Information Security Governance Simplified

Book description

Security practitioners must be able to build a cost-effective security program while at the same time meet the requirements of government regulations. This book lays out these regulations in simple terms and explains how to use the control frameworks to build an effective information security program and governance structure. It discusses how organizations can best ensure that the information is protected and examines all positions from the board of directors to the end user, delineating the role each plays in protecting the security of the organization.

Table of contents

  1. Cover
  2. Half Title
  3. Title Page
  4. Copyright Page
  5. Dedication
  6. Table of Contents
  7. Foreword
  8. Acknowledgments
  9. Introduction
  10. About the Author
  11. Chapter 1 Getting Information Security Right: Top to Bottom
    1. Information Security Governance
    2. Tone at the Top
    3. Tone at the Bottom
    4. Governance, Risk, and Compliance (GRC)
    5. The Compliance Dilemma
    6. Suggested Reading
  12. Chapter 2 Developing Information Security Strategy
    1. Evolution of Information Security
    2. Organization Historical Perspective
      1. Fear, Uncertainty, Doubt, Fear, Uncertainty, Doubt
    3. Understand the External Environment
      1. Regulatory
      2. Competition
      3. Emerging Threats
      4. Technology Cost Changes
      5. External Independent Research
    4. The Internal Company Culture
      1. Risk Appetite
      2. Speed
      3. Collaborative versus Authoritative
      4. Trust Level
      5. Growth Seeker or Cost Cutter
      6. Company Size
      7. Outsourcing Posture
    5. Prior Security Incidents, Audits
    6. Security Strategy Development Techniques
      1. Mind Mapping
      2. SWOT Analysis
      3. Balanced Scorecard
      4. Face-to-Face Interviews
    7. Security Planning
      1. Strategic
      2. Tactical
      3. Operational/Project Plans
    8. Suggested Reading
  13. Chapter 3 Defining the Security Management Organization
    1. History of the Security Leadership Role Is Relevant
    2. The New Security Officer Mandate
    3. Day 1: Hey, I Got the Job!
    4. Security Leader Titles
    5. Techie versus Leader
    6. The Security Leaders Library
    7. Security Leadership Defined
    8. Security Leader Soft Skills
    9. Seven Competencies for Effective Security Leadership
    10. Security Functions
      1. Learning from Leading Organizations
        1. Assess Risk and Determine Needs
        2. Implement Policies and Controls
        3. Promote Awareness
        4. Monitor and Evaluate
        5. Central Management
      2. What Functions Should the Security Officer Be Responsible For?
      3. Assessing Risk and Determining Needs Functions
        1. Risk Assessment/Analysis
        2. Systems Security Plan Development
        3. External Penetration Testing
      4. Implement Policies and Control Functions
        1. Security Policy Development
        2. Security Architecture
        3. Security Control Assessment
        4. Identity and Access Management
        5. Business Continuity and Disaster Recovery
      5. Promote Awareness Functions
        1. End User Security Awareness Training
        2. Intranet Site and Policy Publication
        3. Targeted Awareness
      6. Monitor and Evaluate Functions
        1. Security Baseline Configuration Review
        2. Logging and Monitoring
        3. Vulnerability Assessment
        4. Internet Monitoring/Management of Managed Services
        5. Incident Response
        6. Forensic Investigations
        7. Central Management Functions
      7. Reporting Model
        1. Business Relationships
        2. Reporting to the CEO
        3. Reporting to the Information Systems Department
        4. Reporting to Corporate Security
        5. Reporting to the Administrative Services Department
        6. Reporting to the Insurance and Risk Management Department
        7. Reporting to the Internal Audit Department
        8. Reporting to the Legal Department
        9. Determining the Best Fit
    11. Suggested Reading
  14. Chapter 4 Interacting with the C-Suite
    1. Communication between the CEO, CIO, Other Executives, and CISO
    2. 13 “Lucky” Questions to Ask One Another
      1. The CEO, Ultimate Decision Maker
      2. The CEO Needs to Know Why
      3. The CIO, Where Technology Meets the Business
      4. CIO’s Commitment to Security Is Important
      5. The Security Officer, Protecting the Business
      6. The CEO, CIO, and CISO Are Business Partners
    3. Building Grassroots Support through an Information Security Council
      1. Establishing the Security Council
        1. Oversight of Security Program
