Telephone : +234 (0) | Website : Registered company : Telephone : +234 (0) | Website : Registered company : Aligning information security operations and management for an effective information security program Insights Africa 2013
Infoprive Overview Information Security Advisory and Consulting Managed Compliance and Services Security Technology Implementation and Integration Information Security Advisory and Consulting Managed Compliance and Services Security Technology Implementation and Integration Clients Service Offering Banks Government Oil and Gas firms Payment Companies Educational Institutions Electronic payment firms Banks Government Oil and Gas firms Payment Companies Educational Institutions Electronic payment firms Infoprive Limited is a core Business Information Security Company that delivers and maintains trusted and enabling Information Security services and solutions for its clients giving them the confidence to focus on their core business objectives
Outline Why an Information Security Program Aspects of an Information Security Program Challenges Alignment
Why an Information security Program ? © 2012 Skybox Security4 To protect critical information assets
Most importantly … © 2012 Skybox Security5 Current State Desired State Short- term initiatives Medium- term Initiatives Long- term Initiatives Information Security program Information Security Objectives Information Security Strategy
Information Security Management Aspects of an Information Security Program Strategic Tactical Information Security Operations
© 2012 Skybox Security7 So Why is alignment Hard ? Simply…….
Security Management Challenges Complexity Change Network changes - virtualization, cloud, acquisitions Applications changes - agile development People changes – behavioural, roles/functions Compliance Complex regulations and internal mandates Time-consuming audits Communication Disconnect between application, security and operation teams Terminology gaps Challenges Thousands of security access rules and configurations Highly-connected business critical applications Technology solution sprawl
Security Operations Challenges Projects Threat Prevention Change threat Landscape Third party, supplier or customer Technology Risk Management Disaster Recovery and Business Continuity Incidence Response Architecture Disparate platforms Integration gaps Challenges Too many commissioned projects Lack of ROI
ManagementOperations Risk Assessment Threat Prevention ProjectsArchitectureComplianceChangesCommunicationComplexity Alignment ….. Becomes striking a balance
ManagementOperations ComplianceChangesCommunicationComplexityArchitecture Alignment ? What we must understand
ManagementOperations ComplianceChangesCommunicationComplexityProjects Alignment ? What we must understand
ManagementOperations ComplianceChangesCommunicationComplexity Threat Prevention Alignment ? What we must understand
ManagementOperations ComplianceChangesCommunicationComplexityRisk Assessment Alignment ? What we must understand
ManagementOperations Risk AssessmentThreat PreventionProjectsArchitectureComplianceChangesCommunicationComplexity Alignment becomes striking a balance……. based on Organizational Structure People Policies Drivers Products Services Processes Procedures Business Goals Lines of Business
Thank You
Questions?