2
Information Security Strategy
Accessing the Online Content
With this book, you get unlimited access to web-based CISM exam prep tools which include practice questions, flashcards, exam tips, and more. To unlock the content, you'll need to create an account using your unique sign-up code provided with this book. Refer to the Instructions for Unlocking the Online Content section in the Preface on how to do that.
If you've already created your account using those instructions, visit this link http://packt.link/cismexamguidewebsite or scan the following QR code to quickly open the website. Once there, click the Login link in the top-right corner of the page to access the content using your credentials.
In this chapter, you will explore the practical aspects of an information security strategy and understand how a well-defined strategy impacts the success of security projects. You will learn about the different aspects of what a security strategy is and understand the role of an information security manager in supporting business objectives.
The following topics will be covered in this chapter:
- Information Security Strategy Development
- Information Governance Frameworks and Standards
- The IT Balanced Scorecard
- Information Security Programs
- Enterprise Information Security Architecture
- Awareness and Education
- Governance, Risk Management, and Compliance
- Commitment from Senior Management
- Business Case and Feasibility Studies
Information Security Strategy and Plan
An information security strategy is a set of actions designed to ensure that an organization achieves its security objectives. This strategy includes what should be done, how it should be done, and when it should be done to achieve the security objectives.
A strategy is basically a roadmap of specific actions that must be completed to achieve any objective. Long-term and short-term plans are finalized based on the strategy adopted.
The primary objective of any security strategy is to support the business objectives, and the information security strategy should be aligned with the business objectives. The first step for an information security manager in creating a plan is to understand and evaluate the business strategy. This is essential to align the information security plan with the business strategy.
A strategy plan should include the desired level of information security. A strategy is only considered effective if the objectives of the controls are met. As discussed in Chapter 1, Enterprise Governance, "the ultimate responsibility for the appropriate protection of an organization's information falls on the board of directors. The involvement of board members in information security initiatives indicates good governance. The liability of directors can be protected if the board has exercised due care. Many laws and regulations make the board responsible in case of data breaches. Even the cybersecurity insurance policy requires the board to exercise due care as a pre-condition for insurance coverage."
Note
The preceding point is reiterated here to serve as a reminder. During the CISM certification exam, you can expect to face at least one question on this subject.
The chief information security officer (CISO) is primarily responsible for the design and development of the information security strategy in accordance with the security policy.
Information Security Policies
Policies are high-level documentation of the intent and direction of an organization's management. Security policies are developed based on the company's security strategy and they indicate the management's intent regarding security. Various procedures and architectures are designed based on these security policies.
Any changes in the management's intent should be appropriately addressed in the policies.
It is important to ensure compliance with the policy requirements at regular intervals. Self-assessment is the best way to determine the readiness and remediation of non-compliance items. This helps the organization to prepare for regulatory reviews conducted as per different regulations.
Key Aspects from the CISM Exam Perspective
Following are some of the key aspects from the perspective of the CISM exam:
Question
|
Possible Answer
|
What is the first step in developing an information security plan?
|
To understand the business strategy
|
What is the main objective of designing an information security strategy?
|
To support the business objectives
|
What is the first step in developing an information security management program?
|
To ascertain the need and justification for creating the program
|
What is the best way to address the conflicting requirements of a multinational organization's security policy with local regulations?
|
The best way in such a situation is to establish a local version of the policy that is aligned with the local laws and regulations.
|
What is the conflict of security controls with business requirements?
|
- The objective of security controls is to support the business objectives and requirements.
- A security control should not restrict the users' ability to perform their jobs.
- When a security control is not supporting the business needs, it is termed as a conflict of security controls with business requirements.
|
The objectives of information security can be best described as:
|
The requirements of the desired state (i.e., whatever is required to achieve the desired state).
|
What is value delivery in information security?
|
Value delivery means designing processes that give maximum benefit to the organization. It indicates high utilization of available resources for the benefit of the organization.
|
What is the roadmap for information security implementation primarily based on?
|
The security strategy.
|
On what basis should intangible assets be valued?
|
The ability of the assets to generate revenue.
In the absence of the availability of intangible assets, the organization will lose the amount of revenue the asset normally generates. The acquisition or replacement cost may be more or less than the asset's actual ability to generate revenue.
|
Figure 2.1: Key aspects from the CISM exam perspective
Note
The answer key and explanations for all practice and revision questions for this chapter can be found via this link.
