Homepage > Consulting > Information security, Cyber security and business continuity > Corporate information security
Corporate information security
What is corporate information security?
Information security is a “moving target”, an area that is constantly and rapidly changing. Today, systems based on the application of ISO/IEC 270 xx series standards are on the scene. (ISMS systems) However, practice requires their gradual transformation according to the concept of so–called Information Security Governance. The derivative corporate information Security (KIS) is most commonly used for this original term, which can be misleading at first glance, because it can be associated with information security in large business systems. However, this concept applies equally to small and medium–sized and large business systems. In order to better understand the concept of corporate information security, it is important to recognise the difference between management (management) and management (governance). COBIT defines a clear distinction between these two concepts.
Management refers to day–to–day decision–making during the performance of activities within business processes and operations and is the basis for the management of a business or organisational unit. It is based on the implementation of policies and procedures and must ensure that everyone has the necessary conditions to do their job. Information security management is e.g. backup, verification of system records, monitoring of system performance and other day–to–day activities of IT departments. The management plans, installs, manages and supervises activities that comply with the guidelines set by the management body (e.g. the supervisory board) in order to achieve the company‘s objectives.
Guidance shall ensure that the needs, conditions and possible options set by stakeholders are well assessed in order to determine the balanced and agreed objectives to be achieved by the company, set guidelines through prioritisation and decision–making, monitor performance and compliance monitoring in relation to the identified objectives and guidelines. Leadership is a set of broader principles, visions and values that determine how a company is directed.
In this sense, corporate information security is a system that makes up vision and principles on the basis of which information security processes are directed and controlled. The difference between management (management) and management (governance) of information security is that management consists of a security strategy and decisions taken by management and implemented controls that mitigate risk, while management (governance) sets a liability framework that determines who can make decisions, establishes supervision to ensure that risks are adequately mitigated and controls whether the security strategy is consistent with the company‘s objectives and complies with regulatory requirements.
ISO 27014 describes the link between good governance and efficient information security management as defined in ISO 27001. The principles used for KIS–water are (according to ISO 27014);
information security at company level should be integrated and comprehensive;
each decision should be based on accepted risk management policies;
the strategy for acquiring and investing in information security should comply with business requirements;
compliance with legal and regulatory requirements and formal internal policies;
encouraging a positive attitude towards security measures among all stakeholders in view of the human factor;
the adequacy of access to information protection with regard to business support and protection;
The focus of the KIS concept is on further development, responsibilities, processes, procedures, documentation and competencies for information security, especially from the point of view of management and executive management (directors).
Each of the aforementioned components IS a problem for itself. For example, responsibilities in the KIS make demands design and implementation of processes that achieve the process cycle evaluation – Management – supervision – Communication – ensuring consistency between the management level of the business system and executive management.
The main task of information risk management is to meet the security requirements prescribed by a certain standard and harmonised requirements of all stakeholders of the company, with the determination of an acceptable point of relation between investments in security controls and the cost in the event of the occurrence of a security incident or the achievement of a threat.
Implementation of the KIS system may be of interest:
members of the safety administrations;
corporate security managers;
information security managers;
information security experts
it security auditors/assessors
anyone interested in the field of security and information security
The benefits of the company‘s proper implementation of the corporate information security system are primarily reflected in increasing the degree of compliance with regulatory and legal obligations related to the acceptable use of IT and protection of information assets, which reduces the risk of the company and responsible persons being subject to legal proceedings and significant fines. The protection of critical information assets reduces the risk of unauthorised disclosure of information and thus reduces reputational risk, risk of market loss, risk of competitive advantage and risk of financial losses. KIS can also ensure the balance of investment costs in information security and losses due to possible security incidents and thus maximize the efficiency of part of the company‘s investment cycle.
How can ZIH help you?
For each WINTER user, it has an individualised approach depending on its needs. In accordance with this, we organize workshops with management teams and, with the expert guidance of our consultants and the application of world reference recommendations, we help users successfully implement the principles of corporate information security and IT management in their business. Consulting services that we can provide you with:
preparation and operation of THE CASH project;
the selection of THE KIS model (ISO 27014, COBIT, SE CMM, CG);
KIS business process design for the evaluation cycle – governance – supervision – Communication – compliance assurance
Determination of THE KIS organisation for E – U – N – K – O cycle
Drafting of a proposal for responsibility for this cycle
Preparation of proposals for necessary procedures
Participation in the implementation of KIS solutions in practice
Participation in verification (auditory)
Education in the following field:
- Why and how to operate the corporate information security system?
- Development and implementation of corporate information security
- Internal corporate information security audit
You may also be interested in these services and trainings:
Zašto ZIH?
ZIH ima više od 20 godina bogatog iskustva u oblikovanja suvremene organizacije sustava upravljanja informacijskom sigurnošću te pomno prati razvoj i primjenu normi koje se odnose na ovu tematiku.
Contact us
Fill out the form and our staff will contact you and arrange a visit or online meeting to find out how we can help you.
We want to share with you our experiences and the latest trends that can help you in your daily business.