Helping managers get a handle on IT security
March 02, 2007Two new publications issued by the National Institute of Standards and Technology (NIST) will help senior executives, auditors and others in federal agencies better understand how to manage, support, and evaluate their information security programs.
Information Security Guide for Government Executives (NISTIR 7359) was developed specifically to help senior managers better understand how to oversee and support information security programs. According to the 14-page document, "senior management's commitment to information security initiatives is the single most critical element that impacts an information security program's success." The guide answers five key questions about information security for senior managers:
- Why do I need to invest in information security?
- Where do I need to focus my attention in accomplishing critical information security goals?
- What are the key activities to build an effective information security program?
- What are the information security laws, regulations, standards and guidance that I need to understand to build an effective information security program?
- Where can I learn more to assist me in evaluating the effectiveness of my information security program?
Both publications are available at http://csrc.nist.gov/publications/nistir/index.html.
-end-
National Institute of Standards and Technology (NIST)
Related Information Security Articles from Brightsurf:
Some employees more likely to adhere to information security policies than others
Information security policies (ISP) that are not grounded in the realities of an employee's work responsibilities and priorities exposes organizations to higher risk for data breaches, according to new research from Binghamton University, State University of New York.
Data Security in Website Tracking
Tracking of our browsing behavior is part of the daily routine of Internet use.
High-security identification that cannot be counterfeited
Researchers from University of Tsukuba have used the principles that underpin the whispering-gallery effect to create an unbeatable anti-counterfeiting system.
Focus on food security and sustainability
The number of malnourished people is increasing worldwide. More than two billion people suffer from a lack of micronutrients.
Eliminating infamous security threats
Speculative memory side-channel attacks like Meltdown and Spectre are security vulnerabilities in computers.
UBC study: Publicizing a firm's security levels may strengthen security over time
New research from the UBC Sauder School of Business has quantified the security levels of more than 1,200 Pan-Asian companies in order to determine whether increased awareness of one's security levels leads to improved defense levels against cybercrime.
An MSU-based researcher developed an algorithm to improve information security tools
A scientist from MSU developed an algorithm increasing the speed of calculation of cryptographic transformations based on elliptical curves that requires little computational power.
Peatland contributions to UK water security
Scientists from the University of Leeds have developed a new global index that identifies water supplied from peatlands as a significant source of drinking water for the UK and the Republic of Ireland.
Improve your information security by giving employees more options
A recent study published in the Journal of Management Information Systems suggests information security managers and supervisors could have greater success in motivating employees to act more securely by avoiding cold, authoritative commands, and instead create security messages that are relatable and provide options for how employees can better protect information and respond to threats.
Shh! Proven security for your secrets
Researchers show the security of their cipher based on chaos theory.
Read More: Information Security News and Information Security Current Events
Information security policies (ISP) that are not grounded in the realities of an employee's work responsibilities and priorities exposes organizations to higher risk for data breaches, according to new research from Binghamton University, State University of New York.
Data Security in Website Tracking
Tracking of our browsing behavior is part of the daily routine of Internet use.
High-security identification that cannot be counterfeited
Researchers from University of Tsukuba have used the principles that underpin the whispering-gallery effect to create an unbeatable anti-counterfeiting system.
Focus on food security and sustainability
The number of malnourished people is increasing worldwide. More than two billion people suffer from a lack of micronutrients.
Eliminating infamous security threats
Speculative memory side-channel attacks like Meltdown and Spectre are security vulnerabilities in computers.
UBC study: Publicizing a firm's security levels may strengthen security over time
New research from the UBC Sauder School of Business has quantified the security levels of more than 1,200 Pan-Asian companies in order to determine whether increased awareness of one's security levels leads to improved defense levels against cybercrime.
An MSU-based researcher developed an algorithm to improve information security tools
A scientist from MSU developed an algorithm increasing the speed of calculation of cryptographic transformations based on elliptical curves that requires little computational power.
Peatland contributions to UK water security
Scientists from the University of Leeds have developed a new global index that identifies water supplied from peatlands as a significant source of drinking water for the UK and the Republic of Ireland.
Improve your information security by giving employees more options
A recent study published in the Journal of Management Information Systems suggests information security managers and supervisors could have greater success in motivating employees to act more securely by avoiding cold, authoritative commands, and instead create security messages that are relatable and provide options for how employees can better protect information and respond to threats.
Shh! Proven security for your secrets
Researchers show the security of their cipher based on chaos theory.
Read More: Information Security News and Information Security Current Events
Brightsurf.com is a participant in the Amazon Services LLC Associates Program, an affiliate advertising program designed to provide a means for sites to earn advertising fees by advertising and linking to Amazon.com.