The Human Firewall Council advocates a systematic, holistic approach to information security management. What exactly does that mean? It means using a framework such as the ISO 17799 guideline, which maps out 10 critical areas to consider:Security policyfor the development review, approval and implementation of security policies for the entire organization. Organization of assets and resourcesfor organizing information security personnel, including advisers, steering committees and third-party access to the organizations IT resources.Asset classification and controlfor the maintenance of asset inventories.Personnel securityfor addressing personnel-related security issues, including procedures for recruitment and selection of personnel as well as definition of roles and responsibilities.Physical and environmental securityfor preventing unauthorized access and damage to business facilities and equipment.Communications and operations managementfor ensuring the optimum secure operation of information technologies.Access controlfor controlling access to information technologies such as operating systems, networks and applications.Systems development and maintenancefor developing security requirements during systems development, using encryption and digital signatures where needed and controlling source libraries.Business continuity managementfor minimizing interruptions to business processes due to disasters and other similar events and for ensuring the recovery of business processes in a timely fashion after an interruption.Compliancefor provisions that ensure compliance with laws, regulations and contracts. Related content news Google Chrome zero-day jumps onto CISA's known vulnerability list A serious security flaw in Google Chrome, which was discovered under active exploitation in the wild, is a new addition to the Cybersecurity and Infrastructure Agency’s Known Exploited vulnerabilities catalog. By Jon Gold Oct 03, 2023 3 mins Zero-day vulnerability Vulnerabilities Security brandpost The advantages and risks of large language models in the cloud Understanding the pros and cons of LLMs in the cloud is a step closer to optimized efficiency—but be mindful of security concerns along the way. By Daniel Prizmant, Senior Principal Researcher at Palo Alto Networks Oct 03, 2023 5 mins Cloud Security news Arm patches bugs in Mali GPUs that affect Android phones and Chromebooks The vulnerability with active exploitations allows local non-privileged users to access freed-up memory for staging new attacks. By Shweta Sharma Oct 03, 2023 3 mins Android Security Vulnerabilities news UK businesses face tightening cybersecurity budgets as incidents spike More than a quarter of UK organisations think their cybersecurity budget is inadequate to protect them from growing threats. By Michael Hill Oct 03, 2023 3 mins CSO and CISO Risk Management Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe