SlideShare a Scribd company logo
1 of 7
Download to read offline
1
NINE STEPS TO CREATING
A WORLD-CLASS INFORMATION
SECURITY PLAN
Securing your data takes more than the latest security software. It also takes sound management
and an informed team.
Protecting what we own in cyberspace has evolved to become one of today’s top business
challenges. That’s mainly because assets are no longer just physical, as they were 150 years ago.
Security is no longer a matter of just rounding up the cattle and putting a fence around the herd.
Now, there are digital assets to protect, too.
Lawyers won’t help you much, either, when it comes to data security. They may argue your case
in court or pursue those who infringe on your digital property, but they can’t do much to shore
up your data vulnerabilities. No matter how thickly your organization pads itself with teams of
lawyers, it won’t do much to protect your digital assets from the threats that loom in cyberspace.
These days, it takes a comprehensive, disruptive approach to information security to secure
all your business assets. Cyberspace is about as vast a territory to protect as any, which makes
creating an information security plan no small task. This guide is here to help.
A Guide to Protecting Your Assets in the 21st
Century
The interdependence of technologies makes for an incredibly diverse and complex world. This
world includes telecommunications, computer networks, and the quickly-growing sub-world of
connected devices.
This guide is for business owners, CISO’s, IT managers, and others who seek to create an
information security plan. It’s also designed to give leaders an idea of the landscape. Only by
seeing the big picture can leaders and managers prioritize their decisions.
2
Grasping the Information Security Landscape
A good security plan focuses on the most serious threats at hand while also incorporating a plan
for the future integrity of valuable assets.
Before you create your plan, it’s important to understand what you’re up against. Threats come in
many forms, both hostile and negligence-based. They range from catastrophic events like all-out
attacks on your company’s infrastructure, to cyber espionage, to leakage of intellectual property.
It’s that last threat, which can arise from inadvertent carelessness or from wilful theft, that poses
one of the greatest security challenges today. The reason is clear: this type of security threat
is employee-based. This is one reason why today’s security challenges must involve sound
management. Training, oversight, and communications are key in this regard.
As you can see, an information security plan must involve a plan for management as well as a
structure for technology mandates.
What follows is a five-part plan for businesses to protect their electronic assets. A 2015 Ponemon
Institute study found that the average cost of a data breach to companies surveyed was £2.95
million, up 23 percent over the previous two years. The time to start your security plan is now.
Step 1: Know What You’re Protecting
Your cyber assets can be divided into two categories:
1.	 Data. This is your intellectual property, your customer records, your inventory database, your
bookkeeping, your employee data
2.	 Systems. This is your website, your CMS, your online shopping cart, your security system for
your building, your health & safety management system, your patient monitoring system, etc,
depending the type of business you have
Step 2: Know Where the Threats Come From
Vulnerabilities for both types of assets stem from both technical and human sources. If your
firewall isn’t strong enough or configured correctly, or if you don’t have one at all, that’s a
technical issue. If your employees fall for phishing email scams, there’s your human vulnerability.
Again, cyber security is not just a technical issue—it’s a management concern, too.
On the other hand, if your employees are accessing company systems on unsecured devices, that
poses both technical- and human-based threats.
3
Step 3: Understand the Scope of a Good Plan
Companies who understand that information security plans need to be cross-departmental, as
well as top-to-bottom, will ultimately be more successful in protecting their assets.
Gone are the days when companies could simply rely on their IT departments to put up a firewall,
install anti-virus software, and be done with it.
Security is no longer the sole domain of the IT department.
Creating and managing a successful data security plan takes, first and foremost, an informed
vision from top leadership. Only through solid and consistent messaging from the C-suite will
management be able to inject a security-minded culture at every level in an organization.
In other words, it’s great if managers understand how to protect data and systems, but for a plan
to work, everyone has to work together. That includes team leaders and team players, right down
to the new hire who’s about to access the company intranet on his own phone.
Step 4: Conduct an Audit
It’s hard to devise a customized, comprehensive plan for security without first conducting an
audit. The best person to conduct a security audit is someone with security experience. Your
firm’s security is still your own responsibility, however, so it’s good to know how to conduct a
basic audit yourself.
Leaders can begin the process by taking stock of the following:
•	 data and systems that could be at risk
•	 offline systems which are at risk via USB ports etc
•	 assets shared or held outside your organization—by vendors, contractors, etc
The scope of an audit depends on your organization, your goals, and the industry you’re in.
Banking, for example, requires regular, third-party audits to ensure compliance with federal and
industry regulations.
If you’re a small business, chances are your audit can be completed in an afternoon and you can
set your own benchmarks.
Step 5: Prepare a Risk Assessment
With the list of assets you’ve made in Step 4, now it’s time to assess the level of risk for each item
on your list. Go down the list you made:
•	 What is the likelihood of an attack on each item in your security audit?
•	 What types of vulnerabilities are attached to each asset?
4
If you have a team, gather them and do some brainstorming on the risks your assets face. Then,
begin to attach value to the risks.
•	 What is the financial risk?
•	 How about the risk to your brand’s reputation if assets are compromised?
In your brainstorming session, make sure to include conversations about the motivation for
malicious cyber-attacks. That’s going to be tied to the value of the assets but also to the type of
risk involved. In other words, customer data may have street value but your company’s website
has competitive value. If your website goes down, who benefits? Try to cover all the risks from all
angles.
Finally, do you already have a security policy? If so, your assessment serves to test how well that
policy works in real life.
Step Five: Categorize Your Assets
Based on the audit and the risk assessment, you’ll be able to divide your assets into two
categories:
1.	 those which require basic protection such as best practices
2.	 those which require more aggressive measures of security
The second category of assets may require outside services for protection, or more internal
resources, or both. For instance, you may need to dedicate more employee time to protecting
these assets. Perhaps some assets require an upgraded security management regime so training
would be in order for some employees.
Step Six: Assign Responsibility
It’s important to assign responsibility for information security at your company.
According to recommendations outlined in a McKinsey white paper on managing cybersecurity,
there are three areas of responsibility to account for:
1.	 Technology. Technical capability is essential for countering cyber-attacks and for minimizing
vulnerabilities. Therefore, technical spending is largely considered a must if you’re going to
be running a business these days. Companies should be well-versed in security best practices.
These can include limiting access to employees on a need-to-access basis, for example.
2.	 People. This is key, especially as bring-your-own-device policies expand the range of
hardware that’s accessing company assets. Clear procedures need to be spelled out and
communicated with all employees. Training is a huge component of taking responsibility for
the ‘people’ aspect of IT security. Testing your employees for compliance with policies should
be considered, too.
5
3.	 Processes and procedures. If attacks do happen, there should be clear procedures in place
for handling them. Leaders need to know about attacks as soon as they happen so they can
galvanize their teams to respond properly. This includes not only making sure everyone at
your company knows about attacks, but also understands how they happen, and learns how to
protect against them.
Step Seven: Establish Your KPI’s
You’ve assigned responsibility for various aspects of cyber security. Now, how do you manage
those roles? You’ll need a basis for checking performance, so your next step is to establish the
key performance indicators (KPI) for each of the three areas of responsibility outlined above.
1.	 KPI’s for Technology. These are perhaps easiest to determine. Is your software updated? How
long does it take for everyone in your organization to update their software after the update
has been released?
2.	 KPI’s for People. Has everyone completed their security training? Has everyone read the
guidelines and signed off on them? Is everyone practicing safe email operation? Are personal
mobile devices being used for work purposes? If so, does that violate your policy? If it’s
allowed, do all personal devices adhere to security standards?
3.	 KPI’s for Processes and Procedures. Is the data your company handles suitably encrypted?
Is your website secure? If you operate using cloud services, is your system secure? Is data
segmented properly?
Step Eight: Set Up a Management Review Process
KPI’s don’t help you much if nobody’s checking up on them. Establish a regular, routine review
process. Managers, using KPI’s and a benchmark, should submit assessment reports for their
departments.
Step Nine: Get Your Contingency Plan in Place
If your organization does experience a major security attack, what will you do? Preparing for this
outcome is similar to preparing for any Environmental, Health, and Safety (EHS) incident. You
enter three phases of response:
1.	 crisis management
2.	 recovery
3.	 incident reporting
For crisis management, how will you react when something happens? Plan how you’ll
communicate with employees and stakeholders. Then plan how you’ll approach your system
response. Will you take your website offline if you suffer a DDOS attack?
6
Recovery will undoubtedly involve your IT people, whether they’re in-house or contracted.
You’ll want to repair any damages to data and systems, then plug up the ‘hole’ that caused the
vulnerability, then restore your system back to normal operation.
However, you manage this last component (recovery), make sure it’s fast. The longer you wait, the
more exposure you have to attacks.
Finally, you’ll want to draw up something akin to an incident report. Reporting on the
circumstances that led up to the attack or the breach can prove to be valuable data when you’re
revising your security plan. It’s also helpful for when you’re looking for ways to prevent future
attacks.
You may also need to report to stakeholders. They’ll want reassurance that you understand the
attack or the breach, so it’s less likely to happen again.
Conclusion
The bottom line is that every organization, no matter how small, has digital assets that are
vulnerable and need protecting. Whether it’s via malicious hackers or careless employees, your
company’s assets are at great risk if you don’t have an information security plan.
The steps outlined in this guide are simply a template for getting started with your plan. Every
organization maintains its own set of unique digital assets and has its own set of vulnerabilities.
While companies face similar cyber threats, each has to develop its own, specialized plan for
security. The policies you create should be aimed at the employees you have, to protect the
assets you hold, not those of some other organization.
We hope this guide has given you a foundation for creating your own information security plan—
one that carries you through the coming years, and which will be adaptable as the threats evolve
and your business grows.
Contact your Bright representive today for more information:
333 Latimer Rd, London W10 6RA | 020 3031 9500
sales@bright.co

More Related Content

Recently uploaded

Jual Obat Aborsi Di Sibolga wa 0851/7541/5434 Cytotec Misoprostol 200mcg Pfizer
Jual Obat Aborsi Di Sibolga wa 0851/7541/5434 Cytotec Misoprostol 200mcg PfizerJual Obat Aborsi Di Sibolga wa 0851/7541/5434 Cytotec Misoprostol 200mcg Pfizer
Jual Obat Aborsi Di Sibolga wa 0851/7541/5434 Cytotec Misoprostol 200mcg Pfizer
Pusat Herbal Resmi BPOM
 
Obat Aborsi Malang 0851\7696\3835 Jual Obat Cytotec Di Malang
Obat Aborsi Malang 0851\7696\3835 Jual Obat Cytotec Di MalangObat Aborsi Malang 0851\7696\3835 Jual Obat Cytotec Di Malang
Obat Aborsi Malang 0851\7696\3835 Jual Obat Cytotec Di Malang
Obat Aborsi Jakarta Wa 085176963835 Apotek Jual Obat Cytotec Di Jakarta
 
00971508021841 حبوب الإجهاض في دبي | أبوظبي | الشارقة | السطوة |❇ ❈ ((![© ر
00971508021841 حبوب الإجهاض في دبي | أبوظبي | الشارقة | السطوة |❇ ❈ ((![©  ر00971508021841 حبوب الإجهاض في دبي | أبوظبي | الشارقة | السطوة |❇ ❈ ((![©  ر
00971508021841 حبوب الإجهاض في دبي | أبوظبي | الشارقة | السطوة |❇ ❈ ((![© ر
nafizanafzal
 
Contact +971581248768 for 100% original and safe abortion pills available for...
Contact +971581248768 for 100% original and safe abortion pills available for...Contact +971581248768 for 100% original and safe abortion pills available for...
Contact +971581248768 for 100% original and safe abortion pills available for...
DUBAI (+971)581248768 BUY ABORTION PILLS IN ABU dhabi...Qatar
 
Abortion pills in Muscut<Oman(+27737758557) Cytotec available.inn Kuwait City.
Abortion pills in Muscut<Oman(+27737758557) Cytotec available.inn Kuwait City.Abortion pills in Muscut<Oman(+27737758557) Cytotec available.inn Kuwait City.
Abortion pills in Muscut<Oman(+27737758557) Cytotec available.inn Kuwait City.
daisycvs
 
Powerpoint showing results from tik tok metrics
Powerpoint showing results from tik tok metricsPowerpoint showing results from tik tok metrics
Powerpoint showing results from tik tok metrics
CaitlinCummins3
 
#Mtp-Kit Prices » Qatar. Doha (+27737758557) Abortion Pills For Sale In Doha,...
#Mtp-Kit Prices » Qatar. Doha (+27737758557) Abortion Pills For Sale In Doha,...#Mtp-Kit Prices » Qatar. Doha (+27737758557) Abortion Pills For Sale In Doha,...
#Mtp-Kit Prices » Qatar. Doha (+27737758557) Abortion Pills For Sale In Doha,...
drm1699
 
如何办理(SUT毕业证书)斯威本科技大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(SUT毕业证书)斯威本科技大学毕业证成绩单本科硕士学位证留信学历认证如何办理(SUT毕业证书)斯威本科技大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(SUT毕业证书)斯威本科技大学毕业证成绩单本科硕士学位证留信学历认证
ogawka
 
Obat Aborsi Surabaya 0851\7696\3835 Jual Obat Cytotec Di Surabaya
Obat Aborsi Surabaya 0851\7696\3835 Jual Obat Cytotec Di SurabayaObat Aborsi Surabaya 0851\7696\3835 Jual Obat Cytotec Di Surabaya
Obat Aborsi Surabaya 0851\7696\3835 Jual Obat Cytotec Di Surabaya
Obat Aborsi Jakarta Wa 085176963835 Apotek Jual Obat Cytotec Di Jakarta
 
What is paper chromatography, principal, procedure,types, diagram, advantages...
What is paper chromatography, principal, procedure,types, diagram, advantages...What is paper chromatography, principal, procedure,types, diagram, advantages...
What is paper chromatography, principal, procedure,types, diagram, advantages...
srcw2322l101
 

Recently uploaded (20)

Home Furnishings Ecommerce Platform Short Pitch 2024
Home Furnishings Ecommerce Platform Short Pitch 2024Home Furnishings Ecommerce Platform Short Pitch 2024
Home Furnishings Ecommerce Platform Short Pitch 2024
 
Jual Obat Aborsi Di Sibolga wa 0851/7541/5434 Cytotec Misoprostol 200mcg Pfizer
Jual Obat Aborsi Di Sibolga wa 0851/7541/5434 Cytotec Misoprostol 200mcg PfizerJual Obat Aborsi Di Sibolga wa 0851/7541/5434 Cytotec Misoprostol 200mcg Pfizer
Jual Obat Aborsi Di Sibolga wa 0851/7541/5434 Cytotec Misoprostol 200mcg Pfizer
 
Obat Aborsi Malang 0851\7696\3835 Jual Obat Cytotec Di Malang
Obat Aborsi Malang 0851\7696\3835 Jual Obat Cytotec Di MalangObat Aborsi Malang 0851\7696\3835 Jual Obat Cytotec Di Malang
Obat Aborsi Malang 0851\7696\3835 Jual Obat Cytotec Di Malang
 
How to refresh to be fit for the future world
How to refresh to be fit for the future worldHow to refresh to be fit for the future world
How to refresh to be fit for the future world
 
00971508021841 حبوب الإجهاض في دبي | أبوظبي | الشارقة | السطوة |❇ ❈ ((![© ر
00971508021841 حبوب الإجهاض في دبي | أبوظبي | الشارقة | السطوة |❇ ❈ ((![©  ر00971508021841 حبوب الإجهاض في دبي | أبوظبي | الشارقة | السطوة |❇ ❈ ((![©  ر
00971508021841 حبوب الإجهاض في دبي | أبوظبي | الشارقة | السطوة |❇ ❈ ((![© ر
 
Pay after result spell caster (,$+27834335081)@ bring back lost lover same da...
Pay after result spell caster (,$+27834335081)@ bring back lost lover same da...Pay after result spell caster (,$+27834335081)@ bring back lost lover same da...
Pay after result spell caster (,$+27834335081)@ bring back lost lover same da...
 
Thompson_Taylor_MBBS_PB1_2024-03 (1)- Project & Portfolio 2.pptx
Thompson_Taylor_MBBS_PB1_2024-03 (1)- Project & Portfolio 2.pptxThompson_Taylor_MBBS_PB1_2024-03 (1)- Project & Portfolio 2.pptx
Thompson_Taylor_MBBS_PB1_2024-03 (1)- Project & Portfolio 2.pptx
 
SCI9-Q4-MOD8.1.pdfjttstwjwetw55k5wwtwrjw
SCI9-Q4-MOD8.1.pdfjttstwjwetw55k5wwtwrjwSCI9-Q4-MOD8.1.pdfjttstwjwetw55k5wwtwrjw
SCI9-Q4-MOD8.1.pdfjttstwjwetw55k5wwtwrjw
 
Should Law Firms Outsource their Bookkeeping
Should Law Firms Outsource their BookkeepingShould Law Firms Outsource their Bookkeeping
Should Law Firms Outsource their Bookkeeping
 
Contact +971581248768 for 100% original and safe abortion pills available for...
Contact +971581248768 for 100% original and safe abortion pills available for...Contact +971581248768 for 100% original and safe abortion pills available for...
Contact +971581248768 for 100% original and safe abortion pills available for...
 