        2. Decide on Project Initiatives
        3. Prioritize Information Security Efforts
        4. Review and Recommend Security Policies
        5. Champion Organizational Security Efforts
        6. Recommend Areas Requiring Investment
      2. Appropriate Security Council Representation
      3. “-Inging” the Council: Forming, Storming, Norming, and Performing
        1. Forming
        2. Storming
        3. Norming
        4. Performing
      4. Integration with Other Committees
      5. Establish Early, Incremental Success
      6. Let Go of Perfectionism
      7. Sustaining the Security Council
      8. End User Awareness
      9. Security Council Commitment
    4. Suggested Reading
  15. Chapter 5 Managing Risk to an Acceptable Level
    1. Risk in Our Daily Lives
    2. Accepting Organizational Risk
    3. Just Another Set of Risks
    4. Management Owns the Risk Decision
    5. Qualitative versus Quantitative Risk Analysis
    6. Risk Management Process
      1. Risk Analysis Involvement
      2. Step 1: Categorize the System
      3. Step 2: Identify Potential Dangers (Threats)
        1. Human Threats
        2. Environmental/Physical Threats
        3. Technical Threats
      4. Step 3: Identify Vulnerabilities That Could Be Exploited
      5. Step 4: Identify Existing Controls
      6. Step 5: Determine Exploitation Likelihood Given Existing Controls
      7. Step 6: Determine Impact Severity
      8. Step 7: Determine Risk Level
      9. Step 8: Determine Additional Controls
    7. Risk Mitigation Options
      1. Risk Assumption
      2. Risk Avoidance
      3. Risk Limitation
      4. Risk Planning
      5. Risk Research
      6. Risk Transference
    8. Conclusion
    9. Suggested Reading
  16. Chapter 6 Creating Effective Information Security Policies
    1. Why Information Security Policies Are Important
    2. Avoiding Shelfware
    3. Electronic Policy Distribution
    4. Canned Security Policies
    5. Policies, Standards, Guidelines Definitions
      1. Policies Are Written at a High Level
      2. Policies
      3. Security Policy Best Practices
      4. Types of Security Policies
      5. Standards
      6. Procedures
      7. Baselines
      8. Guidelines
      9. Combination of Policies, Standards, Baselines, Procedures, and Guidelines
        1. Policy Analogy
    6. An Approach for Developing Information Security Policies
    7. Utilizing the Security Council for Policies
    8. The Policy Review Process
      1. Information Security Policy Process
    9. Suggested Reading
  17. Chapter 7 Security Compliance Using Control Frameworks
    1. Security Control Frameworks Defined
    2. Security Control Frameworks and Standards Examples
      1. Heath Insurance Portability and Accountability Act (HIPAA)
      2. Federal Information Security Management Act of 2002 (FISMA)
      3. National Institute of Standards and Technology (NIST) Recommended Security Controls for Federal Information Systems (800-53)
      4. Federal Information System Controls Audit Manual (FISCAM)
      5. ISO/IEC 27001:2005 Information Security Management Systems—Requirements
      6. ISO/IEC 27002:2005 Information Technology—Security Techniques—Code of Practice for Information Security Management
      7. Control Objectives for Information and Related Technology (COBIT)
      8. Payment Card Industry Data Security Standard (PCI DSS)
      9. Information Technology Infrastructure Library (ITIL)
      10. Security Technical Implementation Guides (STIGs) and National Security Agency (NSA) Guides
      11. Federal Financial Institutions Examination Council (FFIEC) IT Examination Handbook
    3. The World Operates on Standards
    4. Standards Are Dynamic
    5. The How Is Typically Left Up to Us
    6. Key Question: Why Does the Standard Exist?
    7. Compliance Is Not Security, But It Is a Good Start
    8. Integration of Standards and Control Frameworks
    9. Auditing Compliance
    10. Adoption Rate of Various Standards
      1. ISO 27001/2 Certification
      2. NIST Certification
    11. Control Framework Convergence
    12. The 11-Factor Compliance Assurance Manifesto
    13. The Standards/Framework Value Proposition
    14. Suggested Reading
  18. Chapter 8 Managerial Controls: Practical Security Considerations
    1. Security Control Convergence
    2. Security Control Methodology
    3. Security Assessment and Authorization Controls
    4. Planning Controls
    5. Risk Assessment Controls
    6. System and Services Acquisition Controls
    7. Program Management Controls
    8. Suggested Reading
  19. Chapter 9 Technical Controls: Practical Security Considerations
    1. Access Control Controls
    2. Audit and Accountability Controls
    3. Identification and Authentication
