Managing Risk and Information Security: Protect to Enable
Rate it:
17%
Flag icon
as information security professionals, our mission is to Protect to Enable. This mission aligns our security goals with those of the business. It helps maintain the perception of shared values. Research suggests that people with whom we share values are deemed more trustworthy (Breakwell 2007, 143). If employees trust us, they are more likely to believe our warnings and act on our recommendations.
18%
Flag icon
how we could provide limited access to the environment from “untrusted” devices,
18%
Flag icon
Controls that are initially very effective can become inadequate over time.
18%
Flag icon
enterprise IT, a typical “set and forget” error is the failure to keep controls up-to-date, particularly if the controls are designed to mitigate a relatively low risk.
19%
Flag icon
The danger of misperception is particularly acute when decision makers rely on a narrow range of sources who all share similar viewpoints. Without obtaining a diversity of viewpoints, managers don’t get a full picture of the risk.
19%
Flag icon
When a group is composed solely of people with similar backgrounds and viewpoints, it may be particularly prone to group polarization (Breakwell 2007, 99) and the group’s decision may be more extreme than the mean of their individual views.
19%
Flag icon
even broader concern is how a focus on business goals can drive people to make unethical decisions. When these decisions are made by managers at the organizational level rather than at the individual level, the impact is compounded by the potential for widespread disaster.
20%
Flag icon
We can start by ensuring we include a diversity of viewpoints when making risk management decisions. Whenever possible, we should involve a broad cross-section of individuals representing groups across the organization. This diversity helps compensate for individual biases.
23%
Flag icon
we can establish credibility by demonstrating consistency, striving for objectivity, and showing that we can accurately predict the real security issues
23%
Flag icon
If we are together nothing is impossible. If we are divided all will fail. —Winston Churchill
24%
Flag icon
A framework for decision rights and accountability to encourage desirable behavior in the use of IT. Governance identifies who will make key IT decisions and how will they be held accountable.”
24%
Flag icon
Information risk governance is the component of IT governance that enables the organization to effectively sense, interpret, and act on risk.
24%
Flag icon
Information risk governance focuses on enabling the business while protecting the confidentiality, integrity, and availability of information—whether it is corporate data or pe...
This highlight has been truncated due to consecutive passage length restrictions.
24%
Flag icon
the organization can make tactical and strategic risk management decisions based on business priorities...
This highlight has been truncated due to consecutive passage length restrictions.
24%
Flag icon
To some people, the word governance may imply unnecessary bureaucracy, or perhaps even a dictatorial approach.
24%
Flag icon
When implemented well, a concise decision-making process can be a powerful mechanism for helping to achieve business objectives.
24%
Flag icon
Effective governance helps drive alignment and solid decision-making; it enables the organization to move more quickly while managing risk.
24%
Flag icon
As MIT CISR notes, “good governance is enabling and reduces bureaucracy and dysfunctional politics by formalizing organizational learning and thus avoiding the trap of ...
This highlight has been truncated due to consecutive passage length restrictions.
24%
Flag icon
Research at MIT CISR shows that the more businesses leverage the structure, tools, and techniques of governance, th...
This highlight has been truncated due to consecutive passage length restrictions.
24%
Flag icon
leveraging governance doesn’t imply slavishly following rules and procedures.
24%
Flag icon
continually make adjustments using their senses and experience to achieve the best results.
24%
Flag icon
IT policies provide a valuable framework. However, their value lies in what we can achieve by following the guidelines. Sometimes we need to make adjustments based on sensing changes in business needs.
24%
Flag icon
This is one reason that partnerships are so critical. They provide channels for dialogue, helping us sense changing business priorities so that we mitigate risk based on those priorities rather than our preconceptions.
24%
Flag icon
Without a governance structure that facilitates this dialogue, organizations may take too rigid an approach when applying controls to manage and mitigate risks.
25%
Flag icon
There’s no single IT governance model, but in the influential book IT Governance, researchers at Massachusetts Institute of Technology Center for Information Systems Research described several archetypal models based on deliberately provocative political archetypes.
26%
Flag icon
Our goal is to implement a comprehensive and balanced approach to risk management. To achieve this goal, our approach includes a large number of risk management activities grouped into five broad focus areas, as shown in Figure 3-1: oversight, monitoring, engagements, operations, and strategic activities.
