Page 14 - index
P. 14
Risk acceptance includes identifying suspicious internal people/factors.
Don’t underestimate internal threats. Legacy systems requiring unique security measures are
accompanied by legacy people who are resistant to change.
Possessive employees that impede proper authorizations/protocols raise a red flag. IT execs that
transfer responsibility to the cloud storage team and don’t maintain the same commitment level to
security are a detriment. Those conducting “shadow IT” initiatives are a danger…
Acknowledge risk and accept the reality of breach. Only then can an organization properly plan its
next-gen security strategy.
About The Author
Irena Mroz is the Senior Vice President of Marketing for Cryptzone, a provider
of dynamic, context-aware network, application and content security solutions.
Mroz leads the security company’s strategic direction and execution of global
marketing and communications initiatives.
With more than 20 years as a technology marketing executive, her previous
roles include senior positions at Bottomline Technologies and Create!form
International.
A graduate of Boston University’s College of Communication, she is an advocate for social
responsibility throughout her many industry and volunteer affiliations. Mroz can be reached at
[email protected], LinkedIn and at www.cryptzone.com.
14 Cyber Warnings E-Magazine – September 2015 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide