Page 68 - Cyber Warnings
P. 68
The goal is to earn the trust and partnership of the business units so they can work together to
secure the organization.
Otherwise, the security team runs the risk of being isolated and perceived as a parking ticket
collector, popping up simply to tell colleagues when they’re doing something wrong.
This does not motivate the business units from proactively reaching out to the security team with
information, and it suppresses the “if you see something, say something” approach that is
holistic to security.
Ultimately, the security team must communicate with everyone because security truly is
everyone’s job.
The Future Requires a Two-Pronged Approach
It will always be necessary for organizations to protect their infrastructure with hardened
security.
Yet with the advent of technologies such as cloud, IoT, automation, and network
programmability, it is absolutely critical that security be embedded in the fabric and information
flow of an organization.
Security staffs today require engineers with the skills and awareness to design, deploy, and
manage an operations approach to security.
By combining fortified walls with alert guards throughout the infrastructure, organizations can
have a two-pronged approach to protecting their most sensitive data.
About the Author
Tom Gilheany, product manager, CISSP, Cisco Systems
68 Cyber Warnings E-Magazine – August 2016 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide