top of page

EDUCATION INDUSTRY CASE STUDY

INDUSTRY ENLIGHTENMENT

 

In order for any educational institution to comply with federal & industry security regulations, strategic measures must be taken in order to identify areas where opportunities exist to enhance organizational security posture and better protect institutional assets.

Deployment of an Information Security Management System (ISMS) is a recommended architecture building block for establishing and maintaining the necessary requirements for meeting the standards of regulatory compliance. Deploying a comprehensive organizational security framework is not a trivial task and should not be approached as an add-on to traditional IT services. This

responsibility should be entrusted to the Educational institution’s Chief Security Officer as this role contains the breadth of business & technical expertise to set the agenda for protecting the organization’s portfolio of assets. Typically, a risk assessment would be the first step in the Information Security Management System (ISMS), leading to framework identification (ISO 27002/17799) and planning a strategic roadmap to prioritize and remediate existing risks while addressing new risk scenarios. Risks can originate from a variety of sources

(technology, people, process, physical, intellectual property). Therefore, the appropriate first step in risk management is risk identification, via a process known as the Risk Assessment. The Risk Assessment is an assessment of the entire organization, not a specific department, location or subsidiary. By assessing the organization as a whole, the security roadmap can be constructed to support organizational business objectives while minimizing risk exposure to organizational assets.

.

Conclusion

Regulatory matters are quite complex, however, not having the knowledge of which regulatory standards one must comply with

is considered willful neglect. Partner with The Knox Corps to remediate risks in your firm and improve business credibility and

profitability by adequately securing your global assets.

bottom of page