IS4550 Security Policies and Implementation

Slides:



Advertisements
Similar presentations
Leading Change * * Kotter, John. Leading Change. Boston: Harvard Business School Press.
Advertisements

Change Management Overview. 2 Objectives Overview of the change management approach Clarity on how the tools support the change approach Apply the change.
Ninth Lecture Hour 8:30 – 9:20 pm, Thursday, September 13
Social Media Requires Change Management Urgency! Guidance & governance Vision Communication Empowerment & enablement Campaign wins + competence development.
Leadership: Understanding its Global Impact Chapter 11: Leading change.
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Security Policies and Implementation Issues.
CHAPTER 9 DEVELOPING BUSINESS/IT STRATEGIES. IT Planning Planning an information system doesn’t start with bits, and bytes, or a Web site. It starts with.
Leading and Managing Business Intelligence 21 st Meeting Course Name: Business Intelligence Year: 2009.
Individual Development Plan
Towards 2010 – VCE Business Management
COSO Framework Update IIA Columbus Chapter May 17, 2013
Information Technology Audit
Week Six Topic Week Six Topic Copyright © Regis University, 2012.
ITIL – Yale’s Experience – as of May, 2008 John Guidone Bill Cunningham Yale University.
University of Portsmouth Managing Change at VT Group Michael Staunton Organisation Development Director 28 October 2009.
Change Management for (IT) Projects Learned lessons from 300+ ]project-open[ roll-out projects.
IS3220 Information Technology Infrastructure Security
Info-Tech Research Group1 Info-Tech Research Group, Inc. Is a global leader in providing IT research and advice. Info-Tech’s products and services combine.
Info-Tech Research Group1 Info-Tech Research Group, Inc. Is a global leader in providing IT research and advice. Info-Tech’s products and services combine.
© ITT Educational Services, Inc. All rights reserved. IS3120 Network Communications Infrastructure Unit 10 Network Management—FCAPS.
Maureen Dieckmann March Introductions AGENDA Change Management o What is it exactly? o Why is it difficult? How and when to implement Introducing.
© ITT Educational Services, Inc. All rights reserved. IS4680 Security Auditing for Compliance Unit 1 Information Security Compliance.
Diane Trimble, MSN, RN-BC Saint Luke’s Health System.
CMGT 430 Week 4 Learning Team Presentation Check this A+ tutorial guideline at Week-4-Learning-Team-Presentation.
Sample Fit-Gap Kick-off
Lecture 20 Revision class.
IS4680 Security Auditing for Compliance
Towards 2010 – VCE Business Management
Steve Barfoot, President Advantage International Registrar, Inc.
Strategic Information Initiatives
IS4550 Security Policies and Implementation
How To Apply Quality Management
Chapter 13 Leadership, people and culture
Leading Change Stephanie Shi, PhD October, 2016.
Training Course on Integrated Management System for Regulatory Body
AIMS AND LEARNING OUTCOMES UNIT: 22
Chapter 3: The Project Management Process Groups: A Case Study
IS4550 Security Policies and Implementation Unit 7 Risk Management
IS4680 Security Auditing for Compliance
Health Information Security and Privacy Collaborative (HISPC) Overview
Faisal Ba Sharahil S 09/24/2016 HRD 520 Leading Change.
Project Management.
Chapter 3: The Project Management Process Groups: A Case Study
IS4550 Security Policies and Implementation
HR Business Partner Individual Development Plans
IS4680 Security Auditing for Compliance
IS4550 Security Policies and Implementation
IST 723 Competitive Success/snaptutorial.com
INF 342 Enthusiastic Study/snaptutorial.com
IST 723 Enthusiastic Studysnaptutorial.com
BSA 376 AID Lessons in Excellence-- bsa376aid.com.
CIS 558 RANK Lessons in Excellence-- cis558rank.com.
IST 723 Education for Service/snaptutorial.com
MGT 230 Education for Service-- tutorialrank.com
Leading Change: Why Transformation Efforts Fail Terry Anderson 1999
IS4550 Security Policies and Implementation Unit 5 User Policies
LEADERSHIP & CHANGE 8 STEPS FOR LEADING CHANGE- John Kotter Create Urgency Form a powerful coalition Create a vision for change Communicate the.
IS4550 Security Policies and Implementation
Leading for the First Time? Strive to be a Ballon d'Or - Goal!!
دکترشهرام شايان دکتراي تخصصي مديريت آموزش عالي
IS4680 Security Auditing for Compliance
IS4550 Security Policies and Implementation
IS4550 Security Policies and Implementation
IS4680 Security Auditing for Compliance
IS4550 Security Policies and Implementation
IS4680 Security Auditing for Compliance
Transformational Change Management> Sustainability
IS4680 Security Auditing for Compliance
Kotter – 8 Steps of Change
Presentation transcript:

