|
|
|
|
|
|
|
|
|
|
|
|
|
Strategy and Information Technology. |
|
|
|
Strategy and Information Security. |
|
|
|
An Information Security Strategic Planning Methodology. |
|
|
|
The Business Environment. |
|
|
|
|
|
|
|
|
|
The Strategic Planning Process. |
|
|
|
|
|
|
|
|
|
|
|
|
2. Developing an Information Security Strategy. |
|
|
|
|
|
|
An Information Security Strategy Development Methodology. |
|
|
|
|
|
|
|
|
|
|
|
|
Formal Project Introduction. |
|
|
|
|
|
|
General Background Information. |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Strengths, Weaknesses, Opportunities, and Threats. |
|
|
|
Business Systems Planning. |
|
|
|
|
|
|
Critical Success Factors. |
|
|
|
|
|
|
|
|
|
Benchmarks and Best Practices. |
|
|
|
|
|
|
|
|
|
|
|
|
Organizational Mission and Goals. |
|
|
|
|
|
|
Management Systems and Controls. |
|
|
|
Information Technology Management. |
|
|
|
Information Technology Architecture. |
|
|
|
|
|
|
|
|
|
|
|
|
Options for Plan Development. |
|
|
|
|
|
|
|
|
|
|
|
|
The Security Assessment and the Security Strategy. |
|
|
|
|
|
|
|
|
|
Converting Strategic goals to Tactical Plans. |
|
|
|
Turning Tactical Planning Outcomes into Ongoing Operations. |
|
|
|
|
|
|
|
|
|
3. The Technology Strategy. |
|
|
|
Thinking About Technology. |
|
|
|
Planning Technology Implementation. |
|
|
|
|
|
|
|
|
|
Technology Life-Cycle Models. |
|
|
|
Technology Solution Evaluation. |
|
|
|
|
|
|
Technology Strategy Components: |
|
|
|
The Security Strategy Technical Architecture. |
|
|
|
Leveraging Existing Vendors. |
|
|
|
|
|
|
The Management Dimension. |
|
|
|
Overall Technical Design. |
|
|
|
The Logical Technology Architecture. |
|
|
|
Specific Technical Components. |
|
|
|
|
|
|
|
|
|
External Network Connections. |
|
|
|
|
|
|
|
|
|
Portable Computing Devices. |
|
|
|
|
|
|
|
|
|
|
|
|
Facility Security Systems. |
|
|
|
Security Management Systems. |
|
|
|
|
|
|
4. The Management Strategy. |
|
|
|
|
|
|
Control Systems and the Information Security Strategy. |
|
|
|
|
|
|
|
|
|
|
|
|
Current Issues in Governance. |
|
|
|
Control Objectives for Information and Related Technology (CobiT). |
|
|
|
|
|
|
Governance in Information Security. |
|
|
|
|
|
|
An IT Management Model for Information Security. |
|
|
|
Policies, Procedures, and Standards. |
|
|
|
Assigning Information Security Responsibilities. |
|
|
|
To Whom Should Information Security Report? |
|
|
|
|
|
|
Organizational Interfaces. |
|
|
|
Information Security Staff Structure. |
|
|
|
Staffing and Funding Levels. |
|
|
|
|
|
|
Organizational Culture and Legitimacy. |
|
|
|
|
|
|
|
|
|
|
|
|
Case Study 1—Singles Opportunity Services. |
|
|
|
|
|
|
Developing the Strategic Plan. |
|
|
|
Information Value Analysis. |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Case Study 2—Rancho Nachos Mosquito Abatement District. |
|
|
|
|
|
|
Developing the Strategic Plan. |
|
|
|
Information Value Analysis. |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
6. Business and IT Strategy: |
|
|
|
|
|
|
Strategy and Systems of Management. |
|
|
|
Business Strategy Models. |
|
|
|
Boston Consulting Group Business Matrix. |
|
|
|
Michael Porter—Competitive Advantage. |
|
|
|
Business Process Reengineering. |
|
|
|
The Strategy of No Strategy. |
|
|
|
|
|
|
Nolan/Gibson Stages of Growth. |
|
|
|
|
|
|
Rockart’s Critical Success Factors. |
|
|
|
IBM Business System Planning (BSP). |
|
|
|
So is IT really “strategic”? |
|
|
|
IT Strategy and Information Security Strategy. |
|
|
|
|
|
|
7. Information Economics. |
|
|
|
Concepts of Information Protection. |
|
|
|
|
|
|
|
|
|
Information Economics and Information Security. |
|
|
|
Basic Economic Principles. |
|
|
|
Why is Information Economics Difficult? |
|
|
|
Information Value—Reducing Uncertainty. |
|
|
|
Information Value—Improved Business Processes. |
|
|
|
Information Security Investment Economics. |
|
|
|
The Economic Cost of Security Failures. |
|
|
|
Future Directions in Information Economics. |
|
|
|
Information Management Accounting—Return on Investment. |
|
|
|
Economic Models and Management Decision Making. |
|
|
|
Information Protection or Information Stewardship? |
|
|
|
|
|
|
|
|
|
Compliance Versus Risk Approaches. |
|
|
|
The “Classic” Risk Analysis Model. |
|
|
|
|
|
|
Process-Oriented Risk Models. |
|
|
|
|
|
|
Organizational Risk Cultures. |
|
|
|
Risk Averse, Risk Neutral, and Risk Taking Organizations. |
|
|
|
Strategic Versus Tactical Risk Analysis. |
|
|
|
When Compliance-based Models are Appropriate. |
|
|
|
|
|
|
|
|
|
|
|
|
|
|