How To Manage An Infrmatin Security Gvernance Prgram



Similar documents
CASSOWARY COAST REGIONAL COUNCIL POLICY ENTERPRISE RISK MANAGEMENT

HIPAA HITECH ACT Compliance, Review and Training Services

Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013

Request for Resume (RFR) CATS II Master Contract. All Master Contract Provisions Apply

Help Desk Level Competencies

POLICY 1390 Information Technology Continuity of Business Planning Issued: June 4, 2009 Revised: June 12, 2014

Internal Audit Charter and operating standards

ENTERPRISE RISK MANAGEMENT ENTERPRISE RISK MANAGEMENT POLICY

OFFICIAL JOB SPECIFICATION. Network Services Analyst. Network Services Team Manager

Professional Leaders/Specialists

Chapter 7 Business Continuity and Risk Management

Enterprise Security Management CIS 259

Systems Support - Extended

Process Improvement Center of Excellence Service Proposal Recommendation. Operational Oversight Committee Report Submission

VACANCY. SENIOR MANAGER: SPECIAL PROJECTS AND STAKEHOLDER MANAGEMENT x1 3 YEAR CONTRACT (WITH A POSSIBILITY OF BEING EXTENDED TO 5 YEARS) JOB LEVEL: 5

GUIDANCE FOR BUSINESS ASSOCIATES

HIPAA Compliance 101. Important Terms. Pittsburgh Computer Solutions

Independent Development Trust JOB DESCRIPTION

POSITION DESCRIPTION. Classification Higher Education Worker, Level 7. Responsible to. I.T Manager. The Position

Business Continuity Management Policy

South Australia Police POSITION INFORMATION DOCUMENT

PENETRATION TEST OF THE INDIAN HEALTH SERVICE S COMPUTER NETWORK

Change Management Process

CMS Eligibility Requirements Checklist for MSSP ACO Participation

GUIDELINE INFORMATION MANAGEMENT (IM) PROGRAM PLAN

MANITOBA SECURITIES COMMISSION STRATEGIC PLAN

Risk Management Policy AGL Energy Limited

Vulnerability Management:

Job Profile Data & Reporting Analyst (Grant Fund)

BRISTOL CITY COUNCIL ROLE AND EMPLOYEE PROFILE: Architect (Practitioner Level) Specific Role Data Architect

Information Services Hosting Arrangements

SERVICE DESK TEAM LEADER

Chief Finance and Operations Officer IfM Education and Consultancy Services (IfM ECS)

IT CHANGE MANAGEMENT POLICY

Appendix H. Annual Risk Assessment and Audit Plan 2013/14

AHLA. C. Big Data, Cloud Computing and the New World Order for Health Care Privacy

ITIL Release Control & Validation (RCV) Certification Program - 5 Days

INFRASTRUCTURE TECHNICAL LEAD

Audit Committee Charter

Independent Development Trust. 27 June 2016 POSITION: SENIOR SPECIALIST: SUPPLY CHAIN MANAGEMENT JOB LEVEL: 7

COPIES-F.Y.I., INC. Policies and Procedures Data Security Policy

Job Classification Details Department Job Function Job Family Job Title Job Code Salary Level

Charmaine Brooks CRM (208)

State of Wisconsin Division of Enterprise Technology (DET) Distributed Database Hosting Service Offering Definition (SOD)

ITIL Service Offerings & Agreement (SOA) Certification Program - 5 Days

CDC UNIFIED PROCESS PRACTICES GUIDE

OE PROJECT MANAGEMENT GLOSSARY

How To Write An Ehsms Training, Awareness And Competency Procedure

ITIL V3 Planning, Protection and Optimization (PPO) Certification Program - 5 Days

VCU Payment Card Policy

Audit Committee Charter. St Andrew s Insurance (Australia) Pty Ltd St Andrew s Life Insurance Pty Ltd St Andrew s Australia Services Pty Ltd

Basics of Supply Chain Management

Session 9 : Information Security and Risk

How To Understand The Risks Of A Financial Institutin

The Importance Advanced Data Collection System Maintenance. Berry Drijsen Global Service Business Manager. knowledge to shape your future

