Purpose of Security Strategy

Video Activity

In this lesson, instructor Kelly Handerhan provides a detailed overview of the concepts, methods, and goals of an effective security strategy and details the six outcomes of effective security strategy. - Strategic alignment - information security should align directly with business strategy to support organizational objectives - Risk management - ...

Join over 3 million cybersecurity professionals advancing their career
Sign up with
or

Already have an account? Sign In »

Time
32 minutes
Difficulty
Intermediate
CEU/CPE
4
Video Description

In this lesson, instructor Kelly Handerhan provides a detailed overview of the concepts, methods, and goals of an effective security strategy and details the six outcomes of effective security strategy. - Strategic alignment - information security should align directly with business strategy to support organizational objectives - Risk management - Executing appropriate measures to mitigate risks to an acceptable level - Resource optimization - using information security knowledge and infrastructure efficiently - Value delivery - optimizing information security investments in support of organizational objectives - Performance measurement – measuring, monitoring, and reporting information security governance metrics to ensure that organizational objectives are achieved - Process Assurance Integration – integration of disparate assurance functions to ensure that processes operate as intended from end to end, minimizing hidden risks Course participants will understand the reasoning behind the six outcomes of effective security management and why it is important that personnel support the goals and objectives of the business.

Video Transcription
00:04
all right, So when it comes to developing a security strategy, let's get a definition.
00:10
So we have Kenneth Andrews from the concept of corporate strategy, and he defines a corporate strategy. But I think if you replace the word security for corporate, I think you'll find this. This works very, very well.
00:24
So if we were to say, security strategy is the pattern of decisions in a company
00:31
that determines and reveals its objectives, purposes, goals produces the principal policies and the plans for achieving those goals and defines the range of business accompanies to pursuit.
00:45
I don't generally like to read slides while I'm doing these classes, but I think that's really very telling and what he's saying. So first of all, it's a pattern of our decisions, and if you examine my decisions, you're going to see what we're really trying to accomplish,
01:00
right. If you look at the decision someone makes that tells you what they're what they're trying to do, what they're hoping to gain, So with our strategy, this is sort of our plan of decisions that we make that will get us closer to our goals. Um,
01:15
it will help us make decisions about how we spend our resource is how we organ organize our HR personnel
01:25
structure. It's gonna be it's gonna drive how we make decisions, economic and non economic. Ultimately, all of this comes together as our security strategy, and it will shape the drive in the focus of our organization.
01:42
Okay, so if we don't we look at effective security strategy. So how do I know if I've got a good security strategy? How do I know that it's well written that it really does what I'm expecting it to do because remember, my strategy is gonna be the basis for my security program in my policies.
02:01
All right, So one of the most important pieces
02:06
is it strategically aligned to the business strategy.
02:10
I know we've said that again and again and again, but when it comes right down to it, we all have to realize there is only one reason that any of us have jobs. There's only one reason that any of us are employed, and that's because we support the business. And the better we support the business,
02:30
the more likely the business will support us. The longer I'll have a job, the better I'll be paid, the more marketable I am, the higher job satisfaction.
02:38
Ultimately, it all comes down to the business. So when I do look at things from an information security perspective, I'm always finding that cost benefit. Okay, And remember that cost comes from many directions other than just money.
02:54
You know, certainly some security mechanisms cost money, and some of them cause quite a good deal of money.
03:00
But don't forget. Also, another trade off for security is performance, its ease of use. It's backwards compatibility. It's all of those different elements. So what I have to do, really, my question should be. What is the organization trying to do
03:17
and how I can help them accomplish that goal
03:21
by helping them do this securely? I hope that makes sense, because that will come in a little bit later, when we're talking about really making sure that their other senior officers understand the value of security. All right, so we make sure that we're using a resource is wisely that we're supporting the organization.
03:39
Then, like we talked about in the last chapter, we will be effectively managing risks and risks,
03:46
you know, come up as a result of threats and vulnerabilities and ideally, as risks materialized, we could see harm to our assets. We know that our stakeholders have entrusted us with the assets of this organization of this business, and it's our job to protect those.
04:04
So when we have a good security strategy,
04:09
we're proactive. We have mechanisms in place to manage these risks, and it's you and I know the best time to address risks is before they happen, as opposed to after All right, next bullet point resource optimization,
04:25
making sure that our knowledge, our funds, our equipment,
04:30
our processes are implemented in the best way possible so that we get the most bang for the buck, so to speak. We want to make sure, you know, I've seen organizations that go through incident response situations where they have an incident that they have to respond to, and yet they failed to document at the end of that
04:49
incident.
04:50
Well, what happened? How did it happen? What did we learn from it? Right. That's not optimizing our organizational strategy, right? And sometimes you'll find that every department kind of does their own thing without good communication across those departments. That is not optimization.
05:09
What we want to build is an environment which all units coordinate
05:14
and communicate effectively across these barriers so that I can take what you've learned and apply it and use it for my benefit as well. So, you know, so many times in an organization. I know this isn't shocking to any of you out there every organization, every department for themselves.
05:30
And we've got to create policies and procedures,
05:33
communication mechanisms that help us get beyond that for the ultimate in optimization.
05:40
All right, on the next slide Ah, some additional outcomes value,
05:45
value delivery. You know, all of thes come together and all of these air so tightly related
05:51
value delivery. I can justify,
05:55
uh, the expenses that you've invested in security. We can go back, and this is tied into performance measurement, and we can go back and look at this documentation and say, Look, you know, here's the amount of money that we saved by implementing these strategies that we've laid out
06:12
so again, value delivery. Well, how can I show you? Your value is I've measured the performance and I've documented,
06:18
and then finally process assurance that basically, we're gonna integrate our processes and make sure that we have a holistic approach to security within the organization, that it flows from one end all the way through and that ultimately we approach security
06:36
with the common goal of supporting the business. That's what our strategy is designed to do to help us share the philosophy, the principles and the ultimate in Goa of helping the organization run smoother and more efficiently.
Up Next
Developing a Security Strategy

How do I develop a security strategy? In order to develop an effective security strategy, one must take a proactive response to security threats.

Instructed By