Practice Question Set 1
- A newly appointed information security manager is required to develop an information security plan. What should their first step be?
- To conduct a vulnerability assessment
- To evaluate the current business strategy
- To perform an information system audit
- To evaluate the risk culture of the organization
- An information security manager is designing an information security strategy plan for the approval of the security steering committee. The most important factor to be included in this plan is:
- Information security manpower requirements
- Information security tools and technique requirements
- Information security mission statement
- Desired future state of information security
- An information security manager is designing an information security strategy plan for the approval of the security steering committee. The primary objective of designing an information security strategy is:
- To monitor performance
- To support the business objectives
- To enhance the responsibility of the security manager
- To comply with legal requirements
- The most important factor to be included in an information security strategy is:
- Details of key business controls
- Security objectives and processes
- Budget for specific security tools
- Details of network security control
- The best way to address a conflict between a multinational organization's security policy and local regulations is:
- To give priority to policy requirements over local laws
- To follow local laws only
- To establish a local version of the organization's policy
- To discontinue services in the conflicting jurisdiction
- The best way to prepare for a regulatory audit is:
- To nominate a security administrator as regulatory liaison
- To conduct self-assessment using regulatory guidelines and reports
- To discuss the previous year's regulatory reports with the process owner
- To ensure that all regulatory inquiries are approved by the legal department
- Who is responsible for the enforcement of an information security policy?
- The information security steering committee
- The chief technical officer
- The chief information security officer
- The chief compliance officer
- The most important role for a Chief Information Security Officer is to:
- Design and develop an information security strategy
- Conduct business continuity plan testing
- Approve system access
- Deploy patch releases
- The timeline for an information security strategy plan should be:
- In accordance with the IT strategic plan
- In accordance with technology changes
- For a duration of five years
- Aligned with business strategy
- Commitment and support from senior management with respect to information security can be best addressed by:
- Emphasizing the organizational risk
- Emphasizing the requirements of global security standards
- Emphasizing the industry benchmark
- Emphasizing the responsibility of the organization
- The primary objective of developing an information security strategy is:
- To manage the risks impacting business objectives
- To mitigate risks to zero
- To transfer risks to insurers
- To develop a risk-aware culture
- Immediately after implementing access control for the internet, an organization's employees started complaining that they were unable to perform business functions on internet sites. This is an example of:
- A conflict of security controls with business requirements
- Stringent security controls
- Mandatory access control
- Discretionary access control
- Which of the following should be the first action when developing an information security strategy?
- Identifying the assets
- Performing a risk analysis
- Defining the scope
- Determining critical business processes
- The most important objective of an information security strategy is:
- To minimize the risk to an acceptable level
- To support the business objectives and goals of the enterprise
- To ensure optimum utilization of security resources
- To maximize return on security investment
- The most critical factor for designing an information security strategy is:
- Defined objectives
- A defined time frame
- A defined framework
- Defined policies
- In an information security steering committee, there is no representation from user management. Which of the following is the main risk in this scenario?
- Functional requirements may not be adequately addressed.
- Inadequate user training.
- Inadequate budget allocation.
- The information security strategy may not be aligned with business requirements.
- Which of the following is the best approach for an information security manager when there is a disagreement between them and the business manager regarding the security aspect of a new process?
- To accept the business manager's decision as they are the process owner
- To mandate the security manager's decision
- To review the risk assessment with senior management for final consideration
- To prepare a new risk assessment to address the disagreement
- The connection between business objectives and security should be demonstrated by:
- Indirect linkages
- Mapping to standardized controls
- Interconnected constraints
- Direct traceability
- The accountability for information categorization and protective measures resides with:
- Security administrators
- Senior management
- System administrators
- End users
- As a newly appointed information security manager, you are required to develop a strategic plan for the information security of the organization. Your most important action should be:
- To understand the key business objectives
- To provide training to the information security team
- To provide sufficient resources for information security
- To develop a risk-aware culture
Information Governance Frameworks and Standards
The governance framework is a structure or outline that supports the implementation of the information security strategy. It provides the best practices for a structured security program. Frameworks are flexible structures that any organization can adopt as per their environment and requirements. COBIT and ISO 27001 are two widely accepted and implemented frameworks for security governance.
The Objective of Information Security Governance
Information security governance is a subset of enterprise governance. The same framework should be used for both enterprise governance and security governance to enable better integration of one with the other.
The following are the objectives of security governance:
- To ensure that security initiatives are aligned with the business strategy and that they support organizational objectives.
- To optimize security investments and ensure the high-value execution of business processes.
- To monitor security processes and ensure that security objectives are achieved
- To integrate and align the activities of all assurance functions for effective and efficient security measures.
- To support the security strategy in ensuring that residual risks are well within acceptable limits. This reassures the management.
Information Security/Cybersecurity Management Frameworks
An information security manager should have a basic understanding of the following widely accepted frameworks for information security. Please note that in the CISM exam, there will be no direct questions on any of the frameworks.
Framework
|
Particulars
|
ISO 27001
|
- The ISO 27001 standard is a widely accepted framework for information security management systems.
- It recommends 14 areas of control consisting of a total of 114 controls. These include the availability of information security policies, human resource securities, asset management, access controls, and so on.
- An organization needs to implement all the applicable controls and get them audited by a certification body to be ISO 27001 certified.
- An ISO 27001 certified organization is preferred as a service provider/supplier compared to a non-certified organization.
|
NIST Cybersecurity Framework
|
- NIST Cybersecurity Framework emphasizes the importance of effective risk management integration and extensively promotes the improvement of supply chain risk management.
- The NIST Cybersecurity Framework does not include any controls. Rather, it provides guidance on the process of identifying gaps between present practices and a desirable target state.
- Understanding these gaps helps the organization to adopt the desirable controls to improve information security risk management.
|
NIST Risk Management Framework (RMF)
|
- NIST RMF was originally designed to assist US government agencies in evaluating and improving information security.
- It has since been expanded to apply to any business and is free to use.
- It emphasizes the integration of security, privacy, and cyber supply chain risk management activities into the system development life cycle.
- NIST RMF includes a risk-based approach to categorizing relevant assets and selecting and implementing controls to achieve adequate protection.
|
Figure 2.2: Information security management frameworks
The IT Balanced Scorecard
Figure 2.3: IT balanced scorecard
The objective of an IT balanced scorecard (IT BSC) is to establish, monitor, and evaluate IT performance in terms of (i) business contribution, (ii) future orientation, (iii) operational excellence, and (iv) user orientation.
CISM aspirants should understand the following aspects of a balanced scorecard:
Practice Question Set 2
- Which of the following is not considered while evaluating an IT balanced score card?
- Financial performance
- Customer satisfaction
- Internal processes
- Innovation capacity
- Which of the following is the most important prerequisite before implementing an IT balanced scorecard?
- Existence of effective and efficient IT services
- Defining key performance indicators
- Ensuring that IT projects add value to the business
- IT expenses being within the allotted budget
- As an information security manager, you note that senior management is not involved in IT strategy planning. Which of the following is the area of most concern?
- A lack of investment in technology
- Absence of a structured methodology for IT security
- Absence of IT alignment with business objectives
- Absence of control over outsourced vendors
- As an information security manager, you have been asked to review the parameters for measuring IT performance. The main objective of the IT performance measurement process is:
- To reduce errors
- To obtain performance data
- To finalize the requirement baseline
- To improve performance
Information Security Programs
A program can be defined as a set of activities implemented in a structured manner to achieve a common objective. A security program includes various activities, such as implementing controls, raising awareness, monitoring, and reporting on controls and other related activities.
A security strategy is a guiding force for the implementation of a security program. The roadmap detailing the security implementation, i.e., procedure, resources, and timelines, is developed based on this strategy. Further, various implementation activities can be aligned and integrated on the basis of this strategy to achieve security objectives more effectively and efficiently.
An information security program should be aligned with the business objectives of the organization. The effectiveness of an information security program is determined based on its ability to address the risks impacting the business objectives.
Key Aspects from the CISM Exam Perspective
Following are some of the key aspects from the perspective of the CISM exam:
Question
|
Possible Answer
|
Define a program.
|
A program can be defined as a set of activities implemented in a structured manner to achieve a common objective.
|
What is the first step in developing an information security management program?
|
To ascertain the need and justification for creating the program.
|
What is the roadmap for information security implementation primarily based on?
|
Security strategy.
|
What is the aim of cost-benefit analysis when implementing controls?
|
The cost of implementing a control should not exceed the expected benefits.
|
Figure 2.4: Key aspects from the CISM exam perspective
Practice Question Set 3
- Which of the following should be the first step in implementing a new security monitoring solution?
- To evaluate the various alternatives available for the solution
- To determine a budget for the new solution
- To evaluate and determine the correlation between the solution and the business objectives
- To develop a team for implementation
- An information security program is primarily created to:
- Develop an information security strategy.
- Establish a business continuity plan.
- Ensure optimum utilization of security resources.
- Mitigate the risks impacting the business.
- The most important factor in developing a security strategy before implementing a security program is:
- Reducing the cost of implementation
- Aligning and integrating development activities
- Obtaining support from management
- Adhering to international requirements
- The most likely reason for a sudden increase in the number of security events could be:
- A higher amount of vulnerabilities being exploited
- An increase in the number of threat actors
- Failure of detective controls
- The absence of an information system audit
- The primary objective of an information security program is:
- To protect information assets in accordance with the business strategy and objectives
- To standardize operational risk management processes
- To protect the confidentiality of information
- To develop the information security policy
- A combination of management, administrative, and technical controls is important for effective information security because:
- An organization cannot completely depend on technical controls to address faulty processes.
- Technical control is too expensive to manage.
- Monitoring and reporting the effectiveness of technical control is difficult.
- Implementing the right technical control is an iterative process.
- The best way to learn and improve from a security incident is:
- To improve the integration of business and security processes
- To increase the information security budget
- To set up a separate compliance monitoring department
- To acquire high-end technical controls
- As an information security manager, you are required to develop an information security management program. What should your first step be?
- To ascertain key business risks
- To ascertain the need for creating the program
- To ascertain who the information security program manager is
- To ascertain the sufficiency of existing controls
Enterprise Information Security Architecture
Figure 2.5: Security budget
Enterprise Architecture (EA) defines and documents the structure and process flow of the operations of an organization. It describes how different elements such as processes, systems, data, employees, and other infrastructure are integrated to achieve the organization's current and future objectives.
Security architecture is a subset of enterprise architecture. Its objective is to improve the security posture of the organization. Security architecture clearly defines the processes that a business performs and how those processes are executed and secured.
The first step for a security manager implementing the security strategy is to understand and evaluate the IT architecture and portfolio. Once they have a fair idea of the IT architecture, they can determine the security strategy.
Challenges in Designing the Security Architecture
While designing the security architecture, it is important for a security manager to understand the possible challenges. This will help to address the challenges in an effective and efficient manner.
The following are some of these challenges:
- Most security architecture projects are expensive and time-consuming.
- A lack of competent security architects results in more effort being required to build reliable security architecture.
- The potential benefits of a well-designed security architecture cannot be quantified, so gaining support from management can be very difficult.
Benefits of Security Architecture
Security architecture provides detailed information about how a business operates and what security controls are required. This helps the security manager determine the processes and systems where more security efforts are required.
Key Aspects from the CISM Exam Perspective
Following are some of the key aspects from the perspective of the CISM exam:
Question
|
Possible Answer
|
Information security architecture should be aligned with:
|
Business goals and objectives.
|
Figure 2.6: Key aspects from the CISM exam perspective
Practice Question Set 4
- As an information security manager, you are required to develop the information security architecture for an organization. The information security architecture should be best aligned with:
- International security standards
- Business goals and objectives
- IT architecture
- Industry standards
- An information security manager is entrusted with creating the information security strategy for the organization. Their first step should be:
- To understand the IT architecture and portfolio
- To determine the security baseline
- To document the information security policy
- To conduct an IT risk assessment
Awareness and Education
Figure 2.7: Training for information security
End users are one of the most important stakeholders when considering the overall security strategy. Training, education, and awareness are of extreme importance to ensure that policies, standards, and procedures are appropriately followed.
Increasing the Effectiveness of Security Training
The most effective way to increase the effectiveness of training is to customize it as per the target audience and to address the systems and procedures applicable to that particular group. For example, a system developer needs to undergo an enhanced level of training that covers secure coding aspects. By contrast, data entry operators only need to be trained on security aspects related to their functions.
Key Aspects from the CISM Exam Perspective
Following are some of the key aspects from the perspective of the CISM exam:
Question
|
Possible Answer
|
What is the best method to increase the effectiveness of security training?
|
Customizing training for the target audience.
|
Figure 2.8: Key aspects from the CISM exam perspective
Governance, Risk Management, and Compliance
GRC is a term used to align and integrate the processes of governance, risk management, and compliance. GRC emphasizes that governance should be in place for effective risk management and the enforcement of compliance.
Governance, risk management, and compliance are three related aspects that help achieve organizational objectives. GRC aims to lay down operations for more effective organizational processes and avoid wasteful overlaps. Each of these three disciplines impacts the organization's technologies, people, processes, and information. If GRC activities are handled independently of each other, it may result in a considerable amount of duplication and a waste of resources. The integration of these three functions helps to streamline assurance activities by addressing overlapping and duplicated GRC activities.
Though GRC can be applied in any function of an organization, it focuses primarily on financial, IT, and legal areas.
Financial GRC focuses on effective risk management and compliance for finance processes. IT GRC focuses on information technology processes. Legal GRC focuses on enterprise-level regulatory compliance.
GRC is an ever-evolving concept, and a security manager should understand the current state of GRC in their organization and determine how to ensure its continuous improvement.
Key Aspects from the CISM Exam Perspective
Following are some of the key aspects from the perspective of the CISM exam:
Question
|
Possible Answer
|
What is the main objective of implementing GRC procedures?
|
- To improve risk management processes by integrating various assurance-related activities
- To synchronize and align an organization's assurance functions
|
What areas are focused on most in GRC?
|
|
Figure 2.9: Key aspects from the CISM exam perspective
Practice Question Set 5
- As an information security manager, you are part of a team that is responsible for implementing governance, risk, and compliance procedures. Which of the following is the main reason to implement these procedures?
- To minimize the governance cost
- To improve risk management
- To synchronize security initiatives
- To ensure regulatory compliance
- The primary objective of governance, risk, and compliance is:
- To synchronize and align an organization's assurance functions
- To address the requirements of information security policy
- To address the requirement of regulation
- To design a low-cost security strategy
- The primary areas of focus of governance, risk, and compliance is:
- Marketing and risk management
- IT, finance, and legal
- Risk and audit
- Compliance and information security
Senior Management Commitment
For effective implementation of security governance, support and commitment from senior management is the most important prerequisite. A lack of high-level sponsorship will have an adverse impact on the effectiveness of security projects.
It is very important for the information security manager to gain support from senior management. The most effective way is to ensure that the security program continues to be aligned with, and supports, the business objectives. This is critical for promoting management support. Senior management is more concerned about the achievement of business objectives and will be keen to address all risks impacting key business objectives.
Obtaining commitment from senior managers is very important to ensure appropriate investment in information security, as you will explore in the next section.
Information Security Investment
Any investment should be able to provide value to the business. The primary driver for investment in an information security project is value analysis and a sound business case. To obtain approval for an information security budget, the budget should primarily include a cost-benefit analysis. Senior management is more interested in the benefit that is derived from the budget.
For example, as a security manager, if you request a budget of $5,000 for security investment, senior management may not be convinced. But if you also project annualized savings of $10,000 against that investment, senior management may be more willing to invest.
Strategic Alignment
Information security activities are said to have a strategic alignment when they support the requirements of the key business stakeholders. Information security should support the achievement of organizational objectives by minimizing business disruption. The most effective way to enhance management commitment toward information security is to conduct a periodic review of alignment between security and business goals. A discussion with key business stakeholders will provide an accurate picture of the alignment of security programs to support business objectives.
A survey of management is the best way to determine whether the security program supports the business objectives. Achieving strategic alignment means business process owners and managers believe that information security is effectively supporting their goals. If business management is not confident in the security programs, the information security manager should redesign the process to provide better value to the business.
Another aspect of determining the strategic alignment is to review the business balanced scorecard. A business scorecard contains important metrics from a business perspective. It helps to determine the alignment of security goals with business goals.
Key Aspects from the CISM Exam Perspective
Following are some of the key aspects from the perspective of the CISM exam:
Question
|
Possible Answer
|
What is the most important factor to be included in a budget note while obtaining approval from management?
|
Cost-benefit analysis
|
What is the best way to gain support from senior management for security projects?
|
Explain to management the impact of security risks on key business objectives.
|
What is the primary driver for investment in an information security project?
|
A value analysis and a sound business case
|
Figure 2.10: Key aspects from the CISM exam perspective
Practice Question Set 6
- As an information security manager, you are required to obtain approval for an information security budget from senior management. Your budget proposal should primarily include:
- A cost-benefit analysis
- Industry benchmarks
- Total cost of ownership
- All the resources required by business units
- What is the most important role of senior management in supporting an information security program?
