SlideShare a Scribd company logo
Information Security
Management Certification
Dr. Kevin F. Streff
Founder and Managing Partner
605.270.4427 kevin.streff@americansecurityandprivacy.com 1
Agenda
1. Overview
2. Laws & Regulations
3. IT Exam Process
4. Information Security
Programs
5. Risk Management
6. Threats
7. Third Party
Management
8. SETA Programs
9.Incident Response
Programs
10.Business Continuity
Programs
11. Documentation
12. Auditing
13. Metrics
Information Security Management Certification
2
Section 4
Information Security Program
3
Learning Objectives
• Understand Security Maturity Model
• Understand Linking Business Strategy
to Security Program
• Understand Information Security
Program Options
• Understand ASP Information Security
Program Option
4
SP-CMM Security & Privacy
Maturity Model
• SP-CMM is an acronym for Security &
Privacy Capability Maturity Model.
Maintained by the Secure Controls
Framework Council, this framework
seeks to help organizations in the
establishment and evaluation of their
security and security controls.
5
SP-CMM Security & Security
Maturity Model
• On a high-level, it has three primary
objectives:
• Provide C-level executives with a well-defined
criterion for setting the expectations for an
organization’s cybersecurity and security
program;
• Provide internal security teams with a well-
defined criterion for planning and
implementing security practices; and
• Provide a baseline criterion for organizations
to evaluate third-party service providers.
6
Security Tied to Strategy
7
8
Leading Security Frameworks
1. NIST Security Framework
2. OASIS Security Framework
3. APEC Security Framework
4. Nymity Security Management Accountability
Framework
5. HITRUST Security Framework
6. STREFF Security Framework
7. American Security and Privacy (ASP)
Information Security Framework (ISP)
9
NIST Security Framework
10
Oasis Security Framework
• The International Open Standards Consortium (OASIS) was founded under
the name "SGML Open" in 1993.
• The consortium changed its name to "OASIS" (Organization for the
Advancement of Structured Information Standards) in 1998 to reflect an
expanded scope of technical work.
• Later renamed to the International Open Standards Consortium,
announcements about creating security frameworks emerged (The OASIS
PMRM TC) that to assist business process engineers, IT analysts,
architects, and developers implement security and security policies in
their operations.
• PMRM extends broad security policies, as most policies describe fair
information practices and principles but offer little understanding into
how to operationalize or implement these practices.
11
Oasis Security Framework
• PMRM includes two phases: Use Case and High-Level Analysis.
• The first phase entails the scoping of the Use Case in which data is
associated.
• This includes drafting a complete description of the environment
following the definitions of “business environment” or “application” as
established by the Stakeholders using the PMRM within a particular Use
Case.
• The second phase is the analysis phase.
• This high-level analysis likely includes Security Impact Assessments,
previous security and security risk assessments, security maturity
assessments, compliance reviews, and security audits.
• PMRM can be used to examine an entire business environment to
develop Policies, Security Controls, Services and Functions, Mechanisms,
or a Security Architecture.
12
APEC Security Framework
1. Asian-Pacific Framework
2. Set of principles and implementation guidelines that were created in
order to establish effective security protections that avoid barriers to
information flows, and ensure continued trade and economic growth in
