Alternative Search Engine

Security Think Tank: Security governance key to outcomes-based approach

https://www.computerweekly.com/opinion/Security-Think-Tank-Security-governance-key-to-outcomes-based-approach
See More From: computerweekly.com   ( Internet & Websites )

Oct 1, 2018 3:30 AM 6+ mon ago

Security Think Tank: Security governance key to outcomes-based approach

Having a tick-box approach to security is not necessarily a bad thing; it at least demonstrates a structure to organisational security. However, a tick-box approach is certainly a significant contributor to the situation many organisations find themselves in today: myriad security products purchased to address specific identified issues.

Some of these products have not even been deployed, instead becoming shelf-ware, maybe because there are insufficient staff with the necessary skills and expertise to implement and support, or perhaps because the purchase box was ticked with no follow-up on deployment.

Everyone now knows security is important. But the view still persists among non-security professionals that it is all about the technology; individuals (as workers and consumers) don't always practise secure behaviour.

This is often a function of security being approached as a tick-box exercise - have we delivered General Data Protection ...

Read More

Security Think Tank: Enable outcomes-based security in software development

computerweekly.com     6+ mon ago

Front-line operational security will always require a tick box element to ensure everyone is synchronised and singing from the same cyber security hymn sheet. Those on the front line cannot afford to ...

Security Think Tank: C-suite needs to drive outcomes-based security

computerweekly.com     6+ mon ago

Everywhere you look, there are articles saying that security is a c-suite issue. Sadly, it seems the only people who do not realise that are members of the c-suite. The upper echelon of businesses nee...

Security Think Tank: A risk-based approach to security outsourcing

computerweekly.com     8+ mon ago

...

Security Think Tank: A three-pronged approach to application security

computerweekly.com     5+ mon ago

In October 2018, an article in Computer Weekly noted that "Most organisations (67%) believe hackers can still penetrate their network and 89% say they have had an application layer attack in the past ...

Security Think Tank: Approach UTM with caution

computerweekly.com     2+ mon ago

Security Think Tank: Approach UTM with caution How can organisations best use unified threat management tools to help stem the tide of data breaches? Share thi...

Security Think Tank: Invest in proactive approach to security and digital risk

computerweekly.com     1+ mon ago

What should be the key cyber security risk indicator for any business? Share this item with your network: Ovum Instea...

Security Think Tank: Creative thinking key to meeting emerging security challenges

computerweekly.com     3+ mon ago

By submitting my Email address I confirm that I have read and accepted the Terms of Use and Declaration of Consent. Other developments, such as cloud computing, have hastened the displacement of netw...

Security Think Tank: Adopt a proactive approach to software vulnerabilities

computerweekly.com     7+ mon ago

This email address doesn t appear to be valid. This email address is already registered. Please login. ...

Security Think Tank: Gap, risk and business impact analysis key to application security

computerweekly.com     5+ mon ago

While interface, usability and user experience are important factors, developers must follow a "White Book" on coding that considers security measures such as where logs are kept, how access control i...

Security Think Tank: Key considerations for determining cyber risk

computerweekly.com     1+ mon ago

...

Security Think Tank: UTM a key part of a well-rounded security strategy

computerweekly.com     2+ mon ago

Security Think Tank: UTM a key part of a well-rounded security strategy How can organisations best use unified threat management tools to help stem the tide of data breache...

Security Think Tank: Align security strategy to business objectives

computerweekly.com     4+ mon ago

Security Think Tank: Align security strategy to business objectives At the close of 2018, we asked CW Security Think Tank contributors to name one thing predicted for 2018 ...

Security Think Tank: Situational awareness underpins effective security

computerweekly.com     4+ mon ago

Security Think Tank: Situational awareness underpins effective security As attackers begin to use multiple command and control systems to communicate with backdoors and oth...

Security Think Tank: Outsource security operations, not control

computerweekly.com     8+ mon ago

This email address doesn t appear to be valid. This email address is already registered. Please login. ...

Security Think Tank: Prevention and detection key to disrupting malware comms

computerweekly.com     4+ mon ago

By submitting my Email address I confirm that I have read and accepted the Terms of Use and Declaration of Consent. Identifying these types of attack requires a two-pronged approach of prevention and...

Security Think Tank: BC/DR plan key to cyber attack survival

computerweekly.com     1+ week ago

The world is full of dangers and some of the most deadly are those that we ourselves unwittingly encourage or allow. An example of this is believing that someone else has your back, such as your IT or...

Security Think Tank: Top things to consider in security outsourcing

computerweekly.com     8+ mon ago

Security Think Tank: Top things to consider in security outsourcing What critical security controls can be outsourced, and how do organisations SMEs in particular maintain confidence that they...

Outcomes-based security is the way forward

computerweekly.com     7+ mon ago

...

Start outcomes-based security with asset identification

computerweekly.com     6+ mon ago

For example, we were once approached to provide a basic IDS [intrusion detection system] service so an organisation could "tick the network monitoring box". It should be as cheap as possible with mini...

Security Think Tank: Focus on security before app deployment

computerweekly.com     5+ mon ago

In the rush to deploy applications, security becomes an afterthought and is largely ignored when it really matters most - during the software development process. From a purely financial point of vie...

Security Think Tank: Put collaboration on 2019 security agenda

computerweekly.com     4+ mon ago

By submitting my Email address I confirm that I have read and accepted the Terms of Use and Declaration of Consent. In the 12 years that Threat Horizon has been published, many of the predicted threa...

Security Think Tank: Many routes to UTM to boost security capabilities

computerweekly.com     2+ mon ago

Security Think Tank: Many routes to UTM to boost security capabilities How can organisations best use unified threat management tools to help stem the tide of data breaches...

Security Think Tank: Severing C&C comms is key, but complex

computerweekly.com     4+ mon ago

By submitting my Email address I confirm that I have read and accepted the Terms of Use and Declaration of Consent. To interact with a compromised system, communication channels are established betwe...

Search Builder

(Click to add to search box)
security assurance program  security governance  business outcomes  security governance programs  security controls  security governance program  security posture  security decisions  risk appetite  identity management  security risks  Other programs  security products  security tip  organisational security  vulnerability management  risk management  data management  project management  access management  purchase box  security operations  statistics show  security policy  governance program  security activities  
**Content contained on this site is provided on an “as is” basis. 4Internet, LLC makes no commitments regarding the content and does not review it, so don't assume that it's been reviewed. What you see here may not be accurate and should not be relied upon. The content does not necessarily represent the views and opinions of 4Internet, LLC. You use this service and everything you see here at your own risk. Content displayed may be subject to copyright. Content is removed on a case by case basis. To request that content be removed, contact us using the following form: Contact Us.