{"id":10317,"date":"2016-10-24T16:27:34","date_gmt":"2016-10-24T16:27:34","guid":{"rendered":"https:\/\/multiacademstg.wpengine.com\/27001academy\/?p=10317"},"modified":"2025-03-07T09:47:14","modified_gmt":"2025-03-07T09:47:14","slug":"where-does-information-security-fit-into-a-company","status":"publish","type":"post","link":"https:\/\/staging.advisera.com\/27001academy\/blog\/2016\/10\/24\/where-does-information-security-fit-into-a-company\/","title":{"rendered":"Where does information security fit into a company?"},"content":{"rendered":"<p><div id=\"side-banner-trigger\" class=\"banner-shortcode\"><\/div><br \/>\nVery often, I hear controversial discussions about whether information security is part of IT, or whether it should be separate from it, part of some compliance or risk department, etc.<\/p>\n<p>But, before we determine who should be handling information security and from which organizational unit, let\u2019s see first the conceptual point of view \u2013 where does information security fit into an organization?<\/p>\n<p>Generally, information security is part of overall risk management in a company, with areas that overlap with cybersecurity, business continuity management, and IT management, as displayed below.<\/p>\n<p><img decoding=\"async\" class=\"aligncenter size-full wp-image-10318\" src=\"\/wp-content\/uploads\/\/sites\/5\/2016\/10\/Information_security_inside_organization.png\" alt=\"information_security_inside_organization\" width=\"582\" height=\"595\" srcset=\"\/wp-content\/uploads\/sites\/5\/2016\/10\/Information_security_inside_organization.png 582w, \/wp-content\/uploads\/sites\/5\/2016\/10\/Information_security_inside_organization-293x300.png 293w\" sizes=\"(max-width: 582px) 100vw, 582px\" \/><\/p>\n<p style=\"text-align: center; font-size: 14px;\"><em>Figure: Relationship between information security, risk management, business continuity, IT, and cybersecurity<\/em><\/p>\n<p>Cybersecurity is basically a subset of information security because it focuses on protecting the information in digital form, while information security is a slightly wider concept because it protects the information in any media.<\/p>\n<p>The overlap with business continuity exists because its purpose is, among other things, to enable the availability of information, which is also one of the key roles of information security. See also this article: <a href=\"https:\/\/staging.advisera.com\/27001academy\/blog\/2015\/06\/15\/how-to-use-iso-22301-for-the-implementation-of-business-continuity-in-iso-27001\/\">How to use ISO 22301 for the implementation of business continuity in ISO 27001<\/a>.<\/p>\n<p>Naturally, information technology plays an extremely important role in information security; so, consequently, there is also an overlapping area; information technology is not only about security, so this is why good part of IT is not related to security.<br \/>\n<div id=\"middle-banner\" class=\"banner-shortcode\"><\/div><script>loadMiddleBanner();<\/script><\/p>\n<h2>Why risk management?<\/h2>\n<p>But, the most important thing is that <a href=\"https:\/\/staging.advisera.com\/27001academy\/iso-27001-documentation-toolkit\/?rel=management-system&amp;doc=information-security-policy\" target=\"_blank\" rel=\"noopener noreferrer\">information security<\/a>, cybersecurity, and <a href=\"https:\/\/staging.advisera.com\/27001academy\/iso-27001-22301-premium-documentation-toolkit\/?rel=business-continuity&amp;doc=business-continuity-plan\" target=\"_blank\" rel=\"noopener\">business continuity<\/a>\u00a0have the same goal: to decrease the risks to business operations. You may not call it risk management in your day-to-day job, but basically this is what information security does \u2013 assess which potential problems can occur, and then apply various safeguards or controls to decrease those risks.