Page 54 - index
P. 54







no controls or accountability on their use. This can lead to an accidental breach due to misuse
or breach escalation by a deliberate external or internal attack.




Keep the conversation going. IT security needs to be included at a strategic level in the
steering of the organization. Many companies are already adopting this mentality by changing
their internal reporting structure. The CISO will now often report directly to the CEO or CFO
rather than the CIO, giving IT security a seat at the senior management table with direct access
to executive decision makers and budget. This is especially important to ensure appropriate IT
security staffing, training, technology and best practices are implemented.

The price of a data breach is simply too high to ignore. Organizations who fail to make data
security a priority across the entire line of business risk losing revenue, reputation, customer
trust and more.




About the author

Jonathan Cogley is the CEO of Thycotic – a Washington, D.C.-based provider of privileged
account management tools. Jonathan has a software engineering background and frequently
speaks at IT Security industry events around the world.









































! " $
! # ! "
   49   50   51   52   53   54   55   56   57   58   59