30 seconds on

By

Demonstrate value: A lifecycle of IT security risk management should demonstrate that you can mitigate risk with what products you are deploying. This evidence will get you the executive trust and support you need.

Organizational support:


In addition to executive understanding, you should seek to ensure that others in the company understand that IT security professionals are integral to the organization as custodians of business assets -- their help will be needed.

Others must step up

Before undertaking a corporate-wide risk management program, make sure the leaders of business units realize they bear some responsibility for the information they own and use. They must help IT security pros protect data.

A lifecycle approach:

Security pros must work with heads to conduct a business impact analysis, which includes outlining business practices, prioritizing mission control data, application and network segments and defining regulatory requirements.

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © SC Magazine, US edition
Tags:

Most Read Articles

India's alarm over Chinese spying rocks CCTV makers

India's alarm over Chinese spying rocks CCTV makers

Hackers abuse modified Salesforce app to steal data, extort companies

Hackers abuse modified Salesforce app to steal data, extort companies

Cyber companies hope to untangle weird hacker codenames

Cyber companies hope to untangle weird hacker codenames

Woolworths' CSO is Optus-bound

Woolworths' CSO is Optus-bound

Log In

  |  Forgot your password?