HCISPP

Course
Time
5 hours 25 minutes
Difficulty
Intermediate
CEU/CPE
6

Video Transcription

00:00
Well, hello, everybody. And welcome back to the eight C I s P p certification course with Cyber Eri information, governance, roles and responsibility.
00:10
My name is Shalane Hutchins and I will be your instructor for the day
00:17
today we're gonna talk about information, governance, roles and responsibility.
00:25
In addition to the characteristics and components described in the previous module, there are also common roles that are related to information and privacy governments that should be understood.
00:36
Many of the titles mentioned here are from the government or public sector, and similar roles entitles may also exist in the corporate and private sector.
00:47
Heads of agency or your chief executive officer are responsible for ensuring that information security management processes are integrated with strategic and operational planning processes,
01:00
their senior officials who provide security for the information and systems that support operations and assets under their control.
01:10
The organization has trained this personnel or these persons sufficient to assist in complying with regulatory requirements, policies, instructions, standards and guidelines,
01:26
your risk executive function or your chief risk officer coordinates with senior leadership of an organization to provide a comprehensive organization. Why holistic approach for addressing risk that provides a greater understanding of integrated operations.
01:44
They developed risk management strategies to provide a strategic view of information security related risks related to the whole organization.
01:53
A risk manager or risk officer facilitates the sharing of risk related information to senior leaders within the organization. They provide oversight for all risk management related activities to ensure consistent and effective risk acceptance decisions.
02:12
They identify the organizational risk posture
02:15
based on the aggregated risk to the information from the operation and use of the information systems.
02:25
Your chief information officer or C i o is responsible for designating the senior information security officer.
02:34
They're responsible for developing and maintaining security policies and procedures and control techniques to address all applicable requirements.
02:43
They oversee personnel with responsibilities for information security and ensure their trained and reporting to the head of the federal agency and in the private sector to the board of directors,
03:00
an information sharing environments. The information owner or steward is responsible for establishing the rules for appropriate use and protection of the information, for example, the rules of behavior and retains that responsibility even when the information is shared or provided to other organizations,
03:20
the information owner or Stewart May or may not be the same as the system owner.
03:25
A single system could have information from multiple owners or stewards who may provide input to the system owners regarding security and control requirements. For instance, should a system contain data that is classified differently, the security and controls around that data
03:44
should be aligned with the classification of that data.
03:46
Therefore, the information owner or Stewart must meet those classifications requirements with the controls that are being implemented.
03:59
The senior information security officer serves as the primary liaison for the C I O to be
04:05
other officers in system owners.
04:09
This position is frequently referred to as either the CIS oh, or the chief information security officer or the C. S. O, the chief security officer in other organizations. While the tiles may be different, the intent of the role is the same.
04:28
And authorizing official typically has budgetary oversight for a system or are responsible for the mission and or business operations supported by the system.
04:39
Authorising officials, through the security authorization process, are accountable for the security risks associated with the information systems operations.
04:48
They improve security plans and plans of actions and milestones and determine whether significant changes in the systems or environments of operation require re authorization
05:01
again, mostly in the public sector.
05:08
Your Information Systems security officer is responsible for ensuring the operational security posture is maintained and works in close collaboration with the information systems owner. They may also service the principal adviser on all matters technical and otherwise involving the security
05:27
oven information system and in many organisations, is assigned responsibility
05:31
for the data days security operations of a system.
05:35
In my role as isil, I'm responsible for security of all systems and applications that recreate
05:43
I reviewed contracts and agreements to ensure that that we are agreeing to, um what we can actually provide in terms of security requirements. I ensure the policies and procedures related to various aspects of security exist and are maintained and communicated throughout the organization.
06:03
Listed here are other rules that may be designated in an organization.
06:09
A common control provider documents controls for each system and maintains assessments and assessment findings and reports.
06:17
The information system owner is responsible for the operations of the information system,
06:24
the information systems architect,
06:26
design security within the organisations and networks in systems,
06:30
the information systems security engineer
06:33
Ah and this role in our organization is responsible for performing threat models and managing firewall rules and working with the product teams to ensure that security is implemented appropriately.
06:47
So the Security control assessor is kind of like an auditor. They assess the controls of each information system.
06:55
Please refer to the supplemental materials for additional information on the's roles. They may show up in the exam.
07:05
Now it's time to test your knowledge.
07:09
Who is the highest level senior official with responsibility for information security protections?
07:20
Did you guess the chief information officer
07:28
next,
07:30
who is responsible for ensuring the operational security posture is maintained?
07:39
That's right, the information systems security officer
07:47
in one more
07:50
who is responsible for providing a comprehensive, organization wide, holistic approach for addressing risk.
08:03
You guessed it the chief risk officer or the risk executive.
08:13
So today we review the information, governance, roles and responsibilities.
08:16
Thank you for watching, and I look forward to seeing you in the next video

Up Next

HCISPP

The HCISSP certification course provides students with the knowledge and skills to successfully pass the certification test needed to become a healthcare information security and privacy practitioner. The course covers all seven domains included on the exam.

Instructed By

Instructor Profile Image
Schlaine Hutchins
Director, Information Security / Security Officer
Instructor