Understanding key skills for information security managers

被引:29
|
作者
Haqaf, Husam [1 ]
Koyuncu, Murat [1 ]
机构
[1] Atilim Univ, Informat Syst Engn, Ankara, Turkey
关键词
Information security management; Security skills; Information security manager; Security certifications; RISK-MANAGEMENT; DELPHI METHOD;
D O I
10.1016/j.ijinfomgt.2018.07.013
中图分类号
G25 [图书馆学、图书馆事业]; G35 [情报学、情报工作];
学科分类号
1205 ; 120501 ;
摘要
Information security management is a necessity for all institutions and enterprises that regard company information as valuable assets. Developing, auditing and managing information security depends upon professional expertise in order to achieve the desired information security governance. This research seeks the key skills required for the position of information security management as well as the methods to develop these skills through professional training programs. The study adopts the Delphi method which requires building a list of items through a literature survey and involves experts with certain expertise to modify the list until a consensus on less than 20% of the items is reached. Through completing three rounds of the Delphi technique - data collection, relevance voting and ranking sixteen skills are shortlisted as the key skills. In the final list, the majority belong to core information security skills, and the top two skills belong to project/process management skills and risk management skills, indicating the importance of these skills for the information security manager role. In addition, a series of related professional training programs and certifications are surveyed, the outcome of which highlights a number of most comprehensive and appropriate programs to develop these determined skills.
引用
收藏
页码:165 / 172
页数:8
相关论文
共 50 条
  • [21] Understanding Security Failures of Two Authentication and Key Agreement Schemes for Telecare Medicine Information Systems
    Dheerendra Mishra
    [J]. Journal of Medical Systems, 2015, 39
  • [22] Understanding Security Failures of Two Authentication and Key Agreement Schemes for Telecare Medicine Information Systems
    Mishra, Dheerendra
    [J]. JOURNAL OF MEDICAL SYSTEMS, 2015, 39 (03)
  • [23] Developing Metacognitive Skills for Training on Information Security
    Cano, Jesus
    Hernandez, Roberto
    Pastor, Rafael
    Ros, Salvador
    Tobarra, Llanos
    Robles-Gomez, Antonio
    [J]. ONLINE ENGINEERING & INTERNET OF THINGS, 2018, 22 : 708 - 720
  • [24] The Required Information Technology Skills of Malaysian Federal Records Managers
    Johare, Rusnah
    Masrek, Mohamad Noorman
    Ghazali, Asmadi Mohamed
    [J]. PROCEEDINGS OF THE 2013 INTERNATIONAL CONFERENCE ON INFORMATION, BUSINESS AND EDUCATION TECHNOLOGY (ICIBET 2013), 2013, 26 : 741 - 744
  • [25] Understanding the influences on information security behaviour
    Furnell, Steven
    Rajendran, Anish
    [J]. Computer Fraud and Security, 2012, 2012 (03): : 12 - 15
  • [26] Understanding information security stress: Focusing on the type of information security compliance activity
    Lee, Chunghun
    Lee, Choong C.
    Kim, Suhyun
    [J]. COMPUTERS & SECURITY, 2016, 59 : 60 - 70
  • [27] INFORMATION-THEORY IN THE UNDERSTANDING OF HUMAN SKILLS
    KAY, H
    [J]. BULLETIN OF THE BRITISH PSYCHOLOGICAL SOCIETY, 1957, (32): : 16 - 16
  • [28] INFORMATION MANAGEMENT - KEY ISSUES RANKED BY GERMAN IS-MANAGERS
    KRCMAR, HAO
    [J]. WIRTSCHAFTSINFORMATIK, 1990, 32 (02): : 127 - 135
  • [29] Key Success Factors of Information Systems Security
    Arbanas, Krunoslav
    Hrustek, Nikolina Zajdela
    [J]. JOURNAL OF INFORMATION AND ORGANIZATIONAL SCIENCES, 2019, 43 (02) : 131 - 144
  • [30] Key elements of an information security culture in organisations
    Nel, Frans
    Drevin, Lynette
    [J]. INFORMATION AND COMPUTER SECURITY, 2019, 27 (02) : 146 - 164