Ch 11 - Security and Personnel Flashcards
Story or vignette
The story is about Iris Majwubu who gets an email from the senior manager of IT, Charlie Moody.
In the email, he asks her to come by as he would like to discuss the Magruder case and investigation. Guy who left the USB at the coffee station and was found to be selling sensitive company information
It turns out he wants to reward her with an opportunity to join the information security team, as her actions saved the company from having significant losses. She is hesitant, but she says that she’ll think about it.
Learning Objectives
- How should the info sec. function be positioned within an organization?
- What are the issues/concerns that must be addressed when staffing the IS function?
- What are some IS credentials one can earn in the field?
- How can employment policies and practices support the IS function?
- What special security precautions should be taken when using contract workers?
- What are the requisites (needed) to ensure the privacy of personnel data?
How are IS departments usually positioned?
Within the information technology department of organizations.
CISO or CSO as the head of the department reporting to the CIO
Not always have the same interest in mind
CIO - access
CSO/CISO - security
A balance between access and security is essential
Other possible places where the IS function can be positioned in an organization’s structure
- IT function
- Physical security function
- Administrative services function
- Insurance and risk mgmt. function
- Legal department
Wherever the IS function is positioned matters less than that it meets two criteria:
- That it is able to have a say in terms of the reporting function.
- That it is able to enforce organizational policy, meaning monitor compliance.
- And that it be able to provide education, training, awareness, and customer service.
Best hiring practices
- Gen. mgmt. should learn about the skills/requisites needed to carry out the IS job.
- Gen. mgmt. needs to understand and allocate a budget that allows the IS function to carry out its duties
- IT and Gen. mgmt. should grant the appropriate level of influence and prestige to the IS function.
Important skills for people in the IS function to understand:
- How an organization operates at all levels
- That information security is usually a management problem and is seldom an exclusively technical problem
- How to work with people and collaborate with end users, and the importance of strong communications and writing skills
- The role of policy in guiding security efforts, and the role of education and training in making employees and other authorized users part of the solution, rather than part of the problem
- Most mainstream IT technologies (not necessarily as experts, but as generalists)
- The terminology of IT and information security
- The threats facing an organization and how these threats can become attacks
- How to protect an organization’s assets from information security attacks
- How business solutions (including technology-based solutions) can be applied to solve specific information security problems
The broad 3 areas of IS job classifications:
- Those that define the IS program - provide the policies, guidelines, and standards. Do the consulting and risk assessment, and develop the product and technical architectures. Seniors in the field broad knowledge.
- Those that build the IS system and create the programs to implement IS controls. The techies.
- Those that administer the infosec control systems and programs that have been created. The sheep that can carry out specific tasks.
CISO duties and responsibilities
- Manages the overall information security program for the organization
- Drafts or approves information security policies
- Works with the CIO on strategic plans, develops tactical plans, and works with security managers on operational plans
- Develops information security budgets based on available funding
- Sets priorities for the purchase and implementation of information security projects and technology
- Makes decisions or recommendations on the recruiting, hiring, and firing of security staff
- Acts as the spokesperson for the information security team
CISSP
Certified Information Systems Security Professional
CISSP accreditation
CISM
GIAC
CISM -Certified Information Security manager
GIAC - Global Info. Assurance Certification
(ISC)2
International Information Systems Security Certification Consortium
is considered one the foremost organizations offering information security certifications today. Currently (ISC)2 offers three primary certifications and three specializations for its flagship certification.
CISSP - Certified Info Systems Security Professional
Concentrations of CISSP - Info Systems Security: Engineering Prof., Mgmt. Prof, and Architecture Prof.
SSCP - Systems Security Certified Practioner
Associate of ISC2
CAP - Certification and Accreditation Professional
ISACA Certifications
The Information Systems Audit and Control Association
Offers 2 certifications:
CISA - for auditing, networking, and security professionals
CISM - for info. security management professionals
Requisites:
- Successful completion of the requisite examination
- Experience as an information systems auditor, with a minimum of five years’ professional experience in an area of direct interest to the certification
- Agreement to the ISACA Code of Professional Ethics
- Continuing education policy that requires maintenance fees and a minimum of twenty contact hours of continuing education each year and a minimum of 120 contact hours over the three-year certification period
CISA
ISACA
Certified information systems auditor
CISM
ISACA
Certified Info Security Manager