One Article Review

Accueil - L'article:
Source NoticeBored.webp NoticeBored
Identifiant 409088
Date de publication 2017-09-03 12:28:08 (vue: 2017-09-03 12:28:08)
Titre NBlog September 3 - InfoSec 101 elevator pitch, part 2 of 3
Texte Yesterday, I started telling you about one of the smallest deliverables in our awareness portfolio, the elevator pitch aimed at senior executive management. Despite its diminutive size, a lot of effort goes into selecting and fine-tuning those 100-odd words.[Sorry if this detailed deconstruction of the pitch one paragraph at a time is tedious but I think it's useful to understand the design, the purpose of the page and the thinking that goes into it. As far as I know, we are the only security awareness provider specifically targeting senior management in this way. I've made disparaging comments in the past about awareness programs aimed at "end-users": neglecting other employees - especially managers and professionals - seems incredibly short-sighted to me, a bit like trying to teach the passengers how to drive a car, ignoring the driver and the mechanics.] OK, pressing swiftly ahead, the elevator pitch can be interrupted at any point. If someone is presenting or talking it through with an exec, they may well need to break off answer questions or respond to comments. If a busy exec is quickly skimming the piece online or on paper, they might get distracted by a phone call or email. We may only have their attention fleetingly, if at all. If we're lucky, the exec will swallow the bait and be hooked ... so the second paragraph has the essential barb:Cybersecurity is important but there's more to it than IT. Information security enables the business to exploit information in ways that would otherwise be too risky.'Cybersecurity' is all the rage, of course. It's a term we see frequently in the media.  Although it's rarely defined, it is generally interpreted as IT and network security, specifically around Internet-related tech incidents such as hacking and malware. That's all very well, but what about all the rest of information risk and security? What about social engineering scams and frauds, piracy, industrial espionage and so forth? What about the whole insider-threat thing: where does that fit in relation to 'cyber'? Oh, hang on a moment: explain
Envoyé Oui
Condensat  although  how does  if  information  oh  ok 100 101 about admittedly advertisement advertisements again agency ahead aimed all annoying answer any anyway are around aside asked attention awareness bait barb:cybersecurity because before being bit blogging break business busy but button call can car catch challenge clever client comments company conclude course cyber cybersecurity deconstruction defined deliberately deliverables design despite detailed did diminutive disparaging distracted distracting does down dozen drive driver effort elevator else email employees enable enables end ended ends engineering especially espionage essential even exec executive explaining explanation exploit far final fine first fit fleetingly forth frauds frequently generally get goes hacking hand hang has have here hit hook hooked how iceberg ignoring important inanely incidents including incredibly industrial information infosec insider intensely internet interpreted interrupted its just key know like little lot lucky made malware management managers may maybe mechanics media mentions might mind moment: more names nblog need neglecting network new notice odd off one online only open other otherwise page paper paragraph part passengers past phone piece piracy pitch point portfolio presenting pressing presume product professionals programs promote provider provoking purpose questions quickly quite radio rage rambles rant rarely reader reflexively related relation remember repeat repeated repetition respond rest risk risky scams second seconds security see seems selecting senior sentence september series short sighted size skimming smallest social some someone sorry spate specifically springs started such suffering swallow swiftly talking targeting teach tech tedious telling term than that there thing: think thinking those thought threat through throws time times tip tomorrow too took trying tuning typical understand useful users very wallpaper way ways well what whenever where whole will word words would yesterday zealand
Tags
Stories
Notes
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: