Technology Today…

The power in your hands

The Starting Point in Defending Data from Cyber Attack

Last Thursday’s show revealed multiple holes in an organization’s overall cybersecurity posture. (If you missed it, download the episode here http://www.voiceamerica.com/voiceamerica/vshow.aspx?sid=1691 or on iTunes: http://itunes.apple.com/podcast/technology-today/id359207549)

One of the reasons vulnerabilities to our communications networks and sensitive data persists even after a great deal of attention is now brought to bear on the problem is that organizations still do not know what to do to address the issue – or rather, they don’t know where to start.

For some time now, cybersecurity professionals have been saying that the first step is having a strong security policy and sound procedures in place.

That’s true – however, that simple statement doesn’t convey the full message.

Developing security policy and procedures is step one because it gives us a chance to not only document security best practices for our organization, but also and more importantly tailor those practices to our organization.

In other words, the effort of writing security policy is actually an effort to assess existing business processes and re-engineer those processes to incorporate accepted best practices with respect to cybersecurity.

The result of such an effort should be two-fold. One, our business processes, and therefore the organization, should be more secure. And two, a secure set of operations should also be more streamlined, efficient and transparent.

Developing security policy as the first step to securing an organization works best when and only when both these goals are met. Rather than being a burden to an organization, cybersecurity efforts should also improve operations.

Advertisements

July 19, 2010 - Posted by | Show Wrap Up

No comments yet.

Leave a Reply

Please log in using one of these methods to post your comment:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: