Donate your essay and get 10$ for each one!
Upload your essay and after it checking you will get money in your bonus account.
How it works
With cybersecurity attacks on the rise, the ability of an organization to ensure uninterrupted operations is an imperative. No longer can an organization solely rely upon software applications to identify and mitigate cyber risks. It takes a skilled team led by an experienced manager to holistically address an organization’s technology risks. The National Infrastructure Advisory Council’s (NIAC’s) definition of infrastructure resilience is “the ability to reduce the magnitude and/or duration of disruptive events. The effectiveness of a resilient infrastructure or enterprise depends upon its ability to anticipate, absorb, adapt to, and/or rapidly recover from a potentially disruptive event.” A Chief Information Security Officer is a senior-level executive within an organization who is responsible for proactively protecting the information assets of the organization. The CISO must understand the scope of the organization’s needs and goals. Reducing risk through education and training also falls within the CISO’s responsibilities. This officer is a key senior leader within an organization that must be intimately involved in the development of an organization’s resiliency plan. The CISO utilizes current technology tools to assess and provide feedback to key stakeholders about the potential and current risks to the organization’s technology infrastructure. Balancing confidentiality, integrity, and availability (CIA Triad) is always at the forefront of every decision. While security (confidentiality and integrity) is important to an information security professional, availability is just as important to the heads of each department and the customer. The CISO’s ability to communicate at the target audience’s level of understanding is key to gaining support in the pursuit of securing the organization’s data and systems. By utilizing the eight domains of the CISSP Common Body of Knowledge, a CISO can build a proactive information security defense structure that will protect the organization’s interests. The following sections will provide a description of each domain and provide examples of how a Chief Information Security Officer can utilize this framework to develop a solid information security program for their organization. Security and Risk Management
Upon acceptance into a new position, a CISO should assess the organization’s compliance with regulatory guidance as it pertains to information security both locally and internationally. A CISO must understand and align security functions to the goals, mission, and objectives of the organization. Operational goals (daily), tactical goals (mid-term), and strategic goals (long-term) must be addressed according to the current and future security posture necessary for the industry that the organization operates within. A CISO would best support their organization by effectively balancing availability with integrity and confidentiality of information services. Understanding the legal requirements as they pertain to information security both nationally and internationally is necessary for the CISO to protect the organization from potential violations with regards to privacy or licensing concerns. In addition to providing regulatory requirements regarding reporting and audits of information systems and networks, this domain will provide information about security governance principles which will assist in developing the organization’s policies and incident response procedures.
How it works
People, both internal and external, are always the priority when it comes to safety and liability. By developing personnel security policies and information assurance training programs, the CISO will address some of the risk concerns of the organization. These programs and policies must also address external personnel that would have access to networks and/or internal data. Asset Security
Assigning roles, permissions, classification levels, data security controls, and encryption are focuses within this section of the CISSP CBK. Determining the sensitivity and criticality of data is necessary in determining the method of control and transport of data. The CISO must be in communication with the data, systems, and business/mission owners to ensure there is a cooperative effort in developing policies regarding data security controls. The CISO would assist key stakeholders in understanding the risks involved with different states of data (Data in Transit, Data at Rest, Data Remanence, etc.) and establish handling and destruction requirements.
Handling data is just as much about people as it is about systems. Data ownership and responsibilities should be clearly defined and agreed upon. The CISO should assist data owners in understanding their level of accountability when handling data. Without clearly communicating these responsibilities and liabilities, data integrity and quality are at risk.
The method of sending or storing data can be difficult to manage for a CISO. Network security and media handling methods must incorporate means of protecting the data in transit or at rest. Up-to-date methods of encryption must be used to reduce the risk of compromising the organization’s data. The CISO should be familiar with different standards and be able to implement and enforce the appropriate standards within their organization. This domain provides links to some of the primary publications that will assist in asset security goals:
Make sure your essay is plagiarism-free or hire a writer to get a unique paper crafted to your needs.
Our writers will help you fix any mistakes and get an A+!GET QUALIFIED HELP
Please check your inbox.I NEED PLAGIARISM-FREE ESSAY
Hi! I'm Amy,
your personal assistant!
Don't know where to start? Give me your paper requirements and I connect you to an academic expert.get professional help