/*
Customise Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorised as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

Performance cookies are used to understand and analyse the key performance indexes of the website which helps in delivering a better user experience for the visitors.

Advertisement cookies are used to provide visitors with customised advertisements based on the pages you visited previously and to analyse the effectiveness of the ad campaigns.

/*]]>*/

Interview

February 28, 2018

Interview

You are here:
< Back

cyber risk assessment cybersecurity best practices Certifier interview process TPRM TEKCHEK interactive CISO Flaw Hypothesis Methodology High Assurance Guard Define RMM What is a Cybersecurity Interview?

In the context of cybersecurity, an “interview” within the NIST Cybersecurity Framework (CSF) refers to a type of assessment method used to gather information and evidenceIt involves structured discussions with individuals or groups within an organization to understand their knowledge, perspectives, and experiences related to security controls. 

Definition

A type of assessment method that is characterized by the process of conducting discussions with individuals or groups within an organization to facilitate understanding, achieve clarification, or lead to the location of evidence, the results of which are used to support the determination of security control effectiveness over time.
SOURCE: SP 800-53A

Purpose of Interviews in Cybersecurity Assessments

  • Evidence Gathering: Interviews help assessors gather evidence to support the determination of whether security controls are effective.
  • Understanding and Clarification: They facilitate understanding of how security controls are implemented, how they function, and how they are maintained.
  • Identifying Gaps: Interviews can reveal areas where security controls may be weak or ineffective, or where there are gaps in understanding or implementation.
  • Building Relationships: Interviews can help build relationships between assessors and the organization, which can be valuable for future engagement and collaboration. 

Types of Interviews:

  • Individual Interviews: May focus on specific individuals with relevant expertise, such as IT administrators, security managers, or system owners.
    Group Interviews: Can involve multiple individuals, such as a management team or a cross-functional group, to gain diverse perspectives and insights.
    Informal Discussions: Interviews can also involve informal discussions with employees from various departments to gather broader insights into their understanding and adherence to security policies and procedures. 

How Interviews get Conducted:

  • Structured Questions:
    Assessors typically use a structured set of questions to guide the interview and ensure that key areas are covered.
  • Open-Ended Questions: These allow for more in-depth responses and the opportunity for interviewees to share their experiences.
  • Active Listening: Risk Assessors should actively listen to interviewees’ responses, and they should ask clarifying questions to ensure a thorough understanding of the information being provided.
  • Documentation: All interview findings should be carefully documented to support the overall assessment process. 

Examples

  • NIST Cybersecurity Framework: Interviews can be used to assess how an organization is implementing the Identify, Protect, Respond, and Recover functions of the CSF.
  • Security Control Effectiveness: Interviews can be used to assess the effectiveness of specific security controls. These may include access control, data encryption, or incident response procedures.
  • Gap Analysis: Interviews can help identify gaps in security awareness training, policy implementation, or technology deployment. 

 CIA Triad

In the context of an interview, the CIA Triad is an approach that is often used. The CIA triad consists of three core principles: Confidentiality, Integrity, and Availability. Confidentiality ensures that sensitive information is accessed only by authorized individuals, protecting it from unauthorized access and breaches.
Interviews are an extremely valuable assessment method in cybersecurity.  They help organizations gain a deeper understanding of an organizations security posture. They help identify potential vulnerabilities, and they improve their overall security program.