Access Millions of academic & study documents

Although many commercial and government organizations operate throug

Content type
User Generated
Showing Page:
1/3
Although many commercial and government organizations
operate through a hierarchy, many have not implemented
an IT or Security governance structure. Why is it that
organizations often view IT and security functions as
difficult to organize and govern?
Research and discuss a security governance infrastructure
that you believe provides a solid example for other
organizations to follow.
Solution
Managing information security is a challenge for some
companies and getting a grip on security may seem near
impossible. To have successfull IT security operation, have
to concentrate of 5 areas: policy and audit management,
access management, infrastructure and hardware security,
software and application security, and incident response.
Ideally each of these areas should be handled individually
or in combinations its own team, each with its own senior
head - manager or director and reporting directly to a chief
information security officer or Chief technology office or
someone is similar role . But not all the companies have
such luxuary and existing team/employees are performing
multiple roles . Even thinking of outsourcing might not help

Sign up to view the full document!

lock_open Sign Up
Showing Page:
2/3
as you need somone as a single point of contact (SPOC)
within/from the company and for that you need to have
someone who has free time cycle and knowledgeable to
handle discussions with the outsourced company.Cost and
budget Constraint is also a challenge that companies have
to look into that before moving ahead and in current
market scenario no companies has a liberty to spend at its
own will , require lot of approvals before moving ahead
Any organization need to have good security program and
elements of that program are :
1. Designated security officer : For most security
regulations and standards, having an officer is not optional
its a requirement. Your security officer is the one
responsible for coordinating and executing your security
program.
2. Risk assessment: Identifies and assesses the risks that
your security program intends to manage.
3. Policies and Procedures: Needs to be in place from
security aspect
4. Organizational security awareness: In general , security
community agrees that human factor is the weakest link in
most organizations security , not technology but still it is
often overlooked in security programs. Have to take human
factor seriously and every employee needs to be informed
of his or her roles and responsibilities when it comes to

Sign up to view the full document!

lock_open Sign Up
Showing Page:
3/3

Sign up to view the full document!

lock_open Sign Up
Unformatted Attachment Preview
Although many commercial and government organizations operate through a hierarchy, many have not implemented an IT or Security governance structure. Why is it that organizations often view IT and security functions as difficult to organize and govern? Research and discuss a security governance infrastructure that you believe provides a solid example for other organizations to follow. Solution Managing information security is a challenge for some companies and getting a grip on security may seem near impossible. To have successfull IT security operation, have to concentrate of 5 areas: policy and audit management, access management, infrastructure and hardware security, software and application security, and incident response. Ideally each of these areas should be handled individually or in combinations its own team, each with its own senior head - manager or director and reporting dire ...
Purchase document to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Studypool
4.7
Indeed
4.5
Sitejabber
4.4