (Part 3)
PDF
CNIT 160: Ch 2b: Security Strategy Development
PDF
CNIT 160: 3. Information Risk Management (Part 4)
PDF
CNIT 160 Ch 4 Information Security Program Development (Part 3)
PDF
1. Security and Risk Management
PDF
CNIT 160: Ch 3b: The Risk Management Life Cycle
PDF
2. Asset Security
PDF
CISSP Preparation: Introduction
PPTX
Chapter 1 Personal security
PPTX
Professional Designations IT Assurance
PDF
6. Security Assessment and Testing
PPTX
Integrated APT-IGA Solution - Future of IT Security (Vladislav Shapiro, Immer...
PPTX
project managmnet
PDF
CNIT 125: Ch 2. Security and Risk Management (Part 2)
PPT
Chapter 5
PDF
isicg - 3 r's v4
PDF
7. Security Operations
CNIT 160: Ch 3c: The Risk Management Life Cycle
CNIT 160 Ch 4b: Security Program Management
CNIT 160 3a Information Risk Management
CNIT 160 Ch 4c: Security Program Development (Part 3)
CNIT 160: Ch 2b: Security Strategy Development
CNIT 160: 3. Information Risk Management (Part 4)
CNIT 160 Ch 4 Information Security Program Development (Part 3)
1. Security and Risk Management
CNIT 160: Ch 3b: The Risk Management Life Cycle
2. Asset Security
CISSP Preparation: Introduction
Chapter 1 Personal security
Professional Designations IT Assurance
6. Security Assessment and Testing
Integrated APT-IGA Solution - Future of IT Security (Vladislav Shapiro, Immer...
project managmnet
CNIT 125: Ch 2. Security and Risk Management (Part 2)
Chapter 5
isicg - 3 r's v4
7. Security Operations
Ad

Similar to CNIT 160: Ch 2a: Introduction to Information Security Governance (20)

PPTX
crisc_wk_2a.pptx
PPTX
CISA Training - Chapter 2 - 2016
PPTX
b26c48fe6gg3Cybersecuritygovernance.pptx
PDF
What’s my job again? Slides from Mark Simos talk at 2025 Tampa BSides
PDF
Integration of Information Security Governance and Corporate Governance
PDF
Building an effective Information Security Roadmap
PDF
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...
PPT
Developing an Information Security Program
PPTX
Mandelaris_SecureWorld_2016_FINAL
PPTX
Dancyrityshy 1foundatioieh
PDF
Security Program Guidance and Establishing a Culture of Security
PPT
MIS chap # 9.....
PPTX
CISO's first 100 days
PDF
IT Information Security Management Principles, 28 February - 02 March 2016 Du...
PPTX
IT Governance.pptx
PDF
1. Security and Risk Management
PPTX
Planning for security and security audit process
PDF
CNIT 125: Ch 2. Security and Risk Management (Part 1)
PPTX
Security Organization/ Infrastructure
PDF
IT Information Security Management Principles, 15 - 18 May 2016 Dubai UAE
crisc_wk_2a.pptx
CISA Training - Chapter 2 - 2016
b26c48fe6gg3Cybersecuritygovernance.pptx
What’s my job again? Slides from Mark Simos talk at 2025 Tampa BSides
Integration of Information Security Governance and Corporate Governance
Building an effective Information Security Roadmap
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...
Developing an Information Security Program
Mandelaris_SecureWorld_2016_FINAL
Dancyrityshy 1foundatioieh
Security Program Guidance and Establishing a Culture of Security
MIS chap # 9.....
CISO's first 100 days
IT Information Security Management Principles, 28 February - 02 March 2016 Du...
IT Governance.pptx
1. Security and Risk Management
Planning for security and security audit process
CNIT 125: Ch 2. Security and Risk Management (Part 1)
Security Organization/ Infrastructure
IT Information Security Management Principles, 15 - 18 May 2016 Dubai UAE
Ad

More from Sam Bowne (20)

PDF
Introduction to the Class & CISSP Certification
PDF
Cyberwar
PDF
3: DNS vulnerabilities
PDF
8. Software Development Security
PDF
4 Mapping the Application
PDF
3. Attacking iOS Applications (Part 2)
PDF
12 Elliptic Curves
PDF
11. Diffie-Hellman
PDF
2a Analyzing iOS Apps Part 1
PDF
9 Writing Secure Android Applications
PDF
12 Investigating Windows Systems (Part 2 of 3)
PDF
10 RSA
PDF
12 Investigating Windows Systems (Part 1 of 3
PDF
9. Hard Problems
PDF
8 Android Implementation Issues (Part 1)
PDF
11 Analysis Methodology
PDF
8. Authenticated Encryption
PDF
7. Attacking Android Applications (Part 2)
PDF
7. Attacking Android Applications (Part 1)
PDF
5. Stream Ciphers
Introduction to the Class & CISSP Certification
Cyberwar
3: DNS vulnerabilities
8. Software Development Security
4 Mapping the Application
3. Attacking iOS Applications (Part 2)
12 Elliptic Curves
11. Diffie-Hellman
2a Analyzing iOS Apps Part 1
9 Writing Secure Android Applications
12 Investigating Windows Systems (Part 2 of 3)
10 RSA
12 Investigating Windows Systems (Part 1 of 3
9. Hard Problems
8 Android Implementation Issues (Part 1)
11 Analysis Methodology
8. Authenticated Encryption
7. Attacking Android Applications (Part 2)
7. Attacking Android Applications (Part 1)
5. Stream Ciphers

Recently uploaded (20)

PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PDF
Microbial disease of the cardiovascular and lymphatic systems
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
Insiders guide to clinical Medicine.pdf
PDF
O7-L3 Supply Chain Operations - ICLT Program
PPTX
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
PDF
Basic Mud Logging Guide for educational purpose
PPTX
PPH.pptx obstetrics and gynecology in nursing
PDF
TR - Agricultural Crops Production NC III.pdf
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PPTX
master seminar digital applications in india
PPTX
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PDF
Complications of Minimal Access Surgery at WLH
PDF
Classroom Observation Tools for Teachers
PPTX
Cell Structure & Organelles in detailed.
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PDF
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
Microbial disease of the cardiovascular and lymphatic systems
STATICS OF THE RIGID BODIES Hibbelers.pdf
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
Insiders guide to clinical Medicine.pdf
O7-L3 Supply Chain Operations - ICLT Program
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
Basic Mud Logging Guide for educational purpose
PPH.pptx obstetrics and gynecology in nursing
TR - Agricultural Crops Production NC III.pdf
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
master seminar digital applications in india
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
Complications of Minimal Access Surgery at WLH
Classroom Observation Tools for Teachers
Cell Structure & Organelles in detailed.
2.FourierTransform-ShortQuestionswithAnswers.pdf
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table
Abdominal Access Techniques with Prof. Dr. R K Mishra

CNIT 160: Ch 2a: Introduction to Information Security Governance