The Five Information Value Questions

The Five Information Value Questions

I recently posted about an internal security campaign that I initiated at Thales Australia and New Zealand (TANZ) to bring the value of information to the front of employees mind.

The issue I see is that while TANZ has a strong security culture, sometimes, during adhoc and unplanned collaboration such as internal instant message discussions, the internal mental alarms may not trigger, as other drivers, such as business milestones, are front of mind. 

Following the example of Rachael Falk and Mike Burgess who developed, while at Telstra, the five knows campaign for information protection, I recommend that the following five Information Value questions are asked when employees are sharing information both online and offline.  

?        What is the value of the information to you?

?        What is the value of the information to your business team?

?        What is the value of the information to the organisation?

?        What is the value of the information to our competitor?

?        What is the value of the information to the criminal element?


 Not all the questions are relevant every time information is shared, however if you are quickly running through the questions in your mind, this at least  ensures you’re giving yourself the best opportunity to consider all implications of information sharing.  

One thing I have found when asking these questions is that people have trouble defining the value in each of the contexts. This may be due to a point written about by Audrey Fenner in their paper on "Placing Value on Information" where it is stated: 

"Information has no value in itself; its value is derived from its understanding and subsequent application."

  and

"Society values only the product, or result, of information"

 To help people better determine value I have found applying the following context to each question helps derive a potential value decision.

What is the impact if the information is lost or made public?


Hitesh Thakkar

Technology Evangelist

6 年

Dear Ben, Thanks for providing 360 degree context for CxO to derive value from Information and security controls needed to bring into it. Simply brilliant.

回复
Aisha Mir

Director, IT Applications & Agile PMO

6 年

The 5 questions are great, Ben. It makes the sensitivity of the data in question, and the subsequent handling of it clear.

回复

要查看或添加评论,请登录

Ben Doyle的更多文章

  • Getting/Arriving to what matters most

    Getting/Arriving to what matters most

    It has been a fantastic journey and a privilege to hold such a unique CISO role for Australia for so long. In my tenure…

    193 条评论
  • Detecting Benign URLs

    Detecting Benign URLs

    I have had the pleasure of working for the last couple of years with a University of Sydney PHD researcher, Fariza…

    4 条评论
  • 20-Year Anniversary in Role

    20-Year Anniversary in Role

    CISO Thales Australia and New Zealand Today marks my official 20-year anniversary working as the Chief Information…

    107 条评论
  • AISA/RSAC CISO Boot Camp

    AISA/RSAC CISO Boot Camp

    Over the last few months, I have been working with Britta Glade from RSA Conference on building the agenda for the…

    8 条评论
  • Purposeful Language

    Purposeful Language

    One of the biggest barriers for cyber professionals when explaining the threat landscape, the controls that are…

    10 条评论
  • Create Memorable Interviews

    Create Memorable Interviews

    This is a continuation in the series of articles I have been writing on LinkedIn on the topic of approaching cyber…

  • Defining the Requirements for a Job

    Defining the Requirements for a Job

    This is a continuation in the series of articles I have been writing on LinkedIn on the topic of approaching cyber…

    5 条评论
  • Be Purposeful in your Job Needs

    Be Purposeful in your Job Needs

    I am a strong believer in the axiom, the value you get out of something is correlated with the effort that you are…

  • Job Focus vs Career Focus Hiring?

    Job Focus vs Career Focus Hiring?

    There is plenty of discussion across the Cyber security industry about the lack of available candidates for Cyber…

    1 条评论
  • Why Cyber Risk is Broken

    Why Cyber Risk is Broken

    Image if you will that you are the owner of a very successful Michelin-star restaurant. The more you put yourself in…

    18 条评论

社区洞察

其他会员也浏览了