IT Security Organizations Launch First Set Of Information Security Principles

Three leading global security organizations have launched the first information security principles designed to promote good practice in information security. The Information Security Forum (ISF), International Information Systems Security Certification Consortium (ISC)2 and ISACA have developed 12 independent, non-proprietary principles that will help security practitioners respond more effectively in today’s complex, interconnected world.

“There are other standards and frameworks around like SOGP, COBIT and ISO27002, which are all aimed at organizations, but we were clear that we wanted these principles to be unique, practical and more like a code of conduct for individuals to adopt”

The emerging role of information security in improved governance, regulatory compliance and risk assessment has prompted the need for clear, relevant guidelines. The principles will help individuals support business objectives, manage their organizational risk and promote responsible security behavior.

“There are other standards and frameworks around like SOGP, COBIT and ISO27002, which are all aimed at organizations, but we were clear that we wanted these principles to be unique, practical and more like a code of conduct for individuals to adopt,” said Jason Creasey, Global Alliances Leader, ISF.

While information security has been added to many corporate agendas, the entire business -- not just security practitioners -- should be vigilant and responsive.

“The security profession has to break away from its roots as an IT-focused discipline. These principles are accessible to everyone working in information security whatever their qualification or affiliation. Security professionals and their stakeholders now have a common framework for truly risk-based security management that all will be able to identify with,” said John Colley, CISSP, Managing Director, EMEA, (ISC)2.

According to Manuel Aceves, CISA, CISM, CGEIT, CRISC, CISSP, FCITSM, member of ISACA’s Professional Standards Committee, “Because information security has become such an important business function, it is critical for information security professionals to develop sound business skills in addition to technical skills and knowledge. The information security principles provide a guide to help those in the security profession add value to their organizations by successfully supporting the business and promoting good practices. They also are a good complement to ISACA’s Business Model for Information Security (BMIS), which provides a breakthrough approach for describing the information security ecosystem and a common language for information security and business management to improve information protection.”

Available as a poster and downloadable from the ISF, (ISC)² and ISACA websites -- http://www.isaca.org/security-principles --  the principles are aimed at individuals working in information security, including those who develop, supply and manage security systems; influence legal or regulatory requirements for security; and educate tomorrow’s workforce. They have three categories -- support the business, defend the business, and promote responsible security behavior.

 

 

Featured

  • Maximizing Your Security Budget This Year

    7 Ways You Can Secure a High-Traffic Commercial Security Gate  

    Your commercial security gate is one of your most powerful tools to keep thieves off your property. Without a security gate, your commercial perimeter security plan is all for nothing. Read Now

  • Surveillance Cameras Provide Peace of Mind for New Florida Homeowners

    Managing a large estate is never easy. Tack on 2 acres of property and keeping track of the comings and goings of family and visitors becomes nearly impossible. Needless to say, the new owner of a $10 million spec home in Florida was eager for a simple way to monitor and manage his 15,000-square-foot residence, 2,800-square-foot clubhouse and expansive outdoor areas. Read Now

  • Survey: 72% of CISOs Are Concerned Generative AI Solutions Could Result In Security Breach

    Metomic recently released its “2024 CISO Survey: Insights from the Security Leaders Keeping Critical Business Data Safe.” Metomic surveyed more than 400 Chief Information Security Officers (CISOs) from the U.S. and UK to gain deeper insights on the state of data security. The report includes survey findings on various cybersecurity issues, including security leaders’ top priorities and challenges, SaaS app usage across their organization, and biggest concerns with implementing generative AI solutions. Read Now

  • New Research Shows a Continuing Increase in Ransomware Victims

    GuidePoint Security recently announced the release of GuidePoint Research and Intelligence Team’s (GRIT) Q1 2024 Ransomware Report. In addition to revealing a nearly 20% year-over-year increase in the number of ransomware victims, the GRIT Q1 2024 Ransomware Report observes major shifts in the behavioral patterns of ransomware groups following law enforcement activity – including the continued targeting of previously “off-limits” organizations and industries, such as emergency hospitals. Read Now

Featured Cybersecurity

Webinars

New Products

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3

  • Hanwha QNO-7012R

    Hanwha QNO-7012R

    The Q Series cameras are equipped with an Open Platform chipset for easy and seamless integration with third-party systems and solutions, and analog video output (CVBS) support for easy camera positioning during installation. A suite of on-board intelligent video analytics covers tampering, directional/virtual line detection, defocus detection, enter/exit, and motion detection. 3