CNIT 160:
Cybersecurity
Responsibilities
2. Information Security 

Governance

Part 1

Pages 16 - 55
Topics in Part 1
• Introduction to Information Security
Governance
• Reason for Security Governance
• Security Governance Activities and
Results
• Business Alignment
• Roles and Responsibilities
Topics in Part 1 

(continued)
• Introduction to Information Security
Governance (continued)
• Monitoring Responsibilities
• Information Security Governance Metrics
• The Security Balanced Scorecard
• Business Model for Information Security
Topics in Part 2
• Security Strategy Development
• Strategy Objectives
• Control Frameworks
• Risk Objectives
• Strategy Resources
• Strategy Development
• Strategy Constraints
Governance
• A process whereby senior management
exerts strategic control over business
functions
• Through policies, objectives, delegation of
authority, and monitoring
• Ensures that business processes
effectively meet vision and objectives
Information Security
Governance
• Focuses on key processes
• Personnel management
• Sourcing
• Risk management
• Configuration management
• Change management
• Access management
Information Security
Governance
• Focuses on key processes (continued)
• Vulnerability management
• Incident management
• Business continuity planning
• Establishment of an effective organization
structure and clear statements of roles and
responsibilities
Information Security
Governance
• Monitor processes with scorecard or
metrics
• Continuous improvement changes
processes to keep them effective and
support ongoing business needs
CNIT 160: Ch 2a: Introduction to Information Security Governance
CNIT 160: Ch 2a: Introduction to Information Security Governance
CNIT 160: Ch 2a: Introduction to Information Security Governance
CNIT 160: Ch 2a: Introduction to Information Security Governance
Reason for Security
Governance
• Organizations are dependent on
information systems
• Must understand priority of
• Confidentiality
• Integrity
• Availability
Security Governance
Activities and Results
• Risk management
• Risk assessments and follow-up actions
to reduce risks
• Process improvement
• Event identification
• Security events and incidents
• Incident response
Security Governance
Activities and Results
• Improved compliance
• With laws, regulations, and standards
• Business continuity and disaster recovery
planning
• Metrics management
• Measure key security events, such as
incidents, policy changes, violations,
audits, and training
Security Governance
Activities and Results
• Resource management
• Allocation of manpower, budget, and
resources
• Improved IT governance
• Increased trust
• From customers, suppliers and partners
• Improved reputation
Business Alignment
• Security program must align with guiding
principles
• Mission
• Why the organization exists
• Goals and objectives
• What achievements it wants to accomplish
• Strategy
• Activities needed to fulfill goals and objectives
Organization's
Characteristics
• Culture
• Asset value
• Risk tolerance
• Legal obligations
• Market conditions
Dr. No
• Security that prevents necessary business
practices
• Leads to "Shadow IT"
• Departments setting up uncontrolled IT
assets
Organization's
Characteristics
• Goals and objectives
• Risk appetite
• Risk-averse organizations have a formal
system of accountability for risk
decisions
Facebook
• https://www.wired.com/2016/11/buy-facebook-propaganda-posters/
Roles and Responsibilities
• Role describes expected activities
Ranks
• In order of increasing seniority
Responsibilities
• Specific
• General
RACI Charts
RACI Charts
Considerations
• When assigning roles in a RACI chart
• Skills
• Segregation of duties
• Conflict of interest
Ch 2a-1
Board of Directors
• Fiduciary duty
• Accountable to shareholders to act in the
best interests of the organization
• Selected for
• Investor representation
• Business experience
• Access to resources
• Appoints the CEO
Five Principles
• From National Association of Corporate
Directors
Executive Management
• Carries out directives from the board of
directors
• Ratifies corporate security policy
• Publicly supporting it
• Leads by example
• Has ultimate responsibility
Executive Management
Security Steering
Committee's Responsibilities
• Risk treatment deliberation and
recommendation
• Discussion and coordination of IT and
security projects
• Review of recent risk assessments
• Discussion of new laws, regulations, and
requirements
• Review of recent security incidents
Business Process and
Business Asset Owners
• Usually nontechnical personnel
• Responsibilities:
• Access grants, revocation, and reviews
• Configuration
• Function definition
• Process definition
• Physical location
Custodial Responsibilities
• IT staff acts as a proxy for asset owners
• Should implement decisions from the asset
owner
• But often the asset owner is uninvolved
and uninformed, instead of periodically
reviewing these decisions
• https://www.nbcnews.com/business/consumer/former-equifax-ceo-blames-one-it-guy-massive-
hack-n807956
Chief Information Security
Officer (CISO)
• Highest-ranking security person
• Develops security strategies
• Similar titles
• Chief Security Officer (CSO)
• Chief Information Risk Officer (CIRO)
• Chief Risk Officer (CRO)
Position of CISO
• Reports to Chief Operating Officer (COO) or
Chief Executive Officer (CEO)
• Sometimes to CIO or legal or someone
else
• Many organizations lack a CISO but have a
manager of information security lower on
the org chart, weakening security posture
• Small to medium-sized orgs may contract
with a virtual CISO for strategy and planning
Rank Sets Tone and Gives
Power
Chief Privacy Officer
• For organization with large amounts of
customer Personally Identifiable
Information (PII)
• Regulations like
• Health Insurance Portability and
Accountability Act (HIPAA)
• Fair Credit Reporting Act (FRCA)
• The Gramm-Leach-Bliley Act (GLBA)
Software Development
• Systems architect
• Systems analyst
• Software engineer/developer
• Software tester
Data Management
• Data manager
• Database architect
• Big data architect
• Database administrator (DBA)
• Database analyst
• Data scientist
Network Management
• Network architect
• Network engineer
• Network administrator
• Telecom engineer
Systems Management
• Systems architect
• Systems analyst
• Storage engineer
• Systems administrator
Operations
• Operations manager
• Operations analyst
• Controls analyst
• Systems operator
• Data entry
• Media manager
Security Operations
• Security architect
• Security engineer
• Security analyst
• Examines logs
• Access administrator
Security Audit
• Security audit manager
• Security auditor
Service Desk
• Service desk manager
• Service desk analyst
• Technical support analyst
Quality Assurance & Other
Roles
• QA manager
• QC manager
• Vendor manager
• Project manager
General Staff Security
Responsibilities
Monitoring Responsibilities
• Confirming that the correct jobs are being
carried out in the correct way
• Controls and internal audit
• Metrics and reporting
• Work measurement
• Performance evaluation
• 360 feedback -- from peers, subordinates,
and management
• Position benchmarking -- comparing job
titles with other organizations
Information Security
Governance Metrics
• Technical metrics, counts of events from
• Firewall, IDS, Anti-malware, DLP, etc.
• Business-related metrics
• Key Risk Indicators (KRIs)
• Key Goal Indicators (KGIs)
• Key Performance Indicators (KPIs)
Return on Security
Investment
• Difficult to quantify
• Because breaches are rare
• Other ways to justify security
• Fiduciary responsibility
• Regulation
• Competitive differentiation
SMART Metrics
Good Considerations for
Metrics
Ch 2a-1
Risk Management
Performance Measurement
Convergence Metrics
• Large organizations with multiple business
units or locations
Value Delivery Metrics
Resource Management
Metrics
Security Balanced
Scorecard
Business Model for
Information Security
Business Model for
Information Security
BMIS Elements and
Dynamic Interconnections
• Elements
• Organization
• People
• Process
• Technology
BMIS Elements and
Dynamic Interconnections
• Dynamic Interconnections
• Culture
• Governing
• Architecture
• Emergence
• Enabling and Support
• Human Factors
Culture
• "a pattern of behaviors, beliefs,
assumptions, attitudes, and ways of doing
things"
• Critical to the success or failure of an
information security program
• Cannot be legislated or controlled directly
Steps to Create Favorable
Security Culture
Governing
Architecture
Architecture
The Zachman Framework
• The dominant architecture architecture
standard
Data Flow Diagram
Emergence
• People learning to do things better
• Can lead to improvements, but also cause
inconsistent results
Enabling and Support
• Technology and business people don't
understand one another
• To fill this gap, create a requirements
document
• Charts listing required and desired
functionality for new technologies
BMIS Enabling and Support
Life Cycle
Human Factors
• Also called Human-Computer Interaction
(HCI)
• Includes User Interface (UI)
• Consistency with other systems
• Typing and data entry methods
• Display and readability
• Error recovery
• Sound
• Voice and biometric recognition
• Ergonomics
• Environment
Human Factors
Example 1:
Adverse Effects of a Policy Change
• New policy
regarding
personal
devices and
company email
• Affects
organization
and processes
• Changed
processes
affect people
and technology
• An outside security audit shows that
servers are months behind in security
patches
• The company uses a vulnerability scanner
to keep up-to date, for compliance
• Why is it failing?
Example 2:
Causes for Process Weakness
• Possible causes:
• Technology --
scanner is
faulty
Example 2:
Causes for Process Weakness
• Possible causes:
• Architecture--
scanner can't
reach all
systems in
network
• Human
factors--
engineers not
using scanner
properly
Example 2:
Causes for Process Weakness
• Possible causes:
• Enabling &
Support--
Interview
engineers about
business
processes
• New networks
have been added
that are not
included in
scanner's
configuration
Example 2:
Causes for Process Weakness
Ch 2a-1
CNIT 160: Ch 2a: Introduction to Information Security Governance

