Follow us on:
Follow us on Facebook  Share via Twitter  Share via LinkedIn
 

Search...
Hi-Tech Security Solutions Business Directory


Senior executives information security survival kit
March 2006, Information Security

Specific information security risks for senior executives

The following examples show how senior executives can be exposed to information security risks:

* Lack of appreciation of what risks are most significant.

* Failure to mandate the right security culture and control framework and set the right security example.

* Failure to embed responsibilities for risk management into the management team.

* Failure to detect where the most critical security weaknesses exist within the organisation.

* Failure to monitor risk management investments and/or be able to measure benefits realised.

* Failure to direct risk management and be in a position to know what residual risk remains.

Questions to ask

* How is the board kept informed of information security issues? When was the last briefing made to the board on security risks and status of security improvements?

* Is the enterprise clear on its position relative to IT and security risks? Does it tend toward risk avoidance or risk taking?

* How much is being spent on information security? On what? How were the expenditures justified? What projects were undertaken to improve security last year? Have sufficient resources been allocated?

* How many staff had security training last year? How many of the management team received security training?

* How does the organisation detect security incidents? How are they escalated and what does management do about them? Is management prepared to recover from a major security incident?

* Is management confident that security is adequately addressed in the organisation? Has the organisation ever had its network security checked by a third party?

* Is management aware of the latest IT security issues and best practices?

* What is industry best practice and how does the enterprise compare?

* Are IT security issues considered when developing business and IT strategy?

* Can the entity continue to operate properly if critical information is unavailable, corrupted or lost? What would be the consequences of a security incident in terms of lost revenues, customers and investor confidence? What would be the consequences if the infrastructure became inoperable?

* Are the information assets subject to laws and regulations? What has management instituted to assure compliance with them?

* Does the information security policy address the concern of the board and management on information security ('tone at the top'), cover identified risks, establish an appropriate infrastructure to manage and control the risks, and establish appropriate monitoring and feedback procedures?

* Is there a security programme in place that covers all of the above questions? Is there clear accountability about who carries it out?

* Is management aware that serious security breaches could result in significant legal consequences for which management may be held responsible?

Action list

* Establish a security organisation and function that assists management in the development of policies and assists the enterprise in carrying them out.

* Establish responsibility, accountability and authority for all security-related functions to appropriate individuals in the organisation.

* Establish clear, pragmatic enterprise and technology continuity programmes, which are then continually tested and kept up to date.

* Conduct information security audits based on a clear process and accountabilities, with management tracking the closure of recommendations.

* Include security in job performance appraisals and apply appropriate rewards and disciplinary measures.

* Develop and introduce clear and regular reporting on the organisation's information security status to the board of directors based on the established policies and guidelines and applicable standards. Report on compliance with these policies, important weaknesses and remedial actions, and important security projects.

This material is extracted from COBIT Security Baseline. Copyright (c) 2004 IT Governance Institute (ITGI). For additional information on COBIT and ITGI, visit www.itgi.org


  Share via Twitter   Share via LinkedIn      

Further reading:

  • Stopping the leak
    May 2015, Information Security
    The damage that data loss can do to an inadequately secured enterprise extends far beyond pecuniary matters and can include reputation loss, regulatory consequences, a decrease in customer confidence, trust issues, a drop in market share, and the development of trade barriers.
  • Cyber risks severely underrated
    May 2015, Information Security, Enterprise Solutions
    South Africa is the fifth most targeted country in the world in terms of cybercrime attacks, while informal consensus within the private sector places SA third behind Russia and China.
  • Detection and response
    May 2015, Information Security
    Recent large-scale attacks move focus from blocking and detecting attacks, to detecting and responding to attacks. Gartner says by 2018, 40% of large organisations will have formal plans to address aggressive cyber-security business disruption attacks.
  • Data security is essential for Government
    May 2015, Government and Parastatal (Industry), Information Security
    Cybercrime is a burgeoning threat, not only to business but also to governments all over the world. The increasing number of highly publicised examples of cybercrime highlights this trend.
  • Understanding intelligence
    April 2015, Vision Catcher, Information Security
    Intelligence is gained from many aspects of surveillance that does not necessarily require a picture. Information only becomes intelligent when it is used with all other available information to provide the basis for a decision and perhaps a result.
  • Anticipate, adapt, activate
    April 2015, Information Security
    Annual global EY survey finds organisations are still unprepared for inevitable cyber attacks.
  • Widening gulf between perception and reality
    April 2015, Information Security
    Cisco unveils security manifesto as a foundation for organisations in South Africa to better understand and respond to today’s cybersecurity challenges.
  • Experian SA launches new fraud prevention solution
    April 2015, Information Security, Security Services & Risk Management
    Experian SA has launched the National Fraud Prevention Solution to address the significant threat of identity and credit application fraud in South Africa.
  • Safer than Sony
    March 2015, Information Security
    Carey van Vlaanderen, CEO of ESET Southern Africa, discusses three cyber security lessons learned from 2014’s most notorious hack.
  • Security in the modern age
    March 2015, Information Security
    It is now universally accepted that ever-increasing sophistication in technology, however ground-breaking it may be, brings with it a host of security challenges. The greater the innovation in how it’s ...
  • Careless employees the greatest mobile threat
    January 2015, Information Security
    Check Point’s third annual mobile security survey highlights careless employees as the greatest mobile security threat. 82% of security professionals expect the number of mobile security incidents to increase in 2015.
  • IFSEC SA 2015 focuses on retaining data securely
    November 2014, Security Services & Risk Management, Information Security
    Data storage and recovery has become big business as companies realise the true cost of losing all their strategic data to carelessness, fire or theft. Enterprise Strategy Group research indicates that ...

 
 
         
Contact:
Technews Publishing (Pty) Ltd
1st Floor, Stabilitas House
265 Kent Ave, Randburg, 2194
South Africa
Publications by Technews
Dataweek Electronics & Communications Technology
Electronic Buyers Guide (EBG)

Hi-Tech Security Solutions
Hi-Tech Security Business Directory (HSBD)

Motion Control in Southern Africa
Motion Control Buyers’ Guide (MCBG)

South African Instrumentation & Control
South African Instrumentation & Control Buyers’ Guide (IBG)
Other
Terms & conditions of use, including privacy policy
PAIA Manual
         
    Mobile | Classic

Copyright © Technews Publishing (Pty) Ltd. All rights reserved.