<!DOCTYPE html>
<html>
<head>
        <title>IT Security Management Standard Requirements</title>
</head>
<body>
<style type="text/css">#aweber_rem {
              text-align:center;
              font-size:10px;
              color:#333;
              width:600px !important;
              margin:0px auto;
                    font-family:Verdana, Arial, Helvetica, san-serif;
              }
           #aweber_rem a {
              text-decoration:none;
              }
           #aweber_rem a:hover {
              text-decoration:underline;
              }
</style>
<center>
<table cellpadding="0" cellspacing="0" style="font-family:helvetica,verdana,arial,sans-serif; text-align:left; width:600px">
        <tbody>
                <tr>
                        <td style="color:#666666; padding-bottom:5px" valign="bottom" width="400">
                        <div style="font-size:12px; text-align:right"><span style="font-family:verdana"><a href="http://zaale.com/l/J9dyb892892r4VxIWGcw892l7Etw/qx3JKlKoGYWwzT0LcM5qTA/ORuGtNOUpUonNpN7892jnfsw"><img align="left" alt="" height="80" src="https://cdn6.bigcommerce.com/s-ilcoov/product_images/the_art_of_service_-_we_get_it_transparent_1_1503604503__72937.png" width="200" /></a></span><br />
                        <span style="font-family:verdana"><a href="http://zaale.com/l/J9dyb892892r4VxIWGcw892l7Etw/qx3JKlKoGYWwzT0LcM5qTA/ORuGtNOUpUonNpN7892jnfsw" target="_blank" title="Trouble viewing this email? ">Trouble viewing this email?</a></span></div>

                        <div style="font-size:14px; text-align:right"><br />
                        <u style="text-decoration:underline"><strong><a href="http://zaale.com/l/J9dyb892892r4VxIWGcw892l7Etw/5SUGSkx8tUf66KuCV0c2rA/ORuGtNOUpUonNpN7892jnfsw" title="CD-ROM Subscriptions">CD-ROM Subscriptions</a></strong></u>

                        <div style="font-size:12px; text-align:right"> </div>

                        <div style="font-size:12px; text-align:center"> 
                        <hr /> 
                        <p><span style="color:#000000"><span style="font-size:24px"><strong>IT Security Management Standard Requirements</strong></span></span></p>

                        <p><span style="color:#000000"><span style="font-size:20px">Crucial Requirements:</span></span></p>

