NuHarbor Security
  • Solutions
    Solutions
    Custom cybersecurity solutions that meet you where you are.
    • Overview
    • Our Approach
    • Data Icon Resources
    • Consultation Icon Consult with an expert
    • By Business Need
      • Identify Gaps in My Cybersecurity Plan
      • Detect and Respond to Threats in My Environment
      • Fulfill Compliance Assessments and Requirements
      • Verify Security With Expert-Led Testing
      • Manage Complex Cybersecurity Technologies
      • Security Monitoring With Splunk
    • By Industry
      • State & Local Government
      • Higher Education
      • Federal
      • Finance
      • Healthcare
      • Insurance
    Report 2023-2024 SLED Cybersecurity Priorities Report
    2023-2024 SLED Cybersecurity Priorities Report
    Read Report
  • Services
    Services
    Outcomes you want from a team of experts you can trust.
    • Overview
    • Data Icon Resources
    • Consultation Icon Consult with an expert
    • Security Testing
      • Penetration Testing
      • Application Penetration Testing
      • Vulnerability Scanning
      • Wireless Penetration Testing
      • Internal Penetration Testing
      • External Penetration Testing
    • Assessment & Compliance
      • CMMC Compliance
      • NIST 800-53
      • HIPAA Security Standards
      • ISO 27001
      • MARS-E Security Standards
      • New York Cybersecurity (23 NYCRR 500)
      • Payment Card Industry (PCI)
    • Advisory & Planning
      • Security Strategy
      • Incident Response Planning
      • Security Program Reviews
      • Security Risk Assessments
      • Virtual CISO
      • Policy Review
    • Managed Services
      • Curated Threat Intelligence
      • Managed Detection and Response (MDR)
      • Sentinel Managed Extended Detection and Response (MXDR)
      • SOC as a Service
      • Splunk Managed Services
      • Tenable Managed Services
      • Vendor Security Assessments
      • Vulnerability Management
      • Zscaler Support Services
    Report 2023-2024 SLED Cybersecurity Priorities Report
    2023-2024 SLED Cybersecurity Priorities Report
    Read Report
  • Partners
  • Resources
    Resources
    Explore reports, webinars, case studies, and more.
    • Browse Resources
    • Consultation Icon Consult with an expert
    • Blog icon Blog
    • Podcast icon Podcast
    • Annual SLED CPR icon Annual SLED CPR
    • Downloadable Assets icon Downloadable Assets
    Report 2023-2024 SLED Cybersecurity Priorities Report
    2023-2024 SLED Cybersecurity Priorities Report
    Read Report
  • Company
    Company
    We do cybersecurity differently – the right way.
    • Overview
    • Data Icon Resources
    • Consultation Icon Consult with an expert
    • Leadership
    • News
    • Careers
    • Contact
    Report 2023-2024 SLED Cybersecurity Priorities Report
    2023-2024 SLED Cybersecurity Priorities Report
    Read Report
  • Consult with an expert
  • Client support
  • Careers
  • Contact
1.800.917.5719
NuHarbor Security Blog
    • Compliance
    • Cybersecurity Technology
    • Security Operations
    • Industry Insights
    • Security Testing
    • Advisory and Planning
    • Application Security
    • Managed Detection and Response
    • Threat Intelligence
    • NuHarbor
    • Managed Services
    • Cyber Talent
August 20, 2014

The Difference Between Information Security and IT Security

Justin Fimlaid Justin Fimlaid

Lately there’s been a lot of swirl in the industry about security organizations, with the term “information security” being used synonymously with “IT security.” These are very different functions and should be distinguished as such. With proper planning, you can ensure that your security functions are purposefully aligned with the business strategy and vision of your CEO and Board of Directors.

Let’s start with information security. Information security is the governance of security, typically within the context of enterprise (i.e., business) operations. Security governance includes tasks such as defining policy and aligning the overall company security strategy with the business strategy. Information security governance solves business-level issues and transcends the IT department. To appropriately govern information security in an enterprise setting, IT must be treated as any other business unit, a consumer of the information security service the same as legal, HR, finance, facilities, etc. This function of information security governance is pervasive to your business and should provide end-to-end coverage.

Now for IT security. IT security is the management of security within IT. IT security management teams should be translating information security strategy into technical IT security requirements. They’re responsible for IT risk management, security operations, security engineering and architecture, and IT compliance. The IT security management function should “plug in” to the information security governance framework.

As an example, if your business is preparing to expand in Europe (i.e., your business strategy), your information security governance might include compliance and certification for US-EU Safe Harbor, and your IT security management teams should planning to implement the security controls to comply with the Safe Harbor regulations. This mechanism of cascading goals and strategy will help ensure a holistic approach to security across the entire business.

So, why should you care? It’s about creating a common definition of security. If we can educate folks about security and establish a common lexicon, our audience will have a platform to think about security and apply the terminology in a way that makes sense to them. When people can correlate an activity or definition to their personal environment, it allows them to make an informed decision and self-select the correct security behavior without external incentives.

If you’re just getting started with security, I highly recommend you check out the work from ISACA, specifically CobIT 5 for information security found here. ISACA’s CobIT 5 is a nice reference point for defining the difference between information security and IT security. ISACA also ties in security business enablers as part of the larger CobIT governance and management framework. Additionally, ISO27001 should not be overlooked. There’s a great collection of artifacts found at ISO27001 Security.

Included Topics

  • Compliance,
  • Industry Insights,
  • Cybersecurity Technology
Justin Fimlaid
Justin Fimlaid

Justin (he/him) is the founder and CEO of NuHarbor Security, where he continues to advance modern integrated cybersecurity services. He has over 20 years of cybersecurity experience, much of it earned while leading security efforts for multinational corporations, most recently serving as global CISO at Keurig Green Mountain Coffee. Justin serves multiple local organizations in the public interest, including his board membership at Champlain College.

Related Posts

Compliance 2 min read
LockPath and NuHarbor Security to Host Series on Building Modern Risk and Security Program Read More
Compliance 2 min read
10 Strategic Security Metrics to Help Manage Your Information Security Program Read More
Cybersecurity Technology 3 min read
What's the Difference Between Splunk Enterprise Security and Security Essentials? Read More

Subscribe via Email

Subscribe to our blog to get insights sent directly to your inbox.

Subscribe Here!

Latest Pwned episodes

Episode 200 - Reflections of Pwned...Until Next Time
April 03, 2024
Episode 200 - Reflections of Pwned...Until Next Time
Listen Now
Episode 199 - When a BlackCat Crosses Your Path...
March 21, 2024
Episode 199 - When a BlackCat Crosses Your Path...
Listen Now
Episode 198 - Heard it Through the Grapevine - Beyond the Beltway, 2024
March 08, 2024
Episode 198 - Heard it Through the Grapevine - Beyond the Beltway, 2024
Listen Now
NuHarbor Security logo
NuHarbor Security

553 Roosevelt Highway
Colchester, VT 05446

1.800.917.5719

  • Solutions
  • Services
  • Partners
  • Resources
  • Company
  • Contact
  • Privacy Policy
Connect
  • Twitter
  • Linkedin
  • YouTube
©2025 NuHarbor Security. All rights reserved.