How many activities does the average security manager have to accomplish over the course of a year? A year sounds like a long time, but before you know it, things will snowball if you don't plan for them. A proactive, strategic plan is necessary to help you account for all it takes to effectively run a security practice. Our
The activities of Information Security System Managers (ISSM) can be broken down into the following five categories: functional security; coordination; documentation; configuration management and certification and accreditation; and risk management. Accomplishing all of the tasks associated with these five areas ensures an ISSM is limiting his/her organization's liability, and is accomplishing due diligence in support of the organization as well as any customers associated with the organization.
The Perpetual Calendar is powerful because it:
- Illustrates to management security responsibilities over the course of a year
- Acts as a checklist
- Demonstrates to your staff their appropriate division of responsibilities
- Will help determine adequate staffing
- Acts as a time management tool, allowing you to project for potential issues
Understand that you will never have enough talent, time, money, people or resources, so you have to target your activities to use the best of these to protect your most critical assets.
Typical security-related activities you need to plan:
Daily activities (use a summary checklist for each month)
Semi- and/or annual activities
In addition to what you know has a reoccurring schedule, what is not on the calendar that you must allow time for?
- Daily backups
- Daily checklist
- Equipment rollouts/upgrades
- Vacation/sick leave
- Bad weather-related delays
- Training -- technical, mandatory corporate compliance, new personnel orientation, new IT people and general (management, leadership, school, other)
- Meetings -- regular/ad hoc
- Data and/or equipment recovery
- Out-of-cycle updates for virus-related events
- Incident response
- Compliance inspections and/or audits
The weekly series then examines 52 facets of security, emphasizing one each week. Each column will discuss:
- What event we'll be looking at more in depth
- When/how often the event occurs
- Why it's important to security
- Implementation strategy
- More information
About the author
Shelley Bard, CISSP, is a senior security network engineer with Verizon Federal Network Systems (FNS). An infosecurity professional for 17 years, Bard has briefed and written infosecurity assessments and technical reports for the White House and Department of Defense, special interest groups, industry and academia. Please e-mail any comments to firstname.lastname@example.org.
This was first published in February 2004