the Asia Pacific Economic Cooperation region of 27 countries.
• The APEC Security Framework set in motion the process of creating the APEC Cross-Border
Security Rules system.
• The CBPR system has now been formally joined by the United States, Canada, Japan and
Mexico,
1. The APEC CBPR system requires participating businesses like Apple, Box, HP, IBM, Lynda.com,
Merck, Rimini Street, Workday, and Intasect to develop and implement Information Security
policies consistent with the APEC Security Framework. These policies and practices must be
assessed as compliant with the minimum program requirements of the APEC CBPR system by
an accountability agent
13
Nymity Security Framework
1. Maintain Governance Structure
2. Maintain Personal Data Inventory
and Data Transfer Mechanisms
3. Maintain Internal Information
Security Policy
4. Embed Information Security into
Operations
5. Maintain Training and Awareness
Program
6. Manage Information Security
7. Manage Third Party Risk
8. Maintain Notices
9. Respond to Requests and Complaints
from Individuals
10. Monitor for New Operational Policies
11. Maintain Information Security
Breach Management Program
12. Monitor Data Handling Practices
13. Track External Criteria
14
HITRUST Security Framework
• Founded in 2007, Health Information Trust Alliance (HITRUST) was
launched with the idea that information protection should be a core pillar
of the broad adoption of health information systems.
• HITRUST brought together public and private healthcare professionals to
develop a common risk and compliance management framework.
• In 2015, HITRUST announced that their security framework was updated
with security controls.
• Over 84 percent of hospitals and health plans, as well as many other
healthcare organizations and business associates, use the CSF, making it
the most widely adopted security framework in the industry.
• CSF – Common Security and Security Framework
15
• The CSF contains 14 control categories, comprised of 49 control objectives
and 156 control specifications.
• The CSF control categories, accompanied with their respective number of
control objectives and control specifications for each category, are:
– 0. Information Security Management Program (1, 1)
– 1. Access Control (7, 25)
– 2. Human Resources Security (4, 9)
– 3. Risk Management (1, 4)
– 4. Security Policy (1, 2)
– 5. Organization of Information Security (2, 11)
– 6. Compliance (3, 10)
– 7. Asset Management (2, 5)
– 8. Physical and Environmental Security (2, 13)
– 9. Communications and Operations Management (10, 32)
– 10. Information Systems Acquisition, Development, and Maintenance (6, 13)
– 11. Information Security Incident Management (2, 5)
– 12. Business Continuity Management (1, 5)
– 13. Security Practices (7, 21)
HITRUST Security Framework
16
Information Security Program Blueprint
Inventories
Policies
Procedures
Standards
Guidelines
Plans
Audit/Test Results
Reports
SARS
Meeting Minutes
Committee Approvals
Previous Exams
Awareness/Training
Materials
Third Party Reports
Network Diagram
Organizational Chart
Process Flows
Incident Reports
Strategies
Budgets
Memos
FI
Processes
Documentation
Asset
Mgmt.
Physical
Security
Business
Continuity
Incident
Response
Developmen
t &
Acquisition
Operations
Security
Risk Mgmt. Network
Security
Auditing
Functions
Personnel
Security
Reporting
Remediation
Assessment Changes
Audit Recommendations
Exam Findings
Incident Reports
Policy Changes
Board
Committee
Operations
Third Party
Examiner
FI and
Technology
Strategy
ASP ISP v1.1
IT Audit
Soc. Eng.
Pen Test
Vul. Scanning
Third Party Mgmt.
Soft. Dev.
Customer
Employee
Systems Inventory
Technology
BIA
AUP
Roles & Resp.

More Related Content

PPT
Module 4 - ASP Privacy Management Certfication.ppt
PPT
Start With A Great Information Security Plan!
PPT
Lesson 1- Information Policy
PPT
Khas bank isms 3 s
PDF
Solve the exercise in security management.pdf
PPT
Principles of information security Chapter 5.ppt
PDF
Chapter 7 Managing Secure System.pdf
Module 4 - ASP Privacy Management Certfication.ppt
Start With A Great Information Security Plan!
Lesson 1- Information Policy
Khas bank isms 3 s
Solve the exercise in security management.pdf
Principles of information security Chapter 5.ppt
Chapter 7 Managing Secure System.pdf

Similar to Security Manager - Slides - Module 4 Powerpoint Presentation (20)

PPTX
Certified Banking Security C-Suite - Module 4.pptx
PPTX
D1 security and risk management v1.62
ODT
Ch.5 rq (1)
PPTX
Cybersecurity Risk Management Program and Your Organization
PPTX
L1_Introduction.pptx
DOCX
Risk Assessment Famework
PPT
Lesson 2 - System Specific Policy
PPT
Gs Us Roadmap For A World Class Information Security Management System– Isoie...
DOCX
There are two general types of data dictionaries a database manag
PDF
Security Level Analysis of Academic Information Systems Based on Standard ISO...
PPTX
Governance and management of IT.pptx
PDF
Applying Lean for information security operations centre
PPT
Security policy and standards
PPTX
implementation_of_a_risk-based_process_safety_management_system_framework.pptx
PPT
Chapter 5
PPTX
20220911-ISO27000-SecurityStandards.pptx
PDF
GDPR compliance and information security: Reducing data breach risks
PDF
Chapter 10 security standart
DOCX
CHAPTER 6INFORMATION GOVERNANCEInformation Governance Po.docx
Certified Banking Security C-Suite - Module 4.pptx
D1 security and risk management v1.62
Ch.5 rq (1)
Cybersecurity Risk Management Program and Your Organization
L1_Introduction.pptx
Risk Assessment Famework
Lesson 2 - System Specific Policy
Gs Us Roadmap For A World Class Information Security Management System– Isoie...
There are two general types of data dictionaries a database manag
Security Level Analysis of Academic Information Systems Based on Standard ISO...
Governance and management of IT.pptx
Applying Lean for information security operations centre
Security policy and standards
implementation_of_a_risk-based_process_safety_management_system_framework.pptx
Chapter 5
20220911-ISO27000-SecurityStandards.pptx
GDPR compliance and information security: Reducing data breach risks
Chapter 10 security standart
CHAPTER 6INFORMATION GOVERNANCEInformation Governance Po.docx
Ad

More from trevor501353 (20)

PPT
Security Manager - Slides - Module 10.ppt
PPTX
Certified Banking Data Privacy Law and Regulation - Module 9.pptx
PPT
Security Manager - Slides - Module 8.ppt
PPTX
Certified Banking Data Privacy Law and Regulation - Module 7.pptx
PPT
Security Manager - Slides - Module 6.ppt
PPTX
Certified Banking Data Privacy Law and Regulation - Module 5.pptx
PPTX
Certified Banking Data Privacy Law and Regulation - Module 4.pptx
PPTX
Certified Banking Data Privacy Law and Regulation - Module 3.pptx
PPT
Security Manager - Slides - Module 2.ppt
PPTX
Certified Banking Data Privacy Law and Regulation - Module 1.pptx
PPTX
Board Cyber - Level 3 - Module 4.pptx
PPTX
Board Cyber - Level 3 - Module 3.pptx
PPTX
Board Cyber - Level 3 - Module 2.pptx
PPTX
Board Cyber - Level 3 - Module 1.pptx
PPTX
Board Cyber - Level 2 - Module 4.pptx
PPTX
Board Cyber - Level 2 - Module 3.pptx
PPTX
Board Cyber - Level 2 - Module 2.pptx
PPTX
Board Cyber - Level 2 - Module 1.pptx
PPTX
Cyber Frontline - Level 3 - Module 4.pptx
PPTX
Cyber Frontline - Level 3 - Module 2.pptx
Security Manager - Slides - Module 10.ppt
Certified Banking Data Privacy Law and Regulation - Module 9.pptx
Security Manager - Slides - Module 8.ppt
Certified Banking Data Privacy Law and Regulation - Module 7.pptx
Security Manager - Slides - Module 6.ppt
Certified Banking Data Privacy Law and Regulation - Module 5.pptx
Certified Banking Data Privacy Law and Regulation - Module 4.pptx
Certified Banking Data Privacy Law and Regulation - Module 3.pptx
Security Manager - Slides - Module 2.ppt
Certified Banking Data Privacy Law and Regulation - Module 1.pptx
Board Cyber - Level 3 - Module 4.pptx
Board Cyber - Level 3 - Module 3.pptx
Board Cyber - Level 3 - Module 2.pptx
Board Cyber - Level 3 - Module 1.pptx
Board Cyber - Level 2 - Module 4.pptx
Board Cyber - Level 2 - Module 3.pptx
Board Cyber - Level 2 - Module 2.pptx
Board Cyber - Level 2 - Module 1.pptx
Cyber Frontline - Level 3 - Module 4.pptx
Cyber Frontline - Level 3 - Module 2.pptx
Ad

Recently uploaded (20)

PPTX
Concluding Session_Wrapup-NA May 5 2024-Oct 10 2025 ZS.pptx
PPTX
Empowering Project Management Through Servant Leadership - PMI UK.pptx
PDF
ORGANIZATIONAL communication -concepts and importance._20250806_112132_0000.pdf
PPTX
Effective_communication._(strategy).pptx
PDF
CISSP Domain 6: Security Assessment and Testing
PPTX
Human Resource Management | Introduction,Meaning and Definition
PDF
MANAGEMENT LESSONS FROM ANCIENT KNOWLEDGE SYSTEM-ARTHASHASTRA AND THIRUKKURAL...
PDF
1_Corporate Goverance presentation topic
PDF
The Cyber SwarmShield by Stéphane Nappo
PPTX
Project Management Methods PERT-and-CPM.pptx
PDF
Organisational Behaviour And it's concepts
PPTX
Hutt_Speh_Chapter2_Organizational_Buying.pptx
PDF
Human resources management is a best management
PPTX
2. CYCLE OF FUNCTIONING RIFLE -PP Presentation..pptx
PDF
How does risk management integrate with project control?
PDF
Timeless Leadership Principles from History’s Greatest Figures by Alfonso Ken...
PPTX
Chapter One an overview of political economy
PPTX
Course Overview of the Course Titled.pptx
PDF
The Plan: Save the Palestinian Nation Now
PDF
Contemporary management and it's content
Concluding Session_Wrapup-NA May 5 2024-Oct 10 2025 ZS.pptx
Empowering Project Management Through Servant Leadership - PMI UK.pptx
ORGANIZATIONAL communication -concepts and importance._20250806_112132_0000.pdf
Effective_communication._(strategy).pptx
CISSP Domain 6: Security Assessment and Testing
Human Resource Management | Introduction,Meaning and Definition
MANAGEMENT LESSONS FROM ANCIENT KNOWLEDGE SYSTEM-ARTHASHASTRA AND THIRUKKURAL...
1_Corporate Goverance presentation topic
The Cyber SwarmShield by Stéphane Nappo
Project Management Methods PERT-and-CPM.pptx
Organisational Behaviour And it's concepts
Hutt_Speh_Chapter2_Organizational_Buying.pptx
Human resources management is a best management
2. CYCLE OF FUNCTIONING RIFLE -PP Presentation..pptx
How does risk management integrate with project control?
Timeless Leadership Principles from History’s Greatest Figures by Alfonso Ken...
Chapter One an overview of political economy
Course Overview of the Course Titled.pptx
The Plan: Save the Palestinian Nation Now
Contemporary management and it's content

