CCP Lesson 6 Flashcards
Organizational Culture
Personality of an organization.
Employees develop an organization’s culture:
-As it becomes more ingrained, it can be difficult to change.
Organizational Culture - Values
Some values may be written:
-Mission statement
Many values will be unwritten and assumed:
-Learned through observation and informal communication.
Cybersecurity Culture
Stong cybersecurity culture involves alignment between:
-Organizational elements (e.g., policy, leadership, social norms).
-Individual employee’s attitudes, knowledge, and assumptions about cybersecurity.
Cybersecurity Culture: Organization
Cybersecurity needs to be a company-wide focus (not just IT).
People make organization secure, not technology:
-Everyone needs to be trained and conscious of risks.
Cybersecurity Culture: Individual
Employees must recognize they play a role in protecting critical information from digital attacks.
Employees must participate in regular training.
Employees must actively engage in behaviors and habits outlined by their cybersecurity program.
Institutionalization
Cybersecurity practices should become ingrained within the company culture.
-Are the correct technology controls implemented?
-Do all employees understand the risks?
-Are senior executives on board?
Maturity Stages
- Focusing on compliance.
- Establishing governance.
- Implementing cultural change.
- Establishing quantitative framework.
- Optimizing for long-term sustainment.
As organizations move through the maturity stages, they will institutionalize cybersecurity.
Governance
Should provide balance between strategic planning and day-to-day operationalized approach.
-Allocation of personnel and resources
-Active monitoring of SLAs, KPIs, risk management activities.
Effective communication is paramount.
Internal/external assessments provide objective means to identify and address weaknesses and strengthen controls.
Minimum Attributes of a Policy
Policies should:
-Clearly state purpose.
-Clearly define scope.
-Identify roles and responsibilities (to include authority and ownership of activities).
-Identify procedures used to meet the intent of the policy.
-Include regulatory guidelines.
-Be endorsed my management and disseminated to stakeholders.
-Be periodically reviewed and updated.
Minimum Attributes of a Procedure
Procedures should minimally specify:
-Purpose
-Objective
-Description of roles, responsibilities, and authorities.
-Description of inputs/outputs.
-Criteria that must be met in support of procedure.
-Any tools, information, and/or supporting resources.
-Definition of key terminology.
-Detailed steps of how to perform the procedure.
Minimum Attributes of a Plan
Plans should include:
-Mission and/or vision statement.
-Strategic goals and objectives.
-Relevant standards and procedures.
-Project timelines and plans.
-Resources requirements for people and tools.
-Required training.
-Stakeholders necessary to implement.
Governance Establishment
As part of governance, in order to retain their efficacy, cybersecurity policies, procedures, and controls must be maintained through a plan.
-Unmanaged assets introduce higher risk.
Plans should include mechanisms for ongoing monitoring of the systems and associated controls to ensure continued effectiveness.
-Are all changes documented?
-Is the plan still functioning as intended?
Cultural Change Implementation
To ensure a mature culture of cybersecurity, companies need to create a cultural change management plan.
-Secure executive support.
-Connect cybersecurity risks to other operational, financial, and legal risks.
-Establish clear business goals/KPIs.
-Establish a clear systematic culture management plan with a cross-functional team (Management, Info Security, IT, HR, Legal, and Marketing).
-Identify employees’ views/understandings of cybersecurity culture or guidelines.
-Keep policy and procedure communications user-friendly.
-Implement regular hands-on awareness training.
-Implement a relentless and consistent message that helps employees understand exactly how their daily behaviors have the potential to protect or threaten the security of corporate data.
Quantitative Framework Establishment
Provides for day-to-day measurement and control of the procedures in order to.
Metrics may be qualitative or quantitative.
Measurements examples:
-Actual vs. planned (performance of procedure).
-Identification and evaluation of significant deviations.
-Results of corrective actions.
Reviews with “higher level management” are critical to the success of the organization’s cybersecurity program.
Optimization for Long-Term Sustainment
Standardization provides for consistency in the implementation of policies, practices, and controls across the organization.
A standardized organizational practice typically provides:
-Ample description of practices and objectives.
-Process flow diagrams.
-Specified performance metrics.
-Procedures for incorporation of lessons learned and improvements.
Optimization is contingent upon practice stability.