80 likes | 181 Views
Concept Presentation. Information Systems Security Management. Philip Robbins - August 1, 2012 University of Phoenix Hawaii Campus. Who am I?. Information Systems Authorizing Official Representative United States Pacific Command (USPACOM) Risk Management Field
E N D
Concept Presentation Information Systems Security Management Philip Robbins - August 1, 2012 University of Phoenix Hawaii Campus
Who am I? • Information Systems Authorizing Official Representative • United States Pacific Command (USPACOM) • Risk Management Field • Assessments to USPACOM Authorizing Official / CIO • Bachelor of Science in Electrical Engineering • Master of Science in Information Systems • Ph.D. Student in Communication & Information Sciences • Certified Information Systems Security Professional (CISSP) and Project Management Professional (PMP)
Concept 1: Info Security & Assurance • You leave your job at ACME, Inc. to become the new Information Systems Security Manager (ISSM) for University of University College (UUC). • The CIO of UUC drops by your office to let you know that they have no ISS program at UUC! • A meeting with the Board of Directors is scheduled and you are asked by the CIO to attend. • The Board wants to hear your considerations on how to start the new ISS program spanning all national and international networks. • What are you going to tell them? • As an ISSM, what would you consider first? • What types of questions would you ask the Board and/or to the CIO?
Concept 2: Physical & Logical ISS • First day on the job and you find yourself already meeting with the local Physical Security and IT Services Managers at UUC. • You introduce yourself as the new ISSM and both managers eagerly ask you “what can we do to help?” • What do you tell these Managers? • What types of questions would you ask the Managers? • As an ISSM, what are some IT, computer, and network security issues you consider important to a new ISS program at UUC? • What about your meeting with the Board of Directors earlier? How does it apply here?
Concept 3: Risk • At the end of your first 30-days on the job, as an ISSM, you have been able to sUUCessfully develop and implement an ISS program for UUC. • You decide to update the CIO on the progress of the UUC ISS program via email when all of a sudden the entire internal network goes down! • Your Computer Network Defense Team is able to determine the source of the disruption to an unknown vulnerability that was exploited on a generic perimeter router. • The CIO calls you into his office and indicates to you that he is “concerned about the Risk to the networks at UUC” and ‘wants a risk assessment conducted’ ASAP. • What does the CIO mean by “Risk to the networks at UUC”? • As a ISSM, how would you conduct a risk assessment for the CIO? • How is risk measured and why is it important?
Thank you! Questions? philiprobbins@email.phoenix.edu