01. Information Security Strategy Development Flashcards
Information Security Strategy Development
What is a strategy
the plan to achieve and objective
The path you have outlined to get from current state to strategic objective
From where you are to where you want to be
63
Information Security Strategy Development
Strategic objectives:
The desired state, and the strategy to get there, must be in alignment with the organisation and its strategy and objectives
Business Alignment
63
Information Security Strategy Development
Strategic objectives:
An organisations information security program implicitly drives an organisation toward a specific level of risk, which may or may not align with the organisations true level of risk appetite
Risk Appetite Alignment
63
Information Security Strategy Development
Strategic objectives:
A security program must include a risk management policy, processes, and procedures. Without this, decisions are made blindly without regard to their consequences
Effective Risk Management
63
Information Security Strategy Development
Strategic objectives:
The desired state of the security program should include a focus on continual improvement and increasing efficiency. The budget is not limitless
Value Delivery
Information Security Strategy Development
Strategic objectives:
Strategic goals should efficiently utilize available resources i.e. only having the neccessary staff to meet the strategic objectives
Resource Optimization
64
Information Security Strategy Development
Strategic objectives:
It is important for stategic objectives to be SMART (Specific, Measurable, Achievable, Relevant, Time-related) and measurable, giving management an opportunity to drive continual improvement
Performance Measurement
64
Information Security Strategy Development
Strategic objectives:
An effective strategy will work to break down silos of separate assurance processes and consolidate assurace processes, reducing hidden risk
Assurance Process Integration
64
Information Security Strategy Development
A strategy is a means to achieve an objective. The strategy in itself will have objectives. 7 objectives of an information security strategy
- Business Alignment
- Risk Appetite Alignment
- Effective Risk Management
- Value Devliery
- Resource Optimization
- Performance measurement
- Assurance Process Integration
64
Information Security Strategy Development
Strategy Participants:
Explicitly responsible for establishing risk appetite and should have a clear understanding of the level of risk they desire for the organisation
Board of Directors
64
Information Security Strategy Development
Strategy Participants:
Personnel responsible for corporate governance. They impart decisions and attitudes about risk
Executive Management
65
Information Security Strategy Development
Strategy Participants:
Must be an effective communicator and must be able to sell the strategy to business leaders. They must be able to effectively get the executives and board members onboard or else the strategy has little chance of succeeding
Security Leader
65
Information Security Strategy Development
Strategy Participants:
Must be able to collaborate with one another and with others in the organisation to contribute to the development of strategy details. Must be able to;
1. identify specialities in information security
2. recognize essential improvement areas
3. articulate improvement plans to security leaders and other leaders
Security Team
65
Information Security Strategy Development
Strategy Participants:
These people understand their business models, strategies, goals, objectives, and operations. Security leaders must collaborate with them to help align the security strategy to business needs and objectives
Business Leaders
65
Information Security Strategy Development
Strategy Participants:
Trusted professionals with whom the security leader can consult with
Outside Experts
65
Information Security Strategy Development
Before an information security strategy can be developed, it is first necessary to understand what
Everything that is in place currently
Understand the lay of the land, establishing a starting point
65
Information Security Strategy Development
It is not possibly to mapy out future security capabilities without first understanding the organisations current what
State and Capabilities
65
Information Security Strategy Development
A tool used to establish the needs to be filled between a current state and a desired state
Gap Analysis
65
Information Security Strategy Development
Two input assessments that must be considered before objectives for an information security objectives can be defined
Risk Assessments
- Risk Assessment
- Threat Assessment
65
Information Security Strategy Development
One a risk and threat assessment has been completed, the security strategist can develop ____ or validate if established ones already will satisfactorily address ____ and ____ identified.
Risk Assessments
- Strategic Objectives
- Risks
- Threats
66
Information Security Strategy Development
A strategist shuld choose to have a risk assessment performed. This will help them to understand what 3 key things
Risk Assessments
- Threat Scenarios
- Estimated Impact
- Frequency of Occurrence
Threat, Likelihood, Impact
66
Information Security Strategy Development
What is the purpose of a threat assessment
Threat Assessments
Understand relevant threats
67
Information Security Strategy Development
A threat assessment focuses on external threats and threat scenarios, regardless of what
Threat Assessments
The presence or effectiveness of preventive or detective controls
67
Information Security Strategy Development
What may give a security strategist insight into the maturity of the organisations security program
Threat Assessments
Historical Threat Assessments