Information Security in Organization Structure (CISO)

In this article, I will introduce the concept of Information Security (InfoSec) as an independent section or department in the organization. I will start from the beginning by explaining what is information and what is information in the organization until we reach to a point where we can differentiate between Information Technology (IT) and Information Security (InfoSec) which is somehow related terms and also a related department in the organization. But, it should to independent departments in the organization.

Just to mention at the beginning that the purpose of this article is not to reduce the importance of IT in the organization but to clarify that IT is a department that is handling an important part of the organization strategy and goals and InfoSec also handling another impotent part of the organization strategy and goals.

Better to start by explaining what is Information. It is something that people can learn, know about, or understand. For example, the book contains information about some subject. This information is important to the book because without it the book will be meaningless. Another definition of the information form technical perspective (from TechTarget Website) Information is stimuli that have to mean in some context for its receiver. When information is entered into and stored in a computer, it is generally referred to as data. After processing (such as formatting and printing), output data can again be perceived as information (refer to Click here). But, also information can be physical not only digital.

Information is an asset to any organization or we can say it is the main asset of the organization. So, after the evolution of computer and using the computer in the enterprise. Information mostly moved from physical use to digital use and all the processing and operations performed using systems and software. Here we can say the IT department started and as old people in this area know that this section was a very small section under another department not related to IT like account. Because mainly it was handling data entry to mainframes and it use to be 2 to 3 employees. With the growth of using the technology and increasing demand for using the technology in the enterprise the IT department started to be as a standalone department in the organization and at that time the main focus of IT department is the performance of entering the data and processing it the correct way. And as you can see these days IT department is one of the main department in many organizations and it contains multiple sections under it like Infrastructure, Support, development ,and some time projects.

Nowadays with the increasing use of digital technology and the organizations depending on the technology in day to day operation, a new demand comes to the Horizon which is securing that information in the systems. By saying securing not only means prevent this information from being exposed to hackers or leaking it. But, balanced protection of the Confidentiality, Integrity , and Availability (CIA) tried which is the main target and purpose of InfoSec department in the organization.

Information Technology (IT) Department roles and responsibilities in the organization:

IT is department within a company that is charged with establishing, monitoring and maintaining information technology systems and services. IT organization is typically managed by a Chief Information Officer (CIO) or IT Director. Roles and responsibilities it may explained in different way but I chooses below brief roles and responsibilities explanation (reference for below explanation click here).
  • Governance refers to the implementation of operational parameters for working units and individuals' use of IT systems, architecture, and networks. The governance of the master data is based on workflow processes that integrate business rules and subject matter domain expertise. This is part of the conventional IT security as well as the data assurance for which the IT department is also responsible.
  • Infrastructure refers to the hardware components, the network, the circuitry, and all other equipment necessary to make an IT system function according to the established needs and system "size" of the company.
  • Functionality is perhaps the most apparent task performed by the IT department. It refers to creating and maintaining operational applications; developing, securing, and storing electronic data that belongs to the organization; and assisting in the use of software and data management to all functional areas of the organization.
Information Security (InfoSec) Department roles and responsibilities in the organization:

Instead of waiting for a data breach or security incident, the CISO is tasked with anticipating new threats and actively working to prevent them from occurring. The CISO must work with other executives across different departments to ensure that security systems are working smoothly to reduce the organization's operational risks in the face of a security attack.

  • Conducting employee security awareness training, 
  • Developing secure business and communication practices, 
  • Identifying security objectives and metrics, 
  • Choosing and purchasing security products from vendors, 
  • Ensuring that the company is in regulatory compliance with the rules for relevant bodies 
  • Enforcing adherence to security practices.
  • Ensuring the company's data privacy is secure,
  • Managing the Computer Security Incident Response Team and conducting electronic discovery and digital forensic investigations.


Refer to click link.

Finally, the main purpose of writing this article is to express my opinion and to show that InfoSec team deserves to be under an independent department with standalone roles and responsibilities and it will be led by Chief Information Security Officer. May be currently a lot of CEO's doesn't see this but soon it will be the practice.

Comments

  1. Remarkable post, the information you have mentioned is really knowledgeable and engaging for us, I really enjoyed reading it. Thanks for sharing. Cyber Security Services

    ReplyDelete
  2. Excellent post. I really enjoy reading and also appreciate your work. This concept is a good way to enhance knowledge about security system company. Keep sharing this kind of articles, Thank you.

    ReplyDelete
  3. Excellent post. I really enjoy reading and also appreciate your work.hoa security services Miami This concept is a good way to enhance knowledge. Keep sharing this kind of articles, Thank you.

    ReplyDelete
  4. I am attracted by the presentation of this article. Security guard services in Durham It is a genuinely a gainful article for us. Keep posting, Thank you

    ReplyDelete
  5. I got some instructive information from this post about calendar and events. You have done such a brilliant job. Door Supervisor Course in Ealing Only £229 Keep it up. Get add to calendar link.

    ReplyDelete
  6. I liked your work and, as a result, the manner you presented this content about Private Security Services London.It is a valuable paper for us. Thank you for sharing this blog with us.

    ReplyDelete
  7. Your blog contains lots of valuable data. It is a factual and beneficial article for us.affordable security systems regina sk Thankful to you for sharing an article like this.

    ReplyDelete
  8. It also offers them a 코인카지노 cause to look at most or all of the sport, which is unusual. The Team Whistle survey found that 70 p.c individuals who|of individuals that} bet on a sport watch all of it, versus forty eight p.c of those who haven’t. And it supplies a window to sports they don’t often observe.

    ReplyDelete
  9. This comment has been removed by the author.

    ReplyDelete
  10. It is a proficient article that you have shared here about system company I got some unique and valuable information from your article security system company Thankful to you for sharing this article here.

    ReplyDelete
  11. Great blog ! I am impressed with suggestions of author.
    Cotton Clothing For Women

    ReplyDelete

Post a Comment

Popular posts from this blog

Vulnerability Assessment vs. Penetration Test

Vulnerability Management (VM) vs. System Admins. It is a challenge !!!