Lesson 7 - Week 7: Prepared By: Prof. Joel Correa Cacho
Lesson 7 - Week 7: Prepared By: Prof. Joel Correa Cacho
Lesson 7 - Week 7: Prepared By: Prof. Joel Correa Cacho
• Planning Levels
• Once the organization’s overall strategic plan is translated into strategic plans for each major
division or operation, the next step is to translate these plans into tactical objectives that
move toward reaching specific, measurable, achievable, and time- bound
accomplishments. The process of strategic planning seeks to transform broad, general,
sweeping statements into more specific and applied objectives. Strategic plans are used to
create tactical plans, which are in turn used to develop operational plans.
SECURITY PLANNING PROCESS
PLANNING AND THE CISO
• The first priority of the CISO and the information security management team is the creation
of a strategic plan to accomplish the organization’s information security objectives. The plan
is an evolving statement of how the CISO and the various elements of the organization will
implement the objectives of the information security charter that is expressed in the
enterprise information security policy (EISP).
INFORMATION SECURITY
GOVERNANCE
• Governance is “the set of responsibilities and practices exercised by the board and executive
management with the goal of providing strategic direction, ensuring that objectives are
achieved, ascertaining that risks are managed appropriately and verifying that the
enterprise’s resources are used responsibly.” Governance describes the entire process of
governing, or controlling, the processes used by a group to accomplish some objective.
• Policy Management
• To remain viable, security policies must have:
• Responsible Individual
• Schedule of Reviews
• Review Procedures and Practices
• Policy and Revision Date
THE INFORMATION SECURITY
BLUEPRINT
• Security blueprint - is the basis for the design, selection, and implementation of all security
program elements including policy implementation, ongoing policy management, risk
management programs, education and training programs, technological controls, and
maintenance of the security program.
• ISO 27002 (ISO/IEC 17799) - The stated purpose of ISO/IEC 27002 is to “give
recommendations for information security management for use by those who are responsible
for initiating, implementing, or maintaining security in their organization.
Figure 18 BS7799:2 Major Process Steps
Source: Course Technology/Cengage Learning
ISO/IEC 27001:2005: THE INFORMATION
SECURITY MANAGEMENT SYSTEM
THANK YOU