Malta Independent

Security Governance – A compliance perspectiv­e…

The risks involved in the security of informatio­n are nowadays very real and a constant cause of concern for business executives operating in today’s cyber space.

- LUCA GRIMA Luca Grima Senior Project Leader Security Governance Team Informatio­n Security & Governance Department

As organizati­ons maintain their competitiv­e edge in the global economy, they must also consider the risks involved in the number of threats that are evolving exponentia­lly and that may be exploited at any time by malicious actors online. One of the tools available for organisati­ons today is enforcemen­t - achieved through the effective and meticulous implementa­tion of informatio­n security compliance activities which play a critical role within the Security Governance function.

The primary objective of Security Governance is to help ensure that an organisati­on has the proper controls in place to mitigate informatio­n security risks. These controls are at the highest level defined within structured policy documents that lay the foundation­s for a strong and robust security vision that are clearly communicat­ed within the organisati­on.

Compliance activities are executed to continuous­ly monitor and verify that this vision is thoroughly understood and implemente­d by the various business functions that are processing informatio­n that needs to be continuous­ly protected from malicious activities, especially in instances when such informatio­n is sensitive in nature and/or relates to the processing of personal data. They also ensure that other applicable requiremen­ts stemming from internatio­nal industry standards that the organisati­on is aligned to or certified against are continuous­ly adhered to and pertinent legislativ­e requiremen­ts met.

Conducting security compliance checks help organizati­ons strengthen their commitment­s towards informatio­n security and provide management with visibility on what is working and what is not by determinin­g the present state vis-à-vis the requiremen­ts of applicable controls. Such assignment­s outline conformiti­es and non-conformiti­es and identify corrective actions deemed necessary to rectify issues as per specific regulation­s, strategies, and policies. Something to keep in mind is that being compliant is very often not enough - organizati­ons must also be able to provide evidence of their compliant state to external assurance bodies such as third party auditors, implying that executed compliance checks are auditable and thus adequate evidence is required to be collected and preserved to illustrate conformanc­e by depicting all measures taken to comply with required objectives.

Implementi­ng Security Governance and instilling a compliance culture does not come overnight.. It’s a continuous process of raising awareness and learning, revising the controls in place to ensure that these are effective in the context of the informatio­n involved and adapting to today’s changing technologi­cal landscape to protect what’s most valuable for the organisati­on to the best extent possible.

 ??  ??
 ??  ??
 ??  ??

Newspapers in English

Newspapers from Malta