30 seconds on

By
Follow google news

Demonstrate value: A lifecycle of IT security risk management should demonstrate that you can mitigate risk with what products you are deploying. This evidence will get you the executive trust and support you need.

Organizational support:


In addition to executive understanding, you should seek to ensure that others in the company understand that IT security professionals are integral to the organization as custodians of business assets -- their help will be needed.

Others must step up

Before undertaking a corporate-wide risk management program, make sure the leaders of business units realize they bear some responsibility for the information they own and use. They must help IT security pros protect data.

A lifecycle approach:

Security pros must work with heads to conduct a business impact analysis, which includes outlining business practices, prioritizing mission control data, application and network segments and defining regulatory requirements.

Add iTnews as your trusted source

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © SC Magazine, US edition
Tags:

Most Read Articles

Services Australia describes fraud, debt-related machine learning use cases

Services Australia describes fraud, debt-related machine learning use cases

'Copy Fail' Linux privesc bug lay dormant in kernel since 2017

'Copy Fail' Linux privesc bug lay dormant in kernel since 2017

Medibank reveals attack vector and cost of 2022 security breach

Medibank reveals attack vector and cost of 2022 security breach

Incomplete fix for Fancy Bear exploit opens zero-click hole in Windows

Incomplete fix for Fancy Bear exploit opens zero-click hole in Windows

Log In

  |  Forgot your password?