- Evaluating the latest security products
- Conducting risk assessments
- Approving policy statements and funding
- Mandating information security audits
- Information security activities are said to have strategic alignment when:
- They support the requirements of all key business stakeholders
- They support the requirements of the IT team
- They support the requirements of the globally accepted standards
- They provide a reliable and cost-effective service
- The best way to gain support from senior management is to:
- Provide examples of security breaches in other organizations
- Provide details of technical risks applicable to the organization
- Showcase industry best practices
- Explain the impact of security risks on key business objectives
- For implementing a new project, support from senior management can be obtained by:
- Conducting a risk assessment
- Explaining regulatory requirements
- Developing a business case
- Selecting the latest technology
- The most effective way to enhance the management's commitment to information security is:
- To have the security policy approved by the chief executive officer
- To conduct frequent security awareness training
- To conduct periodic reviews of alignment between security and business goals
- To conduct periodic information security audits
- The most effective way to justify the information security budget is:
- To consider the number of security breaches
- To consider the expected annual loss
- To consider a cost-benefit analysis
- To consider industry benchmarks
- Senior management's commitment to security programs is best indicated by their involvement in:
- Asset risk assessment
- Review and approval of risk management methodologies
- Review and approval of residual risks
- Review and approval of inherent risks
- The most effective justification to gain support from senior management for security investment is:
- Reduction in security budget
- Adherence to regulatory requirements
- Protection of information assets
- Enhanced business value
- The most likely position to sponsor the security steering committee is:
- The chief audit officer
- The information security manager
- The chief operating officer
- The head of legal
- The best driver for investment in an information security project is:
- An information security audit report
- A value analysis
- The business environment
- A penetration test report
- The most important prerequisite for implementing an information security program is:
- Senior management commitment
- A documented framework
- A documented policy
- Frequent security awareness training
- An information security governance plan can be best approved by:
- The system auditor
- The security manager
- The steering committee
- The system administrator
- The best method to change an organization's security culture is:
- Stringent penalties for non-compliance
- Strong management support
- Strong security controls
- Frequent system audits
- Which of the following will have the most adverse impact on the effective implementation of security governance?
- A complex organizational environment
- Limited budget for information security
- Improper business priorities
- A lack of high-level sponsorship
- What is the best method to measure the strategic alignment of an information security program?
- To survey the business stakeholders
- To conduct frequent audits
- To analyze incident trends
- To evaluate the business case
- What is the best method to determine the level of alignment of the security objectives with the business objectives?
- Interviewing the security manager
- Reviewing the capability maturity model
- Reviewing the risk assessment report
- Reviewing the business balanced scorecard
- The best factor to ensure a successful implementation of an information security program is:
- Support from senior management
- The level of security budget
- The size of the security team
- Regular information system audits
- The most effective method to achieve strategic alignment is:
- A periodic survey of management
- Following an industry-accepted governance framework
- Conducting frequent audits
- Developing enterprise risk management
- The objective of aligning information security governance with corporate governance is to:
- Ensure that the security team understands the business objectives
- Comply with regulations
- Maximize the cost-effectiveness of the control
- Reduce the number of rules required for governance
- What is the best method to address the senior management's concerns regarding the effectiveness of the existing information security program?
- Redesign the program based on industry-recognized standards.
- Analyze the cost-benefit of the existing program.
- Discuss with senior management to understand their concerns.
- Show the approved business case to senior management.
Business Case and Feasibility Study
A business case is a justification for a proposed project. It is prepared to justify the effort and investment in a proposed project and captures the reasoning for initiating a new project or task. Generally, the business case is a precursor to the start of any new project.
The business case is a key element in the decision-making for any project. The proposed return on investment (ROI), along with any other expected benefits, is the most important consideration for decision-making in any new project.
The first step in developing a business case is to define the need for and justification of the problem.
A feasibility study or analysis is an analysis that takes various factors into account, including economic, technical, and legal factors, to ascertain the likelihood of completing the project successfully.
A feasibility study should consider how the project will impact the organization in terms of risk, costs, and benefits. It helps to assess whether a solution is practical and achievable within the established budgets and schedule requirements.
