Information Security Management: Developing The Security Program
Information Security Management: Developing The Security Program
Information Security Management: Developing The Security Program
Chapter 5
Developing the Security Program
Webster University
Scott Granneman
“We trained hard ... but every time
we formed up teams
we would be reorganized.
I was to learn that
we meet any new situation
by reorganizing.
And a wonderful method it can be
for creating the illusion of progress
while producing confusion, inefficiency,
and demoralization.”
more ...
List & describe
the typical job titles & functions
performed in the infosec program
Organizational culture
Size
Tend to spend
proportionally less on security
One approach to security
in large organizations
separates functions into 4 areas:
1. Functions performed by
non-technology business units outside IT
2. Functions performed by
IT groups outside of infosec area
3. Functions performed
within infosec dep’t as customer service
4. Functions performed
within the infosec dep’t as compliance
Remains CISO’s responsibility
to see that infosec functions
are adequately performed
somewhere within the organization
Deployment of full-time security personnel
depends on a number of factors,
including sensitivity of info to be protected,
industry regulations,
& general profitability
The more money
a company can dedicate
to its personnel budget,
the more likely it is
to maintain a large infosec staff
Medium-sized organizations
of 100-1,000 computers ...
Medium-sized organizations
tend to ignore some security functions
Small organizations of 10-100 computers
have simple, centralized
IT organizational model
more ...
Such organizations frequently
have little in the way
of formal policy, planning, or measures
more ...
Policies are often issue-specific
Formal planning
is often part of IT planning
The challenge
is to design a reporting structure
for the InfoSec program
that balances the needs
of each of the communities of interest
Other options:
Builders
the real techies
create & install security solutions
Administrators
operate & administrate security tools
& the security monitoring function
work to continuously improve processes
Typical organization
has a number of individuals
with infosec responsibilities
2. Enable organization
to hold employees accountable
for their actions
SETA program consists of three elements:
1. security education
2. security training
3. security awareness
The purpose of SETA
is to enhance security ...
By improving awareness
of the need to protect system resources
Comparative SETA Framework
Security training involves
providing detailed information
& hands-on instruction
to give skills to users
to perform their duties securely
Two methods for customizing training
1. Functional background
General user
Managerial user
Technical user
2. Skill level
Novice
Intermediate
Advanced
Using wrong training methods can:
Other factors,
like budget, scheduling,
& organization’s needs
often come first
Training delivery methods:
One-on-One
Formal Class
On-the-Job Training
Self-Study (Noncomputerized)
Where can you find trainers?
In-house training
using organization’s own employees
While each organization
develops its own strategy,
the following 7-step methodology
generally applies:
remind users
of the procedures to be followed
SETA best practices
Focus on people
more ...
Don’t overload the users
Take advantage
of in-house communications media
I. InfoSec is a people,
rather than a technical, issue
more ...
VI. Make your point, support it, & conclude it
X. Always be timely,
even if it means slipping schedules
to include urgent information
Security awareness & security training
are designed to modify
any employee behavior
that endangers the security
of the organization’s information
Videos
Posters & banners
Lectures & conferences
Computer-based training
Newsletters
Brochures & flyers
Trinkets (coffee cups, pens, pencils, T-shirts)
Bulletin boards
Security newsletter is
a cost-effective way
to disseminate security information
How-to’s
Security poster series
can be a simple & inexpensive way
to keep security on people’s minds
Professional posters
can be quite expensive,
so in-house development
may be best solution
Keys to a good poster series:
Providing information
on reporting violations
I like some other posters better.
(see www.despair.com)
Trinkets may not
cost much on a per-unit basis,
but they can be expensive
to distribute throughout an organization
Plan ahead
Seek feedback
Implementing Security
Education, Training, & Awareness Programs
Thank you!
Scott Granneman