Information Security and Management
Information Security and Management
and
Management
Introduction to Information Security
What is Information?
• Share Holders/Owners
• Management
• Employees
• Business Partners
• Service providers
• Contractors
• Customers/Clients
• Regulators
Process
“What we do”
• Helpdesk/Service management
• Incident Reporting and Management
• Change Requests process
• Request fulfillment
• Access management
• Identity management
• Service Level/Third-party Services Management
• Procurement process
Technology
“What we use to improve what we do”
Application software: Access devices:
• Finance and assets systems – Accounting • Desktop computers
packages, Inventory management, HR
• Laptops
systems, Assessment and reporting systems
• Digital cameras
• Software as a service (Sass)
• Printers
• Scanners
Physical Security components:
• Photocopier
• CCTV Cameras
• Clock in systems/Biometrics
• Environmental management Systems:
Humidity Control, Ventilation, Air
Conditioning, Fire Control systems
• Electricity/Power backup
Information Security
• Reputation loss
• Financial loss
• Intellectual property loss
• Legislative Breaches leading to legal actions (Cyber
Law)
• Loss of customer confidence
• Business interruption costs