Download presentation
Presentation is loading. Please wait.
Published byAidan Bussell Modified over 10 years ago
1
Copyright Security-Assessment.com 2004 Information Security Management A Process Driven Approach by Peter Benson and Phillip Mawson
2
Copyright Security-Assessment.com 2004 Overview Information Security Management (ISM) Task centred approach to ISM Pro’s and Con’s Process centred approach to ISM Pro’s and Con’s Process Example Questions
3
Copyright Security-Assessment.com 2004 Information Security Management Challenges Security threat growing Pressure to reduce IT operational spend Centralisation of infrastructure access technology Growth of online e-business Rapidly changing environments
4
Copyright Security-Assessment.com 2004 Information Security Management Process Centred vs task centred Security Management Task: A unit of work Process: A complete end to end set of tasks that together create values for a client. Generally speaking Security Management today is task focused
5
Copyright Security-Assessment.com 2004 Task Centred Approach Define Policy (password age 30 days) Audit environment against policy Identify level of non compliance Action plan to address non-compliance Re-audit environment to assess progress
6
Copyright Security-Assessment.com 2004 Task Centred Approach Disadvantages Lots of tasks It’s expensive Often business value is unclear Susceptible to policy idealism (long live practical security policies)
7
Copyright Security-Assessment.com 2004 Process Centred Approach Existing security processes security process quality system
8
Copyright Security-Assessment.com 2004 Process Centred Approach Advantages Starting point is current state Overcomes snapshot limitations Process focus keeps things practical Process view is cheaper than policy view Simplified technology roadmap
9
Copyright Security-Assessment.com 2004 Security Patch Management Process Identify & Assess Manage Monitor Audit
10
Copyright Security-Assessment.com 2004 Identify & Assess
11
Copyright Security-Assessment.com 2004 Manage
12
Copyright Security-Assessment.com 2004 Monitor
13
Copyright Security-Assessment.com 2004 Information Security Management Process Centred Approach – quick tips Process owners, doers and reviewers Process abdication is bad But we don’t have a process for that ??? Measurement is key
14
Copyright Security-Assessment.com 2004 Questions
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.