Security Manager - Slides - Module 4 Powerpoint Presentation

  • 1. Information Security Management Certification Dr. Kevin F. Streff Founder and Managing Partner 605.270.4427 kevin.streff@americansecurityandprivacy.com 1
  • 2. Agenda 1. Overview 2. Laws & Regulations 3. IT Exam Process 4. Information Security Programs 5. Risk Management 6. Threats 7. Third Party Management 8. SETA Programs 9.Incident Response Programs 10.Business Continuity Programs 11. Documentation 12. Auditing 13. Metrics Information Security Management Certification 2
  • 4. Learning Objectives • Understand Security Maturity Model • Understand Linking Business Strategy to Security Program • Understand Information Security Program Options • Understand ASP Information Security Program Option 4
  • 5. SP-CMM Security & Privacy Maturity Model • SP-CMM is an acronym for Security & Privacy Capability Maturity Model. Maintained by the Secure Controls Framework Council, this framework seeks to help organizations in the establishment and evaluation of their security and security controls. 5
  • 6. SP-CMM Security & Security Maturity Model • On a high-level, it has three primary objectives: • Provide C-level executives with a well-defined criterion for setting the expectations for an organization’s cybersecurity and security program; • Provide internal security teams with a well- defined criterion for planning and implementing security practices; and • Provide a baseline criterion for organizations to evaluate third-party service providers. 6
  • 7. Security Tied to Strategy 7
  • 8. 8
  • 9. Leading Security Frameworks 1. NIST Security Framework 2. OASIS Security Framework 3. APEC Security Framework 4. Nymity Security Management Accountability Framework 5. HITRUST Security Framework 6. STREFF Security Framework 7. American Security and Privacy (ASP) Information Security Framework (ISP) 9
  • 11. Oasis Security Framework • The International Open Standards Consortium (OASIS) was founded under the name "SGML Open" in 1993. • The consortium changed its name to "OASIS" (Organization for the Advancement of Structured Information Standards) in 1998 to reflect an expanded scope of technical work. • Later renamed to the International Open Standards Consortium, announcements about creating security frameworks emerged (The OASIS PMRM TC) that to assist business process engineers, IT analysts, architects, and developers implement security and security policies in their operations. • PMRM extends broad security policies, as most policies describe fair information practices and principles but offer little understanding into how to operationalize or implement these practices. 11
  • 12. Oasis Security Framework • PMRM includes two phases: Use Case and High-Level Analysis. • The first phase entails the scoping of the Use Case in which data is associated. • This includes drafting a complete description of the environment following the definitions of “business environment” or “application” as established by the Stakeholders using the PMRM within a particular Use Case. • The second phase is the analysis phase. • This high-level analysis likely includes Security Impact Assessments, previous security and security risk assessments, security maturity assessments, compliance reviews, and security audits. • PMRM can be used to examine an entire business environment to develop Policies, Security Controls, Services and Functions, Mechanisms, or a Security Architecture. 12
  • 13. APEC Security Framework 1. Asian-Pacific Framework 2. Set of principles and implementation guidelines that were created in order to establish effective security protections that avoid barriers to information flows, and ensure continued trade and economic growth in the Asia Pacific Economic Cooperation region of 27 countries. • The APEC Security Framework set in motion the process of creating the APEC Cross-Border Security Rules system. • The CBPR system has now been formally joined by the United States, Canada, Japan and Mexico, 1. The APEC CBPR system requires participating businesses like Apple, Box, HP, IBM, Lynda.com, Merck, Rimini Street, Workday, and Intasect to develop and implement Information Security policies consistent with the APEC Security Framework. These policies and practices must be assessed as compliant with the minimum program requirements of the APEC CBPR system by an accountability agent 13
  • 14. Nymity Security Framework 1. Maintain Governance Structure 2. Maintain Personal Data Inventory and Data Transfer Mechanisms 3. Maintain Internal Information Security Policy 4. Embed Information Security into Operations 5. Maintain Training and Awareness Program 6. Manage Information Security 7. Manage Third Party Risk 8. Maintain Notices 9. Respond to Requests and Complaints from Individuals 10. Monitor for New Operational Policies 11. Maintain Information Security Breach Management Program 12. Monitor Data Handling Practices 13. Track External Criteria 14
  • 15. HITRUST Security Framework • Founded in 2007, Health Information Trust Alliance (HITRUST) was launched with the idea that information protection should be a core pillar of the broad adoption of health information systems. • HITRUST brought together public and private healthcare professionals to develop a common risk and compliance management framework. • In 2015, HITRUST announced that their security framework was updated with security controls. • Over 84 percent of hospitals and health plans, as well as many other healthcare organizations and business associates, use the CSF, making it the most widely adopted security framework in the industry. • CSF – Common Security and Security Framework 15
  • 16. • The CSF contains 14 control categories, comprised of 49 control objectives and 156 control specifications. • The CSF control categories, accompanied with their respective number of control objectives and control specifications for each category, are: – 0. Information Security Management Program (1, 1) – 1. Access Control (7, 25) – 2. Human Resources Security (4, 9) – 3. Risk Management (1, 4) – 4. Security Policy (1, 2) – 5. Organization of Information Security (2, 11) – 6. Compliance (3, 10) – 7. Asset Management (2, 5) – 8. Physical and Environmental Security (2, 13) – 9. Communications and Operations Management (10, 32) – 10. Information Systems Acquisition, Development, and Maintenance (6, 13) – 11. Information Security Incident Management (2, 5) – 12. Business Continuity Management (1, 5) – 13. Security Practices (7, 21) HITRUST Security Framework 16
  • 17. Information Security Program Blueprint Inventories Policies Procedures Standards Guidelines Plans Audit/Test Results Reports SARS Meeting Minutes Committee Approvals Previous Exams Awareness/Training Materials Third Party Reports Network Diagram Organizational Chart Process Flows Incident Reports Strategies Budgets Memos FI Processes Documentation Asset Mgmt. Physical Security Business Continuity Incident Response Developmen t & Acquisition Operations Security Risk Mgmt. Network Security Auditing Functions Personnel Security Reporting Remediation Assessment Changes Audit Recommendations Exam Findings Incident Reports Policy Changes Board Committee Operations Third Party Examiner FI and Technology Strategy ASP ISP v1.1 IT Audit Soc. Eng. Pen Test Vul. Scanning Third Party Mgmt. Soft. Dev. Customer Employee Systems Inventory Technology BIA AUP Roles & Resp.