StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

The Unification of Information Security Program Management and Project Management - Article Example

Comments (0) Cite this document
Summary
The breakthrough of the new technology and the aim of any organization or enterprise to achieve development and better service have pushed the unification of Information Security Program Management and Project Management. As more organizations follow the trend of the new age, more and more people are learning to navigate in the field of Information Security so that they can supply each other the competence they need…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER91% of users find it useful
The Unification of Information Security Program Management and Project Management
Read TextPreview

Extract of sample "The Unification of Information Security Program Management and Project Management"

Download file to see previous pages However, converging the two managements has drawbacks as well. More often than not, drawbacks weigh more than success on the first stages of the implementation. In light of the mentioned union, his paper will discuss the risks brought about by the new technology, the tasks to be dealt with in developing the Enterprise Information Security Program, and the adherence to executing risk management. The life of any organization or enterprise moving to build up a gateway lies in making goals into reality, and maintaining a successful position in the industry.
Dealing with new things may bring more thoughts to ponder. The unification of Information Security Program Management and Project Management comes with new security threats/risks that must be addressed accordingly. "Unfortunately, in the context of security, requirements and specifications are most often overlooked. This may in turn account for the estimated 92% of security vulnerabilities NIST3 recently attributed to applications."1 Organizations wanting to advance with Information Security Program are susceptible to the possible hazards for the Project Management in setting up new systems to adhere with the goals of both managements. A partner of Hurwitz and Associates, Fran Howarth, wrote an article about "The Convergence of Physical and IT Security." Howarth stated that "IT systems are increasingly being attacked-and not in the way they used to be, by hackers concerned most with gaining the respect of their peers for their exploits, but by criminals intent on financial gain."2 Howarth further explained that:
the heightened security threats that we face today-especially given the high levels of international terrorism that we face-affect huge parts of our lives. In recent years, public buildings, hotels, embassies and transport links have all been targeted by terrorists. And huge parts of our critical national infrastructures, including power, water and food supply, transport links and facilities, government and commercial facilities remain vulnerable, not just to terrorist attacks, but also to theft, sabotage and environmental disasters.3
An executive summary of a research entitled "Making Security an Integral Part of the Management" from Computer Electronics Inc. reveals that "security should be an important element of project management, to ensure that the security implications of these changes are addressed."4 A skilled and knowledgeable project manager must be aware of the security requirements in managing projects.
In addition, A Guideline to the Project & Program Management Standard produced by the International Association of Project and Program Management for the benefit of the project managers who need "to attain project success according to schedule, cost, quality, and to customer expectations."5 IAPPM sees a greater need in developing new techniques as organizations compete to be more accessible in providing solutions, products and services.6 IAPPM describes project management as "the centralized management by an individual to plan, organize, control and deploy key milestones, deliverables and resources from conception through retirement, according to customer goals. Often project managers are skilled to use specific templates and techniques to manage through the preferred project life-cycle."7 For example, a ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“The Unification of Information Security Program Management and Project Article”, n.d.)
The Unification of Information Security Program Management and Project Article. Retrieved from https://studentshare.org/miscellaneous/1506670-the-unification-of-information-security-program-management-and-project-management
(The Unification of Information Security Program Management and Project Article)
The Unification of Information Security Program Management and Project Article. https://studentshare.org/miscellaneous/1506670-the-unification-of-information-security-program-management-and-project-management.
“The Unification of Information Security Program Management and Project Article”, n.d. https://studentshare.org/miscellaneous/1506670-the-unification-of-information-security-program-management-and-project-management.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF The Unification of Information Security Program Management and Project Management

Information security management

...?TMA01 Information security management QUESTION A Before conducting information security risk assessment, there are certain fundamental concepts thatneed to be recalled. One of them is a Threat that is defined as the probable network security breach which may occur in the future and will harm the network, as well as Information systems. The current trends in technology advancement have enabled the networks to be prevalent. People are connected at home, offices, as well as when they are travelling either via laptop or mobile phones. The evaluation is conducted to identify the severity of each information system, which deserves priority due to the value of data which needs to be protected. Both threats and vulnerabilities need...
10 Pages(2500 words)Essay

