30 seconds on

By
Follow google news

Demonstrate value: A lifecycle of IT security risk management should demonstrate that you can mitigate risk with what products you are deploying. This evidence will get you the executive trust and support you need.

Organizational support:


In addition to executive understanding, you should seek to ensure that others in the company understand that IT security professionals are integral to the organization as custodians of business assets -- their help will be needed.

Others must step up

Before undertaking a corporate-wide risk management program, make sure the leaders of business units realize they bear some responsibility for the information they own and use. They must help IT security pros protect data.

A lifecycle approach:

Security pros must work with heads to conduct a business impact analysis, which includes outlining business practices, prioritizing mission control data, application and network segments and defining regulatory requirements.

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © SC Magazine, US edition
Tags:

Most Read Articles

Tasmanian gov agencies impacted by cyber attack

Tasmanian gov agencies impacted by cyber attack

Australian chief at US defence contractor L3Harris sold exploits to Russia

Australian chief at US defence contractor L3Harris sold exploits to Russia

Vic gov agencies flying blind on server security, audit finds

Vic gov agencies flying blind on server security, audit finds

Home Affairs streamlines risk vetting for gov tech suppliers

Home Affairs streamlines risk vetting for gov tech suppliers

Log In

  |  Forgot your password?