A bridge too far?
https://www.sky.com/tv/movie/a-bridge-too-far-1977

A bridge too far?

THE ICT THREAT LANDSCAPE

Most agree that the ICT security threat landscape is more dynamic now than ever before. The emergence and proliferation of hackers for hire, advanced persistent threats etc. form an ever-changing risk environment that is difficult to deal with and almost impossible to predict.

Couple the above explosion in security events with business imperatives such as the relentless push to the cloud, the need to improve speed to market while reducing ICT costs and the scarcity of staff with appropriate skills and we have a ‘perfect storm’ of security risk.

Security issues make the front page of mainstream newspapers regularly, and CXO’s want to know how to keep their organisations out of the press. Budgets are tight, and there is an increasing need to focus scarce security resources on those business risks that are most important, and while many security people are quite able to identify technical problems, they often struggle to translate these into business risk.

Business leaders are frustrated by this lack of appreciation of their concerns, and they want a view of likelihood of threats eventuating and the impact on their business.

So it seems that the business wants to know about risk, whereas IT typically provides compliance tick, not risk information.

THE PROBLEMS WITH ‘SECURITY REPORTS’

Many customers have commissioned third parties to provide a security report of some sort at some stage in their quest for answers.

These traditional lengthy, moment in time security reviews often don’t meet the organisation’s business and governance needs. They are typically based on a rigid methodology and metrics that may not suit all customers. Customers have limited time and ability to interpret and implement recommendations in these heavyweight reports before they become outdated, and they ultimately fall into disuse.

WHAT KEEP LEADERS AWAKE AT NIGHT?

Talking to the CXO’s of various organisations the implication is that there are a number of unanswered questions, for example:

·        What are the top threats to my organisation?

·        Which threats are most likely to eventuate?

·        Which assets do these threats impact?

·        Which will be impacted the most?

·        Where are my assets? (shadow IT etc) 

·        How do I raise visibility of risk to the board and meet governance requirements?

·        How do I move forward with confidence in my digital strategy? (cloud etc.)

CONCLUSION

These issues cannot be solved by technology, yet this is often the knee-jerk response from ICT security. We need to bridge the chasm between IT Security and the business.

要查看或添加评论,请登录

Lawrence Ostle的更多文章

  • The Security Operations Center – measuring the business benefits.

    The Security Operations Center – measuring the business benefits.

    A Security Operation Center (SOC) is a central function within an organisation utilising people, processes, and…

  • What motivates people?

    What motivates people?

    What motivates people? Is it money? Status? Bonuses? Ownership? Here is my top 5 in order of importance! Money is…

  • The ‘Essential Eight’ is no longer relevant….

    The ‘Essential Eight’ is no longer relevant….

    ..

    1 条评论
  • it's 10 o'clock do you know where your PII is?

    it's 10 o'clock do you know where your PII is?

    In May 2018, GDPR (General Data Protection Regulation) came into effect. Even though this is euro-centric, it caused…

  • The Security Hype Cycle – What’s Your Take?

    The Security Hype Cycle – What’s Your Take?

    Gartner’s ‘Hype Cycle’ presentation has been criticised by some for its lack of science, the subjective nature of the…

    5 条评论
  • What's going to keep us awake in 2017?

    What's going to keep us awake in 2017?

    More of the same I think, with some subtle changes..

  • Is legacy endpoint dead or does it just smell funny?

    Is legacy endpoint dead or does it just smell funny?

    I attended a presentation from a business partner regarding ‘next generation endpoint protection’ recently. The pitch…

    5 条评论
  • What makes the difference?

    What makes the difference?

    I’ve read that there are a number of ‘moments of truth’ during a company’s relationship with customers, usually when…

  • The Time Is Right For DLP

    The Time Is Right For DLP

    DLP Globally Much has been written in the overseas press (particularly in the US) about Data Loss Prevention (DLP). The…

    1 条评论
  • DLP

    DLP

    A while back, in another world I was involved in doing a DLP scan of a customer's network. This revealed a number of…

    2 条评论

社区洞察

其他会员也浏览了