26%
Flag icon
How we manage the risks: Intel’s internal information risk management focus areas. Source: Intel Corporation, 2012 Oversight. This area focuses on making informed risk decisions and reviewing risks. It includes committees and review boards that set strategic direction, and review key risk areas such as ethics, compliance, and corporate investigations. Monitoring. We monitor (sense) risk through external and internal sources. External sources include industry research and analysis. Internal sources include internal partners who inform us of new business risks or legal requirements. These ...more
This highlight has been truncated due to consecutive passage length restrictions.
26%
Flag icon
By providing vehicles for dialogue and decision-making, internal partnerships enable information security teams to become more agile and responsive to business needs.
26%
Flag icon
Today, Intel’s information security team partners with many internal groups for a variety of functions, including risk management decisions, incident response, and monitoring. These groups include legal, finance, human resources, and business groups. Partnerships may include formal structures such as standing committees and risk review boards, as described in the information risk governance section of this chapter. We also maintain a large number of informal and ad hoc relationships. These are created and maintained through everyday communication with people in other groups. We might initially ...more
27%
Flag icon
We also gain business acumen, which helps us play a more valuable role within the organization.
27%
Flag icon
At Intel, partnerships have been critical to our success in understanding the broader risk picture, helping us sense, interpret, and act on risk. Through these relationships, other groups can act as additional eyes and ears for the information security group, helping us sense new risks, such as security threats and compliance concerns.
27%
Flag icon
As privacy regulations continue to grow in complexity and reach, many organizations need to comply with multiple requirements at local, regional, and national levels. Legal specialists across the organization can help us understand what’s required in each geography, align policies and controls for protecting personal information, and decide how to manage responses in the event of a breach.
28%
Flag icon
Guidance from the US Securities and Exchange Commission specifically discusses the obligation to disclose the impact of cyber attacks, including those that result in IP thefts. Companies are also required to disclose material increases in security spending in response to an attack, even if the attack didn’t result in a loss of IP (SEC 2011).
30%
Flag icon
The human resources group is the organization’s center of expertise on employee procedures.
30%
Flag icon
HR is also responsible for other functions, including internal and external communications. Because of this broad charter, the security team may form valuable partnerships with HR in several areas, including employee policies related to appropriate use and protection of information assets, internal communications, and investigations.
30%
Flag icon
critical to create employee policies that set expectations for secure behavior.
30%
Flag icon
Careless behavior can have highly damaging consequences.
30%
Flag icon
work extensively with the employee communications group to create engaging security awareness messages, including interactive content that helps encourage secure practices when using social media and the Web.
32%
Flag icon
Privacy breaches or other compromises can have a major impact on a company’s revenue, cost, and brand image.
32%
Flag icon
insurance against cyber risks is a rapidly growing category, and we can expect a growing need to partner with the corporate risk management team to ensure adequate coverage of information risks.
32%
Flag icon
Privacy and security are closely linked. However, increasing security doesn’t always enhance privacy.
32%
Flag icon
Unfettered monitoring of information and activities can increase security but intrude on personal privacy.
32%
Flag icon
This creates inherent tension between security and privacy interests. This tension is apparent at a national level in the way that privacy advocates respond ...
This highlight has been truncated due to consecutive passage length restrictions.
32%
Flag icon
We need to carefully manage the relationship between security and privacy, ensuring that we apply the appropriate level of controls to protect information without infringing on personal privacy.
32%
Flag icon
This arrangement necessitates careful management of the relationship between security and privacy teams to manage tension, align policies, and control breaches.
32%
Flag icon
Laws define privacy rights; the organization’s interpretation of those laws drives compliance requirements.
33%
Flag icon
Direct relationships with business group managers and any risk management specialists within their groups, are invaluable for strategic and tactical reasons.
33%
Flag icon
Business group managers can help drive decision-making and incident response. They can also help improve security by setting the “tone at the top”—publicly setting expectations for their employees’ security behavior.
33%
Flag icon
Information risk has become a major concern for the entire organization.
43%
Flag icon
as information security professionals, we are in the behavior modification business. Our goals include creating a more security-conscious workforce so that users are more aware of threats and vulnerabilities and make better security decisions.