Nuance Healthcare Services Project Delivery Methodology

Sources of Federal Government and Employee Information

SECTION J QUALITY ASSURANCE AND IMPROVEMENT PROGRAM

The Whole of Government Approach: Models and Tools for EGOV Strategy & Alignment

Business Continuity Management Systems Foundation Training Course

LINCOLNSHIRE POLICE Policy Document

Helpdesk Services at the Executive Office of Energy and Environmental Affairs is defined as follows:

RESTRUCTURING THE ADDITIONAL DUTY HOURS ALLOWANCE. Part I of Volume II JOB DESCRIPTIONS FOR DIRECTORS

Configuring, Monitoring and Deploying a Private Cloud with System Center 2012 Boot Camp

Training - Quality Manual

MISSION STATEMENT & CUSTOMER SERVICE CHARTER

GIS Service Provider. GIS Service Management

System Business Continuity Classification

Major Duties and Responsibilities. Accounting

System Business Continuity Classification

Oakland County Department of Information Technology Project Scope and Approach

Transcription:

CCISO Ttal Duratin: 10 Days, 80 Hurs Dmain 1: Gvernance Qualifying areas under Dmain 1 include (but are nt limited t) the fllwing: Define, implement, manage and maintain an infrmatin security gvernance prgram that includes leadership, rganizatinal structures and prcesses. Align infrmatin security gvernance framewrk with rganizatinal gals and gvernance, i.e., leadership style, philsphy, values, standards and plicies. Establish infrmatin security management structure. Establish a framewrk fr infrmatin security gvernance mnitring (cnsidering cst/benefits analyses f cntrls and ROI). Understand standards, prcedures, directives, plicies, regulatins, and legal issues that affect the infrmatin security prgram. Understand the enterprise infrmatin security cmpliance prgram and manage the cmpliance team. Analyze all the external laws, regulatins, standards, and best practices applicable t the rganizatin. Understand the varius prvisins f the laws that affect the rganizatinal security such as Gramm-Leach-Bliley Act, Family Educatinal Rights and Privacy Act, Health Insurance Prtability and Accuntability Act [HIPAA], Federal Infrmatin Security Management Act [FISMA], Clinger-Chen Act, Privacy Act, Sarbanes-Oxley, etc. Be familiar with the different standards such as ISO 27000 series, Federal Infrmatin Prcessing Standards [FIPS]. Understand the federal and rganizatin specific published dcuments t manage peratins in a cmputing envirnment. Assess the majr enterprise risk factrs fr cmpliance. Crdinate the applicatin f infrmatin security strategies, plans, plicies, and prcedures t reduce regulatry risk. Understand the imprtance f regulatry infrmatin security rganizatins and apprpriate industry grups, frums, and stakehlders.

Understand the infrmatin security changes, trends, and best practices. Manage enterprise cmpliance prgram cntrls. Understand the infrmatin security cmpliance prcess and prcedures. Cmpile, analyze, and reprt cmpliance prgrams. Understand the cmpliance auditing and certificatin prgrams. Fllw rganizatinal ethics. Dmain 2 Management Cntrls and Auditing Management Infrmatin Security Management Cntrls: Identify the rganizatin s peratinal prcess and bjectives as well as risk tlerance level. Design infrmatin systems cntrls in alignment with the peratinal needs and gals and cnduct testing prir t implementatin t ensure effectiveness and efficiency. Identify and select the resurces required t effectively implement and maintain infrmatin systems cntrls. Such resurces can include human capital, infrmatin, infrastructure, and architecture (e.g., platfrms, perating systems, netwrks, databases, applicatins). Supervise the infrmatin systems cntrl prcess t ensure timely implementatin in accrdance with the utlined budget and scpe, and cmmunicate prgress t stakehlders. Design and implement infrmatin systems cntrls t mitigate risk. Mnitr and dcument the infrmatin systems cntrl perfrmance in meeting rganizatinal bjectives by identifying and measuring metrics and key perfrmance indicatrs (KPIs). Design and cnduct testing f infrmatin security cntrls t ensure effectiveness, discver deficiencies and ensure alignment with rganizatin s plicies, standards and prcedures. Design and implement prcesses t apprpriately remediate deficiencies and evaluate prblem management practices t ensure that errrs are recrded, analyzed and reslved in a timely manner. Assess and implement tls and techniques t autmate infrmatin systems cntrl prcesses. Prduce infrmatin systems cntrl status reprts t ensure that the prcesses fr infrmatin systems peratins, maintenance and supprt meet the rganizatin s strategies and bjectives, and share with relevant stakehlders t supprt executive decisi Auditing Management Understand the IT audit prcess and be familiar with IT audit standards.