More Related Content

PDF
CNIT 160: Ch 3a: Risk Management Concepts & Implementing a Program
PDF
CNIT 160: Ch 3d: Operational Risk Management
PDF
CNIT 160 4b: Security Program Management (Part 2)
PDF
CNIT 160 Ch 4b: Security Program Management
PDF
Ch 3a: Risk Management Concepts
PDF
CNIT 160 Ch 4a: Information Security Programs
PDF
CNIT 160 Ch 4a: Information Security Programs
PDF
CNIT 160: Ch 3c: The Risk Management Life Cycle
CNIT 160: Ch 3a: Risk Management Concepts & Implementing a Program
CNIT 160: Ch 3d: Operational Risk Management
CNIT 160 4b: Security Program Management (Part 2)
CNIT 160 Ch 4b: Security Program Management
Ch 3a: Risk Management Concepts
CNIT 160 Ch 4a: Information Security Programs
CNIT 160 Ch 4a: Information Security Programs
CNIT 160: Ch 3c: The Risk Management Life Cycle

What's hot (20)

PDF
CNIT 160: Ch 3c: The Risk Management Life Cycle
PDF
CNIT 160 Ch 4b: Security Program Management
PDF
CNIT 160 3a Information Risk Management
PDF
CNIT 160 Ch 4c: Security Program Development (Part 3)
PDF
CNIT 160: Ch 2b: Security Strategy Development
PDF
CNIT 160: 3. Information Risk Management (Part 4)
PDF
CNIT 160 Ch 4 Information Security Program Development (Part 3)
PDF
1. Security and Risk Management
PDF
CNIT 160: Ch 3b: The Risk Management Life Cycle
PDF
2. Asset Security
PDF
CISSP Preparation: Introduction
PPTX
Chapter 1 Personal security
PPTX
Professional Designations IT Assurance
PDF
6. Security Assessment and Testing
PPTX
Integrated APT-IGA Solution - Future of IT Security (Vladislav Shapiro, Immer...
PPTX
project managmnet
PDF
CNIT 125: Ch 2. Security and Risk Management (Part 2)
PPT
Chapter 5
PDF
isicg - 3 r's v4
PDF
7. Security Operations
CNIT 160: Ch 3c: The Risk Management Life Cycle
CNIT 160 Ch 4b: Security Program Management
CNIT 160 3a Information Risk Management
CNIT 160 Ch 4c: Security Program Development (Part 3)
CNIT 160: Ch 2b: Security Strategy Development
CNIT 160: 3. Information Risk Management (Part 4)
CNIT 160 Ch 4 Information Security Program Development (Part 3)
1. Security and Risk Management
CNIT 160: Ch 3b: The Risk Management Life Cycle
2. Asset Security
CISSP Preparation: Introduction
Chapter 1 Personal security
Professional Designations IT Assurance
6. Security Assessment and Testing
Integrated APT-IGA Solution - Future of IT Security (Vladislav Shapiro, Immer...
project managmnet
CNIT 125: Ch 2. Security and Risk Management (Part 2)
Chapter 5
isicg - 3 r's v4
7. Security Operations
Ad

