One Article Review

Accueil - L'article:
Source NoticeBored.webp NoticeBored
Identifiant 435791
Date de publication 2017-11-19 15:03:39 (vue: 2017-11-19 15:03:39)
Titre NBlog November 19 - IoD advises members to develop "cyber security strategy"
Texte report for the UK Institute of Directors by Professor Richard Benham encourages IoD members to develop “a formal cyber security strategy”.As is so often the way, 'cyber' is not explicitly defined by the authors although it is strongly implied that the report concerns the commercial use of IT, the Internet, digital systems and computer data (as opposed to cyberwar perpetrated by well-resourced nation states - a markedly different interpretation of 'cyber' involving substantially greater threats).A 'formal cyber security strategy' would be context dependent, reflecting the organization's business situation. That broader perspective introduces other aspects of information risk, security, governance and compliance. All relevant aspects need to be considered at the strategic level, including but not just 'cyber security'. Counteracting or balancing the desire to lock down information systems and hence data so tightly that its value to the business is squeezed out, 'cyber security strategy' should be closely aligned with, if not an integral part of, information management. For instance it should elaborate on proactively exploiting and maximising the value of information the organization already holds or can obtain or generate, working the asset harder for more productive business purposes. In some circumstances, that means deliberately relaxing the security, consciously accepting the risks in order to gain the rewards. I find it ironic that the professor is quoted:“This issue must stop being treated as the domain of the IT department and be the subject of boardroom policy. Businesses need to develop a cyber security policy, educate their staff, review supplier co
Envoyé Oui
Condensat  counteracting  i a report about accepting achieve address addresses advises again aligned all already although amount apply appreciate appreciation approach approaches appropriate are around aspects asset authors awareness awareness” balancing beef being benham encourages between biases bit blabbing boardroom bordering both broader building business businesses but can change changing circumstances clear climate close closely coffee commercial common competitor complementary compliance computer concepts concerns concerns:  consciously considered context continuity contracts controlling controls counteract course cyber cyberwar dangerous data defence defined deliberately department dependent deserves desire develop developments different differently digital directing directors distinction diversion does doesn domain down draw earth educate elaborate emphasizes employee ensure entire especially experienced explicitly exploited exploiting eye find fire first focus forget formal frequent fundamental gain geeks generate getting global going good governance greater handled harder has have heads hence here: herold holds home huge implied incident including induction information inherently instance institute insurance integral internet interpretation introduces involving iod ironic issue issues its just keep least leaving legs level like line loads lock look make management managing markedly maximising means media members methods monitoring more must narrow nation nblog need needs neologisms networks nist not note november nurtured objectives obsessive obtain often only opposed order organization other out outside over parlance part people perpetrated perpetuates personally perspective planning pleased plus point policy positive practice preferred privacy proactively processes productive professor program proprietary protected provide pub purposes quoted:“this rapidly real rebecca reference referring reflecting regular related relaxing relevant report resigning resourced review rewards richard right risk risks robust rounded secrets secure security see semantics sensible should since situation social some somewhere sp800 specific squeezed staff state: states stop strategic strategy strategy” strongly subject substantially supplier systematically systems take taking technology term than that them then there things think threats tightly too trade training treated turf unclear understanding unfortunately unless use valuable value warming way well whereas which widespread work workers working would yet your ”does “a “continuous
Tags
Stories
Notes
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: