Management and Information Security Positions

Three management positions most commonly associated with information security within a given organization are the chief executive officer (CEO), chief information officer (CIO), and chief information security officer (CISO). CEO is fairly self-explanatory as the person in charge of running the company as a whole. Although information management and information security specifically is not the central component of the CEO’s responsibilities, it is, nevertheless, an aspect of it. The CIO defines how the company structures, handles, stores, and, among other things, secures the information in the course of its functioning (Whitman & Mattord, 2018). Like the CEO, CIO is usually an executive-level position and often acts as a consultant and advisor to the CEO in information-related matters. A for CISO is the person in charge of devising, implementing, and monitoring measures designed to ensure the security of information handled within the company (Whitman & Mattord, 2018). Unlike the two above, CISO is rarely an executive-level position, and those occupying it usually answer to the CIO. As a subordinate, CISO is considered to be one of if not the most important advisors to the CIO.

Overall, the scheme outlined above is a fairly good one for sufficiently large companies. Its main strength lies in clear specialization for each of the positions involved. CEO pursues the organization’s foremost goal and cares for information management insofar as it is conducive to that, CIO handles information management as a whole, and CISO responds to information security specifically (Whitman & Mattord, 2018). CISO reporting to CIO rather than the chief security officer (CSO) makes sense because information security relates more closely to overall information management than the physical safety of personnel and assets. Admittedly, smaller companies may be unable to establish all three positions, in which case CISO’s duties may be distributed between CIO and CSO. Still, for larger entities, this seems like a well-outlined setup.

Reference

Whitman. A. E., & Mattord, H. J. (2018). Principles of information security (6th ed.). Cengage Learning.

Cite this paper

Select style

Reference

StudyCorgi. (2022, December 19). Management and Information Security Positions. https://studycorgi.com/management-and-information-security-positions/

Work Cited

"Management and Information Security Positions." StudyCorgi, 19 Dec. 2022, studycorgi.com/management-and-information-security-positions/.

* Hyperlink the URL after pasting it to your document

References

StudyCorgi. (2022) 'Management and Information Security Positions'. 19 December.

1. StudyCorgi. "Management and Information Security Positions." December 19, 2022. https://studycorgi.com/management-and-information-security-positions/.


Bibliography


StudyCorgi. "Management and Information Security Positions." December 19, 2022. https://studycorgi.com/management-and-information-security-positions/.

References

StudyCorgi. 2022. "Management and Information Security Positions." December 19, 2022. https://studycorgi.com/management-and-information-security-positions/.

This paper, “Management and Information Security Positions”, was written and voluntary submitted to our free essay database by a straight-A student. Please ensure you properly reference the paper if you're using it to write your assignment.

Before publication, the StudyCorgi editorial team proofread and checked the paper to make sure it meets the highest standards in terms of grammar, punctuation, style, fact accuracy, copyright issues, and inclusive language. Last updated: .

If you are the author of this paper and no longer wish to have it published on StudyCorgi, request the removal. Please use the “Donate your paper” form to submit an essay.