1 (306) 502-1116

The four stages of cybersecurity program development — part two

Tillman Hodgson

Welcome to part two in our series on security program development (i.e. creating a cybersecurity posture for your organization’s distinct needs). As a general rule, security program development typically follows four key phases for most organizations, with each subsequent phase building on the last. If you haven’t read part one on the initial stage or […]

Welcome to part two in our series on security program development (i.e. creating a cybersecurity posture for your organization’s distinct needs). As a general rule, security program development typically follows four key phases for most organizations, with each subsequent phase building on the last. If you haven’t read part one on the initial stage or the foundational phase, you can find that post here. This article will look at phase two, or the Security Program Planning stage.

Phase Two of Security Program Development

Now that you’ve gone through the foundational phase of developing your security program, several vital basics should be in place to protect your organization. However, these basics are rather general and aren’t specific to the threats and risks that your industry faces, the strategic objectives of your business, or the requirements of your customers. You can add some of these critical pieces to your security program in phase two. 

To get the ball rolling, begin by doing some deep discovery work to understand the requirements of your business. Consider questions such as the following:

  • What legislation or regulations apply to your business? 
  • Go through your contracts with your partners and customers. For example, do you have any security requirements (such as confidentiality clauses or a need to keep services available 24/7) in the agreements? 
  • What ‘secret sauce’ or intellectual property does your organization want to protect from competitors? 
  • What strategic business objectives do you have that might bring new risks or requirements and thus require the security program to support them? 
  • Who are your internal stakeholders? What is the level of your executive support? 
  • What is your level of ‘risk appetite’ (i.e. how much residual risk is acceptable to your corporate culture and industry)?
Spending some time thinking about these questions is definitely a good use of your time!

Admittedly, they’re probably not questions you’re going to answer in a single afternoon, but start considering them and analyzing where you stand. In addition, identify your scope for the security program. For example, consider what specific sensitive information or critical assets you are trying to protect and make a record of this. This is where the inventory of critical IT and information assets, which you developed in the Initial Stage, can be leveraged.

The key part

Once that work is complete, you’ll want to identify the threats to the assets in your chosen scope and assess what risks they face. This is the truly critical bit. This is the part that tailors the security program to you and changes security from being ‘boring IT’ work to being a business enabler. For instance, imagine your strategic business objectives and opportunities expanding because you can reduce the risks they entail enough to make the new opportunities feasible.

The last step

Last is the planning/management stage. You’ll want to document all of this into a high-level security policy. Clearly identify the objective of the security program expressed in terms of the requirements you collected and the risks you want to prevent. In addition, identify roles and responsibilities and a way to review your security program annually. This is important! As we have said many times, data security is basically in permanent beta, so even with a security program in place, you can’t set it and forget it. You’ll need to stay on top of it. However, you’re now ready to start managing security risks as a business process rather than an IT function!

Ideally, organizations should treat their cybersecurity needs as a key business enabler rather than a dull necessity or an afterthought. Putting some of these pieces in place can help put your company in an even stronger position as it looks to the future.

At SeekingFire Consulting Inc., we work with small to medium-sized clients across Western Canada on their cybersecurity needs. We partner with a diverse mix of organizations, from post-secondary institutions, health offices and credit unions to startups. If you’re looking for data security help, we offer free consultations to all prospective clients. Please reach out to get the conversation started.

Disclaimer

While we have made every effort to present accurate, unbiased and helpful information in this article, please note that it reflects the author’s opinion and is written for the purposes of general knowledge, information and discussion. This article is not intended as legal advice, nor should it be considered as advice specific to your individual data security situation. If you would like to discuss your cybersecurity needs in specific detail, please get in touch with us.

Ready to learn more?

Third Party Security: Who’s Minding Their Store?

Third Party Security: Who’s Minding Their Store?

Giant Tiger made the news this month with a security breach related to a third party. The discount retailer used another company to manage customer engagement and communications. Customer data, including contact information and home addresses were compromised, leaving Giant Tiger with the task of contacting customers to warn them of phishing emails and phone calls likely to ensue as a result.

read more
Stopping the Leaks: How to Play Safe on Today’s Internet

Stopping the Leaks: How to Play Safe on Today’s Internet

Sara finds an email in her inbox, notifying her that she has been the victim of a data leak through one of her social media accounts. Brad gets a similar email, letting him know that his private information is no longer secure after his favourite online store experienced a security breach. These types of notifications are almost commonplace as cybercriminals become increasingly sophisticated in their attacks on the networks that hold our data. In fact, there have been over 26 billion records exposed in what Canadian cybersecurity researchers are terming a “supermassive leak”. 

read more