Security Function and Staffing Insights
Security Function and Staffing Insights
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 1
Module Objectives
• There are several valid choices for positioning the information security
department within an organization. It can be placed within the following:
− IT (most common).
− Physical security.
− Administrative services.
− Insurance and risk management.
− Legal.
• InfoSec should balance duty to monitor compliance with needs for education,
training, awareness, and customer service.
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 4
Staffing the Information Security Function
• Selecting personnel is based on several criteria, including some not within the
control of the organization (supply and demand).
• Many professionals enter security markets by gaining skills, experience, and
credentials.
• At present, the information security industry is in a period of high demand.
According to the Bureau of Labor Statistics (BLS) employment of information
security analysts is projected to grow 31 percent from 2019 to 2029, which is
much faster than the 4 percent average for all occupations.
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 5
Knowledge Check Activity 1
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 6
Knowledge Check Activity 1: Answer
Answer: c. high
According to the Bureau of Labor Statistics (BLS) employment of information security
analysts is projected to grow 31 percent from 2019 to 2029, which is much faster than the
4 percent average for all occupations.
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 7
BLS Information For Information Security Analysts
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 8
[Link] Supply/Demand Heat Map
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 9
Qualifications and Requirements (1 of 3)
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 10
Qualifications and Requirements (2 of 3)
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 11
Qualifications and Requirements (3 of 3)
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 12
Entry into the Information Security
Profession
• Traditionally, many information security professionals entered the field through
one of two career paths:
− Law enforcement and military.
− Technical IT professionals.
• Today, students select and tailor degree programs to prepare for work in
information security.
• Organizations can foster greater professionalism by matching qualified
candidates to clearly defined roles in information security.
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 13
Career Paths To Information Security
Positions
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 14
Knowledge Check Activity 2
Traditionally, which has been the dominant way people enter the information
security field?
a. Law Enforcement / Military
b. Hiring at entry level from college
c. Technical IT Professionals
d. Choice A & B are correct
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 15
Knowledge Check Activity 2: Answer
Traditionally, which has been the dominant way people enter the information security field?
a. Law Enforcement / Military
b. Hiring at entry level from college
c. Technical IT Professionals
d. Choice A & B are correct
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 16
Information Security Positions
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 17
Positions In Information Security
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 18
Chief Information Security Officer (CISO)
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 20
Security Manager
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 21
Security Technician
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 22
Credentials for Information Security
Professionals
• Many organizations seek industry-recognized certifications.
• Most InfoSec certifications are not fully understood by hiring organizations.
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 23
(ISC)2 Certifications
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 25
SANS/GIAC Certifications
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 26
Other Certifications
• EC Council
− CEH
− CICISO
− Others in security awareness, fundamental, core, specialist, advanced and
management areas.
• CompTIA
− Security +
− CySA+
− PenTest+
− CASP+
• Cloud Certifications
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 27
Knowledge Check Activity 3
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 28
Knowledge Check Activity 3: Answer
Answer: c. (ISC)2
The (ISC)2 hosts many certifications including the CISSP and SSCP.
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 29
Certification Costs
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 30
Preparing for Security Certification
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 31
Advice for Information Security Professionals
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 33
Job Descriptions
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 34
Interviews
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 35
Background Checks
• Investigation into a candidate’s past should be conducted before the organization extends an
offer to a candidate.
• Background checks differ in the level of detail and depth with which a candidate is examined.
• May include the following:
− identity check
− education and credential check
− previous employment verification
− references check
− worker’s compensation history
− motor vehicle records
− drug history
− credit history
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 36
Hiring Issues
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 37
Employment Contracts
• Once a candidate has accepted a job offer, the employment contract becomes
an important security instrument.
• Many security policies require an employee to agree in writing to monitoring and
nondisclosure agreements.
• Policies governing employee behavior may be classified as “employment
contingent upon agreement,” whereby employee must agree to conform with the
policies before being hired.
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 38
New Hire Orientation
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 39
On-the-Job Security Training
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 40
Evaluating Performance
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 41
Termination (1 of 3)
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 42
Termination (2 of 3)
• Hostile departures include termination for cause, permanent downsizing, temporary
layoffs, or some instances of quitting.
− Before the employee is aware, all logical and keycard access is terminated.
− Employee collects all belongings and surrenders all keys, keycards, and other
company property.
− Employee is then escorted out of the building.
• Friendly departures include resignation, retirement, promotion, or relocation.
