From the course: Building and Managing a Cybersecurity Program

Unlock the full course today

Join today to access over 24,900 courses taught by industry experts.

Information security program design

Information security program design

- [Instructor] Previously, we looked at five widely-used sources of information security controls, and I've made the case for letting cyber resilience play a major role in driving your control selection. Now you need to select and implement controls to make your program come to life. To be the most effective and efficient, you need a single set of controls that will meet all your program goals. Be easy for your workforce to follow every time, all the time, and allow you to actually manage risk, while also demonstrating compliance. But because of the increasing pressure at the executive level, to be compliant with information security laws and regulations, the importance of being compliant sometimes overshadows the rest of your program goals, which is unacceptable. So you need to figure out how to cost-effectively comply with multiple mandates. Don't tackle each mandate on a standalone basis. That's too much duplication…

Contents