Key Aspects from the CISM Exam Perspective
Following are some of the key aspects from the perspective of the CISM exam:
Question
|
Possible Answer
|
What is the objective of a business case?
|
To justify the implementation of a new project.
|
What are the first steps for the development of a business case?
|
To define issues to be addressed.
To define the need for the project.
|
On what basis is a business case primarily developed?
|
Feasibility and value proposition.
|
What does it mean if an organization implements "system thinking"?
|
Using "system thinking" means the organization views overall systems as more than just the sum of their parts.
|
Figure 2.11: Key aspects from the CISM exam perspective
Practice Question Set 7
- As an information security manager, you are required to develop a business case for a new information security initiative. The business case should primarily include:
- Appropriate justification
- Results of a gap analysis
- Legal requirements
- Expected annual loss
- As an information security manager, you are required to develop a business case for a new information security initiative. Your first step should be:
- To determine the budget
- To determine the vendor
- To define the need
- To determine cost efficiency
- When implementing a new project, support from senior management can be obtained by:
- Conducting a risk assessment
- Explaining regulatory requirements
- Developing a business case
- Selecting the latest technology
- The main criterion for selecting a security technology is:
- Whether the technology can mitigate the risk
- Whether the technology is widely accepted in industry
- Whether it's the latest technology available
- Whether the technology provides benefits in comparison to its costs
- Which of the following is of the least concern for an information security manager when implementing a new project?
- Technical requirements
- Regulatory requirements
- Privacy requirements
- Business requirements
- The most effective report while proposing the implementation of a new security solution is:
- A vendor evaluation report
- A risk analysis report
- A business case
- A budget utilization report
- What is the biggest challenge when preparing a business case in relation to obtaining approval from senior management for a new security project?
- To make the senior management understand the technical aspects of security
- To demonstrate the project's value and benefit
- To present various risk scenarios
- To provide comparative data on the industry
- The best way to obtain support from senior management for an information security initiative is to:
- Develop and present a business case
- Present various risk scenarios
- Inform them about the financial benefits of the project
- Align the initiative to the organization's goals
- Which of the following is the first step for the development of a business case?
- To conduct an industry survey
- To work out the return on investment
- To evaluate cost-effective alternatives
- To define issues to be addressed
- A business case is primarily developed based on:
- Various risk scenarios
- Return on investment
- Organizational objectives
- Feasibility and value proposition
- What is the best way to address senior management's reluctance to provide a budget for new security initiatives?
- To develop and present a business case
- To develop and present various risk scenarios
- To let the user management take the initiative
- To organize security awareness training for the senior management
- An information security manager is evaluating two technologies to address a particular risk and is required to select one for implementation. The best approach for the security manager, with a limited budget, to choose between the two technologies is:
- A risk assessment
- A business impact analysis
- To assess the ROI
- A cost-benefit analysis
- An information security program is best justified by:
- An impact analysis
- A detailed business case
- An industry benchmark
- Acceptance by users
- Which factor is most likely to persuade management to approve a new information security budget?
- A detailed risk assessment
- Risk treatment options
- A well-developed business case
- Calculating the future value of the current budget
- The development of a business case should primarily consider:
- Various risk scenarios
- Industry benchmarks
- Implementation benefits
- Affordability
Summary
In this chapter, you learned about the various aspects of security strategy, governance frameworks, and information security programs. You also explored in detail the benefits of increasing the effectiveness of security training. This helps the CISM aspirant understand the organization's security program and architecture.
In the next chapter, you will go through the important aspects of information risk assessment.
Revision Questions
- The most important consideration while developing an information security strategy is:
- The availability of information security resources
- Adherence to laws and regulations
- Effectiveness in mitigating risk
- Budget allocation for information security
- The objectives of information security can be best described as:
- The requirements of the desired state
- The attributes of the current state
- The key business processes
- The control objectives for loss expectations
- The most important factor when developing risk management strategies is:
- Using an industry-adopted risk assessment framework
- Aligning with business objectives and risk appetite
- Technology architecture
- The geographical spread of business units
- "Systems thinking," in terms of information security, refers to:
- The perspective of artificial intelligence
- The perspective of the whole being greater than the sum of its individual parts
- The perspective of supporting the business objective
- The perspective of governance of the entire organization
- An information security manager is asked to develop a cost-effective information security strategy. What will the most important step be?
