30 seconds on

By

Demonstrate value: A lifecycle of IT security risk management should demonstrate that you can mitigate risk with what products you are deploying. This evidence will get you the executive trust and support you need.

Organizational support:


In addition to executive understanding, you should seek to ensure that others in the company understand that IT security professionals are integral to the organization as custodians of business assets -- their help will be needed.

Others must step up

Before undertaking a corporate-wide risk management program, make sure the leaders of business units realize they bear some responsibility for the information they own and use. They must help IT security pros protect data.

A lifecycle approach:

Security pros must work with heads to conduct a business impact analysis, which includes outlining business practices, prioritizing mission control data, application and network segments and defining regulatory requirements.

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © SC Magazine, US edition
Tags:

Most Read Articles

Phishing attack nets enormous npm supply chain compromise

Phishing attack nets enormous npm supply chain compromise

Service NSW centralises security, networking in mammoth CloudOps overhaul

Service NSW centralises security, networking in mammoth CloudOps overhaul

VicRoads to phase out passwords in favour of passkeys

VicRoads to phase out passwords in favour of passkeys

Apple adds "mercenary spyware" protection to new A19 chip

Apple adds "mercenary spyware" protection to new A19 chip

Log In

  |  Forgot your password?