Book Image

Information Security Handbook - Second Edition

By : Darren Death
Book Image

Information Security Handbook - Second Edition

By: Darren Death

Overview of this book

Information Security Handbook is a practical guide that’ll empower you to take effective actions in securing your organization’s assets. Whether you are an experienced security professional seeking to refine your skills or someone new to the field looking to build a strong foundation, this book is designed to meet you where you are and guide you toward improving your understanding of information security. Each chapter addresses the key concepts, practical techniques, and best practices to establish a robust and effective information security program. You’ll be offered a holistic perspective on securing information, including risk management, incident response, cloud security, and supply chain considerations. This book has distilled years of experience and expertise of the author, Darren Death, into clear insights that can be applied directly to your organization’s security efforts. Whether you work in a large enterprise, a government agency, or a small business, the principles and strategies presented in this book are adaptable and scalable to suit your specific needs. By the end of this book, you’ll have all the tools and guidance needed to fortify your organization’s defenses and expand your capabilities as an information security practitioner.
Table of Contents (16 chapters)

Understanding the organizational context

To effectively protect an organization from potential threats, information security professionals must understand what is important to the organization beyond its information technology. To begin this process, information security professionals should examine the organization’s mission and vision statements to understand what the organization does and who its customers are. Understanding this information can help identify the business-critical processes of the organization’s operations and the technology assets that support them. For example, a hospital’s business-critical processes may include medical records on an external internet-facing technology asset. In contrast, a financial institution’s business-critical process may consist of customer financial data on an internally facing technology asset.

To take this understanding a step further, information security professionals must also work with all levels of management within the organization. This type of engagement involves reaching out to mission-driven parts of the organization to understand how they apply their mission and vision to their day-to-day work. Through this engagement, information security professionals can identify sensitive information, trade secrets, intellectual property, and business processes to understand the potential impact on the organization if this information were to be provided to a competitor, altered, or destroyed. By focusing on business processes and important data within those functions, information security professionals can establish mission-focused relationships within the organization and find allies who share their concerns.

When the highly sensitive processes and information the organization needs to operate have been identified, information security professionals can analyze this information regarding compliance requirements and the organization’s threats. This analysis must consider the organization’s specific context. Organizations may have vastly different responses to securing information systems depending on their industry, the types of information they are trying to protect, and the threats they face.

Understanding what is essential for the successful business operations of an organization, as well as establishing mission-focused relationships with the organization’s various mission units, is critical for information security professionals to protect the organization from potential threats effectively. Gathering this information requires focusing on business functions, the essential data within those functions, and a contextual understanding of the organization’s specific industry and compliance requirements.

Once the critical business processes and data have been identified, the next step is to evaluate the potential impact of a security breach on each technology asset that supports these business processes. This includes considering a successful attack’s financial, reputational, and operational consequences on an organization. For example, a data breach that results in the loss of customer financial information could result in a significant financial loss and damage to the organization’s reputation. Cybersecurity threats can significantly impact an organization’s business operations and reputation. Understanding how these threats can impact the organization from a business perspective is crucial to prioritizing and allocating resources to address them adequately.

One of the most obvious impacts of a cybersecurity breach is financial losses. A breach can result in stolen funds, lost revenue, and legal fees associated with remediation efforts. For example, suppose customer credit card data is compromised in a data breach. In that case, the organization may be liable for fraudulent charges made with those cards, which can result in significant financial losses. Another potential impact of a cybersecurity breach is damage to the organization’s reputation. A breach can erode customer trust and confidence in the organization, leading to decreased sales and difficulty attracting new customers. In some cases, a breach can result in legal action or regulatory fines, further damaging the organization’s reputation.

In addition to financial losses and damage to reputation, a cybersecurity breach can also impact an organization’s ability to carry out its business operations. A breach can result in systems downtime or data loss, disrupting normal business processes and resulting in lost productivity. A breach can have a ripple effect throughout the organization and impact multiple areas, such as supply chain management, customer service, and marketing.

Once the organizational context has been determined, it is essential to integrate cybersecurity with business operations. Alignment involves ensuring that cybersecurity measures align with the organization’s goals and objectives and do not disrupt business processes. One of the key ways to integrate cybersecurity with business operations is to involve key stakeholders in the process. This engagement includes business leaders, IT professionals, and cybersecurity professionals. By involving key stakeholders in the process, it is possible to ensure that cybersecurity measures are designed with the organization’s goals and objectives in mind and integrated into existing business processes.