Implementing an Information Security Awareness Program
نویسنده
چکیده
The article addresses the elements that make up a successful information security awareness program. It addresses the role that organization personnel play in the information security program and how to use this information to one’s benefit. It also discusses how to establish awareness program scope, how to segment the audience, and how to ensure that the content is effective in getting the message to the user community. INTRODUCTION The development of information security policies, standards, procedures, and guidelines is only the beginning of an effective information security program. A strong security architecture will be rendered less effective if there is no process in place to make certain that the employees are made aware of their rights and responsibilities with regard to organization information assets. All too often, security professionals implement the “perfect” security program, and then are surprised that it fails because they forgot to sell their product to their constituents. To be successful, the information security professional must find a way to sell this product to the customers. For years I have heard information security professionals discuss their jobs in terms of overhead, as if this is some evil thing. Nearly every employee within an enterprise is overhead. Even the CEO, CFO, CTO, and CIO are all overhead. However, they have learned what we need to learn, and that is that we all add value to the bottom line of A S E C U R I T Y M A N A G E M E N T P R A C T I C E S
منابع مشابه
A Framework for Information Security Awareness Programs
The importance of information security cannot be overemphasized in today’s networked corporate world. A major component of reducing the risk of security breach in information assets is by implementing an effective security awareness program in organizations. Empirical data for this research is based on a study of two highly regulated industries – Banking and Insurance in Puerto Rico Metropolita...
متن کاملMaking Security Awareness Happen
INTRODUCTION This article focuses on the first step of providing computer and information system security — developing and implementing an effective security awareness program. One might wonder why security awareness is not considered the same as training. The simple answer: because the desired outcome of each is different. The goal of a security awareness program is to heighten the importance ...
متن کاملImplementing an Information Assurance Awareness Program: A case study for the Twenty Critical Security Controls at Consulting Firm X for IT Personnel
As a consultant within a large, growing, high-profile consulting firm, this challenge is interesting in terms of preventing potential future cyber-attacks. The organization supports a large number of sensitive US Government projects, including hosting or developing portals and applications as part of the work. Protecting this organization’s networks indirectly protects sensitive US Government n...
متن کاملCritical Success Factors in implementing information security governance (Case study: Iranian Central Oil Fields Company)
The oil industry, as one of the main industries of the country, has always faced cyber attacks and security threats. Therefore, the integration of information security in corporate governance is essential and a governance challenge. The integration of information security and corporate governance is called information security governance. In this research, we identified "critical success factor...
متن کاملThe Use of an Information Security Vocabulary Test to Assess Information Security Awareness - An Exploratory Study
The dependence on human involvement and human behavior to protect information assets makes it necessary to have an information security awareness program to make people aware of their roles and responsibilities towards information security. The aim of this paper is to examine the feasibility of an information security vocabulary test as an aid to assess awareness levels and to help with the ide...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Information Systems Security
دوره 14 شماره
صفحات -
تاریخ انتشار 2005