Are We Ready for a Chief Information Security Officer-.ppt
《Are We Ready for a Chief Information Security Officer-.ppt》由会员分享,可在线阅读,更多相关《Are We Ready for a Chief Information Security Officer-.ppt(47页珍藏版)》请在麦多课文档分享上搜索。
1、Are We Ready for a Chief Information Security Officer?,Jack McCoy, Ed.D., MBA, CISM Information Security Officer East Carolina University,The Challenges and Evolution of the Campus IT Security Officer,November 9, 2005,Jack McCoy, East Carolina University,The Security Officer Alphabet,ISO Information
2、 Security Officer Often an “IT” Security Officer Designated official, dedicated to information security CISO Chief Information Security Officer “C” level executive, a strategic business partner CSO Chief Security Officer Corporate security, a convergence of information, asset, and physical security,
3、The Challenges of the Campus ISO,November 9, 2005,Jack McCoy, East Carolina University,The Environment: The Institution of Higher Education,A shaky track record for protecting information A culture of shared governance A penchant for distributed computing A desire for free and unfettered exchange of
4、 information across organizational boundaries,. . . in essence a formidable environment for those with campus responsibility for information security,November 9, 2005,Jack McCoy, East Carolina University,The Organization: University Accountability,Resistance to corporate type controls may arise beca
5、use a university is “not a business” Regardless of the culture or inherent challenges a university will be held accountable, just as any other organization (e.g., bank or and retailer) Accountability must trickle down to internal departments, groups, and individuals,November 9, 2005,Jack McCoy, East
6、 Carolina University,The Organization: University Accountability (cont),Challenges arise when the university community: Is not aware of risks to information and potential impacts to the university and its stakeholders Does not believe that the threats are realistic Thinks that someone in another bui
7、lding is taking care of the “security problem” for them Believes that other job duties and responsibilities always take priority over security,November 9, 2005,Jack McCoy, East Carolina University,The Strategic Challenges: Issues Likely to be Encountered,“IT” versus “Information” Security Security:
8、“technical” vs. “business” issue Executive awareness and involvement Governance structures and processes Evolving roles and skill sets of the ISO,The Evolving Role of the Campus ISO,November 9, 2005,Jack McCoy, East Carolina University,The Relationship of InfoSecurity Maturity, Structure, and Roles,
9、InfoSecurity Organizational Maturity,InfoSecurity Functions and Org Structure,ISO Roles, Responsibilities, and Authority,November 9, 2005,Jack McCoy, East Carolina University,Gartners InfoSecurity Maturity Model,Blissful Ignorance Awareness Correction Operational Excellence(Scholtz & Byrnes, 2005),O
10、rganizations and their security programs evolve through four phases of maturity:,November 9, 2005,Jack McCoy, East Carolina University,InfoSec Maturity - Blissful Ignorance,Extensive, but outdated policies Inadequate user awareness Breaches not reported Prevailing belief that the enterprise is secur
11、e No effective communication between the IT security function and business functions (Scholtz & Byrnes, 2005),November 9, 2005,Jack McCoy, East Carolina University,InfoSec Maturity - Awareness,An event leads to a sudden awareness that “something must be done” about security (Re)establishment of dedi
12、cated security team Efforts focus on policy review and update Some organizations assume policy is sufficient and regress to blissful ignorance phase Others develop security vision and strategy (Scholtz & Byrnes, 2005, p. 4),November 9, 2005,Jack McCoy, East Carolina University,InfoSec Maturity - Cor
13、rective,Strategic program launched, based on information security vision and strategy Security, risk, governance processes revamped New policies derived from business needs Corrective actions prioritized and funded Progress toward goals measured and reported through business and governance channels
14、(Scholtz & Byrnes, 2005),November 9, 2005,Jack McCoy, East Carolina University,InfoSec Maturity Operational Excellence,Information security “embedded into the culture of the organization” Security is driven by business processes Program metrics emphasize continuous improvement The organization under
15、stands and accepts residual risks (Scholtz & Byrnes, 2005, p. 4),November 9, 2005,Jack McCoy, East Carolina University,A Gartner Recommendation,Organizations must be aware of and understand the evolving maturity of their security programs.(Scholtz & Byrnes, 2005),November 9, 2005,Jack McCoy, East Ca
16、rolina University,Information Security Functional Structures,An organizations security function depends on its size, business, culture, regulatory requirements Functional structure types: Technical Technical / Management Management (Kobus, 2005),November 9, 2005,Jack McCoy, East Carolina University,
17、“Technical” Information Security Structure,No formal security function Security responsibilities assigned to technicians in IT operational areas Networking Operations Development Reports to IT infrastructure or operational area (Kobus, 2005),November 9, 2005,Jack McCoy, East Carolina University,Aspe
18、cts of a Technical ISO Role,Relegated to a purely technical role, e.g., “firewall jockey” Often has few resources and little authority The reason for hiring a ISO may be to address a regulation, audit, or other requirement or to “sit on the bomb” (Berinato, 2004),November 9, 2005,Jack McCoy, East Ca
19、rolina University,The “Technician” ISO,* Security functions in blue. The designated ISO may reside in any of these areas.,CIO,Network,Systems,App. Dev.,System Adm, Sys Prog, Acct Mgmt,Firewall, Router, IPS Admin,Application Programmer, Developer,November 9, 2005,Jack McCoy, East Carolina University,
20、“Technical / Management” Information Security Structure,Designated security team Responsibilities cover range of issues: Technical Management Strategic enterprise Reports to an operational manager (Kobus, 2005),November 9, 2005,Jack McCoy, East Carolina University,The “Security Coordinator” ISO,CIO,
21、Network,Systems,App Dev,Firewall, Router, IPS Admin,System Admin, Sys Prog,Application Programmer, Developer,ISO,Acct Mgmt, IT Policy, Awareness,November 9, 2005,Jack McCoy, East Carolina University,“Management” Information Security Structure,Designated security team Responsibilities include: Enterp
22、rise oversight of security programs Security governance processes Technical security responsibilities shift back to IT operations Information security may report outside of IT (Kobus, 2005),November 9, 2005,Jack McCoy, East Carolina University,The “Management Advisor” ISO,CIO,Network,Systems,App Dev
23、,Governance, Risk Mgmt, Corp Policy,Security Council,ISO,App Programmer, Developer,Firewall, Router, IPS Admin,System Admin, Sys Prog,November 9, 2005,Jack McCoy, East Carolina University,The “Strategic Business Partner” ISO,CIO,Operational Directors,Acct Mgt, IT Policy, Projects,Security Council,IS
24、O (Bus. Unit),Technical security,CFO, COO, RMO,CISO,Governance, Risk Mgmt, Corp Policy,November 9, 2005,Jack McCoy, East Carolina University,More than One ISO?,Organizations are creating two security positions: CISO bridges the gap between business process and policy directives, and technical securi
25、ty BISO business unit (e.g., IT) representative, implements process & policy directives CISO consults with business units on implementation of policy and process directives CISO advises senior executives on the management of risks brought about by the use of technology (Witty, 2001),November 9, 2005
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
2000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- AREWEREADYFORACHIEFINFORMATIONSECURITYOFFICERPPT

链接地址:http://www.mydoc123.com/p-378558.html