One Article Review

Accueil - L'article:
Source NoticeBored.webp NoticeBored
Identifiant 6206656
Date de publication 2022-08-09 11:26:08 (vue: 2022-08-09 00:05:40)
Titre The business case for security strategy and architecture
Texte The business benefits of developing an information security strategy and accompanying security architecture/design include: Being proactive, taking the lead in this area - more puppeteer than puppet; Designing a framework or structure to support the organisation's unique situation and needs; Positioning and guiding the management of information risk and security within other aspect of the organisation's architecture/design e.g. its IT and information architecture (showing information flows, networked systems, databases, services etc.), complementing and supporting various other business strategies and architectures such as cloud first, artificial intelligence, IIoT, big data, new products, new markets ...);Providing a blueprint, mapping-out and clarifying the organisational structure, governance arrangements and accountabilities for information risk and security relative to other parts of the business such as IT, physical security, Risk, legal/compliance, HR, operations, business continuity, knowledge management ...; Defining a coherent sequence or matrix of strategic initiatives (projects, investments, business and technology changes ...) over the next N years, embedding information risk management ever deeper into the fabric of the organisation and strengthening the information security arrangements in various ways (e.g. systematically phasing-out and replacing aged/deprecated security technologies while researching, piloting and then adopting new ones such as blockchain and post-quantum crypto);Driving the development and maturity of the information risk and security management function, covering its priorities, internal structure and external working relationships, governance etc.; Bringing clarity and direction (focus!), reducing complexity and uncertainty associated with myriad 'other options' that are discounted or put on hold;Seizing opportunities to align and support various departments, processes, systems, partners, projects/initiatives, budgets, plans etc., finding and exploiting points of common interest, avoiding awkward conflicts and gaps;Identifying key objectives for information risk and security
Envoyé Oui
Condensat   can   google   if   must  now  you 27001 ;driving ;providing about access accompanying accountabilities adopting adrift aged/deprecated align among anyway appreciates approach architecture architecture/design architectures are area areas arrangements artificial aspect aspects associated attention avoiding away awkward back benefits beyond big bigger blockchain blown blueprint bringing broadening broader budgets business busy can carefully case changes chaos clarifying clarity clear cloud coherent colleagues comes common complementing complex complexity concerns conflicts consider continuity convinced costlier covering creative crypto dash: data databases debate deeper defining departments designing developing development difficult direction discounted discussion driven embedding emerge encompassing enterprise etc even event ever expertise exploiting exploring extend extending external fabric fail failing far finding first flows focus form framework from full function game gaps;identifying gasping governance gradually grand guiding hard have help hold;seizing horizon however ideas iiot immediate important include: being information initiatives instance intelligence interest internal investments iso/iec its just justice key knowledge land larger lead legal/compliance levels lifeline links list listen literally little long magically maintaining management mapping markets matrix matter mature/stable maturity may meaning metrics;motivating might mind mist more most multi myriad need needed needs needs; networked new next nicely not objections objectives obvious ones operations opportunities options organisation organisational organisations other others out over pain part particular particularly partners parts paying perhaps perspectives phasing physical picture piloting plan planning plans point points positioning post preparing pretty priorities proactive processes processes/activities products professional projects projects/initiatives provided puppet; puppeteer purely pushing put quantum questions quietly raise reactive reducing refine refining relationships relative replacing researching resources risk riskier risky rough run scan security seek seem senior sequence services shape showing simply situation sketch sketching slip some soon special start state steadily step: strategic strategies strategy strengthening structure study suboptimal such support supporting systematically systems take takes taking talk task team techniques technologies technology term than them then thick things think those through throw time timescales too tools topic treading uncertainty unique various view vision vital water ways whichever whose within work working year years you your yours yourself
Tags Guideline
Stories
Notes
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: