Cover image for The Ciso handbook : a practical guide to securing your company
Title:
The Ciso handbook : a practical guide to securing your company
Personal Author:
Publication Information:
Boca Raton, FL : Auerbach Publications, 2006
ISBN:
9780849319525

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010132703 HF5548.37 G46 2006 Open Access Book Book
Searching...

On Order

Summary

Summary

The CISO Handbook: A Practical Guide to Securing Your Company provides unique insights and guidance into designing and implementing an information security program, delivering true value to the stakeholders of a company. The authors present several essential high-level concepts before building a robust framework that will enable you to map the concepts to your company's environment.

The book is presented in chapters that follow a consistent methodology - Assess, Plan, Design, Execute, and Report. The first chapter, Assess, identifies the elements that drive the need for infosec programs, enabling you to conduct an analysis of your business and regulatory requirements. Plan discusses how to build the foundation of your program, allowing you to develop an executive mandate, reporting metrics, and an organizational matrix with defined roles and responsibilities. Design demonstrates how to construct the policies and procedures to meet your identified business objectives, explaining how to perform a gap analysis between the existing environment and the desired end-state, define project requirements, and assemble a rough budget. Execute emphasizes the creation of a successful execution model for the implementation of security projects against the backdrop of common business constraints. Report focuses on communicating back to the external and internal stakeholders with information that fits the various audiences.

Each chapter begins with an Overview, followed by Foundation Concepts that are critical success factors to understanding the material presented. The chapters also contain a Methodology section that explains the steps necessary to achieve the goals of the particular chapter.


Author Notes

Mike Gentile is on a mission to change the status quo in Information Security as we know it. His goal is to translate the discipline from one that is often misunderstood, inefficiently applied, and painful to one that is seamless, collaborative, and repeatable in organizations across the globe. Delphiis is the encapsulation of this mission.

Mike brings balance of business acumen and technical skill-set anchored by years in the field and his core focus over the past 15 years has been his practice, Coastline Consulting services. As the Founder and President, Coastline has developed enterprise security programs for countless leading public, private, and government organizations, including many within the Global 1000 and Fortune 500. During that time he also became Co-Founder and Editor for CISOHandbook.com, the leading portal for security leaders.

As a researcher, Mike has contributed numerous publications within the Information technology, project management, and security communities. He is also a senior researcher with Computer Economics in the Information Security domain and has written articles for the ISSA Journal, Computer Economics, RSA Conference and Secure World Expo.

As a writer he is the co-author of The CISO Handbook: A Practical Guide to Securing Your Company as well as CISO Soft Skills: Securing Organizations Impaired by Employee Politics, Apathy, and Intolerant Perspectives. The CISO Handbook is used as course material for numerous advanced education and Master's programs on security leadership around the world. Mr. Gentile serves on multiple advisory boards, including being on the Board of Advisors for Savant, a malware protection company, as well an active member of the RSA Program Committee since 2009.

Mr. Gentile is a sought after speaker on security, project management, and information technology topics. For the last 3 years he has been a top rated speaker at RSA, the most prestigious security conference in the United states and has been keynote speaker for the CXO Summits conference series. He has also presented over the years for the Project Management Institute, Secure World Expo, ISSA, Symantec, and many more. Mike lives in Southern California with his wife Tiffany and their two boys.


