skip to main content
10.1145/1655168acmconferencesBook PagePublication PagesccsConference Proceedingsconference-collections
WISG '09: Proceedings of the first ACM workshop on Information security governance
ACM2009 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
CCS '09: 16th ACM Conference on Computer and Communications Security 2009 Chicago Illinois USA 13 November 2009
ISBN:
978-1-60558-787-5
Published:
13 November 2009
Sponsors:
Next Conference
October 14 - 18, 2024
Salt Lake City , UT , USA
Bibliometrics
Skip Abstract Section
Abstract

It is our great pleasure to welcome you to the 1st ACM Workshop on Information Security Governance (WISG'09). The goal of this workshop is to establish a framework to drive implementation of effective information security strategies in organizations involving risk management, reporting, and accountability. Recent changes in business environment such as outsourcing, global supply chain, and cross organizational collaborations are forcing users to access and retrieve business data across organizational boundaries. This is making data governance in enterprise intractable. In addition, since emerging IT infrastructure such as cloud computing calls for storing enormous amount of confidential and sensitive information, it is imperative that these data must be appropriately handled according to the agreements. These new disruptive trends will greatly change the notions of the information security governance calling for more fine-grained, data-centric, and risk-adjusted governance models with the innovative implementation technologies.

The call for papers attracted sixteen submissions from Asia, Europe, and the United States. The program committee accepted five full papers and three short papers that cover the compliance, governance, security risk, security policy and privacy issues.

Skip Table Of Content Section
SESSION: Keynote talk
keynote
Information security governance framework

Many companies, especially Japanese companies, have implemented information security with bottom up approach, starting from implementing piece by piece security controls. As increase the number of information security incidents and spread its impact, ...

SESSION: Compliance and governance
research-article
A method of calculating the cost of reducing the risk exposure of non-compliant process instances

A method is introduced to measure the risk of being non-compliant and the cost of reducing the risk by performing internal audits with the help of automated audit tools. Risk exposure of a business process is defined in terms of the prevalence of non-...

research-article
Model driven security accreditation (MDSA)for agile, interconnected it landscapes

Assurance accreditation of agile, interconnected IT landscapes is a great challenge, and is currently often cited as one of the show-stoppers for the adoption of modern IT architectures (e.g. agile, model-driven, process-led SOA and Cloud) in mission ...

research-article
Strengthening employee's responsibility to enhance governance of IT: COBIT RACI chart case study

The ongoing financial markets debacle and the global economic context advocate enhancing the governance of the companies and, de facto, improving the elaboration and the understanding of employees' responsibilities. Furthermore, the moral aspects of the ...

research-article
GoCoMM: a governance and compliance maturity model

Advanced methodologies for compliance such as CobiT identify a number of maturity levels that must be reached: first the existence of an infrastructure for the enforcement of security controls; second, the ability to continuously monitor and audit ...

SESSION: Security risk, policy and privacy
research-article
Dynamic security policy learning

Recent research [12] has suggested that traditional top down security policy models are too rigid to cope with changes in dynamic operational environments. There is a need for greater flexibility in security policies to protect information appropriately ...

research-article
An XACML-based privacy-centered access control system

The widespread diffusion of the Internet as the platform for accessing distributed services makes available a huge amount of personal data, and a corresponding concern and demand from users, as well as legislation, for solutions providing users with ...

research-article
Security risk management using internal controls

Rather than treating security as an independent technical concern, it should be considered as just another risk that needs to be managed alongside all other business risks. An Internal Controls approach to security risk management is proposed whereby ...

Contributors
  • George Mason University
  • IBM Research

Recommendations