Abortion pills in Muscut<Oman(+27737758557) Cytotec available.inn Kuwait City.
Abortion pills in Muscut<Oman(+27737758557) Cytotec available.inn Kuwait City.Abortion pills in Muscut<Oman(+27737758557) Cytotec available.inn Kuwait City.
Abortion pills in Muscut<Oman(+27737758557) Cytotec available.inn Kuwait City.
 
Powerpoint showing results from tik tok metrics
Powerpoint showing results from tik tok metricsPowerpoint showing results from tik tok metrics
Powerpoint showing results from tik tok metrics
 
#Mtp-Kit Prices » Qatar. Doha (+27737758557) Abortion Pills For Sale In Doha,...
#Mtp-Kit Prices » Qatar. Doha (+27737758557) Abortion Pills For Sale In Doha,...#Mtp-Kit Prices » Qatar. Doha (+27737758557) Abortion Pills For Sale In Doha,...
#Mtp-Kit Prices » Qatar. Doha (+27737758557) Abortion Pills For Sale In Doha,...
 
如何办理(SUT毕业证书)斯威本科技大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(SUT毕业证书)斯威本科技大学毕业证成绩单本科硕士学位证留信学历认证如何办理(SUT毕业证书)斯威本科技大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(SUT毕业证书)斯威本科技大学毕业证成绩单本科硕士学位证留信学历认证
 
Goal Presentation_NEW EMPLOYEE_NETAPS FOUNDATION.pptx
Goal Presentation_NEW EMPLOYEE_NETAPS FOUNDATION.pptxGoal Presentation_NEW EMPLOYEE_NETAPS FOUNDATION.pptx
Goal Presentation_NEW EMPLOYEE_NETAPS FOUNDATION.pptx
 
Navigating Tax Season with Confidence Streamlines CPA Firms
Navigating Tax Season with Confidence Streamlines CPA FirmsNavigating Tax Season with Confidence Streamlines CPA Firms
Navigating Tax Season with Confidence Streamlines CPA Firms
 
Obat Aborsi Surabaya 0851\7696\3835 Jual Obat Cytotec Di Surabaya
Obat Aborsi Surabaya 0851\7696\3835 Jual Obat Cytotec Di SurabayaObat Aborsi Surabaya 0851\7696\3835 Jual Obat Cytotec Di Surabaya
Obat Aborsi Surabaya 0851\7696\3835 Jual Obat Cytotec Di Surabaya
 
Space Tech Expo Exhibitor List 2024 - Exhibitors Data
Space Tech Expo Exhibitor List 2024 - Exhibitors DataSpace Tech Expo Exhibitor List 2024 - Exhibitors Data
Space Tech Expo Exhibitor List 2024 - Exhibitors Data
 
Innomantra Viewpoint - Building Moonshots : May-Jun 2024.pdf
Innomantra Viewpoint - Building Moonshots : May-Jun 2024.pdfInnomantra Viewpoint - Building Moonshots : May-Jun 2024.pdf
Innomantra Viewpoint - Building Moonshots : May-Jun 2024.pdf
 
What is paper chromatography, principal, procedure,types, diagram, advantages...
What is paper chromatography, principal, procedure,types, diagram, advantages...What is paper chromatography, principal, procedure,types, diagram, advantages...
What is paper chromatography, principal, procedure,types, diagram, advantages...
 

Featured

How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
ThinkNow
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 

Featured (20)

Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 

Nine Steps To Creating A World Class Information Security Plan

  • 1. 1 NINE STEPS TO CREATING A WORLD-CLASS INFORMATION SECURITY PLAN Securing your data takes more than the latest security software. It also takes sound management and an informed team. Protecting what we own in cyberspace has evolved to become one of today’s top business challenges. That’s mainly because assets are no longer just physical, as they were 150 years ago. Security is no longer a matter of just rounding up the cattle and putting a fence around the herd. Now, there are digital assets to protect, too. Lawyers won’t help you much, either, when it comes to data security. They may argue your case in court or pursue those who infringe on your digital property, but they can’t do much to shore up your data vulnerabilities. No matter how thickly your organization pads itself with teams of lawyers, it won’t do much to protect your digital assets from the threats that loom in cyberspace. These days, it takes a comprehensive, disruptive approach to information security to secure all your business assets. Cyberspace is about as vast a territory to protect as any, which makes creating an information security plan no small task. This guide is here to help. A Guide to Protecting Your Assets in the 21st Century The interdependence of technologies makes for an incredibly diverse and complex world. This world includes telecommunications, computer networks, and the quickly-growing sub-world of connected devices. This guide is for business owners, CISO’s, IT managers, and others who seek to create an information security plan. It’s also designed to give leaders an idea of the landscape. Only by seeing the big picture can leaders and managers prioritize their decisions.
  • 2. 2 Grasping the Information Security Landscape A good security plan focuses on the most serious threats at hand while also incorporating a plan for the future integrity of valuable assets. Before you create your plan, it’s important to understand what you’re up against. Threats come in many forms, both hostile and negligence-based. They range from catastrophic events like all-out attacks on your company’s infrastructure, to cyber espionage, to leakage of intellectual property. It’s that last threat, which can arise from inadvertent carelessness or from wilful theft, that poses one of the greatest security challenges today. The reason is clear: this type of security threat is employee-based. This is one reason why today’s security challenges must involve sound management. Training, oversight, and communications are key in this regard. As you can see, an information security plan must involve a plan for management as well as a structure for technology mandates. What follows is a five-part plan for businesses to protect their electronic assets. A 2015 Ponemon Institute study found that the average cost of a data breach to companies surveyed was £2.95 million, up 23 percent over the previous two years. The time to start your security plan is now. Step 1: Know What You’re Protecting Your cyber assets can be divided into two categories: 1. Data. This is your intellectual property, your customer records, your inventory database, your bookkeeping, your employee data 2. Systems. This is your website, your CMS, your online shopping cart, your security system for your building, your health & safety management system, your patient monitoring system, etc, depending the type of business you have Step 2: Know Where the Threats Come From Vulnerabilities for both types of assets stem from both technical and human sources. If your firewall isn’t strong enough or configured correctly, or if you don’t have one at all, that’s a technical issue. If your employees fall for phishing email scams, there’s your human vulnerability. Again, cyber security is not just a technical issue—it’s a management concern, too. On the other hand, if your employees are accessing company systems on unsecured devices, that poses both technical- and human-based threats.
  • 3. 3 Step 3: Understand the Scope of a Good Plan Companies who understand that information security plans need to be cross-departmental, as well as top-to-bottom, will ultimately be more successful in protecting their assets. Gone are the days when companies could simply rely on their IT departments to put up a firewall, install anti-virus software, and be done with it. Security is no longer the sole domain of the IT department. Creating and managing a successful data security plan takes, first and foremost, an informed vision from top leadership. Only through solid and consistent messaging from the C-suite will management be able to inject a security-minded culture at every level in an organization. In other words, it’s great if managers understand how to protect data and systems, but for a plan to work, everyone has to work together. That includes team leaders and team players, right down to the new hire who’s about to access the company intranet on his own phone. Step 4: Conduct an Audit It’s hard to devise a customized, comprehensive plan for security without first conducting an audit. The best person to conduct a security audit is someone with security experience. Your firm’s security is still your own responsibility, however, so it’s good to know how to conduct a basic audit yourself. Leaders can begin the process by taking stock of the following: • data and systems that could be at risk • offline systems which are at risk via USB ports etc • assets shared or held outside your organization—by vendors, contractors, etc The scope of an audit depends on your organization, your goals, and the industry you’re in. Banking, for example, requires regular, third-party audits to ensure compliance with federal and industry regulations. If you’re a small business, chances are your audit can be completed in an afternoon and you can set your own benchmarks. Step 5: Prepare a Risk Assessment With the list of assets you’ve made in Step 4, now it’s time to assess the level of risk for each item on your list. Go down the list you made: • What is the likelihood of an attack on each item in your security audit? • What types of vulnerabilities are attached to each asset?