- To identify information assets
- To conduct a valuation of the information assets
- To determine the objectives of the security strategy
- To classify assets as per the risk assessment
- Which of the following is considered to have the most important strategic value?
- Privileged access management process
- Trends in incident occurrence
- System downtime analysis
- The results of a penetration test
- An information security manager is considered to have achieved value delivery when:
- Resource utilization is high
- Budget requirements are low
- Low-cost vendors are appointed
- Staff costs are reduced
- The most effective factor to develop an information security strategy is:
- IT architecture
- Governance framework
- The current state of security and future objectives
- Support from senior management
- While developing a security strategy, a security manager should be most concerned about:
- Whether the strategy supports the business objectives
- Whether the strategy ensures the optimum utilization of available resources
- Whether the strategy ensures compliance with regulatory requirements
- Whether the strategy minimizes the budget requirement
- What is the main objective of an information security strategy?
- To determine the goals of security and the plan to achieve them
- To determine the configuration of security controls
- To determine the acceptable usage of information assets
- To determine the budget of an information security program
- The roadmap for information security implementation is primarily based on:
- IT architecture
- IT policy
- Security strategy
- Regulatory requirements
- Which of the following can be the main reason for a change in a policy?
- Changes in regulation
- Changes in security baseline
- Changes in management intent and direction
- Changes in organizational culture
- The most important result of an information security strategy is:
- Mature policies and procedures
- Ensuring that residual risk is kept within acceptable levels
- Mature vulnerability assessment procedures
- Alignment of controls with international standards
- The best indicator to determine the effectiveness of a security strategy is:
- The strategy helps to improve the risk appetite of the organization
- The strategy helps to implement countermeasures for all the threats
- The strategy helps to minimize annual losses
- The strategy helps to achieve the control objectives
- The primary reason for the board of directors to be involved in information security initiatives is:
- Concerns regarding IT architecture
- Concerns regarding the organization's liability
- Concerns regarding compliance
- Concerns regarding the implementation of policy
- The information security manager has been asked to implement a particular security standard. Which of the following is most effective to monitor this?
- Key success factors
- Key objective indicators
- Key performance indicators
- Key goal indicators
- What is the most effective way of measuring the degree of alignment between security objectives and business objectives?
- Interviewing the security manager
- Reviewing the capability maturity model
- Reviewing the risk assessment report
- Reviewing the business balanced scorecard
- The best way to align security goals with business goals is:
- To design functional goals that support security goals
- To have business goals and security goals that support each other
- To ensure that the security goals are derived from the business goals
- To ensure that the business goals and security goals are independent of each other
- The security baseline of a mature organization is most generally defined with reference to:
- The availability of policies
- The availability of IT architecture
- Control objectives being met
- Adherence to regulatory requirements
- Which of the following is the area of most concern for the security manager of an organization that operates in multiple countries?
- Difficulty in implementing a standardized security program
- Difficulty in monitoring security posture across a wide geographical area
- Difficulty in developing a customized security awareness program
- Difficulty in monitoring compliance with laws and regulations
- Which of the following is considered the most significant key risk indicator?
- An abnormal deviation in employee attrition rate
- High count of viruses quarantined by antivirus software
- High count of packets filtered by the firewall
- A low count of information security officers
- The most important aspect of an information security strategy from senior management's perspective is:
- The details of technology
- The details of compliance requirements
- The business priorities
- The details of procedural aspects
- The best method to develop an effective data protection strategy is:
- To conduct a vulnerability assessment
- To design a tailored methodology based on exposure
- To obtain an insurance policy for data losses
- To implement industry best practices
- Out of the following, what is the most effective way to obtain commitment from senior management for the implementation of a security program?
- Discuss the industry best practices.
- Discuss various risk scenarios.
- Discuss the cost-benefit analysis.
- Discuss the relationship between the security program and business goals.
- Which of these factors most influences the success of an information security strategy?
- Approval from the chief information officer
- Alignment with IT plans
- Alignment with the goals set by the board of directors
- Measurement against a key performance indicator
- The most effective method to obtain commitment from senior management for the implementation of any new security program, given the following choices, is:
- To demonstrate the success of industry peers
- To demonstrate potential loss and other negative impacts due to a lack of support
- To demonstrate the regulatory requirements related to security
- To demonstrate support for the desired outcome