Changing the IT culture can deliver benefits such as business/IT alignment, but it’s not easy — it must be lead from the top. IT departments know that they need to modernize, but a fundamental cultural change requires leadership from the top of the org chart, said one consultant and author. “This is not just information […]
Datamation content and product recommendations are
editorially independent. We may make money when you click on links
to our partners.
Learn More
Changing the IT culture can deliver benefits such as business/IT
alignment, but it’s not easy — it must be lead from the top.
IT departments know that they need to modernize, but a fundamental
cultural change requires leadership from the top of the org chart, said one consultant and author.
“This is not just information security,” John Pironti, president of IP Architects, told
InternetNews.com.”This is true business alignment.” Pironti will be giving a speech on the subject, called “Information Security 2.0: Transforming Information Security to Information Risk Management,” this week at the ISACA
International Conference.
“Security has to start at the top,” he said. The board of directors of the company decides where the risks lie. The IT manager becomes the Chief Information Security Officer (CISO), reporting to the CIO and also to the board.
“Most security people don’t understand risk — they understand threats,”
Pironti said. “Threats are just one input into the risk equation. Others
come from operations, strategy, and marketing.
“Where does the business find value? Most executives are more worried
about availability than security,” he added. “Organizations will sometimes
leave systems up if they’re compromised because availability wins. You don’t
need security if you can’t have availability.”
Pironti explained that he’s not arguing for less security. In some cases, less security may make sense. “If it’s marketing data that I give away at trade shows and I want people to have it, then go ahead and sniff away on the network.”
Instead, he argues for more appropriate and effective security. “I’m arguing for a meaningful analysis of security needs based on conversations, deployed in areas with a high threat likelihood and a high impact to the business if a threat occurred. The many controls now in place may not make sense.”
For example, Pironti said that many datacenters have bulletproof glass
even in non-military environments where a frontal assault on the datacenter
is not expected.
“If we have other filters, do we still need a stateful inspection firewall? It’s still required by standards. Heartland is doing end to end
encryption. Ironically, it can take away the ability to do network
protection by disabling the ability to inspect traffic. So when you
implement security, you need to think about what threat you are worrying
about.”
Pironti said that compliance standards are threat-based, not risk-based,
and can be an obstacle to changing the IT mindset. “My biggest fear is
security by compliance. It’s spending all your time thinking about an audit
and none thinking about what’s important to you. The PCI conversation is
outdated in my mind. PCI is a baseline and I think we need to move beyond
it.”
He added that the FTC’s Red Flags Rule was manipulated by lobbyists so
that the banks could meet the standard immediately.
Even Heartland, which suffered a real breach, should think about costs as
it implements stronger security. “Heartland was off the PCI lists for two
months. It was fined $7 million to $12 million. Senior business leaders know
that they can mitigate that risk with insurance. Why buy $14 million of
controls when instead you can buy less and also buy insurance?”
Article courtesy of InternetNews.com.
-
Huawei’s AI Update: Things Are Moving Faster Than We Think
FEATURE | By Rob Enderle,
December 04, 2020
-
Keeping Machine Learning Algorithms Honest in the ‘Ethics-First’ Era
ARTIFICIAL INTELLIGENCE | By Guest Author,
November 18, 2020
-
Key Trends in Chatbots and RPA
FEATURE | By Guest Author,
November 10, 2020
-
Top 10 AIOps Companies
FEATURE | By Samuel Greengard,
November 05, 2020
-
What is Text Analysis?
ARTIFICIAL INTELLIGENCE | By Guest Author,
November 02, 2020
-
How Intel’s Work With Autonomous Cars Could Redefine General Purpose AI
ARTIFICIAL INTELLIGENCE | By Rob Enderle,
October 29, 2020
-
Dell Technologies World: Weaving Together Human And Machine Interaction For AI And Robotics
ARTIFICIAL INTELLIGENCE | By Rob Enderle,
October 23, 2020
-
The Super Moderator, or How IBM Project Debater Could Save Social Media
FEATURE | By Rob Enderle,
October 16, 2020
-
Top 10 Chatbot Platforms
FEATURE | By Cynthia Harvey,
October 07, 2020
-
Finding a Career Path in AI
ARTIFICIAL INTELLIGENCE | By Guest Author,
October 05, 2020
-
CIOs Discuss the Promise of AI and Data Science
FEATURE | By Guest Author,
September 25, 2020
-
Microsoft Is Building An AI Product That Could Predict The Future
FEATURE | By Rob Enderle,
September 25, 2020
-
Top 10 Machine Learning Companies 2020
FEATURE | By Cynthia Harvey,
September 22, 2020
-
NVIDIA and ARM: Massively Changing The AI Landscape
ARTIFICIAL INTELLIGENCE | By Rob Enderle,
September 18, 2020
-
Continuous Intelligence: Expert Discussion [Video and Podcast]
ARTIFICIAL INTELLIGENCE | By James Maguire,
September 14, 2020
-
Artificial Intelligence: Governance and Ethics [Video]
ARTIFICIAL INTELLIGENCE | By James Maguire,
September 13, 2020
-
IBM Watson At The US Open: Showcasing The Power Of A Mature Enterprise-Class AI
FEATURE | By Rob Enderle,
September 11, 2020
-
Artificial Intelligence: Perception vs. Reality
FEATURE | By James Maguire,
September 09, 2020
-
Anticipating The Coming Wave Of AI Enhanced PCs
FEATURE | By Rob Enderle,
September 05, 2020
-
The Critical Nature Of IBM’s NLP (Natural Language Processing) Effort
ARTIFICIAL INTELLIGENCE | By Rob Enderle,
August 14, 2020
SEE ALL
ARTICLES