  • 4. 4 If you have a team, gather them and do some brainstorming on the risks your assets face. Then, begin to attach value to the risks. • What is the financial risk? • How about the risk to your brand’s reputation if assets are compromised? In your brainstorming session, make sure to include conversations about the motivation for malicious cyber-attacks. That’s going to be tied to the value of the assets but also to the type of risk involved. In other words, customer data may have street value but your company’s website has competitive value. If your website goes down, who benefits? Try to cover all the risks from all angles. Finally, do you already have a security policy? If so, your assessment serves to test how well that policy works in real life. Step Five: Categorize Your Assets Based on the audit and the risk assessment, you’ll be able to divide your assets into two categories: 1. those which require basic protection such as best practices 2. those which require more aggressive measures of security The second category of assets may require outside services for protection, or more internal resources, or both. For instance, you may need to dedicate more employee time to protecting these assets. Perhaps some assets require an upgraded security management regime so training would be in order for some employees. Step Six: Assign Responsibility It’s important to assign responsibility for information security at your company. According to recommendations outlined in a McKinsey white paper on managing cybersecurity, there are three areas of responsibility to account for: 1. Technology. Technical capability is essential for countering cyber-attacks and for minimizing vulnerabilities. Therefore, technical spending is largely considered a must if you’re going to be running a business these days. Companies should be well-versed in security best practices. These can include limiting access to employees on a need-to-access basis, for example. 2. People. This is key, especially as bring-your-own-device policies expand the range of hardware that’s accessing company assets. Clear procedures need to be spelled out and communicated with all employees. Training is a huge component of taking responsibility for the ‘people’ aspect of IT security. Testing your employees for compliance with policies should be considered, too.
  • 5. 5 3. Processes and procedures. If attacks do happen, there should be clear procedures in place for handling them. Leaders need to know about attacks as soon as they happen so they can galvanize their teams to respond properly. This includes not only making sure everyone at your company knows about attacks, but also understands how they happen, and learns how to protect against them. Step Seven: Establish Your KPI’s You’ve assigned responsibility for various aspects of cyber security. Now, how do you manage those roles? You’ll need a basis for checking performance, so your next step is to establish the key performance indicators (KPI) for each of the three areas of responsibility outlined above. 1. KPI’s for Technology. These are perhaps easiest to determine. Is your software updated? How long does it take for everyone in your organization to update their software after the update has been released? 2. KPI’s for People. Has everyone completed their security training? Has everyone read the guidelines and signed off on them? Is everyone practicing safe email operation? Are personal mobile devices being used for work purposes? If so, does that violate your policy? If it’s allowed, do all personal devices adhere to security standards? 3. KPI’s for Processes and Procedures. Is the data your company handles suitably encrypted? Is your website secure? If you operate using cloud services, is your system secure? Is data segmented properly? Step Eight: Set Up a Management Review Process KPI’s don’t help you much if nobody’s checking up on them. Establish a regular, routine review process. Managers, using KPI’s and a benchmark, should submit assessment reports for their departments. Step Nine: Get Your Contingency Plan in Place If your organization does experience a major security attack, what will you do? Preparing for this outcome is similar to preparing for any Environmental, Health, and Safety (EHS) incident. You enter three phases of response: 1. crisis management 2. recovery 3. incident reporting For crisis management, how will you react when something happens? Plan how you’ll communicate with employees and stakeholders. Then plan how you’ll approach your system response. Will you take your website offline if you suffer a DDOS attack?
  • 6. 6 Recovery will undoubtedly involve your IT people, whether they’re in-house or contracted. You’ll want to repair any damages to data and systems, then plug up the ‘hole’ that caused the vulnerability, then restore your system back to normal operation. However, you manage this last component (recovery), make sure it’s fast. The longer you wait, the more exposure you have to attacks. Finally, you’ll want to draw up something akin to an incident report. Reporting on the circumstances that led up to the attack or the breach can prove to be valuable data when you’re revising your security plan. It’s also helpful for when you’re looking for ways to prevent future attacks. You may also need to report to stakeholders. They’ll want reassurance that you understand the attack or the breach, so it’s less likely to happen again. Conclusion The bottom line is that every organization, no matter how small, has digital assets that are vulnerable and need protecting. Whether it’s via malicious hackers or careless employees, your company’s assets are at great risk if you don’t have an information security plan. The steps outlined in this guide are simply a template for getting started with your plan. Every organization maintains its own set of unique digital assets and has its own set of vulnerabilities. While companies face similar cyber threats, each has to develop its own, specialized plan for security. The policies you create should be aimed at the employees you have, to protect the assets you hold, not those of some other organization. We hope this guide has given you a foundation for creating your own information security plan— one that carries you through the coming years, and which will be adaptable as the threats evolve and your business grows.
  • 7. Contact your Bright representive today for more information: 333 Latimer Rd, London W10 6RA | 020 3031 9500 sales@bright.co