Security Manager's Journal: A reality check for the department's maturity

An assessment of the information security department shows that it still has a lot of growing up to do.

By Mathias Thurman, Computerworld |  Security

I thought I was a security adolescent, but I'm really just a toddler.

Trouble Ticket

The CIO wants all departments to assess their maturity.Action plan: Find an appropriate maturity model, measure the department and then plan how to do better next year.

Many IT managers can probably tell from that statement that I have been looking into maturity models. I did that at the request of our CIO, who asked all of his department managers to develop a maturity model and identify where we are. Perhaps the topic came up at a conference he attended, but no matter; I had never assessed the maturity of my department at my current company.

My first step was to turn to the Internet to try to find the maturity model that could best help me measure our security program against industry standards. I wanted something that would let me communicate the level of our security maturity in one slide.

I soon found that there are a lot of models to choose from. They range from the complex, requiring lengthy calculations and surveys, to the fairly simple.

Taking into account time and resources, I chose the Gartner Security Maturity Model, making a few modifications of my own. The Gartner model segments maturation into phases: Blissful Ignorance (or what I call the initial phase), Awareness (or the developmental phase), Corrective Action (or the define and manage phase) and Operational Excellence (or the optimized phase). According to Gartner, about half of all companies are in the Awareness phase, and only 5% ever reach Operational Excellence. In other words, most companies know where their weaknesses are but are not yet taking action to correct them.

As I worked my way through the questions that Gartner provides to help clients position themselves on the maturity scale, it became painfully obvious that my security program is not as advanced as I had thought.

Sure, we've spent a lot of money deploying some of the standard buzzword technologies: SIEM, DLP, NAC, file encryption, IPS, content filtering, multifactor authentication, spam filtering, endpoint protection. I have developed a comprehensive set of policies based on ISO 27001 and created awareness training as well as various procedures and processes. But with many of these technologies, we are still in our infancy in terms of capabilities, coverage, deployment and user acceptance.


Originally published on Computerworld |  Click here to read the original story.
Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

SecurityWhite Papers & Webcasts

See more White Papers | Webcasts

Answers - Powered by ITworld

ITworld Answers helps you solve problems and share expertise. Ask a question or take a crack at answering the new questions below.

Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

Ask a Question
randomness