                        <ol>
                                <li style="text-align: left;"><span style="color:#000000"><span style="font-size:15px">There are two philosophical approaches to implementing Cybersecurity on an intelligent, networked grid: create a checklist of actions to take that address known security problems or prioritize actions based on continually refreshing the answer to the question, What makes my system more secure? Which approach do you take?</span></span><br />
                                 </li>
                                <li style="text-align: left;"><span style="color:#000000"><span style="font-size:15px">What collaborative organizations or efforts has your company interacted with or become involved with to improve its Cybersecurity posture (such as NESCO, NESCOR, Fusion centers, Infragard, US-CERT, ICS-CERT, E-ISAC, SANS, HSIN, the Cross-Sector Cyber Security Working Group of the National Sector Partnership, etc.)?</span></span><br />
                                 </li>
                                <li style="text-align: left;"><span style="color:#000000"><span style="font-size:15px">Not all cyber-connected assets are essential to protect at all cost. Some assets, however, are “crown jewels” – worth protecting at all costs. Other assets may be more like “paperclips” where the expense of protection exceeds the benefit. How do you tell the difference?</span></span><br />
                                 </li>
                                <li style="text-align: left;"><span style="color:#000000"><span style="font-size:15px">If employees, administrators, or third parties access the network remotely, is remote access software (such as pcanywhere, dial-in, or vpn) configured with a unique username and password and with encryption and other security features turned on?</span></span><br />
                                 </li>
                                <li style="text-align: left;"><span style="color:#000000"><span style="font-size:15px">Do we support the certified Cybersecurity professional and cyber-informed operations and engineering professionals with advanced problem-solving tools, communities of practice, canonical knowledge bases, and other performance support tools?</span></span><br />
                                 </li>
                                <li style="text-align: left;"><span style="color:#000000"><span style="font-size:15px">For HIPAA, GLBA and/or other state or federal regulation compliance, what due diligence/auditing is performed to ensure that you remain in compliance and what individual(s) in your organization are responsible for said compliance?</span></span><br />
                                 </li>
                                <li style="text-align: left;"><span style="color:#000000"><span style="font-size:15px">Does your organization perform vulnerability assessment activities as part of the acquisition cycle for products in each of the following areas: Cybersecurity, SCADA, smart grid, internet connectivity, and website hosting?</span></span><br />
                                 </li>
                                <li style="text-align: left;"><span style="color:#000000"><span style="font-size:15px">What is the framework we use for general Cybersecurity certifications that integrate both knowledge and skill while predicting constraints of innate abilities on performance, and do we need specific certifications?</span></span><br />
                                 </li>
                                <li style="text-align: left;"><span style="color:#000000"><span style="font-size:15px">Do the client workstations run in kiosk mode (1 generic user logged into machine, many users log into application) or can the application run under the logged in user with any valid user logging into the machine?</span></span><br />
                                 </li>
                                <li style="text-align: left;"><span style="color:#000000"><span style="font-size:15px">If the firewall runs on an individual host for which all users are not trusted system administrators, how vulnerable is it to tampering by a user logged into the operating system running on the protected hosts?</span></span><br />
                                 </li>
                        </ol>
                        <br />
                        <br />
                        <span style="color:#000000"><span style="font-family:verdana"><span style="font-size:36px"><span style="font-family:verdana"><strong><a href="http://zaale.com/l/J9dyb892892r4VxIWGcw892l7Etw/qx3JKlKoGYWwzT0LcM5qTA/ORuGtNOUpUonNpN7892jnfsw"><img alt="" height="50" src="https://artofservice.s3.amazonaws.com/Get_started_button._CB531883441_.png" width="400" /></a></strong></span></span></span></span></div>

                        <div style="text-align:center">
                        <p style="text-align:left"><span style="color:#000000"><span style="font-family:verdana"><a href="http://zaale.com/l/J9dyb892892r4VxIWGcw892l7Etw/qx3JKlKoGYWwzT0LcM5qTA/ORuGtNOUpUonNpN7892jnfsw"><img align="right" alt="" height="900" src="https://cdn5.bigcommerce.com/s-ilcoov/products/141331/images/172480/IT_Security_Management_FC__15871.1529285181.1280.1280.gif?c=2" style="margin:5px" width="600" /></a>   </span></span></p>
                        </div>

                        <div>
                        <p style="text-align:center"><span style="color:#000000"><span style="font-family:verdana"><span style="color:#000000"><span style="font-family:verdana"><span style="font-size:16px"><strong>WHY OWN THE  IT SECURITY MANAGEMENT SELF-ASSESSMENT?</strong></span></span></span></span></span></p>

                        <p style="text-align:left"><span style="color:#000000"><span style="font-family:verdana"><span style="color:#000000"><span style="font-family:verdana">The IT Security Management Self-Assessment will make you a IT Security Management expert by:  </span></span></span></span></p>

                        <ul>
                                <li style="text-align: left;"><span style="color:#000000"><span style="font-family:verdana"><span style="color:#000000"><span style="font-family:verdana">Reducing the effort in the IT Security Management work to be done to get problems solved</span></span></span></span><br />
                                 </li>
                                <li style="text-align: left;"><span style="color:#000000"><span style="font-family:verdana"><span style="color:#000000"><span style="font-family:verdana">Ensuring that plans of action include every IT Security Management task and that every IT Security Management outcome is in place</span></span></span></span><br />
                                 </li>
                                <li style="text-align: left;"><span style="color:#000000"><span style="font-family:verdana"><span style="color:#000000"><span style="font-family:verdana">Saving time investigating strategic and tactical options and ensuring IT Security Management opportunity costs are low</span></span></span></span><br />
                                 </li>
                                <li style="text-align: left;"><u><em><span style="color:#000000"><span style="font-family:verdana"><span style="color:#000000"><span style="font-family:verdana">Delivering tailored IT Security Management advise instantly with structured going-forward plans</span></span></span></span></em></u></li>
                        </ul>
                        <span style="color:#000000"><span style="font-family:verdana"> </span></span></div>