Similar to CNIT 160: Ch 2a: Introduction to Information Security Governance (20)

PDF
Building an effective Information Security Roadmap
PPTX
it grc
PPTX
Nist 800 53 deep dive 20210813
PPTX
CISM_WK_1.pptx
PPTX
CDMP SLIDE TRAINER .pptx
PPTX
Mandelaris_SecureWorld_2016_FINAL
PPTX
CIT 3122 IS Governance Lecture 3.pptx
PDF
ISO27001: Implementation & Certification Process Overview
PDF
You Need a Data Catalog. Do You Know Why?
PPTX
2014-1-Intro-GRC-and-COBIT5 notes fin.pptx
PPTX
CISA Training - Chapter 2 - 2016
PPTX
Cybersecurity Frameworks and You: The Perfect Match
PPTX
GDPR | Cyber security process resilience
PDF
CISSP Prep: Ch 1: Security Governance Through Principles and Policies
PPTX
Mergers Acquisitions and Tech Due Diligence
PDF
Maclear’s IT GRC Tools – Key Issues and Trends
PDF
AI Data Acquisition and Governance: Considerations for Success
PDF
ISO 27001 Awareness IGN Mantra 2nd Day, 2nd Session.
PDF
ASUG82318 - Data Governance Considerations With SAP S4HANA.pdf
PPTX
ch1.pptx Chapter 1 of CISSP ch1.pptx Chapter 1 of CISSPch1.pptx Chapter 1 of ...
Building an effective Information Security Roadmap
it grc
Nist 800 53 deep dive 20210813
CISM_WK_1.pptx
CDMP SLIDE TRAINER .pptx
Mandelaris_SecureWorld_2016_FINAL
CIT 3122 IS Governance Lecture 3.pptx
ISO27001: Implementation & Certification Process Overview
You Need a Data Catalog. Do You Know Why?
2014-1-Intro-GRC-and-COBIT5 notes fin.pptx
CISA Training - Chapter 2 - 2016
Cybersecurity Frameworks and You: The Perfect Match
GDPR | Cyber security process resilience
CISSP Prep: Ch 1: Security Governance Through Principles and Policies
Mergers Acquisitions and Tech Due Diligence
Maclear’s IT GRC Tools – Key Issues and Trends
AI Data Acquisition and Governance: Considerations for Success
ISO 27001 Awareness IGN Mantra 2nd Day, 2nd Session.
ASUG82318 - Data Governance Considerations With SAP S4HANA.pdf
ch1.pptx Chapter 1 of CISSP ch1.pptx Chapter 1 of CISSPch1.pptx Chapter 1 of ...
Ad

More from Sam Bowne (20)

