The MOST appropriate role for senior management in supporting information security is the

VUEtut support Free, Actual and Latest Practice Test for those who are preparing for IT Certification Exams.

VUEtut does not offer exam dumps or questions from actual Microsoft - CompTIA - Amazon - Cisco - Oracle - CFA Institute. We offer learning material and practice tests created by subject matter experts to assist and help learners prepare for those exams. All certification brands used on the website are owned by the respective brand owners. VUEtut does not own or claim any ownership on any of the brands.

Recommended textbook solutions

The MOST appropriate role for senior management in supporting information security is the

Human Resource Management

15th EditionJohn David Jackson, Patricia Meglich, Robert Mathis, Sean Valentine

249 solutions

The MOST appropriate role for senior management in supporting information security is the

Human Resource Management

15th EditionJohn David Jackson, Patricia Meglich, Robert Mathis, Sean Valentine

249 solutions

The MOST appropriate role for senior management in supporting information security is the

Information Technology Project Management: Providing Measurable Organizational Value

5th EditionJack T. Marchewka

346 solutions

The MOST appropriate role for senior management in supporting information security is the

Human Resource Management

15th EditionJohn David Jackson, Patricia Meglich, Robert Mathis, Sean Valentine

249 solutions

The MOST appropriate role for senior management in supporting information security is the

Author: Andrej Volchkov
Date Published: 10 December 2020

Chief information security officers (CISOs) and security specialists often complain about the disinterest of senior management in information security. The lack of participation of management and the board of directors (BoD) in the governance of information security is a reality in many organizations. The stereotype that senior management is only interested in information security during incidents or when establishing budgets has not completely disappeared despite the positive evolution of practices observed in recent years, especially with a greater awareness of cybersecurity threats. The propensity of senior management to delegate decisions concerning security program to IT or to operations is still present despite many advances in governance practices, especially stimulated by regulations or digital transformations. The nature and the dependence of the business on information security also plays a large role in the willingness of senior management to participate in the information security governance process.

One can argue for a long time about the reasons and potential remedies, but the main reasons should be sought in the following areas: technology (often incomprehensible terminology), organization (positioning and responsibilities of information security teams) and strategic alignment (information security is not perceived as essential for the performance of the organization in general). Without a thorough understanding of the benefits of information security, senior management will tend to view security costs as an insurance premium covering a broad spectrum of threats without really understanding them, or a necessary expense required to remain compliant. Understanding the added value of information security to the business is the sine qua non for senior management involvement in the process of information security governance.

Therefore, security officers are asking themselves how they can change this situation and bring the process of running a security program closer to the real challenges of the organization. Repositioning CISOs to higher levels of responsibility, reporting directly to the C-level, helps improve the situation, but organizational changes alone are not enough. Solutions must be sought in a strategic alignment, in the establishment of a standardized reporting process at the highest level of the company and in the provision of acceptable and understandable metrics for information security. The CISO must lead the cultural change and propose a review process based on systematic reporting and clear, acceptable metrics allowing senior management to take ownership of decisions concerning information security in a holistic way.

Security officers should build information security metrics and reports that are useful to senior management. As long as the proposed key performance indicators (KPIs) and the format of the security report encompass the answers to the questions senior management have, a review process based on these elements can be readily accepted. By improving the content of information security reports, the involvement of senior management in the governance of information security will become a reality.

To involve senior management in the governance process, it is essential to articulate the added value of information security using language (terminology) they understand. High-level KPIs and reports that underline the contribution of information security to organization results (by supporting strategic initiatives or reducing operational risk) can only be beneficial for a better involvement of senior management in the information security governance process. By offering KPIs and an understandable reporting system, the CISO will have the opportunity to be profiled as a valued partner alongside other business line managers. KPIs and the content of the reports should then be reviewed and adapted continually to respond as closely as possible to the concerns of senior management in the organization.

Editor’s note: For further insights on this topic, read Andrej Volchkov’s recent Journal article, “Key Performance Indicators for Security Governance, Part 1”.

The MOST appropriate role for senior management in supporting information security is the

Which of the following would be the best indicator of effective information security governance within an organization?

Which of the following would be the best indicator of effective information security governance within an organization? Answer : The steering committee approves security projects.

Which of the following should be the first step in developing an information security plan?

9 Steps on Implementing an Information Security Program.
Step 1: Build an Information Security Team. ... .
Step 2: Inventory and Manage Assets. ... .
Step 3: Assess Risk. ... .
Step 4: Manage Risk. ... .
Step 5: Develop an Incident Management and Disaster Recovery Plan. ... .
Step 6: Inventory and Manage Third Parties. ... .
Step 7: Apply Security Controls..

What is the primary role of the information security manager in the process of?

Defining and ratifying the classification structure of information assets is the primary role of the information security manager in the process of information classification within the organization.

Which of the following is the best approach to obtain senior management commitment to the information security program?

Senior management commitment and support for information security can BEST be obtained through presentations that: Options are : explain the technical risks to the organization. use illustrative examples of successful attacks.