Download PDF version Contact company
 SANS’ webcast series will make SMEs aware of the many options they have for managing information security risks
 SANS' webcast series aims to empower SMEs to make good risk management decisions

"Millions of small businesses assume that Information security is just too complex," explains Jim Herbeck, an instructor for the SANS Institute. "But by breaking down the complete process into smaller, bite sized chunks using the same best practice favoured by larger organisations, SMEs (Small Medium Enterprises) should understand that having good information security is a very realistic goal."

SME managers need to be informed consumers. Because many information security products and services are targeted for large, multi-national organisations, they may not scale to the budgetary or staffing constraints at SMEs. One of the goals of this webcast series is to make SMEs aware of the many options they have for managing information security risks, and empowering SMEs to make good risk management decisions.

Herbeck's approach to information security is very business-centric. As part of his ongoing research at the Business Information Security Competency Center at the Geneva School of Business Administration, he developed a simplified version of the ISO 27001 information security standard for SME's to use. "The Information Risk Framework is a combination of ISO 27001, ISO 27005, and the SANS Institute 20 Critical Security Controls," says Herbeck. "The Framework includes 33 risk areas organised into eight common business functions. While half the Framework covers IT-related risk areas, the rest specifies non-IT-related risk. This underscores my belief that information security is a business risk, not just an IT risk."

In addition to his work co-founding the Business Information Security Competency Center and teaching for the SANS Institute, Herbeck is a security consultant who has spent over 20 years working with information systems in commercial, government, academic, and research environments, both in the US and Europe. His most recent work with large multi-national organisations has given him some unique insights. "Many large multi-nationals look and behave like a large multi-national when you're sitting in the headquarters building," Herbeck explains. "However, when you visit the subsidiary business units, they look and behave like an SME. My work for several clients involved tailoring large information security programs to work within the constraints of smaller business units. I quickly realised that this approach could have wide ranging application with SME's in general."

The last installment of the SME webcast series took place on February the 21st, when Herbeck offered a session to help SMEs create an information security policy in a compact and risk driven fashion in a fraction of the time required by bigger organisations. In March, Herbeck will present a webcast on Managing Network-related Risk, and April's session will cover Managing Legal, Regulatory, and Compliance Risk.

Download PDF version Download PDF version

In case you missed it

What new and emerging threats do security professionals face?
What new and emerging threats do security professionals face?

There is no shortage of threats facing security professionals, including some that are new and emerging. Understanding various new threats allows individuals and organisations to t...

Real time crime centres - policing's new hub
Real time crime centres - policing's new hub

As city managers, law enforcement agencies, and first responders face mounting pressure to combat crime and respond to emergencies with limited resources, real-time crime centres e...

Mitigating cybersecurity risks in industrial control systems with Honeywell
Mitigating cybersecurity risks in industrial control systems with Honeywell

Cybersecurity threats targeting organisations' industrial control systems (ICS) are not always direct. Instead, the most vulnerable entries to an ICS can start with external partne...

Quick poll
Which feature is most important in a video surveillance system?