Information Security Governance
eBook - ePub

Information Security Governance

Framework and Toolset for CISOs and Decision Makers

Andrej Volchkov

Share book
  1. 256 pages
  2. English
  3. ePUB (mobile friendly)
  4. Available on iOS & Android
eBook - ePub

Information Security Governance

Framework and Toolset for CISOs and Decision Makers

Andrej Volchkov

Book details
Book preview
Table of contents
Citations

About This Book

This book presents a framework to model the main activities of information security management and governance. The same model can be used for any security sub-domain such as cybersecurity, data protection, access rights management, business continuity, etc.

Frequently asked questions

How do I cancel my subscription?
Simply head over to the account section in settings and click on ā€œCancel Subscriptionā€ - itā€™s as simple as that. After you cancel, your membership will stay active for the remainder of the time youā€™ve paid for. Learn more here.
Can/how do I download books?
At the moment all of our mobile-responsive ePub books are available to download via the app. Most of our PDFs are also available to download and we're working on making the final remaining ones downloadable now. Learn more here.
What is the difference between the pricing plans?
Both plans give you full access to the library and all of Perlegoā€™s features. The only differences are the price and subscription period: With the annual plan youā€™ll save around 30% compared to 12 months on the monthly plan.
What is Perlego?
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, weā€™ve got you covered! Learn more here.
Do you support text-to-speech?
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Is Information Security Governance an online PDF/ePUB?
Yes, you can access Information Security Governance by Andrej Volchkov in PDF and/or ePUB format, as well as other popular books in Business & Business Strategy. We have over one million books available in our catalogue for you to explore.