PDF
Introduction to the Class & CISSP Certification
PDF
Cyberwar
PDF
3: DNS vulnerabilities
PDF
8. Software Development Security
PDF
4 Mapping the Application
PDF
3. Attacking iOS Applications (Part 2)
PDF
12 Elliptic Curves
PDF
11. Diffie-Hellman
PDF
2a Analyzing iOS Apps Part 1
PDF
9 Writing Secure Android Applications
PDF
12 Investigating Windows Systems (Part 2 of 3)
PDF
10 RSA
PDF
12 Investigating Windows Systems (Part 1 of 3
PDF
9. Hard Problems
PDF
8 Android Implementation Issues (Part 1)
PDF
11 Analysis Methodology
PDF
8. Authenticated Encryption
PDF
7. Attacking Android Applications (Part 2)
PDF
7. Attacking Android Applications (Part 1)
PDF
5. Stream Ciphers
Introduction to the Class & CISSP Certification
Cyberwar
3: DNS vulnerabilities
8. Software Development Security
4 Mapping the Application
3. Attacking iOS Applications (Part 2)
12 Elliptic Curves
11. Diffie-Hellman
2a Analyzing iOS Apps Part 1
9 Writing Secure Android Applications
12 Investigating Windows Systems (Part 2 of 3)
10 RSA
12 Investigating Windows Systems (Part 1 of 3
9. Hard Problems
8 Android Implementation Issues (Part 1)
11 Analysis Methodology
8. Authenticated Encryption
7. Attacking Android Applications (Part 2)
7. Attacking Android Applications (Part 1)
5. Stream Ciphers

Recently uploaded (20)

PDF
Controlled Drug Delivery System-NDDS UNIT-1 B.Pharm 7th sem
PDF
Journal of Dental Science - UDMY (2022).pdf
DOCX
Cambridge-Practice-Tests-for-IELTS-12.docx
PPTX
Reproductive system-Human anatomy and physiology
PDF
fundamentals-of-heat-and-mass-transfer-6th-edition_incropera.pdf
PDF
Fun with Grammar (Communicative Activities for the Azar Grammar Series)
PDF
MICROENCAPSULATION_NDDS_BPHARMACY__SEM VII_PCI Syllabus.pdf
PDF
PUBH1000 - Module 6: Global Health Tute Slides
PDF
Laparoscopic Colorectal Surgery at WLH Hospital
PPTX
PLASMA AND ITS CONSTITUENTS 123.pptx
PPTX
Integrated Management of Neonatal and Childhood Illnesses (IMNCI) – Unit IV |...
PDF
Hospital Case Study .architecture design
PDF
Farming Based Livelihood Systems English Notes
PDF
1.Salivary gland disease.pdf 3.Bleeding and Clotting Disorders.pdf important
PDF
Lecture on Viruses: Structure, Classification, Replication, Effects on Cells,...
PPT
REGULATION OF RESPIRATION lecture note 200L [Autosaved]-1-1.ppt
PPTX
CAPACITY BUILDING PROGRAMME IN ADOLESCENT EDUCATION
PPTX
Macbeth play - analysis .pptx english lit
PPTX
Climate Change and Its Global Impact.pptx
DOCX
Ibrahim Suliman Mukhtar CV5AUG2025.docx
Controlled Drug Delivery System-NDDS UNIT-1 B.Pharm 7th sem
Journal of Dental Science - UDMY (2022).pdf
Cambridge-Practice-Tests-for-IELTS-12.docx
Reproductive system-Human anatomy and physiology
fundamentals-of-heat-and-mass-transfer-6th-edition_incropera.pdf
Fun with Grammar (Communicative Activities for the Azar Grammar Series)
MICROENCAPSULATION_NDDS_BPHARMACY__SEM VII_PCI Syllabus.pdf
PUBH1000 - Module 6: Global Health Tute Slides
Laparoscopic Colorectal Surgery at WLH Hospital
PLASMA AND ITS CONSTITUENTS 123.pptx
Integrated Management of Neonatal and Childhood Illnesses (IMNCI) – Unit IV |...
Hospital Case Study .architecture design
Farming Based Livelihood Systems English Notes
1.Salivary gland disease.pdf 3.Bleeding and Clotting Disorders.pdf important
Lecture on Viruses: Structure, Classification, Replication, Effects on Cells,...
REGULATION OF RESPIRATION lecture note 200L [Autosaved]-1-1.ppt
CAPACITY BUILDING PROGRAMME IN ADOLESCENT EDUCATION
Macbeth play - analysis .pptx english lit
Climate Change and Its Global Impact.pptx
Ibrahim Suliman Mukhtar CV5AUG2025.docx

CNIT 160: Ch 2a: Introduction to Information Security Governance