Information Security Management

The fourth step is associated with creating contingency strategies. In the fifth step, information technology contingency plan is developed. The sixth step involves training, testing, and exercise. A maintenance plan document is developed, in the seventh step. The recommended standard approach to the process is to combine the both system development and life cycle (SDLC) risk management contemplation for the process of contingency planning. 2 Incident Response Planning Steps The incident response planning is associated with detailed set of processes and procedures which mitigate, detect and foresee the scope of an unexpected event directly impacting on information resources and assets. Incident Detection Identifying the incident...
5 Pages(1250 words)Essay

Information management (MSIM program )

...?Information Management (MSIM Program) Table of Contents Table of Contents 2 Question 3 Question 2 4 Question 3 5 Work Cited 7 Question I am interested in Master of Science in Information Management to further enhance my academic and professional experiences and to expand my knowledge in information science. I have Bachelor Degree in Urban and Regional Planning from King Abdul Aziz University in Jeddah, Saudi Arabia. Currently, I am working at Holy Makkah Municipality under general Department of Information Technology. I have been working here since July 2004 and have worked under different designations. I have further acted as Head of the Development of Data within the department and often I have been engaged in supervising...
4 Pages(1000 words)Admission/Application Essay

Successful information security management

... insufficient skills in dealing with information security, they can perform well in reducing risk factors. In each major business unit, employees with set of expertise to conduct IT audit, project management and risk management are recommended to be an information security officers. However, interpersonal, communication and process improvement skills are essential. Likewise, the most prominent objective for this role is to spread awareness between every employee of the Internal Revenue Service, as the awareness will be related to information security threats and most importantly the associated risks with these threats to the Internal Revenue Service. If Internal Revenue Service is associated with the cloud computing services, non-disclosure...
9 Pages(2250 words)Research Paper

Research Project : Information Security Management

... including both physical and electronic forms (Stephen, et al, 160). Information security encompasses four main areas that aim at safeguarding the whole integrity of the information collected and stored for future retrieval. These are availability of the data and information on demand, confidentiality, accountability on the part of individuals charged with the responsibility of managing the information, and data integrity (Stephen, et al, 167). A security authentication process refers to the process of determining he individuals authorized to access, retrieve, alter and use information at specified times and in a specified manner. The authentication process involves putting in place measures to determine which individuals are ratified...
3 Pages(750 words)Research Paper

Information security management

...TMA02- M886 Information Security Management Table of Contents Part A: Presentation of Findings for the Organizational Assessment of Information Security Risks- Report to Accounting Company Senior Manager 3 A. Description of Process 3 B. Explanation/Justification for Choices 5 C. Threats and Vulnerabilities Analysis 5 D. Gap Analysis 7 E. Treatment of Threats/Risks 7 Part B: Critical Assessment of the Process Used to Arrive at Assessment of Information Security Risks, and the Information the Process Has Provided About the Organization 9 A. Evaluation of Process 9 B. Evaluation of Results 10 C. Process Improvement Suggestions 11 D. Suggestions for Further Work 12 Works Cited 14 Part A: Presentation of Findings for the Organizational...
10 Pages(2500 words)Essay

Research Project Information Security Management

..., Pa. However, the details closed in an email were accessed and stolen as a result of this attack. In this scenario, attackers used malicious software to attack Fazio and this attack started almost two months prior to the attack that was launched against Target Corp. In fact, the attackers made use of these stolen information to steal card data from more than one thousand cash register. The investigation shows that the attackers made use of Citadel tool that is particularly used as a password-stealing bot application. In addition, this application is derived from ZeuS that is a well-known banking Trojan (KrebsonSecurity). In addition, the investigation showed that when the attackers entered into their network, the Target’s security team...
5 Pages(1250 words)Research Paper

Information Security Risk Management

...Information Security Risk Management Introduction Information security is the protection of information for business continuity as it is fundamental for maximizing the business opportunities and return on investment. Information security and risk management has become a critical business discipline with sales, marketing, financial management and Human resource. 2. Literature Risk management and its role in the organization Risk was called as a main cause for uncertainty in the business organizations. Therefore, business companies focus upon the risk identification, and manage it before these risks impact the business decisions. Organizations having control over risk management can compromise confidently for future decisions. Organization...
2 Pages(500 words)Case Study

Information Security Management

... data efficiently in order to sustain in this competitive landscape. Proper and effective data management will certainly reveal that business operations are conducted smoothly with better storage and dissemination of information. It has been apparently observed that the implementation of varied security measures is associated with different positive as well as negative aspects, influencing the operations of organisations by a certain degree. In this context, the CISO department of the large organisation will be facilitated in managing data effectively with the implementation of one of the security measures i.e. BCM. It is projected that this particular security measure will facilitate the organisation to gain significant benefits...
5 Pages(1250 words)Research Paper

Implementing Schedule of Time Management

... to conclude this discussion by quoting this “quality assurance parameters involvement and their utilization in the project management is really important and effective to have a successful project completion and deployment”. For this reason we also tried to follow these rules to enhance the project management capacity and have effective decision power. References 1. Atkinson R, Crawford L, Ward S. (2006). Fundamental uncertainties in projects and the scope of project management. 24(8):P.P. 687–98. 2. Balachandra R, Friar J. (1997). Factors of success in R&D projects and new product innovation: a contextual approach. IEEE Trans Eng Manage. 44(3):276–87. 3. Kenneth C. Laudon. (1998). Management Information System; Sixth Edition. New York...
6 Pages(1500 words)Coursework

Change Management

In light of these, management must go out of their way to deal with organizational resistance to change because even the most carefully laid out or well-intentioned changes can still meet resistance. Subsequently, an organization’s ability to gain benefits from their change efforts is largely affected by their ability to create environments that encourage support and acceptance from other members of the organization. (Coetsee, 2003)
Some authors assert that resistance to change may be defined as behavior that human beings depict when they are attempting to protect themselves from the effects of change; these effects may be real or they may be imagined depending on the situation under consideration. Others believe that r...
10 Pages(2500 words)Coursework

Diversity Management in Organisations

... that all workers enjoys the equivalent chances of development and authority within the place of work and not merely to those workers who adds their input to multiplicity, is compulsory for the effectual managing of diversity in organization. Integrating the contemporary organizational ethnicity while planning a “diversity management program” may perhaps be one way for recuperating discernments of multiplicity management by all workers and attaining the most optimistic result for place of work diversity. (SIAS, Patricia M., 2008) 3.2 Impact of Organizational Ethnicity on diversity It is must for a HR manager to be aware of the fact that proponents of office diversity have endlessly endured the positive advantages of assemblage assortment...
6 Pages(1500 words)Case Study

The Relationship Between Security, Risk and Health in a Large Organisation

Managers in modern organizations tend to use appropriately customized policies – in accordance with their firms’ needs and resources (employees, funds, technology) available. The current paper focuses on the examination of the various aspects of security, risk, health and safety within large organizations; Particular emphasis is paid on the fact that the demands of each one of these factors may be differentiated under the pressure of the market conditions and the organizational priorities. The case of Shell in Nigeria has been used as an example in order to show the potential co-existence and interaction of these factors within a specific organizational environment. The measures required and the role of the security ma...
9 Pages(2250 words)Coursework

