Managing Information Security Risks and Business Drivers

the drivers of the information the drivers n.w
1 / 20
Embed
Share

Explore the drivers of information security and business, learn about risk management, BIA, BCP, DRP, and strategies to protect your organization's assets and achieve compliance. Discover the importance of balancing security activities with business objectives to ensure data confidentiality and mitigate risks effectively.

  • Information security
  • Risk management
  • Business drivers
  • Compliance
  • Data confidentiality

Uploaded on | 0 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

You are allowed to download the files provided on this website for personal or commercial use, subject to the condition that they are used lawfully. All files are the property of their respective owners.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.

E N D

Presentation Transcript


  1. THE DRIVERS OF THE INFORMATION THE DRIVERS OF THE INFORMATION SECURITY BUSINESS SECURITY BUSINESS 19/03/2025

  2. The Drivers of the The Drivers of the Information Security Information Security Business Business Every organizations carries out tasks to satisfy business objectives. Without objectives, organization have no purpose. You must identify the elements in your organization business that support your business objectives. These elements are your organization s business drivers. Business drivers include people, information, and conditions that support business objectives. It s important that you balance security activities with their impact on your business drivers to protect your information s security.

  3. The Drivers of the The Drivers of the Information Security Information Security Business Business What risk management is How BIA, BCP, and DRP differ from one another and how they are the same How to describe the impact of risks, threats, and vulnerabilities on an organization How to close the information security gap How to mitigate risk and achieve compliance with laws, regulations, and requirements How to keep private data confidential How to mitigate the risk of mobile workers and use of personal devices

  4. 1. Defining 1. Defining Risk Risk Management Management Risk is the probability that an uncertain event will affect one or more resources (intellectual property, infrastructure and facilities, or employees). Risk management is the process of identifying, assessing, prioritizing, and addressing risks. Risk management ensures that you have planned for risks that are most likely to have an effect on your organization. A secure organization has plans in place to address risks before events occur.

  5. 2 2. Implementing . Implementing a BIA, a BCP, and a a BIA, a BCP, and a DRP DRP The primary focus of risk management is to preempt realized threats. It s not possible to foresee and prevent every event that results in loss. Methods and techniques must be developed and implemented for protecting the organization s IT resources and ensuring that events do not interrupt normal business functions.

  6. Business Impact Analysis Business Impact Analysis A business impact analysis (BIA) is a formal analysis of an organization s functions and activities that classifies them as critical or noncritical. In the BIA, each critical function is fully described in its own section, including a description of recovery goals and requirements for each function. When an event interrupts your organization s ability to conduct operations, it s important to restore the most crucial operations first. Recovery goals and requirements are expressed as follows: Recovery point objective (RPO): the RPO is the maximum amount of data loss that is acceptable. RPO provides direction on how to back up data, policies on recovery.

  7. Business Impact Analysis Business Impact Analysis Recovery time objective (RTO): the RTO expresses the maximum allowable time to recover the function. Time may be a critical factor, and specifying the requirements for recovery time helps determine the best recovery options. Technical recovery requirements: Technical recovery requirements define the technical prerequisites that are needed to support each critical business function. In most cases, technical recovery requirements dictate which IT infrastructure components must be in place. Business recovery requirements: business recovery requirements help in determining the recovery sequence.

  8. Business Continuity Business Continuity Plan Plan A business continuity plan (BCP) is a written plan for a structured response to any events that result in an interruption to critical business activities or functions. BCP is about minimizing the impacts of critical events on an organization and its stakeholders generally there is no reason to develop a BCP for resources that aren t crucial to an organization s survival. The BCP primarily addresses the processes, resources, equipment, and devices needed to continue conducting critical business activities when an interruption occurs that affects the business s viability.

  9. Business Continuity Business Continuity Plan Plan The most important part of any BCP is setting priorities, with the understanding that people always come first. Safety and well-being of people. Continuity of critical business functions and operations, whether onsite or offsite, manual, or dependent upon IT systems Continuity of IT infrastructure components within the seven domains of an IT infrastructure.

  10. Disaster Recovery Plan Disaster Recovery Plan A disaster recovery plan (DRP) directs the actions necessary to recover resources after a disaster. A DRP is part of a BCP. It is necessary to ensure the restoration of resources required by the BCP to an available state. The DRP extends and supports the BCP by identifying events that could cause damage to resources that are necessary to support critical business functions. The BCP already contains a list of the resources necessary to support each business function. The next step in developing a DRP is to consider what could happen to each resource.