                        <p><span style="color:#000000"><span style="font-family:verdana"><span style="font-family:verdana"><span style="color:#000000"><strong><a href="http://zaale.com/l/J9dyb892892r4VxIWGcw892l7Etw/qx3JKlKoGYWwzT0LcM5qTA/ORuGtNOUpUonNpN7892jnfsw"><img alt="" height="311" src="https://cdn6.bigcommerce.com/s-ilcoov/products/141331/images/172488/IT_Security_Management_RACI_Matrix__48622.1529285181.1280.1280.jpg?c=2" width="600" /></a></strong></span></span></span></span></p>

                        <hr />
                        <p style="text-align:center"><br />
                        <span style="color:#000000"><span style="font-family:verdana"><span style="color:#000000"><span style="font-family:verdana"><span style="font-size:16px"><strong>SET NEW IT SECURITY MANAGEMENT STANDARDS OF EXCELLENCE</strong></span></span></span></span></span></p>

                        <p style="text-align:left"><span style="color:#000000"><span style="font-family:verdana"><span style="color:#000000"><span style="font-family:verdana">The IT Security Management Self-Assessment helps our clients create such high levels of IT Security Management value that they set new standards of excellence.</span></span></span></span></p>

                        <ul>
                                <li style="text-align: left;"><span style="color:#000000"><span style="font-family:verdana"><span style="color:#000000"><span style="font-family:verdana">Ensures you don't miss anything: 912 criteria in 7 RDMAICS (Recognize, Define, Measure, Analyze, Improve, Control and Sustain) steps with easy and quick navigating and answering for 1 or up to 10 participants</span></span><br />
                                 </span></span></li>
                                <li style="text-align: left;"><span style="color:#000000"><span style="font-family:verdana"><span style="color:#000000"><span style="font-family:verdana">Shows your organization instant insight in areas for improvement: Auto generates reports, radar chart for maturity assessment, insights per process and participant and bespoke, ready to use, RACI Matrix</span></span><br />
                                 </span></span></li>
                                <li style="text-align: left;"><span style="color:#000000"><span style="font-family:verdana"><span style="color:#000000"><span style="font-family:verdana">Gives you a professional Dashboard to guide and perform a thorough IT Security Management Self-Assessment</span></span></span></span><br />
                                 </li>
                                <li style="text-align: left;"><span style="color:#000000"><span style="font-family:verdana"><span style="color:#000000"><span style="font-family:verdana">Is secure: Ensures offline data protection of your Self-Assessment results</span></span></span></span><br />
                                 </li>
                                <li style="text-align: left;"><em><u><span style="color:#000000"><span style="font-family:verdana"><span style="color:#000000"><span style="font-family:verdana">Dynamically prioritized projects-ready RACI Matrix shows your organization exactly what to do next</span></span></span></span></u></em></li>
                        </ul>

                        <p><span style="color:#000000"><span style="font-family:verdana"> </span></span></p>

                        <p><span style="color:#000000"><span style="font-family:verdana"><a href="http://zaale.com/l/J9dyb892892r4VxIWGcw892l7Etw/qx3JKlKoGYWwzT0LcM5qTA/ORuGtNOUpUonNpN7892jnfsw"><img alt="" height="311" src="https://cdn6.bigcommerce.com/s-ilcoov/products/141331/images/172483/IT_Security_Management_Questionnaire__30958.1529285181.1280.1280.jpg?c=2" width="600" /></a></span></span></p>

                        <p><span style="color:#000000"><span style="font-family:verdana"><span style="font-family:verdana"><a href="http://zaale.com/l/J9dyb892892r4VxIWGcw892l7Etw/qx3JKlKoGYWwzT0LcM5qTA/ORuGtNOUpUonNpN7892jnfsw"><img align="left" alt="" height="471" src="https://cdn6.bigcommerce.com/s-ilcoov/products/141013/images/168579/Agile_Framework_Radar_Chart_-_Process_Average__14719.1520462412.1280.1280.jpg?c=2" style="margin:5px" width="600" /></a></span><br />
                        <br />
                        <span style="font-family:verdana"><a href="http://zaale.com/l/J9dyb892892r4VxIWGcw892l7Etw/qx3JKlKoGYWwzT0LcM5qTA/ORuGtNOUpUonNpN7892jnfsw"><img align="right" alt="" height="233" src="https://cdn6.bigcommerce.com/s-ilcoov/products/138692/images/156251/Service_Level_Agreement_Participant_view__62705.1503431033.1280.1280.jpg?c=2" style="margin:5px" width="250" /></a></span><span style="font-family:verdana"><strong><a href="http://zaale.com/l/J9dyb892892r4VxIWGcw892l7Etw/qx3JKlKoGYWwzT0LcM5qTA/ORuGtNOUpUonNpN7892jnfsw"><img align="left" alt="" height="233" src="https://cdn6.bigcommerce.com/s-ilcoov/products/138692/images/156249/Service_Level_Agreement_Summary_responses__92019.1503431031.1280.1280.jpg?c=2" style="margin:5px" width="250" /></a></strong></span></span></span></p>
                        </div>
                        </td>
                </tr>
                <tr>
                        <td colspan="1">
                        <div style="text-align:left">
                        <p style="text-align:center"><span style="color:#000000"><span style="font-family:verdana"> </span></span></p>

                        <p style="text-align:center"><span style="color:#000000"><span style="font-family:verdana"><span style="font-family:verdana"><span style="font-size:16px"><strong>COST/BENEFIT ANALYSIS; IT SECURITY MANAGEMENT<br />
                        SELF-ASSESSMENT JUSTIFICATION AND APPROVAL TOOLS:</strong></span></span></span></span><br />
                         </p>

                        <p><span style="color:#000000"><span style="font-family:verdana"><span style="font-family:verdana">Purchasing a The Art of Service Self Assessment will spur new ideas, fast track project strategy and advance your professional skills. We’ve developed a set of criteria that will aid in gaining approval and give you the ability to validate and review your Self-Assessment investment:</span></span></span><br />
                         </p>

                        <ul>
                                <li><span style="color:#000000"><span style="font-family:verdana"><span style="font-family:verdana">Excluding hired consultants and advisors from top management consulting firms, internal IT Security Management Self-Assessment work is typically undertaken by senior level positions with titles such as Enterprise Architect, Business Process Architects, Business Process Re-engineering Specialists and Business Architects.</span></span></span><br />
                                 
                                <ul>
                                        <li><span style="color:#000000"><span style="font-family:verdana"><span style="font-family:verdana">Statistics according to Glassdoor and <a href="" https:="" jobs="" www.indeed.com="">Indeed</a> tell these positions receive an average basic pay of $125,000. Daily rates of basic pay are computed by dividing an employee's annual pay by <a computing-hourly-rates-of-pay-using-the-2087-hour-divisor="" fact-sheets="" href="" https:="" pay-administration="" pay-leave="" policy-data-oversight="" www.opm.gov="">260 days</a>. The daily salary is then derived by dividing the annual salary of $125,000 by 260 days = a daily rate of $480.</span></span></span><br />
                                         </li>
                                </ul>
                                </li>
                                <li><span style="color:#000000"><span style="font-family:verdana"><span style="font-family:verdana">Top management consulting firms <a how-much-do-top-management-consulting-firms-charge-clients-per-consultant="" href="" https:="" www.quora.com="">start at $2,000 a day</a>, with rates typically charged up to 40 hours per week.</span></span></span></li>
                        </ul>

                        <p><span style="color:#000000"><span style="font-family:verdana"> </span></span></p>

                        <p style="text-align:center"><span style="font-size:18px"><span style="color:#000000"><span style="font-family:verdana"><span style="font-family:verdana"><strong>For a fraction of this the Self-Assessment will make you<br />
                        a IT Security Management domain authority.</strong></span></span></span></span></p>

                        <p style="text-align:center"><br />
                        <span style="color:#000000"><span style="font-family:verdana"><span style="font-size:36px"><span style="font-family:verdana"><strong><a href="http://zaale.com/l/J9dyb892892r4VxIWGcw892l7Etw/qx3JKlKoGYWwzT0LcM5qTA/ORuGtNOUpUonNpN7892jnfsw"><img alt="" height="50" src="https://artofservice.s3.amazonaws.com/Get_started_button._CB531883441_.png" width="400" /></a></strong></span></span><br />
                        <br />
                        <br />
                         </span></span></p>
                        </div>

                        <hr />
                        <p style="text-align:center"><span style="color:#000000"><span style="font-family:verdana"><a href="http://zaale.com/l/J9dyb892892r4VxIWGcw892l7Etw/hiNw9YjDWMYovmNoQpNL892A/ORuGtNOUpUonNpN7892jnfsw" style="font-size: 16px; font-family: verdana;"><img alt="" height="80" src="https://cdn6.bigcommerce.com/s-ilcoov/product_images/the_art_of_service_-_we_get_it_transparent_1_1503604503__72937.png" width="200" /></a></span></span></p>

                        <div style="text-align:center">
                        <div><span style="color:#000000"><span style="font-family:verdana"><span style="font-family:verdana"><span style="color:#000000"><span style="font-size:16px"><strong>To make sure you keep getting these emails, please add service@theartofservice.com to your address book or whitelist us.</strong> </span></span></span><br />
                         </span></span></div>

                        <div style="text-align:center"><br />
                        <span style="color:#000000"><span style="font-family:verdana"><span style="font-family:verdana"><a href="http://zaale.com/l/J9dyb892892r4VxIWGcw892l7Etw/4L6P3EBFYV3udbvBZtFLEA/ORuGtNOUpUonNpN7892jnfsw"><img alt="" height="121" src="https://cdn6.bigcommerce.com/s-ilcoov/product_images/uploaded_images/itil-training-organization-newlogosmall.jpg" width="280" /><img alt="" height="121" src="https://cdn6.bigcommerce.com/s-ilcoov/product_images/uploaded_images/prince2-training-organization-newlogo-small.jpg" width="280" /></a></span><br />
                          </span></span>

                        <p><strong>The U.S. Department of Commerce, National Institute of Standards and Technology (NIST) has included</strong> The Art of Service's Cyber Security Self Assessment on their Framework Industry Resources list since The Art of Service's Self Assessment <strong>is deemed qualified, accurate and comprehensive as a Guidance</strong> that Incorporates the Framework:  <a href="http://zaale.com/l/J9dyb892892r4VxIWGcw892l7Etw/2EMxkj6pi7631k8uQz8920W6Lg/ORuGtNOUpUonNpN7892jnfsw">https://www.nist.gov/cyberframework/industry-resources</a></p>
                        <span style="color:#000000"><span style="font-family:verdana">  </span></span>

                        <hr /></div>

                        <div style="text-align: center;"><br />
                        <span style="color:#000000"><span style="font-size:14px"><span style="font-size:16px">This message was sent to you because you are registered for this newsletter. We respect your privacy. If you no longer wish to receive emails, safely unsubscribe below.</span></span></span>

                        <p> </p>
                        <span style="color:#000000"> </span></div>
                        </div>
                        </td>
                </tr>
                <tr>
                        <td height="3" style="border-top: 3px double #e4e4e4; text-align: center; font-family: Verdana,Arial; font-size: 12px"> 
                        <p> </p>

                        <p>The Art of Service 22B/302 South Pine Road Brendale, Qld 4500 </p>

                        <p> </p>

                        <p><a href="http://zaale.com/unsubscribe/Wy763JeFxE4qMGmhSKRMkAv763BuYMqm5763oGLg5mhclm737S4GXMPll892vRLi9QonSx6n/USYcb2mwW4TN8KykVByKGQ/ORuGtNOUpUonNpN7892jnfsw" >Manage Subscription</a>  </p>

                        <p> </p>
                        </td>
                </tr>
        </tbody>
</table>
</center>
</body>
</html>
<img src="http://zaale.com/t/ORuGtNOUpUonNpN7892jnfsw/J9dyb892892r4VxIWGcw892l7Etw" alt="" style="width:1px;height:1px;"/>