El equipo formado por los investigadores Rebollo, O., Mellado, D., Sánchez, L.E., Fernández Medina, E y con la colaboración de la división de ciberseguridad MARISMA del grupo Sicaman, ha participado con un artículo denominado Comparative Analysis of Information Security Governance Frameworks: A Public Sector Approach dentro del 11th European Conference on e-Coverment (ECEG’11), Ljubljani, Slovenia, 16 – 17 June, 2011, Pp. 482 – 490, ISBN: 978-1-908272-01-0 CD. IDSNumber: BYT92, EID: 2-s2.0-84870894787, WOS: 000300256400058. Core: C.
Este documento forma parte de los avances e investigaciones en el campo de la Ciberseguridad desarrolladas por el Grupo GSyA y la división de seguridad MARISMA del Grupo Sicaman.
Security awareness has spread inside many organizations leading them to tackle information security not just as a technical matter, but from a corporate point of view. Information Security Governance (ISG) provides enterprises with means of dealing with the security of their information assets in a comprehensive manner, involving every stakeholder through the whole governance and management processes. Boards of Public Entities cannot remain unaware of this development and should make efforts to include ISG in their business processes. Realizing this relevant role, scientific literature contains a variety of proposals which define different frameworks to foster ISG inside any corporation. In order to facilitate the adoption of any of them by the public sector, this paper compiles existing approaches, highlighting the main contributions and characteristics of each one. Senior executives and security managers may need support on their decisions about adopting one of these frameworks, so a comparative analysis is performed. Although some comparative reviews are found in literature, they lack a systematic and repeatable methodology, ignore recently published contributions or focus on specific areas, making results biased and inappropriate for general use in corporations and the public sector. This paper tries to guarantee an objective comparison through a set of comparative criteria that have been defined and applied to every proposal, so that strengths and weaknesses of each one can be pointed out. These criteria have been selected from a deep analysis of existing ISG papers, including both governance and management aspects. As results show, each proposal focuses on different aspects of ISG giving priority to some of the defined criteria, and none of them covers the entire required spectrum. Most of the selected frameworks can be used by any public organization as a starting point towards integrating security into their processes, but this paper helps managers to be aware of their limitations and the gaps which need to be covered in order to achieve a complete integration. Consequently, more investigation is needed to fulfill detected gaps and define an ISG framework that organizations can rely on, and which offers security guarantees of covering every information asset of the company. Public sector´s idiosyncrasy must be taken into account in this development, resulting in a general framework eligible for adoption by both public and private companies.
URL Noticia 1: https://www.researchgate.net
URL Noticia 2: https://books.google.es/books
URL Presentación: https://comparative-analysis-of-information-security