Apply infrmatin systems audit principles, skills and techniques in reviewing and testing infrmatin systems technlgy and applicatins t design and implement a thrugh risk-based IT audit strategy. Execute the audit prcess in accrdance with established standards and interpret results against defined criteria t ensure that the infrmatin systems are prtected, cntrlled and effective in supprting rganizatin s bjectives. Effectively evaluate audit results, weighing the relevancy, accuracy, and perspective f cnclusins against the accumulated audit evidence. Assess the expsures resulting frm ineffective r missing cntrl practices and frmulate a practical and cst-effective plan t imprve thse areas. Develp an IT audit dcumentatin prcess and share reprts with relevant stakehlders as the basis fr decisin-making. Ensure that the necessary changes based n the audit findings are effectively implemented in a timely manner. n-making. Dmain 3 Management Prjects and Operatins. Qualifying areas under Dmain 3 include (but are nt limited t) the fllwing: Fr each infrmatin systems prject develp a clear prject scpe statement in alignment with rganizatinal bjectives. Define activities needed t successfully execute the infrmatin systems prgram, estimate activity duratin, and develp a schedule and staffing plan. Develp, manage and mnitr the infrmatin systems prgram budget, estimate and cntrl csts f individual prjects. Identify, negtiate, acquire and manage the resurces needed fr successful design and implementatin f the infrmatin systems prgram (e.g., peple, infrastructure, and architecture). Acquire, develp and manage infrmatin security prject team. Assign clear infrmatin security persnnel jb functins and prvide cntinuus training t ensure effective perfrmance and accuntability. Direct infrmatin security persnnel and establish cmmunicatins, and team activities, between the infrmatin systems team and ther security-related persnnel (e.g., technical supprt, incident management, security engineering). Reslve persnnel and teamwrk issues within time, cst, and quality cnstraints. Identify, negtiate and manage vendr agreement and cmmunicatin. Participate with vendrs and stakehlders t review/assess recmmended slutins; identify incmpatibilities, challenges, r issues with prpsed slutins.

Evaluate the prject management practices and cntrls t determine whether business requirements are achieved in a cst-effective manner while managing risks t the rganizatin. Develp a plan t cntinuusly measure the effectiveness f the infrmatin systems prjects t ensure ptimal system perfrmance. Identify stakehlders, manage stakehlders expectatins and cmmunicate effectively t reprt prgress and perfrmance. Ensure that necessary changes and imprvements t the infrmatin systems prcesses are implemented as required. Dmain 4 Infrmatin Security Cre Cmpetence Access Cntrl Identify the criteria fr mandatry and discretinary access cntrl, understand the different factrs that help in implementatin f access cntrls and design an access cntrl plan. Implement and manage an access cntrl plan in alignment with the basic principles that gvern the access cntrl systems such as need-t-knw. Identify different access cntrl systems such as ID cards and bimetrics. Understand the imprtance f warning banners fr implementing access rules. Develp prcedures t ensure system users are aware f their IA respnsibilities befre granting access t the infrmatin systems. Scial Engineering, Phishing Attacks, Identity Theft Understand varius scial engineering cncepts and their rle in insider attacks and develp best practices t cunter scial engineering attacks. Design a respnse plan t identity theft incidences. Identify and design a plan t vercme phishing attacks. Physical Security Identify standards, prcedures, directives, plicies, regulatins and laws fr physical security. Determine the value f physical assets and the impact if unavailable. Identify resurces needed t effectively implement a physical security plan. Design, implement and manage a cherent, crdinated, and hlistic physical security plan t ensure verall rganizatinal security. Establish bjectives fr persnnel security t ensure alignment with verall security gals fr the enterprise. Design and manage the physical security audit and update issues.

Establish a physical security perfrmance measurement system. Risk Management Identify the risk mitigatin and risk treatment prcesses and understand the cncept f acceptable risk. Identify resurce requirements fr risk management plan implementatin. Design a systematic and structured risk assessment prcess and establish, in crdinatin with stakehlders, an IT security risk management prgram based n standards and prcedures and ensure alignment with rganizatinal gals and bjectives. Develp, crdinate and manage risk management teams. Establish relatinships between the incident respnse team and ther grups, bth internal (e.g., legal department) and external (e.g., law enfrcement agencies, vendrs, and public relatins prfessinals) Develp an incident management measurement prgram and manage the risk management tls and techniques. Understand the residual risk in the infrmatin infrastructure. Assess threats and vulnerabilities t identify security risks, and regularly update applicable security cntrls. Identify changes t risk management plicies and prcesses and ensure the risk management prgram remains current with the emerging risk and threat envirnment and in alignment with the rganizatinal gals and bjectives. Determine if security cntrls and prcesses are adequately integrated int the investment planning prcess based n IT prtfli and security reprting. Disaster Recvery and Business Cntinuity Planning Develp, implement and mnitr business cntinuity plans in case f disruptive events and ensure alignment with rganizatinal gals and bjectives. Define the scpe f the enterprise cntinuity f peratins prgram t address business cntinuity, business recvery, cntingency planning, and disaster recvery/related activities. Identify the resurces and rles f different stakehlders in business cntinuity prgrams. Identify and priritize critical business functins and cnsequently design emergency delegatins f authrity, rders f successin fr key psitins, the enterprise cntinuity f peratins rganizatinal structure and staffing mdel. Direct cntingency planning, peratins, and prgrams t manage risk. Understand the imprtance f lessns learned frm test, training and exercise, and crisis events. Design dcumentatin prcess as part f the cntinuity f peratins prgram.

Design and execute a testing and updating plan fr the cntinuity f peratins prgram. Understand the imprtance f integratin f IA requirements int the Cntinuity f Operatins Plan (COOP). Identify the measures t increase the level f emergency preparedness such as backup and recvery slutins and design standard perating prcedures fr implementatin during disasters. Firewall, IDS/IPS and Netwrk Defense Systems Identify the apprpriate intrusin detectin and preventin systems fr rganizatinal infrmatin security. Design and develp a prgram t mnitr firewalls and identify firewall cnfiguratin issues. Understand perimeter defense systems such as grid sensrs and access cntrl lists n ruters, firewalls, and ther netwrk devices. Identify the basic netwrk architecture, mdels, prtcls and cmpnents such as ruters and hubs that play a rle in netwrk security. Understand the cncept f netwrk segmentatin. Manage DMZs, VPN and telecmmunicatin technlgies such as PBX and VIP. Identify netwrk vulnerabilities and explre netwrk security cntrls such as use f SSL and TLS fr transmissin security. Supprt, mnitr, test, and trublesht issues with hardware and sftware. Manage accunts, netwrk rights, and access t systems and equipment. Wireless Security Identify vulnerability and attacks assciated with wireless netwrks and manage different wireless netwrk security tls. Virus, Trjans and Malware Threats Assess the threat f virus, Trjan and malware t rganizatinal security and identify surces and mediums f malware infectin. Deply and manage anti-virus systems. Develp prcess t cunter virus, Trjan, and malware threats. Secure Cding Best Practices and Securing Web Applicatins Develp and maintain sftware assurance prgrams in alignment with the secure cding principles and each phase f System Develpment Life Cycle (SDLC). Understand varius system-engineering practices.

