Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Tuesday, 28 March, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

CISOs have "too much focus on technology"

by The Gurus
January 24, 2014
in Editor's News
Share on FacebookShare on Twitter

Security professionals are so focused on tools that they forget about the human element, and what people and process can add.
 
Speaking at an industry roundtable hosted by Websense, Mark Brown, director or risk advisory at EY, said that the accountancy industry spent 300 years trying to get to a shared qualification, but security professionals are trying to achieve that in a generation in “a leap of faith, but they are worried about making mistakes and move on”.
 
He said: “What does security mean to the business? You can look for a metric or try to quantify security, but you are looking in the wrong place.”
 
“Technology is only part of what you offer. It comes back to the element of understanding being breached, and boardrooms realise awareness is key and the whole company has the ability to make their staff security aware. Once governance and awareness is in place, you will be more efficient at what you do as the human and technology factors come together.”
Brown went on to say that any sector that deals with intellectual or valuable property will be targeted, so it becomes an economic rather than cyber battle and, if this is the case, a security manager can protect for a tenth of the cost.
 
“As boardrooms take notice, we see demand for security auditors and this has increased in the last 12 months and this is going one way, as there are too few people,” he said.
 
Carl Leonard, senior manager of Websense Security Labs, who hosted the roundtable, said: “You can see what has happened, but too many people are hung up on attribution. You can use that knowledge to better protect yourself; it doesn’t matter if it is a Government or a hacker after you.
 
Commenting, Amar Singh, chair of the ISACA UK security group, told IT Security Guru that he agreed that most organisations have very onerous procedures and processes to deploy technologies, and are not agile in their approach to general IT projects.
 
“That same attitude is reflected in information security and IT security initiatives. Cyber criminals and cyber activists do not have to present their case to the board, or go through complex and archaic project standards when they choose to cause cyber mayhem – needless to say, the more agile side will win,” he said.
 
Asked if there is too much reliance on technology than on people and processes, Singh said: “There is way too much reliance on technology. In attack after attack, the human factor turns out to be the weakest link. Right next to it is process failure, or lack of any process.
 
“Where there are processes they are so complex so that they are not followed.  Technology is key and I am a firm believer in innovation through technology but you have to ensure that you help your employees, most of whom are “digital or cyber migrants” by teaching them how to protect their own cyber space.”

FacebookTweetLinkedIn
ShareTweetShare
Previous Post

Open source – safe or not?

Next Post

Snowden calls NSA surveillance “databases of ruin”

Recent News

How to Succeed As a New Chief Information Security Officer (CISO)

March 28, 2023

The Importance of Data Security and Privacy for Individuals and Businesses in the Digital Age

March 28, 2023
penetration testing

Cymulate’s 2022 Cybersecurity Effectiveness Report reveals that organizations are leaving common attack paths exposed

March 28, 2023
Synopsys discover new vulnerability in Pluck Content Management System

Synopsys discover new vulnerability in Pluck Content Management System

March 24, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information