Page 60 - CISSO_Prep_ Guide
P. 60

Third Parties, Vendors and Contractors

            Everyone that accesses or works on the systems, networks,
            facilities, or data of the organization must be subject to the rules
            and procedures of the organization. This is especially
            challenging in a world of outsourcing. As organizations
            outsource their data processing, applications, or some business
            processes, the need to ensure that the service provider meets the
            security and data protection requirements. It must be
            remembered that when an organization accepts, processes,
            transmits, or stores sensitive data, then that original organization
            remains liable for the protection of that information even if it is
            shared with another service provider.



            Roles and Responsibilities Summary
            Security is the responsibility of everyone in the organization.
            Adequate protection can only happen when everyone is aware of
            the need for security and realizes how their actions can affect the
            stability, resilience, profitability, and success of the
            organization. Security is not a "nice to have" or an option. It is a
            thread that must be woven into every business process, into the
            mindset of each person and integrated into each system and IT
            function. This requires a continuous effort of education,
            reminders, monitoring, and improvement. When everyone sees
            that the organization is serious about security and is committed
            to ensuring that the policies and procedures are being enforced,
            then a culture of security is created. At this point, each person
            will realize the importance of their role on the security team.
   55   56   57   58   59   60   61   62   63   64   65