Cnfigure and run tls that help in develping secure prgrams. Understand the sftware vulnerability analysis techniques. Install and perate the IT systems in a test cnfiguratin manner that des nt alter the prgram cde r cmprmise security safeguards. Identify web applicatin vulnerabilities and attacks and web applicatin security tls t cunter attacks. Hardening OS Identify varius OS vulnerabilities and attacks and develp a plan fr hardening OS systems. Understand system lgs, patch management prcess and cnfiguratin management fr infrmatin system security. Encryptin Technlgies Understand the cncept f encryptin and decryptin, digital certificates, public key infrastructure and the key differences between cryptgraphy and stegangraphy. Identify the different cmpnents f a cryptsystem. Develp a plan fr infrmatin security encryptin techniques. Vulnerability Assessment And Penetratin Testing Design, develp and implement a penetratin testing prgram based n penetratin testing methdlgy t ensure rganizatinal security. Identify different vulnerabilities assciated with infrmatin systems and legal issues invlved in penetratin testing. Develp pre and pst testing prcedures. Develp a plan fr pen test reprting and implementatin f technical vulnerability crrectins. Develp vulnerability management systems. Cmputer Frensics And Incident Respnse Develp a plan t identify a ptential security vilatin and take apprpriate actin t reprt the incident. Cmply with system terminatin prcedures and incident reprting requirements related t ptential security incidents r actual breaches. Assess ptential security vilatins t determine if the netwrk security plicies have been breached, assess the impact, and preserve evidence. Diagnse and reslve IA prblems in respnse t reprted incidents. Design incident respnse prcedures.

Develp guidelines t determine whether a security incident is indicative f a vilatin f law that requires specific legal actin. Identify the vlatile and persistent system infrmatin. Set up and manage frensic labs and prgrams. Understand varius digital media devices, e-discvery principles and practices and different file systems. Develp and manage an rganizatinal digital frensic prgram. Establish, develp and manage frensic investigatin teams. Design investigatin prcesses such as evidence cllectin, imaging, data acquisitin, and analysis. Identify the best practices t acquire, stre and prcess digital evidence. Cnfigure and use varius frensic investigatin tls. Design anti-frensic techniques. Dmain 5 Strategic Planning and Finance. Strategic Planning Design, develp and maintain enterprise infrmatin security architecture (EISA) by aligning business prcesses, IT sftware and hardware, lcal and wide area netwrks, peple, peratins, and prjects with the rganizatin s verall security strategy. Perfrm external analysis f the rganizatin (e.g., analysis f custmers, cmpetitrs, markets and industry envirnment) and internal analysis (risk management, rganizatinal capabilities, perfrmance measurement etc.) and utilize them t align infrmatin security prgram with rganizatin s bjectives. Identify and cnsult with key stakehlders t ensure understanding f rganizatin s bjectives. Define a frward-lking, visinary and innvative strategic plan fr the rle f the infrmatin security prgram with clear gals, bjectives and targets that supprt the peratinal needs f the rganizatin. Define key perfrmance indicatrs and measure effectiveness n cntinuus basis. Assess and adjust IT investments t ensure they are n track t supprt rganizatin s strategic bjectives. Mnitr and update activities t ensure accuntability and prgress. Finance Analyze, frecast and develp the peratinal budget f the IT department.

Acquire and manage the necessary resurces fr implementatin and management f infrmatin security plan. Allcate financial resurces t prjects, prcesses and units within infrmatin security prgram. Mnitr and versee cst management f infrmatin security prjects, return n investment (ROI) f key purchases related t IT infrastructure and security and ensure alignment with the strategic plan. Identify and reprt financial metrics t stakehlders. Balance the IT security investment prtfli based n EISA cnsideratins and enterprise security pririties. Understand the acquisitin life cycle and determine the imprtance f prcurement by perfrming Business Impact Analysis. Identify different prcurement strategies and understand the imprtance f cstbenefit analysis during prcurement f an infrmatin system. Understand the basic prcurement cncepts such as Statement f Objectives (SOO), Statement f Wrk (SOW), and Ttal Cst f Ownership (TCO). Cllabrate with varius stakehlders (which may include internal client, lawyers, IT security prfessinals, privacy prfessinals, security engineers, suppliers, and thers) n the prcurement f IT security prducts and services. Ensure the inclusin f risk-based IT security requirements in acquisitin plans, cst estimates, statements f wrk, cntracts, and evaluatin factrs fr award, service level agreements, and ther pertinent prcurement dcuments. Design vendr selectin prcess and management plicy. Develp cntract administratin plicies that direct the evaluatin and acceptance f delivered IT security prducts and services under a cntract, as well as the security evaluatin f IT and sftware being prcured. Develp measures and reprting standards t measure and reprt n key bjectives in prcurements aligned with IT security plicies and prcedures. Understand the IA security requirements t be included in statements f wrk and ther apprpriate prcurement dcuments.