Professional Documents
Culture Documents
Project Management in IT Security - EC Council Course
Project Management in IT Security - EC Council Course
Project Management in IT Security - EC Council Course
Determine the amount and magnitude of the work to be carried out in PMITS
Check the scope of the project defined
Break down the activities to be conducted in smaller tasks and sub-tasks
Put up descriptions for each task and sub-task
Determine the quality and value adding stream and the value depreciating stream
Check adherence to government rules and regulations
Determine the risks, budget, schedule, and communication plans before
commencing
Determine what slates the IT security project as completed with regard to PMITS
Brainstorm how to close or pending, open issues and requests for changes
Prepare a closure statement and report
Prepare for deployment/implementation of the success of the IT security project
Handover the reins to operation managers to carry out the change implemented
Prepare a solid compliance report
Generalized IT security planning would include many generic actions that are needed as
key actions for the successful completion and implementation of the IT security project as
the PMITS. These would include the following:
Stages of auditing
The role that security assessment and auditing carried out during the length of
the project
The resources that need these set of audits
Risk assessment processes such as penetration testing and scanning for
vulnerability
Authentication and access control
Entries within reports to different stakeholders and executives
Project parameters and metrics
Work breakdown structure (WBS)
Assessment and audit reports
Impact analysis of the IT security project plan
Constraints of the set project plan
Guidelines for all processes
Guidelines for wireless audits
Wireless threats and solutions
The role of operational security assessment and auditing carried out during the
length of the project
Set up incident reporting and response processes
Build a response team for operational security
Understand all regulatory issues
Understand all operational security policies
Determine disaster recovery processes for IT operational security
Explain the different IT operational security parameters
Risks and mitigation strategies to be employed
Constraints that can hamper the operational security and assumptions that need
to be made
Determine the impact of Health Insurance Portability and Accountability Act,
Gramm-Leach-Bliley Act, and Sarbanes-Oxley Act on IT operational security