Page 20 - Publication6
P. 20
information security decision making should be based on efficiency, while improving collaboration among business,
prioritized, actionable insight derived from the data. security, and IT operations.
“To achieve this, This enables security efforts to be measured and made
tangible (e.g., time to resolution, investment into security
big security data operations personnel, purchases of additional security
tools).
needs to be By leveraging these five cyber security building blocks,
organizations can reduce risk, reduce costs, improve
correlated with its response readiness, and increase risk-posture visibility.
business criticality However, without the commitment of management and
board of directors to provide adequate resources for risk
or risk to the management, organizations� cyber security posture won�t
significantly improve. The current climate is ripe for
implementing a transformational approach to security.
organization”
About the Author:
To achieve this, big security data needs to be correlated
Torsten George is Vice President of Worldwide Marketing
with its business criticality or risk to the organization.
and Products at big data risk management software vendor
Without a risk-based approach to security, organizations
Agiliance. Torsten has more than 20 years of global
can waste valuable IT resources mitigating vulnerabilities
information security experience. He is a frequent speaker on
that in reality pose little or no threat to the business.
compliance and security risk management strategies
Furthermore, big security data needs to be filtered to just worldwide and regularly provides commentary and byline
the information that is relevant to specific stakeholders� articles for media outlets, covering topics such as data
roles and responsibilities. Not everyone has the same needs breaches, incident response best practices, and cyber security
and objectives when it comes to leveraging big data. strategies. Torsten has held executive level positions with
ActivIdentity (now part of HID® Global, an ASSA ABLOY™
Group brand), Digital Link, and Everdream Corporation
(now part of Dell). He holds a Doctorate in Economics and
5. Closed-Loop Remediation
a Master of Business Administration degree in B2B-
Lastly, closed-loop, risk-based remediation leverages Marketing and Business Strategy.
subject matter experts within business units to define a risk
catalog and risk tolerance. This process entails asset
classification as outlined under �Data Integrity� to define
business criticality, continuous scoring to enable risk-based
prioritization, and closed-loop tracking and measurement.
By establishing a continuous review loop of existing assets,
people, processes, potential risks, and possible threats,
organizations can dramatically increase operational
CYBER DEFENSE MAGAZINE - ANNUAL EDITION 3