Example of a Management Objective Part 1

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Time
3 hours 43 minutes
Difficulty
Intermediate
CEU/CPE
4
Video Transcription
00:00
let's continue with the management objective example.
00:04
In this video, we're going to talk about a P 0. 13 with respect to policies and procedures,
00:09
culture and behavior and services, infrastructure and applications
00:16
in the policies and procedures. Component will be pinpointing the relevant policies that support the overall objective of managing information security.
00:25
An example of a relevant policy would be the information, security and privacy policy and a description of that policy.
00:37
The culture, ethics and behavior component will spell out desired behavior at all levels within the organization.
00:44
Let's take an example of key culture elements oven enterprises, culture, risk and behavior to support managing information security.
00:52
Some of the key culture elements include promoting a security aware culture at all levels within the organization and providing sufficient guidance and indicating who the security and privacy champions are, such as C level executives, H R and or security and privacy professionals.
01:08
Along with supporting the privacy program with and communicating the program itself along with new innovations and challenges.
01:18
Desirable behaviors are also spelled out and what is required to support the management Oven Information Security program,
01:25
a work culture that embraces security and privacy awareness and has proper guidance on how to fulfill the enterprises security programs needs, along with knowing who the security and privacy champions are, will allow for the overall support of managing security.
01:42
The last component to support the goal of managing security includes the services, infrastructure and applications needed to support this management objective.
01:53
To support this goal, third party security assessment services can pinpoint the vulnerabilities and security gaps that can be mitigated by an overarching information security management system.
02:05
I hope by now you see the difference between a management objective versus a governance objective.
02:09
Take a moment to look at the differences of how each process contributes to the school as well.
02:19
So in this video we talked about how policies and procedures, culture and behavior and services, infrastructure and applications allow for a P 0. 13 to be implemented.
Up Next