Information Security Management

Security is a group of activities that include the policies, measures, and actions which are utilized to stop unlawful access or alteration, theft, and physical damage to information or computer. Security can be supported by an assortment of techniques and tools to safeguard computer hardware, software communications networks, and data (Laudon & Laudon, 1999, p. 502). In the modern age of information technology, there are many threats happened for organizational information. We need a security model that has the ability to manage and secure our information reserves. Technical administrative safety /security measures like security plans, actions and techniques are the main practices for the organizational information security m...
10 Pages(2500 words)Research Paper

International Security Studies: Examination

Globalization affects international security in the sense that problems involving terrorism, the environment, religious extremism, weapons of mass destruction, and the economic crises have become more universal and widespread in character (Ivanov “Article”). As a result, these issues pose a greater threat to national and international stability and safety. More lives are now affected by threats to international security; these threats did not seem too ominous before the entry of globalization. Consequently, some extremists justify the use of mass weapons of destruction in order to guarantee their security. And as globalization continues to expand and to grow bigger as a phenomenon, threats to international security are...
7 Pages(1750 words)Assignment

Role of the Police and Private Security

... and private detective agencies) it would be a good idea to use these agencies and individuals to provide information to government security agencies on other areas as well. It could provide some relief to an over-worked security force in many parts of the country. Federal funding: Crime in its various forms has always existed in many parts of the United States. In addition criminal activities like terrorism have seen an increase over the years. This has put a lot of pressure on the resources of the state and local police departments across the country. The available resources collected through taxes and other duties may now be insufficient to manage an efficient police force that is capable of providing adequate protection to its citizens...
8 Pages(2000 words)Case Study

Business Information Systems

.... This organizational management of Club IT project will provide a better system management and handing. The implementation of new management system will provide: Better organizational management Better information handling Centralized information retrial Identical data format Better online information access Enhanced data security Establishment of Quality of Services (QoS) Gaining better competitive edge Performance enhancement Better inter-departmental communication Enhanced customer management Fast order processing Assessment of Needs In this high competition and complex business management world Club IT requires extensive assistance from the powerful business management systems. These business management systems and enterprise...
8 Pages(2000 words)Case Study

People, Organisations and Management

Organizations and their management styles have evolved to a great extent in the service and manufacturing industry over the last century, and so have been the concepts of management and its functions. These evolutions can be traced to significant developments brought about by the industrial revolution, scientific management principles such as Taylorism and Fordism, transition of feudalistic to capitalistic approach and others in different sectors of manufacturing industries. However, the beginning of the industrial revolution was characterized by a rigid hierarchical bureaucratic way of organizing business enterprises, a style prevalent even today but only in military service organizations. Nevertheless, the manufacturing and busi...
8 Pages(2000 words)Assignment

Global Employee Information and Consultation: Replicating the European Model

A significant step to enhancing the employees’ right to information and consultation is the establishment of the European Works Council (EWC). The EWC Directive (94/45/EC) aims to improve cooperation in transnational companies and to allow trade unions to influence, at least indirectly, the decision-making of corporations (Lockwood and Williams). It requires community-scale undertakings and community-scale groups of undertaking to create this mechanism for regular consultation of the workforce. A ‘community-scale undertaking’ is one with at least 1,000 employees within the Member States and at least 150 employees in each of at least two Member States (Lewis and Sargeant).

An EWC is a forum that would a...
9 Pages(2250 words)Coursework

Self Assessment: Conflict Management Style

...Please indicate Self Assessment: Conflict Management Style The assessment on conflict management that I took suggests that I am the type of person who tends to cooperate and work with people to achieve a desirable outcome. It suggests that when I am faced with a conflicting situation, although I listen and consider other viewpoints included in the discussion, I carefully evaluate and analyse every detail in accordance to my own. It depicts that I welcome other ideas or arguments but not easily swayed by them for I tend to make my point be heard and accepted as well, creating a really interesting discussion that in turn promotes a win-win situation. Furthermore, the assessment also indicated that second to collaborating attitude, I also...
7 Pages(1750 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Article on topic The Unification of Information Security Program Management and Project Management for FREE!

Contact Us