    4. System and Communications Protections
    5. Suggested Reading
  20. Chapter 10 Operational Controls: Practical Security Considerations
    1. Awareness and Training Controls
    2. Configuration Management Controls
    3. Contingency Planning Controls
    4. Incident Response Controls
    5. Maintenance Controls
    6. Media Protection Controls
    7. Physical and Environmental Protection Controls
    8. Personnel Security Controls
    9. System and Information Integrity Controls
    10. Suggested Reading
  21. Chapter 11 The Auditors Have Arrived, Now What?
    1. Anatomy of an Audit
    2. Audit Planning Phase
      1. Preparation of Document Request List
      2. Gather Audit Artifacts
      3. Provide Information to Auditors
    3. On-Site Arrival Phase
      1. Internet Access
      2. Reserve Conference Rooms
      3. Physical Access
      4. Conference Phones
      5. Schedule Entrance, Exit, Status Meetings
      6. Set Up Interviews
    4. Audit Execution Phase
      1. Additional Audit Meetings
      2. Establish Auditor Communication Protocol
      3. Establish Internal Company Protocol
      4. Media Handling
      5. Audit Coordinator Quality Review
      6. The Interview Itself
    5. Entrance, Exit, and Status Conferences
      1. Entrance Meeting
      2. Exit Meeting
      3. Status Meetings
    6. Report Issuance and Finding Remediation Phase
    7. Suggested Reading
  22. Chapter 12 Effective Security Communications
    1. Why a Chapter Dedicated to Security Communications?
    2. End User Security Awareness Training
      1. Awareness Definition
    3. Delivering the Message
      1. Step 1: Security Awareness Needs Assessment
        1. New or Changed Policies
        2. Past Security Incidents
        3. Systems Security Plans
        4. Audit Findings and Recommendations
        5. Event Analysis
        6. Industry Trends
        7. Management Concerns
        8. Organizational Changes
      2. Step 2: Program Design
        1. Target Audience
        2. Frequency of Sessions
        3. Number of Users
        4. Method of Delivery
        5. Resources Required
      3. Step 3: Develop Scope
        1. Determine Participants Needing Training
        2. Business Units
        3. Select Theme
      4. Step 4: Content Development
      5. Step 5: Communication and Logistics Plan
      6. Step 6: Awareness Delivery
      7. Step 7: Evaluation/Feedback Loops
    4. Security Awareness Training Does Not Have to Be Boring
      1. Targeted Security Training
      2. Continuous Security Reminders
      3. Utilize Multiple Security Awareness Vehicles
    5. Security Officer Communication Skills
      1. Talking versus Listening
      2. Roadblocks to Effective Listening
      3. Generating a Clear Message
      4. Influencing and Negotiating Skills
      5. Written Communication Skills
      6. Presentation Skills
    6. Applying Personality Type to Security Communications
      1. The Four Myers-Briggs Type Indicator (MBTI) Preference Scales
        1. Extraversion versus Introversion Scale
        2. Sensing versus Intuition Scale
        3. Thinking versus Feeling Scale
        4. Judging versus Perceiving Scale
      2. Determining Individual MBTI Personality
      3. Summing Up the MBTI for Security
    7. Suggested Reading
  23. Chapter 13 The Law and Information Security
    1. Civil Law versus Criminal Law
    2. Electronic Communications Privacy Act of 1986 (ECPA)
    3. The Computer Security Act of 1987
    4. The Privacy Act of 1974
    5. Sarbanes–Oxley Act of 2002 (SOX)
    6. Gramm–Leach–Bliley Act (GLBA)
    7. Health Insurance Portability and Accountability Act of 1996
    8. Health Information Technology for Economic and Clinical Health (HITECH) Act
    9. Federal Information Security Management Act of 2002 (FISMA)
    10. Summary
    11. Suggested Reading
  24. Chapter 14 Learning from Information Security Incidents
    1. Recent Security Incidents
      1. Texas State Comptroller
      2. Sony PlayStation Network
      3. Student Loan Social Security Numbers Stolen
      4. Social Security Numbers Printed on Outside of Envelopes
      5. Valid E-Mail Addresses Exposed
      6. Office Copier Hard Disk Contained Confidential Information
      7. Advanced Persistent Threat Targets Security Token
    2. Who Will Be Next?
    3. Every Control Could Result in an Incident
    4. Suggested Reading
  25. Chapter 15 17 Ways to Dismantle Information Security Governance Efforts
    1. Final Thoughts
    2. Suggested Reading
  26. Index

Product information

  • Title: Information Security Governance Simplified
  • Author(s): Todd Fitzgerald
  • Release date: April 2016
  • Publisher(s): CRC Press
  • ISBN: 9781466551282