Download presentation
Presentation is loading. Please wait.
Published byReynard Dominic Boone Modified over 8 years ago
1
Managing Information Security Personnel By Christopher Boehm
2
Overview Introduction Hiring Process Contracts ISO 17799 Terminating Employment Closing points
3
Introduction Security is more a people problem than a technology problem. The process to effectively manage Information Security Personnel starts before an employee is even hired and goes all the way to their termination.
4
Hiring Process BASIC job postings, no access details. Background checks!! Identity Education Previous employment References Drug history Credit history (if agreed to)
5
Contracts Security agreements Employment Contingent Upon Agreement Current employees cannot be forced into signing documents to keep their job.
6
ISO 17799 A Standard Document Encompasses broad range of information security issues Risk Assessment and Treatment System Policy Organizing Information Security Asset Management Human Resources Security Physical and Environmental Security Communications and Operations Management Access Control Information Systems Acquisition, Development and Maintenance Information Systems Acquisition, Development and Maintenance Information Security Incident Management Business Continuity Management Compliance
7
Human Resources Security a) Ensure that employees, contractors and third parties are suitable for the jobs they are considered for, understand their responsibilities, and to reduce the risk of abuse (theft, misuse, etc). b) Ensure that the above are aware of IS threats and their responsibilities, and able to support the organization's security policies c) Ensure that the above exit the organization in an orderly and controlled manner. c) Ensure that the above exit the organization in an orderly and controlled manner. http://17799.denialinfo.com/whatisiso17799.htm
8
Terminating Employment Disable access immediately Return media Secure hard disks Change locks Exit Interview Escort off premises (if necessary)
9
Closing points.. NEVER be too paranoid of who you hire! Keep good security policies in the forefront of ALL employees’ minds. Technology alone is not a defense!
10
Questions? Comments?
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.