Information

Year
2018
ISBN
9780429791246
Edition
1
Chapter 1
Security Governance
As a vital resource in the digital economy, information must be protected. Companies realize the importance of being able to ensure its availability, confidentiality, and integrity. However, technical security measures alone are no longer sufficient. Senior managers are looking for ways to ensure a level of protection in line with the needs of their company. They must also have better control of the costs related to information security while remaining in compliance with legal and regulatory frameworks.
Security governance must be enforced at all levels of an organization. But many still do not understand quite what Security Governance is, what is its main objective and how it should be integrated within existing structures in an organization. This chapter provides answers to the following questions:
ā–  What issues are behind information security in the global context?
ā–  What questions should senior officials ask about security governance?
ā–  What trends are we seeing today?
ā–  Exactly what does information security governance include?
ā–  How can inadequate security governance adversely affect a company?
ā–  How is good security governance recognized?
ā–  What is the difference between governance and management?
ā–  Is there any specific standard for information security governance?
What issues are behind information security in the global context?
1.1 Information Security Is Important for Business
Information exists nowadays in multiple formats; it is stored on different media and exchanged through uncontrolled networks. Yet, it is a vital resource for the economy and for everyday transactions. Companies must therefore ensure informationā€™s availability (for its intended use), confidentiality (exploitable by those who are authorized), integrity (protected against unauthorized changes), and authenticity.
Information security (IS) is currently making a serious contribution to business development by ensuring not only reliable operations but also new opportunities for qualitative differentiation. It is increasingly seen as a value creator or facilitator of operations in new business models. Its added value includes providing reliable and secure exchanges, ensuring secure data transfers, enabling remote protected access, ensuring the availability of services, and offering the possibility of outsourcing processes in a controlled and secure manner. More traditionally, it protects a companyā€™s know-how and reputation, reduces operational risks, and ensures compliance with legal and regulatory frameworks. It is no longer considered a technical discipline that can be delegated to specialized services. Security is becoming an increasing matter of concern for top executives and is being supervised more and more at the highest level of company responsibility. This is not only required by laws and regulations but is also a reality in many companies anxious to improve cost controls and the return on their investment in protection systems. It is no longer an ancillary activity, as companies seek to optimize investments and ensure the adequacy of deployed IS measures. Management and the board of directors are additionally involved in developing IS objectives and supervising its added value to business objectives. Whether they are customers, partners, suppliers, employees, or shareholders, all stakeholders are concerned about security issues.
What should senior officials know about security governance?
Executives and board members must therefore be better acquainted with IS issues so that they can fully assume their new responsibilities. If they do not have answers to the following questions or if the answer is ā€œnoā€, then there is a real need to review the practices of IS governance within the organization:
ā–  Is the board regularly informed about IS risks and measures taken?
ā–  Are management or line managers involved in strategic decisions concerning the development of IS?
ā–  Who defines IS strategy, policies, and guidelines?
ā–  Who is responsible for data protection and associated measures?
ā–  Do we know which business processes are threatened by high IS risks and whether anything is being done to mitigate them?
ā–  Where is confidential data stored and how is it processed? Who is accountable for data privacy protection?
ā–  Is our IS adapted to the real needs of the business?
ā–  Are business units members of committees that decide about IS measures concerning their operations?
ā–  Do our know whether IS expenses are justified and what is their return on investment?
If it can be shown that security plays a part in attaining strategic objectives and reducing the risks involved, then it can benefit from senior executivesā€™ attention and take its place as a link in the value chain. Security is essential, but the question is what level of maturity is needed: in other words, how much and what level of IS are enough? Its contribution margin, and especially its cost, must therefore be measurable. However, this cannot be achieved unless the board of directors and management are involved in setting objectives and monitoring the deliverables of the security program.
What trends are we seeing today?
Several studies have highlighted a positive evolution in managementā€™s awareness of the importance of IS. However, it is still noted that technical means are often deployed in a disorganized manner, in successive layers, to overcome visible threats. Boards and management are not involved or are unable to understand the real issues behind IS, and thus, they delegate this task to bodies with little decision-making power and therefore, few means to act. The return on IS investments is not evaluated systematically. Priority is being given to technical solutions without making the necessary organizational adjustments. Roles and responsibilities are often not well defined, resources are lacking, decisions are not made, objectives and information architectures are not clearly established, and this results in loss of energy, increased costs, and a sense of frustration by both management and the teams responsible for deploying protective measures. This, in turn, causes misunderstanding on the part of the governing bodies, which do not have sufficient visibility regarding the adequacy of the measures and the costs related to real risks, leading to a race to find technical solutions to counter visible threats, but without any real means of control.
The following observations may characterize many companies that have neglected the importance of governance in the field of IS:
ā–  Lack of awareness of IS strategy and its degree of alignment with business strategies.
ā–  Ignorance of the problems and concerns of the IS by senior executives.
ā–  Lack of a formal evaluation process for IS performance or return on security investments (ROSI).
ā–  Priority is often given to technical solutions without adjusting organizational structures.
ā–  Lack of manager involvement in the prioritization of risk treatments.
ā–  Lack of architectural design requirements for IS.
According to PwC (The Global State of Information SecurityĀ® Survey 2018) [Source: PwC, CIO and CSO, The Global State of Information SecurityĀ® Survey 2018, October 18, 2017]: ā€œMost corporate boards are not proactively shaping their companiesā€™ security strategies or investment plans. Only 44% of respondents say their corporate boards actively participate in their companiesā€™ overall security strategyā€. The implication of the board in overall security is estimated as follows: 45% in the security budget, 44% in the overall security strategy, 39% in security policies, 36% in security technologies, and 1% in the review of current security and privacy risks.
According to EYā€™s 19th Global Information Security Survey 2016ā€“2017 [EY - 19th Global Information Security Survey 2016-2017], 73% of companies are concerned about poor user awareness and behavior around mobile devices, 86% say their cybersecurity function does not fully meet their organizationā€™s needs, and 86% of respondents say they need up to 50% more budget.
These observations lead us to believe that many companies have yet to establish real IS governance. There are many reasons behind this; our goal is not to list them but rather, to propose tools to facilitate the implementation of a governance process adapted to the realities of each company. But, first, letā€™s take a closer look at governance and management activities to better understand what we are talking about and why it is important.
What does information security governance mean?
1.2 Information Security Governance
Security governance is an integral part of corporate governance. Remember that there is no single or commonly accepted definition ...

Table of contents