ATO Personal Statement

Improved Essays
I am an IT Security Analyst in Enterprise Solutions and Technology’s (EST) Information and Cyber Security Management stream. In this role, I advise internal and external stakeholders about the ATO’s approach to contemporary risk management for corporate security practices and emerging technology

My awareness of the ATO’s security posture and risk appetite is supplemented by knowledge I have gained from formal Information Security accreditations and industry conventions. I apply this proficiency to represent my team as a subject matter expert across various security services, such as: security intelligence and monitoring; policies, education and support; and governance reporting. In doing so, I promote enhanced information management and security
…show more content…
The ‘front door’ documents I developed shows end-to-end plans of how to manage activities of various team’s within the wider Security branch to ensure closure and delivery on team, business line and group objectives. It supports executive staff to make informed decisions for allocation and management of resources, and provides direction to others to resolve complex or significant technical issues.

By clearly articulating the roles, responsibilities and outputs across the branch, I have made our processes accessible and transparent so that stakeholders can be accountable for delivering a consistent and reliable service. My documents also highlight gaps and areas of duplication so that ongoing operational and procedural improvements can be identified and recommend ed.

My documents assist staff to comply with IT security policies and standards including reviewing system security, system audit trails and logs and the integrity of the system configuration. By applying my knowledge and experience in IT Security operations, I have contributed to the ATO’s overall strategic goals

Related Documents

  • Improved Essays

    Not updating and patching a system regularly can have serve consequences. OS updates could introduce new vulnerabilities. All this need to be kept track of. I can solve this problem with a logging and auditing policy. B. Policy Statements After researching the national and international standards, create three policy statements that apply to the entire organization, comply with a national or international standard, and might have prevented the security breaches identified in part A. 1.…

    • 588 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    The Federal Information Security Management (FISMA) was set up by the United States government for cyber security purposes such as to increase the level of security of software applications, systems and databases. As stated by (Kim, n.d.), “When FISMA was enacted, its purpose was to ensure that federal agencies secure the information contained in the non-defense information systems of the Unites States government”. To protect the systems and data it is important to have a security plan developed for not just federal agencies but also for the government contractors and organizations affiliated with the information. According to (Kim, n.d.), “These grades have trended slightly upward in recent years, with the grades from 2005 through 2007 being…

    • 166 Words
    • 1 Pages
    Improved Essays
  • Decent Essays

    SANS (Sysadmin, Audit, Network and Security) Institute is a privatized company by the United States, which is specialized in 400 training courses including cybersecurity training and information security for security professionals providing proper certification. SANS was established in 1989. The SANS 11 supported programs in the security program publication of 2003 “The many facets of an information security program” by Robert L Behm Jr. Will be discussed below. The information security program is a task for the ISSO.…

    • 935 Words
    • 4 Pages
    Decent Essays
  • Improved Essays

    Ipremier Company is a web-based commerce that it is well-known retail business that sells for its customer’s luxury, unique, and vintage products. It focuses on B2C aspect more than B2B, so their customers are their top priority. They had a security breach into their system which locked their website completely and their customers could not access the website. The support team are getting a dozen of emails every minute and the content of the email are words such as “ha ha?”. They are not sure what causes the breach in the first place, but they assume based on the emails it could be a hacker and their concern is if their customer’s database was compromised.…

    • 962 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    For organizations, using an oversaw security specialist co-op offers an approach to diminish costs and to build the level of security on your system in the meantime. While you are approaching the way toward doing your regular business, the security administration is verifying that your system is protected from dangers and, above all, the general population who work at the specialist organization are dependably progressive on the most recent dangers and ready to give you answers for manage them as they get to be distinctly known. Thinking Ahead Excessively numerous organizations consider their security needs retroactively. Utilizing an oversaw security administrations supplier permits you to adopt a proactive strategy to security and to receive the rewards that accompany doing as such.…

    • 516 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    In the world of cybersecurity it is taught the user is the weakest link. Training and education to the staff is a vital piece of maintaining a strong security posture. It is recommended annual awareness training is a requirement to all personnel that have access to information or information systems at Sony, requiring them to sign documentation stating they were trained and understand the “do’s” and “don’ts” when accessing those systems. All recommendations provided in this white paper will require awareness and education to senior management and the…

    • 431 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    The security problem did not start in July 2005 with the first intruder; this was the hole that did not get filled in time. Early detection of the virus could have prevented widespread infection, but either carelessness or ignorance kept the company from looking. The first major concern is that early detection was not an option or the data that was collected was unused. Next the Customer data was kept in a fashion that could be compromised, either unencrypted or access control was inadequate. This shows a deep level of technological inadequacy by the company, the working technology knowledge of the business owners was too low to avoid risky practices.…

    • 780 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Previously I stated that “Overcomplicating Security is Your Greatest Weakness” [1] and now I would like to expand a little more on this issue. I will state that I have a lot of professional respect for many of my peers, but I know factually that many have been on the wrong security path for some time. Initially I tended to blame certification bodies for putting forth less than stellar explanations of “real world security”, then I began blaming those tasked with frameworks, guidelines and standards for what I feel (not felt), are “less than stellar” explanations and or fixes for issues in the networks. Prior to discussing security issues, I’d like to point out “conditioning.” clas·si·cal con·di·tion·ing - a learning process that occurs when…

    • 976 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Risk Management Framework

    • 44871 Words
    • 180 Pages

    NIST Special Publication 800-37 Revision 1 Guide for Applying the Risk Management Framework to Federal Information Systems A Security Life Cycle Approach JOINT TASK FORCE TRANSFORMATION INITIATIVE INFORMATION SECURITY Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Gaithersburg, MD 20899-8930 February 2010 U.S. Department of Commerce Gary Locke, Secretary National Institute of Standards and Technology Patrick D. Gallagher, Director Special Publication 800-37 Guide for Applying the Risk Management Framework to Federal Information Systems A Security Life Cycle Approach ________________________________________________________________________________________________…

    • 44871 Words
    • 180 Pages
    Improved Essays
  • Improved Essays

    The Three Pillars of Security When it comes to security of information there are three distinct levels involved in the protection of corporate information. In this paper, I will be examining each of these three levels of security, providing an example for each. The first and possibly the most noticeable is physical security, also known as enterprise security. The next level necessary in an organization is information security or managerial security.…

    • 817 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    However, the expense for maintaining and increasing cyber security and cyber security awareness has cost the federal government approximately $459 million since 2012 (Department of Homeland Security, 2011). This figure could eventually increase as newer technology is released and developed, but it is evident how serious cyber security must be taken to ensure the safeguard of information and the proper mitigation of a cyber attack. The monitoring of cyber attacks, as previously mentioned, involves many entities working collaboratively to stonewall cyber attacks from occurring. When implementing measures, agencies have to recognize a legitimate threat exists and if the threat is imminent in order to stop the…

    • 805 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    IT Security Policy

    • 1073 Words
    • 4 Pages

    A cybersecurity policy is critical to the safety of an organization. A policy establishes guidelines for an organization, and makes expectations clear for every employee of the organization. It is important that these guidelines are clear, and concise. This helps and end user understand what is expected out of them, and what they should expect from their IT security department. When building a cybersecurity policy one must keep in mind any potential situations and address them in the policy (Easttom, 2012).…

    • 1073 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    Are your policies and procedures something that sit on a shelf until the auditors and/or regulators ask to see them? Have they become akin to "Shelfware"? As I write this, my colleagues and I are very busy assisting companies with assessing risks, recommending security posture and well yeah, auditing IT controls too.…

    • 727 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    Security – Engineering for Everyone! Corporations in all sectors share a common goal: to make money. This is not an eye opening statement, but the following might be: “Corporations in all sectors share a common theme – they barely (if ever) care about security.” While some reading this may simply stop at that statement and whisper “he is insane,” many tasked with information security would wholeheartedly agree with me after reading this in its entirety.…

    • 1190 Words
    • 5 Pages
    Superior Essays
  • Great Essays

    2. Question Vincent LeVeque speaks of strategy, information technology and security. The author then mentions “Information security strategic planning methodology” (LeVeque, V. 2006. p.4). What is this strategic planning used for and what benefits does it have?…

    • 1426 Words
    • 6 Pages
    Great Essays