IS Security Policies and Strategies Dr Gurpreet Dhillon Virginia Commonwealth University.

Slides:



Advertisements
Similar presentations
1 of 17 Information Strategy The Features of an Information Strategy © FAO 2005 IMARK Investing in Information for Development Information Strategy The.
Advertisements

Program Management Office (PMO) Design
Thematic evaluation on the contribution of UN Women to increasing women’s leadership and participation in Peace and Security and in Humanitarian Response.
Internal Control–Integrated Framework
Course: e-Governance Project Lifecycle Day 1
Understanding the management of IS security GP Dhillon, Ph. D. Associate Professor of IS, VCU
IMFO Audit & Risk Indaba June 2012
Chapter 7: Key Process Areas for Level 2: Repeatable - Arvind Kabir Yateesh.
VCU Master Class IT Project Management Critical success and failure factors in IT project management: getting IT right GP Dhillon, PhD.
Client's aspirations, briefing and alignment of needs both within the client organisation and throughout the supply chain.
It’s Time to Talk About Risk and Control
INITIATING THE PLANNING PROCESS. CONTENT Outputs from this stage Stage general description Obtaining government commitment Raising awareness Establishing.
2-1 The Organizational Context: Strategy, Structure, and Culture Chapter 2 © 2007 Pearson Education.
Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall 2-1 The Organizational Context: Strategy, Structure, and Culture Chapter 2.
© 2015 Cengage Learning. All rights reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
The Nature of Strategic Management
Viewpoint Consulting – Committed to your success.
The Information Systems Planning Process
Evaluation and Human Resources Focus: discuss how evaluation of schools is conducted and where the emphasis should be placed in these evaluations. Thesis:
Learning and Development Developing leaders and managers
Presentation on Integrating Management Systems
Charting a course PROCESS.
Foundations of Business 3e
BIS310: Structured Analysis and Design Introduction and Systems Planning Week 1.
Chapter 3 Unit 2. Planning is deciding in advance what to do, how to do it, when to do it and who is to do it. Planning is deciding in advance what to.
Developing an IS/IT Strategy
IT Risk Management, Planning and Mitigation TCOM 5253 / MSIS 4253
Information Systems Security Risk Management. © G. Dhillon All Rights Reserved Alignment Glenmeade Vision To provide a personalized experience to our.
Copyright © 2009 International Water Association STEP 2 ESTABLISH PRELIMINARY WSP VISION.
AGENDA 09/09 & 09/10 F Nature of Strategic Challenge & F Strategic Management F The Strategy Concept and Process F Strategic Plan - Team Meetings.
Implementing and Auditing Ethics Programs
Copyrights I Global Manager Group | Revision 0.1 Feb 2009 | 1 GMG DEMO OF ISO: ENERGY MANAGEMENT SYSTEM AUDITOR TRAINING PRESENTATION KIT.
Dr. Zaheeruddin Asif.  Automate  Informate  Support ◦ Operations ◦ Control ◦ Strategy  Integrate.
CSI - Introduction General Understanding. What is ITSM and what is its Value? ITSM is a set of specialized organizational capabilities for providing value.
INITIATING THE PLANNING PROCESS. CONTENT Outputs from this stage Stage general description Obtaining government commitment Raising awareness Establishing.
Implementing Strategies: Marketing, Finance/Accounting, R&D, and MIS Issues Chapter 6.
1 CORAT AFRICA MANAGEMENT WORKSHOP FOR IMBISA/AMECEA COMMUNICATION COORDINATORS, MAPUTO, MOZAMBIQUE.
Management & Development of Complex Projects Course Code MS Project Management Project Life Cycle & PM Process Groups Lecture # 4.
Chapter 14: Using the Scalable Decision Process on Large Projects The process outlined is meant to be scaleable. Individual steps can be removed, changed,
1 of 27 How to invest in Information for Development An Introduction Introduction This question is the focus of our examination of the information management.
81 8. Managing Human Resources Managing the IS function Centralized control of IS function Distributed control of IS function Federated control of IS function.
Combining Theory and Systems Building Experiences and Challenges Sotirios Terzis University of Strathclyde.
 Management ◦ The activities and tasks undertaken by one or more persons for the purpose of planning and controlling the activities of other in order.
©2000 Bank for International Settlements 1 F I N A N C I A L S T A B I L I T Y I N S T I T U T E BANK FOR INTERNATIONAL SETTLEMENTS On-site Examination.
WEC MADRID 18 TH MARCH 2004 ASTRAZENECA’S APPROACH TO SUPPLIER RISK MANAGEMENT.
Developing an Investment Governance Framework
Gender Mainstreaming: Making It Happen Geeta Rao Gupta February 16, 2006.
University of Sunderland ENGM91 Unit 4 ENGM91 Project Planning Unit 4.
IB Business & Management Topic 6 – Strategy HL ONLY.
Principles of Information System Security: Text and Cases
Info-Tech Research Group1 Manage the IT Portfolio World Class Operations - Impact Workshop.
IFS310: Module 2 1/18/2007 Systems Planning and SDLC.
Info-Tech Research Group1 Manage IT Budgets & Cost World Class Operations - Impact Workshop.
Pertemuan 14 Matakuliah: A0214/Audit Sistem Informasi Tahun: 2007.
Strategic Management and Policy Chapter 1: Overview of Strategic Management.
Leadership Guide for Strategic Information Management Leadership Guide for Strategic Information Management for State DOTs NCHRP Project Information.
Driving Value from IT Services using ITIL and COBIT 5 July 24, 2013 Gary Hardy ITWinners.
Business Continuity Planning 101
AUDIT STAFF TRAINING WORKSHOP 13 TH – 14 TH NOVEMBER 2014, HILTON HOTEL NAIROBI AUDIT PLANNING 1.
IW:LEARN TDA/SAP Training Course
The Organizational Context: Strategy, Structure, and Culture
Chapter 4 Systems Planning and Selection
The Organizational Context
Portfolio, Programme and Project
The Organizational Context: Strategy, Structure, and Culture
The Organizational Context: Strategy, Structure, and Culture
The Organizational Context: Strategy, Structure, and Culture
Project Management Method and PMI ® PMBOK ® Roles
Presentation transcript:

IS Security Policies and Strategies Dr Gurpreet Dhillon Virginia Commonwealth University

Understanding security risks IT enabled improvement Business change Benefits Management Risk Management Positive outcomes Negative outcomes Business improvement needed

The systems lifecycle Plan Design Implement Evaluate evaluate

Planning for IS security Plan Design Implement Evaluate 1.A well conceived corporate plan establishes a basis for developing a security vision 2.A secure organization lays emphasis on the quality of its operations 3.A security policy denotes specific responses to specific recurring situations and hence cannot be considered as a top level document 4.Information systems security planning is of significance if there is a concurrent security evaluation procedure

Planning for IS security

IS security planning process

Designing IS security Plan Design Implement Evaluate 1.The adherence to a specific security design ideal determines the overall security of a system 2.Good security design will lay more emphasis on ‘correctness’ during system specification 3.A secure design should not impose any particular controls, but choose appropriate ones based on the real setting

Implementing IS security Plan Design Implement Evaluate 1.Successful implementation of security measures can be brought about if analysts consider the informal organization before the formal 2.Implementation of security measures should take a ‘situational issue-centered’ approach 3.To facilitate successful implementation of security controls, organizations need to share and develop expertise and commitment between the ‘experts’ and managers

Evaluating IS security Plan Design Implement Evaluate 1.Security evaluation can only be carried out if the nature of an organization is understood 2.The level of security cannot be quantified and measured; it can only be interpreted 3.Security evaluation cannot be based on the expert viewpoint of any one individual, rather an analysis of all stakeholders should be carried out

Risks in Systems Life Cylce Outcome risks Operational risks Process risks

Risk management: classification Inherent risks Planning needed Can be assessed and predicted Strategic High Potential Key Operational Support Outcome: high Operational: low Process: low What risk? Outcome: low Operational: high Process: medium Outcome: low Operational: low Process: high

Typical concerns StrategicHigh Potential Outcome risks Opportunity & financial risks? Lack of strategic framework: poor business understanding Conflicts of strategy and problems of coordination IT supplier problems Poor management of change Senior management not involved Large and complex projects; too many stakeholders Rigid methodology and strict budgetary controls Key Operational Support Operational risks Process based risks Too much faith in the ‘technical fix’ Use of technology for its novelty value Poor technical skills in the development team Inexperienced staff Large and complex projects; too many stakeholders Poor testing procedures Poor implementation Lack of technical standards

Risk management: core strategies StrategicHigh Potential Key OperationalSupport CONFIGURE COMMUNICATE CONTROL CONSTRAIN

Risk management: directions - 1 StrategicHigh Potential Business and corporate risks Opportunity & financial risks Key OperationalSupport Operational risks Process based risks Controllable Uncontrollable Predictable Unpredictable No problem - carry out plans Practice quick response to manage as events unfold Emphasis forecasting and thus “steer around” these events Develop a contingency planning system

Risk management: directions -2 StrategicHigh Potential Business and corporate risks Key OperationalSupport Operational risks Process based risks History Context (external) Context (internal) Business processes Content Risk Outcomes Context oriented risk assessment Opportunity & financial risks

Security management: the way forward StrategicHigh Potential Outcome risks Opportunity & financial risks? Key Operational Support Operational risks Process based risks The organizational context