hiring the right employees is Human Resources (HR) job
research and development belongs to program management
buildings belong to facilities
public release reviews belong to business development Instead of writing a lengthy security policy, review existing policy and make sure HR requires background checks on all employees, program management practices system security engineering to engineer out risks, business development has a public release process that protects trade secrets and customer information.
Step two, interview business units to determine what assets require protection. The subject matter experts understand their business and know what is valued and what that value is. HR protects personal identifiable information, program management can identify sensitive processes and facilities has the layout for physical security.
Step three, identify impact of loss. Will it shut down business, will loss be negligible, will the customer pull contracts? Determine the impact to get an understanding of what resources need to be allocated and protective measures put in place.
Step four, brief the SME policy makers on the identified assets and impact of loss or damage. This is to emphasize what was discussed and the agreed upon actions. “We’ve identified that all requests for public release must go through the subject matter expert, the first VP in the rating chain, security and forwarded to the customer. Do we have that process documented and in practice?” If so, there’s your policy to protect sensitive information. If not, then the owner of the process (in this case business development) takes responsibility to add this to the enterprise policy.
Continue this throughout the organization. As a risk or security manager, you’ve just had other business units develop and implement policy that supports your role in asset protection. Though the working groups are security led, others own the process, document and enforce it. You get all the credit.
For more ideas of security policy see DoD Security Clearances and Contracts Guidebook
Jeffrey W. Bennett, ISP is the owner of Red Bike Publishing Red Bike Publishing . He regularly consults, presents security training, and recommends export compliance and intellectual property protection countermeasures. He is an accomplished writer of non-fiction books, novels and periodicals. Jeff is an expert in security and has written many security books including: "Insider's Guide to Security Clearances" and "DoD Security Clearances and Contracts Guidebook", "ISP Certification-The Industrial Security Professional Exam Manual", and NISPOM/FSO Training".
No comments:
Post a Comment