Ethics, Principles, Beliefs.
Hope and Ambition.
Motivation and Purpose.
Plans, goals, Sequencing.
Actions, Recourses, Outcomes, Owners, and Timeframes.
Stakeholder needs, conditions and options are evaluated to define:
Balanced agreed-upon enterprise objectives to be achieved.
Setting direction through prioritization and decision making.
Monitoring performance and compliance against agreed-upon direction and objectives.
Risk appetite – Aggressive, neutral, adverse.
C-Level Executives (Senior Leadership)
CEO: Chief Executive Officer.
CSO: Chief Security Officer.
CIO: Chief Information Officer.
CFO: Chief Financial Officer.
Normal organizations obviously have more C-Level executives, the ones listed here you need to know.
Also know where you fit in the organization and on the exam.
Plans, builds, runs and monitors activities in alignment with the direction set by the governance to achieve the objectives.
Risk tolerance – How are we going to practically work with our risk appetite and our environment.
IT Security is seen as a nuisance and not a helper, this often changes when a security breach happens.
IT leadership understands the importance of IT Security, they lead and set the direction.
TBC
Self Directed Risk Management.
Goals for IT – Stakeholder needs are mapped down to IT related goals.
Goals for the entire organization.
IT Service Management (ITSM).
Analyses one business unit, application or system at a time in a roundtable brainstorm with internal employees. Impact analyzed, threats and risks prioritized.
Establish, implement, control and improvement of the ISMS. Uses PDCA (Plan, Do, Check, Act)
Provides practical advice on how to implement security controls. It has 10 domains it uses for ISMS (Information Security Management Systems).
Provides metrics for measuring the success of your ISMS.
Standards based approach to risk management.
Directives on how to protect PHI (Personal Health Information).
We implement multiple overlapping security controls to protect an asset.
This applies both to physical and logical controls.
To get to a server you may have to go through multiple locked doors, security guards, man-traps.
To get to data you may need to get past firewalls, routers, switches, the server, and the applications security.
Each step may have multiple security controls.
No single security control secures an asset.
By implementing Defense in Depth you improve your organization’s Confidentiality, Integrity and Availability.