Security & Privacy Governance

chevron-rightWhen an organization is implementing an information security governance program, its board of directors should be responsible for:hashtag

Setting the strategic direction of the program

chevron-rightHow do you ensure the success of information security governance within an organization?hashtag

Steering committees approve security projects

chevron-rightFrom an information security manager perspective, what is the immediate benefit of clearly-defined roles and responsibilities?hashtag

Better accountability

chevron-rightWho is responsible for ensuring that information is categorized and that specific protective measures are taken?hashtag

Senior management

chevron-rightA business unit intends to deploy a new technology in a manner that places it in violation of existing information security standards. What immediate action should an information security manager take?hashtag

Perform a risk analysis to quantify the risk

chevron-rightWhat is the important information to include in an information security standard?hashtag

Last Review Date

chevron-rightWhat is the important information to include in a strategic plan for information security?hashtag

Current state and desired future state

chevron-rightAt what stage of the applications development process should the security department initially become involved?hashtag

At detail requirements

chevron-rightWhile implementing information security governance an organization should?hashtag

Define the security strategy

chevron-rightWhat is the justification to convince management to invest in an information security program?hashtag

Increased Business Value

chevron-rightWhat is the FIRST step in developing an information security plan?hashtag

Analyze the current business strategy

chevron-rightWhat is the MOST important goal of an information security governance program?hashtag

Ensuring trust in data

WHY?

The development of trust in the integrity of information among stakeholders should be the primary goal of information security governance. Review of internal control mechanisms relates more to auditing, while the total elimination of risk factors is not practical or possible.

Proactive involvement in business decision making implies that security needs dictate business needs when, in fact, just the opposite is true. Involvement in decision making is important only to ensure business data integrity so that data can be trusted.

chevron-rightThe BEST way to justify the implementation of a single sign-on (SSO) product is to use:hashtag

A Business Case

WHY?

A business case shows both direct and indirect benefits, along with the investment required and the expected returns, thus making it useful to present to senior management.

Last updated