ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel
  • »
  • Business and Employment»
  • Employment & Jobs

Information Systems Security Manager

Updated on January 9, 2018
tamarawilhite profile image

Tamara Wilhite is a technical writer, industrial engineer, mother of 2, and a published sci-fi and horror author.

What is an Information Systems Security Manager?

An Information Systems Security Manager or ISSM is responsible for the security of a corporate network, its hardware, its software and its data. Also called an Information Systems Security Management Professional or ISSMP, the ISSM’s primary responsibility is information security and every activity that affects system security.

An Information Systems Security Manager has responsibility for the security processes of an organization as the physical actions take to ensure its security, such as taking inventory and using badge readers to control access to server farms.
An Information Systems Security Manager has responsibility for the security processes of an organization as the physical actions take to ensure its security, such as taking inventory and using badge readers to control access to server farms. | Source

What Does an Information Systems Security Manager Do?

Information Systems Security Manager responsibilities depend upon the company and the particular job position. Information Systems Security Managers often design information security policies and roll them out across an organization.

Information Systems Security Managers may have the responsibility to ensure that data is segregated on separate networks, such as ensuring that classified data for defense contracts is separate from the unclassified network used by most employees.

An ISSM could have the responsibility to design IT systems, group polices, firewall specifications or identity management systems. They will share responsibility for periodic audits to determine of information security policies are being followed and if the policies meet various standards like the ISO 27000 standards family, National Industrial Security Program or NISP, or Office of the Designated Approving Authority or ODAA. The task of performing audits may be shared with a Certified Information Systems Auditor or CISA or rest solely with the ISSM.

An Information Systems Security Manager participates in IT risk assessments and strategies to deal with evolving information security threats. For example, when confronted with compromised Java versions, the ISSM could decides to push an upgraded Java version on all computers on the network or install security tools that prevent the Java or JVM code from affecting the user’s machine.

When the ISSMP is informed of the risk of malicious software being installed on a user’s system simply by visiting an infected website, the ISSM could add these sites to the company blacklist to prevent employees from accessing them. Or the Information Systems Security Manager could tighten user permissions so that no one can install software on a computer without administrative privileges, which also blocks the malware installation.

An ISSM works with management to determine the encryption methods used on a network and the antivirus and proactive information security tools to set up on the network. A good ISSM reviews the information security bulletins put out by their software vendors of recently discovered threats and quickly installs patches or security fixes on the network.

Information System Security Managers should review reports of information security violations such as users trying to install unlicensed freeware or access information they should not have. This is in addition to generating reports on intrusion attempts, malicious software infections fixed and phishing emails sent to employees.

The ISSM in a large organization may manage an IT group with multiple employees who handle help desk requests for suspected malware infections, data leaks and access requests. Information System Security Managers develop the procedures to be used when malicious software infections are discovered, such as whether machines must be unplugged from the network and the response time expected of help desk personnel.

An ISSM supervises the security testing of new software and hardware systems before they are integrated with the IT network. The ISSM may work with the CISA to ensure that hardware is properly disposed of to prevent information loss. An ISSM could have the responsibility of formulating information security policies and teaching these policies to new employees. An ISSM will work with an Information Assurance Manager to ensure data quality and IT system backups.

What Education Does an Information Systems Security Manager Have?

An Information Systems Security Manager or an Information Systems Security Management Professional usually holds an Associate’s degree or Bachelor’s degree in Information Technology, Computer Engineering or another technology field.

An ISSM may have a computer technical certificate such as Microsoft Certified Solutions Expert or MSCE or the Global Information Assurance Certification or GIAC certification. The ISSM may have taken courses to study for the ISSM exam or used books for self-study.

How Does One Earn the Information Systems Security Manager Certification?

The Information Systems Security Manager Professional or ISSM certifications are earned by taking exams offered by the International Information Systems Security Certification Consortium, also known as the (ISC)², isc2 or ISC-squared.

The ISSM and ISSMP certifications are separate from the Certified Information Security Manager or CISM certification offered by ISACA International. However, you can earn and thus possess both CISM and ISSM certifications.

These certifications are available to anyone who studies and then passes the exam. Information security professionals may hold these credentials in addition to a college degree or earn a series of information security certifications until achieving ISSM certification.

Comments

Submit a Comment

  • tamarawilhite profile image
    Author

    Tamara Wilhite 7 months ago from Fort Worth, Texas

    Brenda Barnes Thank you for the praise.

  • Hyphenbird profile image

    Brenda Barnes 5 years ago from America-Broken But Still Beautiful

    Your technical expertise never fails to awe me. Sometimes I have to read these several times just to understand. I take my hat off to you and your considerable intelligence!

working

This website uses cookies

As a user in the EEA, your approval is needed on a few things. To provide a better website experience, hubpages.com uses cookies (and other similar technologies) and may collect, process, and share personal data. Please choose which areas of our service you consent to our doing so.

For more information on managing or withdrawing consents and how we handle data, visit our Privacy Policy at: "https://hubpages.com/privacy-policy#gdpr"

Show Details
Necessary
HubPages Device IDThis is used to identify particular browsers or devices when the access the service, and is used for security reasons.
LoginThis is necessary to sign in to the HubPages Service.
Google RecaptchaThis is used to prevent bots and spam. (Privacy Policy)
AkismetThis is used to detect comment spam. (Privacy Policy)
HubPages Google AnalyticsThis is used to provide data on traffic to our website, all personally identifyable data is anonymized. (Privacy Policy)
HubPages Traffic PixelThis is used to collect data on traffic to articles and other pages on our site. Unless you are signed in to a HubPages account, all personally identifiable information is anonymized.
Amazon Web ServicesThis is a cloud services platform that we used to host our service. (Privacy Policy)
CloudflareThis is a cloud CDN service that we use to efficiently deliver files required for our service to operate such as javascript, cascading style sheets, images, and videos. (Privacy Policy)
Google Hosted LibrariesJavascript software libraries such as jQuery are loaded at endpoints on the googleapis.com or gstatic.com domains, for performance and efficiency reasons. (Privacy Policy)
Features
Google Custom SearchThis is feature allows you to search the site. (Privacy Policy)
Google MapsSome articles have Google Maps embedded in them. (Privacy Policy)
Google ChartsThis is used to display charts and graphs on articles and the author center. (Privacy Policy)
Google AdSense Host APIThis service allows you to sign up for or associate a Google AdSense account with HubPages, so that you can earn money from ads on your articles. No data is shared unless you engage with this feature. (Privacy Policy)
Google YouTubeSome articles have YouTube videos embedded in them. (Privacy Policy)
VimeoSome articles have Vimeo videos embedded in them. (Privacy Policy)
PaypalThis is used for a registered author who enrolls in the HubPages Earnings program and requests to be paid via PayPal. No data is shared with Paypal unless you engage with this feature. (Privacy Policy)
Facebook LoginYou can use this to streamline signing up for, or signing in to your Hubpages account. No data is shared with Facebook unless you engage with this feature. (Privacy Policy)
MavenThis supports the Maven widget and search functionality. (Privacy Policy)
Marketing
Google AdSenseThis is an ad network. (Privacy Policy)
Google DoubleClickGoogle provides ad serving technology and runs an ad network. (Privacy Policy)
Index ExchangeThis is an ad network. (Privacy Policy)
SovrnThis is an ad network. (Privacy Policy)
Facebook AdsThis is an ad network. (Privacy Policy)
Amazon Unified Ad MarketplaceThis is an ad network. (Privacy Policy)
AppNexusThis is an ad network. (Privacy Policy)
OpenxThis is an ad network. (Privacy Policy)
Rubicon ProjectThis is an ad network. (Privacy Policy)
TripleLiftThis is an ad network. (Privacy Policy)
Say MediaWe partner with Say Media to deliver ad campaigns on our sites. (Privacy Policy)
Remarketing PixelsWe may use remarketing pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to advertise the HubPages Service to people that have visited our sites.
Conversion Tracking PixelsWe may use conversion tracking pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to identify when an advertisement has successfully resulted in the desired action, such as signing up for the HubPages Service or publishing an article on the HubPages Service.
Statistics
Author Google AnalyticsThis is used to provide traffic data and reports to the authors of articles on the HubPages Service. (Privacy Policy)
ComscoreComScore is a media measurement and analytics company providing marketing data and analytics to enterprises, media and advertising agencies, and publishers. Non-consent will result in ComScore only processing obfuscated personal data. (Privacy Policy)
Amazon Tracking PixelSome articles display amazon products as part of the Amazon Affiliate program, this pixel provides traffic statistics for those products (Privacy Policy)