IS4550 Security Policies and Implementation Unit 2 Risk Mitigation and Business Support Processes

Class Agenda 6/23/16 Lesson Covers Chapter 4 and 5 Learning Objectives 12/6/2018 Class Agenda 6/23/16 Lesson Covers Chapter 4 and 5 Learning Objectives Lesson Presentation and Discussions. Discussion on Assignments. Discussion on Lab Activities. Break Times as per School Regulations. Try to read the text book before class. (c) ITT Educational Services, Inc.

Learning Objective Analyze how security policies help mitigate risks and support business processes in various domains in the information technology (IT) infrastructure.

Key Concepts Business challenges in each IT domain Risk mitigation in seven IT domains Organizational hurdles to policy implementation Policy implementation issues related to humans in the workplace Executive management

EXPLORE: CONCEPTS

Seven Domains of a Typical IT Infrastructure Switch

Risk Mitigation and the Role of Security Policies Each of the seven IT domains have different types of risks associated with them, and policy creation seeks to reduce or mitigate these risks. Each policy created for the seven IT domains must address as many risks in that domain as possible.

Student check and Discuss sample of Security Policies Security policies template http://www.sans.org/security resources/policies/

Relevance of Executive Management Support Data supporting policy implementation aligned with business objectives Business objectives identified align with compliance laws or regulations required to conduct business Security Policy implementation can expect executive management support

Lack of Executive Management Support Data supporting policy implementation not aligned with business objectives Business objectives identified do not align with compliance laws or regulations required to conduct business, or are unclear and have insufficient support from leadership Security Policy implementation can expect to fail without executive management support

EXPLORE: PROCESS

Policy Implementation Steps Build Support for Policy Implement Security Policy Transition From Informal to Formal Implementation Tasks Informal Discussions Formal Implementation Project Step One: Create Urgency Step Two: Form a Powerful Coalition Step Four: Communicate the Vision Step Three: Create a Vision for Change Step Five: Remove Obstacles Step Six: Create Short-Term Wins Step Seven: Build on the Change Step Eight: Anchor the Changes in Corporate Culture Adapted from “Kotter’s Eight-Step Change Model.”

Policy Implementation Issues Each organization has many different types of personal traits, each affecting the organization in its attempt to implement a policy in the workplace.

Summary In this presentation, the following were covered: Seven domains of a typical IT infrastructure Importance of executive management support to implement security policy Policy implementation steps Policy implementation issues related to humans in the workplace

Unit 2 Discussion and Assignments Unit 2 Discussion 1: Risk Mitigation Unit 2 Assignment 1: Good Policy Implementation

Unit 2 Lab Activities Lab is in the lab manual on line Lab 2.2 Develop an Organization-Wide Policy Framework Implementation Plan Reading assignment: Read chapter 4 and 5

Class Project Project Title Department of Defense DOD Audit This is a Team Project. You will create 3 teams. Deliverables or milestone drafts as specified in the project content will be submitted. Due on Week 11