− Employee may be notified well in advance of departure date.
− More difficult for the security to maintain positive control over the employee’s
access and information usage.
− Employee accounts usually continue with new expiration date.
− Employees come and go at will, collect their own belongings, and leave on their
own.
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 43
Termination (3 of 3)
• Offices and information used by the employee must be inventoried, files stored
or destroyed, and property returned to organizational stores.
• Possibility that employees foresee departure well in advance and begin
collecting organizational information for their future employment.
• Only by scrutinizing systems logs after the employee has departed can the
organization determine if there has been a breach of policy or a loss of
information.
• If information has been illegally copied or stolen, report an incident and follow
the appropriate policy.
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 44
Knowledge Check Activity 4
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 45
Knowledge Check Activity 4: Answer
• Separation of duties is used to reduce the chance that an employee will violate
information security and breach the confidentiality, integrity, or availability of
information by having tasks divided between multiple employees.
• A similar concept is known as two-person control (or dual control) in which two
employees review and approve each other’s work.
• Another control used to prevent personnel from misusing information assets is
job rotation (or task rotation) where multiple employees train to perform each
critical task.
• Mandatory vacations give the organization the ability to audit the work of an
employee.
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 47
Internal Control Strategies
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 48
Personnel Control Strategies (2 of 2)
• Need to know is the principle of limiting users’ access privileges to the specific
information required to perform their assigned tasks.
• Least privilege is the data access principle that ensures no unnecessary access
to data exists by regulating members so they can perform only the minimum
data manipulation needed; least privilege implies a need to know.
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 49
Security Considerations for Temporary
Employees
• Individuals not subject to screening, contractual obligations, and eventual
secured termination often have access to sensitive organizational information.
• Relationships with these individuals should be carefully managed to prevent
possible information leak or theft.
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 50
Temporary Employees
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 51
Contract Employees
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 52
Consultants
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 53
Business Partners
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 54
Summary (1 of 4)
• Where to place the information security function within the organization is a key decision. The
most popular options involve placing information security within IT or the physical security
function. Organizations searching for a rational compromise should place the information
security function where it can balance its need to enforce company policy with its need to deliver
service to the entire organization.
• The selection of information security personnel is based on several criteria, not all of which are
within the control of the organization. In most cases, organizations look for a technically
qualified information security generalist with a solid understanding of how an organization
operates. The following attributes are also desirable:
− An attitude that information security is usually a management problem, not an exclusively
technical problem.
− Good people skills, communication skills, writing skills, and a tolerance for users.
− An understanding of the role of policy in guiding security efforts.
− An understanding of the role of education and training in making users part of the solution.
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 55
Summary (2 of 4)
− An understanding of the threats facing an organization, how they can become attacks, and
how to protect the organization from information security attacks
− A working knowledge of many common technologies and a general familiarity with most
mainstream IT technologies
• Many information security professionals enter the field through one of two career paths: via law
enforcement or the military, or from other professions related to technical information systems.
In recent years, college students have been able to take courses that prepare them to enter the
information security workforce directly.
• During the hiring process for an information security position, an organization should use
standard job descriptions to increase the degree of professionalism among applicants and to
make sure the position’s roles and responsibilities are consistent with those of similar positions
in other organizations. Studies of information security positions have found that they can be
classified into one of three areas: those that define, those that build, and those that administer.
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 56
Summary (3 of 4)
• When filling information security positions, many organizations indicate the level of proficiency
required for the job by specifying that candidates have recognizable certifications. Some of the
more popular certifications are the following:
− The (ISC)2 family of certifications, including the Certified Information Systems Security
Professional (CISSP), a number of specialized CISSP certifications, the Systems Security
Certified Practitioner (SSCP), the Associate of (ISC)2, and several other specialized
certifications.
− The ISACA family of certifications, including the Certified Information Security Manager
(CISM), and several other specialized certifications.
− The Global Information Assurance Certification (GIAC) family of certifications, including the
GIAC Information Security Professional and the GIAC Security Leadership Certification.
− CompTIA’s Security+ and EC-Council’s CCISO.
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 57
Summary (4 of 4)
• In this module you learned about where the information security function can be
placed into the organization’s hierarchy.
• In your opinion, where is the ‘best’ place to have the information security
leadership placed in a larger company of say 10,000 staff?
• Would you have it be in a different place in a much smaller company, say one
with 100 staff?
• If they are not the same, what reason do you have for the difference in
placement?
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 59