Table of Contents

Forwardp. xiii
Acknowledgmentsp. xv
Team Acknowledgmentp. xv
Organizations We Would Like to Thankp. xvi
Introductionp. xvii
Overviewp. xvii
1 Assessp. 1
Overviewp. 1
Foundation Conceptsp. 2
Critical Skillsp. 2
Consultative Sales Skillsp. 2
Enabling New Business Opportunitiesp. 2
Reducing Business Riskp. 3
Critical Knowledgep. 4
Understanding Your Businessp. 4
Understanding Riskp. 6
Understanding Your Enterprise Differentiatorsp. 8
Understanding Your Legal and Regulatory Environmentp. 9
Understanding Your Organizational Structurep. 10
Understanding Your Organizational Dynamicsp. 11
Enterprise Culturep. 14
Understanding Your Enterprise's View of Technologyp. 15
Assessment Methodologyp. 16
Identifying Your Program's Primary Driverp. 17
Why Are You Here?p. 17
Stakeholdersp. 18
Types of Stakeholdersp. 18
Identifying Your External Driversp. 22
Regulatory/Audit Environmentp. 22
Other External Driversp. 26
Identifying Your Internal Driversp. 27
Political Climatep. 27
Who Is on Your Team?p. 29
The Enterprise's Businessp. 31
Financial Environmentp. 33
Technical Environmentp. 35
Industryp. 42
Assessment Checklistp. 46
2 Planp. 55
Overviewp. 55
Foundation Conceptsp. 55
Critical Skillsp. 56
Visioningp. 56
Strategic Planningp. 57
Negotiatingp. 57
Marketingp. 58
Talent Assessmentp. 58
Critical Skills Summaryp. 58
Critical Knowledgep. 59
ISC[superscript 2] Common Body of Knowledge (CBK)p. 59
Other Security Industry Resourcesp. 60
Planning Methodologyp. 62
Understanding Your Program's Mandatep. 63
Determining Your Program Missionp. 64
Mission Statementsp. 64
Building Your Mission Statementp. 66
Determining Your Program's Structurep. 68
Operational Versus Non-Operationalp. 68
Size of Your Enterprisep. 74
Political Climatep. 74
Centralized Versus Decentralizedp. 75
Common Reasons for Choosing a Centralized Modelp. 80
Common Reasons for Choosing a De-Centralized Modelp. 80
Security Pipelinep. 81
Architecturep. 81
Maintenancep. 83
Inspectionp. 84
Size of Your Programp. 85
Large Program Considerationsp. 85
Small Program Considerationsp. 88
Conclusionp. 91
Common Security Responsibilitiesp. 91
Information Security Program Structure Summaryp. 92
Determining Your Program's Staffingp. 92
Define the Roles and Responsibilities of Your Team Membersp. 93
Critical Attributesp. 93
Security Roles and Responsibilitiesp. 97
Influence on Staffing by the Information Security Program Structurep. 101
Perform a Gap Analysisp. 102
Evaluate Talentp. 103
Planning Summaryp. 106
Planning Checklistp. 106
3 Designp. 111
Overviewp. 111
Foundation Conceptsp. 111
Critical Skillsp. 112
Analytical Skillsp. 112
Discoveryp. 112
Evaluationp. 112
Strategyp. 112
Formulationp. 114
Organizational Skillsp. 114
Salesp. 114
Financial Planning and Budgetingp. 114
Critical Skills Summaryp. 115
Critical Knowledgep. 115
Opportunity Costp. 115
Security Documentsp. 115
Policiesp. 116
Standardsp. 117
Proceduresp. 117
Guidelinesp. 118
Examplep. 118
Risks, Threats, and Vulnerabilities ... Oh My!p. 118
Examplep. 119
Types of Security Controlsp. 119
Preventive Controlsp. 119
Detective Controlsp. 121
Gap Analysisp. 121
SMART Statementsp. 123
Types of Projectsp. 123
People Projectsp. 123
Process Projectsp. 124
Technology Projectsp. 124
Methodologyp. 124
Previewp. 124
Security Document Developmentp. 125
Project Portfolio Developmentp. 125
Communication Plan Developmentp. 125
Incorporating Your Enterprise Driversp. 125
Constraintsp. 126
Laws and Regulationsp. 127
Corporate Responsibility/Code of Conductp. 127
Enablersp. 127
Requirementsp. 128
Business Requirementsp. 129
Examplep. 129
Examplep. 130
Functional Requirementp. 130
Examplep. 131
Business Requirements of PCSCp. 131
Functional Requirementp. 131
Analysisp. 132
Methods for Creating Functional Requirementsp. 132
Requirements Summaryp. 133
Gap Analysisp. 133
Building Security Policies, Standards, Procedures, and Guidelinesp. 135
The Theory of Security Policiesp. 135
Drafting Your Information Security Policiesp. 136
Ratifying the Security Policiesp. 138
Standards, Procedures, and Guidelinesp. 138
Build Security Documents Summaryp. 139
Building the Security Project Portfoliop. 140
Performing the Policy Gap Analysisp. 140
Examplep. 142
Analysisp. 142
Defining Ambiguitiesp. 142
Evaluating Controls (Gap Analysis)p. 143
Risk and Exposure Statementsp. 145
Risk Ratingp. 145
Risk Rating - Highp. 146
Deriving the Security Projectsp. 146
Quantitative Evaluationp. 146
Qualitative Evaluationp. 148
Cursory Project Scopingp. 151
Projects Versus Corep. 152
Scheduling (First Three Years)p. 152
Capital Budgetingp. 153
Approval of the Security Project Portfoliop. 155
Believe in Your Productp. 155
Ensure That Your Logic for Prioritization Is Understoodp. 155
Know Your Productp. 155
Know What Others Are Buyingp. 156
Identify the Buyers and the Roadblocksp. 156
Those Who Will Buy Your Offeringsp. 156
Those Who Will Not Buy Any of Your Offeringsp. 156
Those Who Can Apply Pressure to Individuals Who Won't Buy Your Offeringsp. 157
Sell through Momentump. 157
Sell through Othersp. 157
Ensure That It's Sold before You Attempt to Sell Itp. 157
Always Present in Personp. 157
Summaryp. 157
Annual Portfolio Reviewp. 158
Build the Communication Planp. 158
Potential Channels for the Communication Planp. 159
Chapter Summaryp. 161
Design Checklistp. 161
4 Executep. 165
Overviewp. 165
Foundation Conceptsp. 166
Previewp. 166
Critical Skillsp. 167
Executorp. 167
Commanderp. 168
Communicationp. 168
Tacticianp. 168
Researchp. 168
Analysisp. 169
Critical Skills Summaryp. 169
Critical Knowledgep. 169
Overview of Project Management Methodologiesp. 169
Benefits of a Project Mentality for Your Information Security Programp. 170
The Project Management Trianglep. 172
Technical Control Layersp. 175
Summaryp. 177
Methodologyp. 178
Previewp. 178
Project Executionp. 178
Development Methodology Structurep. 178
Critical Success Factors for a Projectp. 183
Business, Functional, and Technical Requirementsp. 188
Marketing Metricsp. 193
Project Governance Modelp. 196
Management Support - Sponsorshipp. 196
Establish a Teamp. 197
Shared Visionp. 197
Formalized Project Plan (Gantt Chart)p. 198
Identifying and Working through the Lull of Doomp. 199
Critical Success Factors Summaryp. 200
Warning Signs for Projectsp. 200
Train Wrecksp. 200
Project Types and Their Intricaciesp. 204
Common Guidelines for All Projectsp. 204
Common Guidelines for People Projectsp. 205
Common Guidelines for Process Projectsp. 206
Common Guidelines for Technology Projectsp. 207
Project Type Summaryp. 208
Incorporating Security into Projectsp. 208
Tools for Adding Security into a Properly Structured Projectp. 209
Deployp. 213
Tools for Adding Security into a Project with Missing Componentsp. 214
Vendor Evaluation/Selectionp. 217
Preparing the Marketing Materialp. 223
Chapter Summaryp. 224
5 Reportp. 225
Overviewp. 225
Foundation Conceptsp. 226
Critical Skillsp. 227
Writerp. 227
Presenterp. 227
Critical Knowledgep. 227
Primary Principle of Reportingp. 227
Basic Reporting Componentsp. 228
Delivery Mechanismsp. 229
Marketingp. 229
Brandingp. 230
Metricsp. 231
Damage Controlp. 231
Summaryp. 232
Methodologyp. 232
Report Construction Processp. 233
Identifying the Needp. 234
Determine Intentp. 235
Desired Reactionp. 236
Determine Target Audiencep. 238
Internal Audiencesp. 238
Executive Management/Board of Directorsp. 239
Technical Engineering Staffp. 245
Employeesp. 247
Internal Audit/Regulatory Compliance Officep. 248
External Audiencesp. 250
Government Agencies/Independent Auditors/Regulatorsp. 250
Stockholders and Ownersp. 252
Customers and Clientsp. 252
Target Audience Summaryp. 253
Delivery Mechanismsp. 253
Administrative Reportingp. 254
Operational Reportingp. 261
Types of Deliveryp. 267
Follow up on the Messagep. 270
Close the Dealp. 270
Chapter Summaryp. 271
6 The Final Phasep. 273
Overviewp. 273
Back to the Beginningp. 275
Parting Thoughtsp. 276
Appendices
A Design Chapter Worksheetsp. 277
B Report Creation Process Worksheetp. 281
C Requirements Samplep. 285
D SDLC Checklistp. 289
E Recommended Readingp. 313
Indexp. 315