  11. Whats the Difference between a BCP and DRP? A BCP does not specify how to recover from disasters, only interruptions. In general, an interruption is a minor event that may disrupt one or more business processes for a short period. In contrast, a disaster is an event that affects multiple business processes for an extended period. Disasters often also cause substantial resource damage that you must address before you can resolve the business process interruption.

  12. Threat Analysis Threat Analysis A threat analysis involves identifying and documenting threats to critical resources. Some common threats include (fire, flood, disease, and Hurricane). you need to consider what types of disasters are possible and what types of damage they can cause. For example, recovering from a data-center fire is different from recovering from a flu epidemic. Each of these threats has the potential to damage an organization s infrastructure. In contrast, disease directly affects personnel. The disease affects people charged with carrying out the recovery plans, the recovery may be unsuccessful. Note that, sometime one threat may lead to another threat. For example a tornado or earthquake could result in a fire.

  13. Impact Scenarios Impact Scenarios After defining potential threats, the next step in creating a comprehensive DRP is to document likely impact scenarios. In most organizations, planning for the most wide-reaching disaster rather than focusing on smaller issues results in a more comprehensive plan. An impact scenario such as Loss of Building will likely encompass all critical business functions and the worst potential outcome from any given threat. A solid DRP might also contain additional, more specific impact scenarios. For example, your plan may include a scenario that addresses the loss of a specific floor in a building

  14. Recovery Requirement Recovery Requirement Documentation Documentation Once you complete the analysis phase, you should document the business and technical requirements to initiate the implementation phase. You ll likely need access to asset information, including asset lists and their availability during a disaster. The information which must be available for the disaster recovery team includes the following: Complete and accurate inventory of all facility assets. Complete and accurate inventory of IT assets, hardware, software, licenses, contracts, and maintenance agreements. Complete and accurate list of alternative office facilities and triage locations. Disaster recovery team member contact information work and personal

  15. Recovery Requirement Recovery Requirement Documentation Documentation Retrieval of backed-up data for recovery and use Recovery time objectives (RTO) and steps required to achieve this metric

  16. 3. Assessing 3. Assessing Risks, Threats, and Vulnerabilities Risks, Threats, and Vulnerabilities One of the first steps in developing comprehensive BCPs and DRPs is to fully assess the risks, threats, and vulnerabilities associated with your organization s critical resources. You can t protect your environment from every possible threat, so it s necessary to prioritize. Instead of starting from scratch in the risk assessment process, you can use one of the many methodologies that are available. At least one of these is likely a good fit for your organization such as Risk Management Guide for Information Technology Systems (NIST SP800-30), http://csrc.nist.gov.

  17. 4 4. Closing . Closing the Information Security Gap the Information Security Gap The difference between the security controls you have in place and the controls you need in order to address all vulnerabilities is called the security gap. Performing gap analysis is an effective method for gauging the overall security of an organization s IT environments. In addition, a gap analysis can provide assurances that security implementations are consistent with real requirements. There are several common reasons for security gaps in any organization, such as: Lack of security training, resulting in noncompliant behavior. Intentional or negligent disregard of security policy Addition or modification of hardware or software without proper risk analysis

  18. 5. Adhering 5. Adhering to Compliance Laws to Compliance Laws The increased reliance on networked resources, hardware, and software has created many new opportunities for the malicious use of resources. Information has become a valued asset to organizations and an attractive target of attackers. As information-related crime has grown, so has legislation and regulation to protect organizations and individuals from criminal activity. Each organization must comply with laws and regulations, although the specific laws and regulations to which an organization is subject depend on the organization s location, the type of information it handles, and the industries in which it operates.

  19. 6. Keeping 6. Keeping Private Data Private Data Confidential Confidential Most strategies to secure data use a three-pronged approach that includes the techniques of authentication, authorization, and accounting. These three techniques help ensure that only authorized users can access resources and data. Some of the authentication controls include the following: Passwords and personal identification numbers (PINs) Smart cards and tokens Biometric devices Digital certificates One-time passwords

  20. THANK YOU

More Related Content