Business Finance Homework Help

Security Program Elements and Industry Certifications Discussion

 

When evaluating prospective InfoSec candidates, employers often look to industry certifications as an important measure of excellence and commitment to quality. The training required for these certifications are further detailed in the links provided below. The following certifications are considered to be some of the most highly regarded and are further explained in the links provided by Business News Daily.

  1. CEH: Certified Ethical Hacker (Links to an external site.)
  2. CISM: Certified Information Security Manager (Links to an external site.)
  3. CompTIA Security+ (Links to an external site.)
  4. CISSP: Certified Information Systems Security Professional (Links to an external site.)
  5. GSEC: SANS GIAC Security Essentials (Links to an external site.)

Discuss various industry certifications that would be beneficial to acquire and how they would be helpful when developing a security program. 

After posting your initial response, please respond to two of your peers by the end of the module week.

Chapter 5 describes the entire set of personnel, plans, policies, and initiatives related to creating and implementing a security program. This includes organizational culture, size, security personnel budge, and security capital budget. Several functions needed to implement an InfoSec program are discussed as well as various options for organizational models used in supporting an InfoSec program.

Read the following from your textbook:

Chapter 5 – Developing the Security Program

SUPPLEMENTAL RESOURCES

The following additional resources will assist you in determining how to create and implement a security program:

How to Build a Cybersecurity Program from the Ground Up (LBMC Information Security) (Links to an external site.)

5-Phase Strategy For Launching Your IT Security Program (Leapfrog Services) (Links to an external site.)

4 Tips for Successful Cybersecurity Program Development (Compuquip) (Links to an external site.)

How to Get Management Support for Your Security Program (Government Technology) (Links to an external site.)

How to Use the NIST Cybersecurity Framework (Security Magazine)