<\/p>\n<p>Some industries have formally recognized information security as part of <a href=\"https:\/\/staging.advisera.com\/27001academy\/iso-27001-documentation-toolkit\/?rel=risk-management&amp;doc=risk-assessment-and-treatment-report\" target=\"_blank\" rel=\"noopener noreferrer\">risk management<\/a>\u00a0\u2013 e.g., in the banking world, information security belongs very often to operational risk management. My guess is that in the future we will see more and more information security professionals work in the risk management part of their organizations, and information security will tend to merge with business continuity.<\/p>\n<p>See also this article: <a href=\"https:\/\/staging.advisera.com\/27001academy\/blog\/2012\/09\/11\/chief-information-security-officer-ciso-where-does-he-belong-in-an-org-chart\/\">Chief Information Security Officer (CISO) \u2013 where does he belong in an org chart?<\/a><\/p>\n<h2>Security is more than IT<\/h2>\n<p>So, the point is: thinking about information security only in IT terms is wrong \u2013 this is a way to narrow the security only to technology issues, which won\u2019t resolve the main source of incidents: people\u2019s behavior.<\/p>\n<p style=\"text-align: left;\">If you want your information security to be effective, you must enable it to access both IT and business parts of the organization \u2013 and for this to succeed, you will need at least two things: to change the perception about security, and to provide a proper organizational position for people handling security.<span id=\"hs-cta-wrapper-2bf6f7b5-4e3c-425e-b57b-72819706a0e2\" class=\"hs-cta-wrapper\"><\/span><\/p>\n<p><em><span class=\"notion-enable-hover\" data-token-index=\"0\">To automate your compliance with ISO 27001 security controls,<\/span>\u00a0<\/em><a class=\"notion-link-token notion-focusable-token notion-enable-hover\" tabindex=\"0\" href=\"https:\/\/staging.advisera.com\/conformio\/\" target=\"_blank\" rel=\"noopener\" data-token-index=\"2\"><span class=\"link-annotation-unknown-block-id-1092142182\">sign up for a free trial<\/span><\/a>\u00a0<em><span class=\"notion-enable-hover\" data-token-index=\"4\">of Conformio, the leading ISO 27001 compliance software.<\/span><\/em><!-- notionvc: 93655307-3a5a-4eac-8c2c-aabe7c2d5d9d --><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Very often, I hear controversial discussions about whether information security is part of IT, or whether it should be separate from it, part of some compliance or risk department, etc. But, before we determine who should be handling information security and from which organizational unit, let\u2019s see first the conceptual point of view \u2013 where &#8230;<\/p>\n","protected":false},"author":26,"featured_media":10319,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[378,379,500,559,1490],"class_list":["post-10317","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","tag-business-continuity","tag-information-security","tag-ciso","tag-cybersecurity","tag-organization"],"acf":[],"_links":{"self":[{"href":"https:\/\/staging.advisera.com\/27001academy\/wp-json\/wp\/v2\/posts\/10317","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/staging.advisera.com\/27001academy\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/staging.advisera.com\/27001academy\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/staging.advisera.com\/27001academy\/wp-json\/wp\/v2\/users\/26"}],"replies":[{"embeddable":true,"href":"https:\/\/staging.advisera.com\/27001academy\/wp-json\/wp\/v2\/comments?post=10317"}],"version-history":[{"count":3,"href":"https:\/\/staging.advisera.com\/27001academy\/wp-json\/wp\/v2\/posts\/10317\/revisions"}],"predecessor-version":[{"id":103732,"href":"https:\/\/staging.advisera.com\/27001academy\/wp-json\/wp\/v2\/posts\/10317\/revisions\/103732"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/staging.advisera.com\/27001academy\/wp-json\/wp\/v2\/media\/10319"}],"wp:attachment":[{"href":"https:\/\/staging.advisera.com\/27001academy\/wp-json\/wp\/v2\/media?parent=10317"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/staging.advisera.com\/27001academy\/wp-json\/wp\/v2\/categories?post=10317"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/staging.advisera.com\/27001academy\/wp-json\/wp\/v2\/tags?post=10317"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}