Managing Security Objectives for Effective Organizational Performance Information Security Management Ramamohan Gutta Walden University
Total Page:16
File Type:pdf, Size:1020Kb
Walden University ScholarWorks Walden Dissertations and Doctoral Studies Walden Dissertations and Doctoral Studies Collection 2019 Managing Security Objectives for Effective Organizational Performance Information Security Management Ramamohan Gutta Walden University Follow this and additional works at: https://scholarworks.waldenu.edu/dissertations Part of the Databases and Information Systems Commons This Dissertation is brought to you for free and open access by the Walden Dissertations and Doctoral Studies Collection at ScholarWorks. It has been accepted for inclusion in Walden Dissertations and Doctoral Studies by an authorized administrator of ScholarWorks. For more information, please contact [email protected]. Walden University College of Management and Technology This is to certify that the doctoral dissertation by Ramamohan Rao Gutta has been found to be complete and satisfactory in all respects, and that any and all revisions required by the review committee have been made. Review Committee Dr. David Gould, Committee Chairperson, Management Faculty Dr. Nikunja Swain, Committee Member, Management Faculty Dr. Karla Phlypo, University Reviewer, Management Faculty Chief Academic Officer Eric Riedel, Ph.D. Walden University 2019 Abstract Managing Security Objectives for Effective Organizational Performance Information Security Management by Ramamohan Rao Gutta MBA, Northern Illinois University, 2012 MS, Jawaharlal Nehru Technological University, 1992 Dissertation Submitted in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy Management Walden University June 2019 Abstract Information is a significant asset to organizations, and a data breach from a cyberattack harms reputations and may result in a massive financial loss. Many senior managers lack the competencies to implement an enterprise risk management system and align organizational resources such as people, processes, and technology to prevent cyberattacks on enterprise assets. The purpose of this Delphi study was to explore how the managerial competencies for information security and risk management senior managers help in managing security objectives and practices to mitigate security risks. The National Institute of Standards and Technology framework served as the foundation for this study. The sample was made up of 12 information security practitioners, information security experts, and managers responsible for the enterprise information security management. Participants were from Fortune 500 companies in the United States. Selection was based on their level of experience and knowledge of the topic being studied. Data were collected using a 3 round Delphi study of 12 experts in information security and risk management. Statistical analysis was performed on the collected data during a 3 round Delphi study. The mean, standard deviation, majority agreement, and ranges were used to determine the final concensus for this research study. Findings of this study included the need for managerial support, risk management strategies, and developling the managerial and technical talent to mitigate and respond to cyberattacks. Findings may result in a positive social change by providing information that helps managers to reduce the number of data breaches from cyberattacks, which benefits companies, employees, and customers. Managing Security Objectives for Effective Organizational Performance Information Security Management by Ramamohan Rao Gutta MBA, Northern Illinois University, 2012 MS, Jawaharlal Nehru Technological University, 1992 Dissertation Submitted in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy Management Walden University June 2019 Dedication This study is dedicated to Mr. Narayana Gutta, my father and Mr. Seshagiri Rao, my high school teacher, who guided and supported me to set my goals and a strong foundation to achieve my personal and academic goals. You told me to never stop and to continue my educational endeavors. You have given me support, love, education, and taught me how to live and help, respect, love those around me. You gave me the inspiration to be the individual and not worry about what everyone else thought. To my best friend Mr. Venkat Mattela thanks for being a friend with encouragement, support, and unconditional love throughout my educational years. I also dedicate this dissertation to my fabulous wife Sree Gutta, daughter Sreaya Gutta, and son Srikar Gutta, thanks for your unconditional love, support and encouraging words and always believing in me, endured long periods of my absence, and whose love and support were instrumental in my achieving this academic milestone. Thank you. Acknowledgments First, I want to acknowledge the guidance, determination, and scholarship of my committee chairperson, Dr. David Gould. Dr. Gould has been accessible, decisive, yet open to new ideas on this journey with me. He has been the catalyst through which completion of this dissertation has been realized. My gratitude to Dr. Gould for being my teacher will remain ever-present in my heart. Thank you. I would also like to recognize Dr. Steve Jang, my initial dissertation committee member, for his insights and feedback in this challenging process and my current committee member, Dr. Nikunja Swain my gratitude goes also to my URR, Dr. Karla Phlypo. I want to applaud Walden University for giving this opportunity to achieve my important academic goal. I would like to give a special thanks to my 25 reading and literacy experts. Thanks for your patience and taking the time to participate in my Delphi study. I was grateful to have worked with a group of extraordinary people. I thank my loving and understanding wife Sree, my daughter Sreaya, my son Srikar, for their love and the understanding I could not be at every function or school activities during my dissertation process. I thank my best friend Mr. Venkat Mattela for motivating me to take up this doctoral journey and his unconditional support throughout my doctoral study. I am forever grateful to all those at whatever organization and to everyone else I did not mention but contributed in some fashion to the successful completion of this dissertation. God, I thank you for all your blessings. Table of Contents List of Tables ..................................................................................................................... vi List of Figures ................................................................................................................... vii Chapter 1: Introduction to the Study ....................................................................................1 Background of the Study ...............................................................................................2 Problem Statement .........................................................................................................3 Purpose of the Study ......................................................................................................5 Research Question .........................................................................................................5 Conceptual Framework ..................................................................................................6 Nature of the Study ........................................................................................................7 Definitions....................................................................................................................10 Assumptions and Limitations ......................................................................................10 Scope and Delimitations ..............................................................................................11 Significance of the Study .............................................................................................11 Significance to Practice......................................................................................... 12 Significance to Theory .......................................................................................... 13 Significance to Social Change .............................................................................. 13 Summary and Transition ..............................................................................................14 Chapter 2: Literature Review .............................................................................................16 Literature Search Strategy............................................................................................17 Conceptual Framework ................................................................................................18 Framework Core ................................................................................................... 19 i Framework Implementation Tiers ......................................................................... 20 Framework Profile ................................................................................................ 22 Coordination of Framework Implementation ....................................................... 23 NIST Framework Cybersecurity Practices ........................................................... 24 Information Security Risk Management ............................................................... 25 Information Security Controls .............................................................................. 25 Literature Review.........................................................................................................27