Download presentation
Presentation is loading. Please wait.
Published byCarol Williamson Modified over 8 years ago
1
Telephone : +234 (0) 1 815 8152 Email : info@infoprive.com | Website : www.infoprive.comwww.infoprive.com Registered company : 985937 Telephone : +234 (0) 1 815 8152 Email : info@infoprive.com | Website : www.infoprive.comwww.infoprive.com Registered company : 985937 Aligning information security operations and management for an effective information security program Insights Africa 2013
2
Infoprive Overview Information Security Advisory and Consulting Managed Compliance and Services Security Technology Implementation and Integration Information Security Advisory and Consulting Managed Compliance and Services Security Technology Implementation and Integration Clients Service Offering Banks Government Oil and Gas firms Payment Companies Educational Institutions Electronic payment firms Banks Government Oil and Gas firms Payment Companies Educational Institutions Electronic payment firms Infoprive Limited is a core Business Information Security Company that delivers and maintains trusted and enabling Information Security services and solutions for its clients giving them the confidence to focus on their core business objectives
3
Outline Why an Information Security Program Aspects of an Information Security Program Challenges Alignment
4
Why an Information security Program ? © 2012 Skybox Security4 To protect critical information assets
5
Most importantly … © 2012 Skybox Security5 Current State Desired State Short- term initiatives Medium- term Initiatives Long- term Initiatives Information Security program Information Security Objectives Information Security Strategy
6
Information Security Management Aspects of an Information Security Program Strategic Tactical Information Security Operations
7
© 2012 Skybox Security7 So Why is alignment Hard ? Simply…….
8
Security Management Challenges Complexity Change Network changes - virtualization, cloud, acquisitions Applications changes - agile development People changes – behavioural, roles/functions Compliance Complex regulations and internal mandates Time-consuming audits Communication Disconnect between application, security and operation teams Terminology gaps Challenges Thousands of security access rules and configurations Highly-connected business critical applications Technology solution sprawl
9
Security Operations Challenges Projects Threat Prevention Change threat Landscape Third party, supplier or customer Technology Risk Management Disaster Recovery and Business Continuity Incidence Response Architecture Disparate platforms Integration gaps Challenges Too many commissioned projects Lack of ROI
10
ManagementOperations Risk Assessment Threat Prevention ProjectsArchitectureComplianceChangesCommunicationComplexity Alignment ….. Becomes striking a balance
11
ManagementOperations ComplianceChangesCommunicationComplexityArchitecture Alignment ?....... What we must understand
12
ManagementOperations ComplianceChangesCommunicationComplexityProjects Alignment ?....... What we must understand
13
ManagementOperations ComplianceChangesCommunicationComplexity Threat Prevention Alignment ?....... What we must understand
14
ManagementOperations ComplianceChangesCommunicationComplexityRisk Assessment Alignment ?....... What we must understand
15
ManagementOperations Risk AssessmentThreat PreventionProjectsArchitectureComplianceChangesCommunicationComplexity Alignment becomes striking a balance……. based on Organizational Structure People Policies Drivers Products Services Processes Procedures Business Goals Lines of Business
16
Thank You
17
Questions?
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.