Analyse and correlate information security events to identify appropriate event handling actions. Assess operational and implementation costs, and evaluate them against the potential business impact if the policies and controls are not implemented. Assess the effectiveness of the measures against security risk management plan. Develop IT security policy and operational procedures based on information collected.
Develop a documented action plan containing policies, practices and procedures that mitigate the identified risks. Document information related to IT security attacks, threats, risks and controls. Establish a standard methodology for performing security tests in accordance with security requirements. Establish review procedures based on organisation's security risk management plan.
Evaluate effectiveness of current incident response plan against industry good practices. Evaluate response plans periodically to ensure relevance. Identify threats and risks that are relevant to organisation's operations and systems. Monitor the effectiveness of action plans in addressing information risks.
Obtain corporate management's endorsement of security policies, standards and procedures by articulating cost and benefits. Perform comparative analysis of security service performance level parameters against security information sources. Prepare information security performance report based on results from analysis and correlation of information security events. Rate and categorise potential security incidents.
Recommend suitable enhancements to improve information security performance. Review business and security environment to identify existing requirements. Review security policies, standards and procedures by considering the threats identified and other information collected. Test incident response plans periodically to ensure response times and executed procedures are acceptable.
Assess and categorise business impact of potential incidents Assess and test the effectiveness of IT controls in a controlled environment Assess and update information risk and control mitigation approach
Determine response plan for the security incidents that specify tasks to be carried out based on the scale and duration of the incident Evaluate qualitative IT risks and assess potential business impact should adverse incidents occur Identify information assets and types of possible threats faced
Identify potential inadequacies in security information sources Identify security information sources such as logs and vendor reports Monitor public sources for the latest IT risks, threats, vulnerabilities and effective controls
Perform comparative analysis of security service performance level parameters against security information sources Perform regular reviews and updates of the policies, standards and procedures Prepare information security performance report based on results from analysis and correlation of information security events
Prioritise IT risks based on overall business impact Recommend mitigation actions to address IT risks Review existing policies, standards and procedures
Communicate the new process to the relevant parties. Develop and carry out process re-engineering plans based on the target process. Develop plans to improve the chances of successful transitions of business processes.
Examine the organisational service standards, values and culture, and understand the organisational environment. Identify client service needs and preferred level of service. Monitor new process. Monitor organisational systems and procedures.