Slow Down and LEAD…So That You Can MANAGE

By Eric Noonan • January 14, 2013

…that’s my advice for managers and CISO’s who find themselves on the hamster wheel of incident response and day to day operations. It’s easy to get locked into a permanent schedule of daily meetings punctuated by operational crisis and mistakenly believe that security is different from anything else in your business and can’t be managed. Of course, it can, but like anything worth doing (dieting and exercise come to mind), it’s hard and results take time to materialize. To do it you have to lead so that you can manage.

CISO’s have to set the strategic direction for the organization and define success criteria that can be measured and shared with the business. One way to change the pace of your organization from frantic to controlled chaos, with a goal of getting to the point where you manage security like a business unit, is to define and implement a process for collecting, analyzing and reporting metrics. Take an incident response as an example:

How many incidents did you have this month?

Where were they (geography)?

What business units were impacted the most?

Did you lose any data?

On average how long did it take you to remediate an incident?

Is that better or worse than last month? Why?

By collecting and analyzing the data you force the organization to slow down and start analyzing what’s working and what’s not. Which tools are performing the best? Which business units need more focused attention because they are more often targeted? Is the peanut butter spread approach to security working or does it make sense to better focus your resources? If you are not taking the time to collect and analyze the data you will never know.

If you don’t lead, you will never be able to manage.

CyberSheath Blog

Dr. Robert Spalding to Address Nation-State Attacks at CMMC Con 2021

Since the inaugural CMMC Con, we’ve seen some of the most malicious attacks on American infrastructure ever executed. The SolarWinds attack reverberated across the entire government as agencies scrambled to discover what nation-state attackers had accessed and stolen. The Colonial Pipeline, shut down by a ransomware attack, led to fuel…

CMMCEnclave: Add Versatility with a More Flexible Approach

The enclave approach to CMMC compliance is one of the most cost effective and least disruptive ways to safeguard CUI. You can maintain high-value custodial security of CUI without upending your existing processes, procedures, and people. That way, you can maintain the proper level of CMMC compliance and remain eligible…

CMMC Con 2021 Opens Registration, Reveals Theme and Speakers

CMMC compliance stands in the way of revenue for every defense contractor in the supply chain. Now that CMMC is a reality for the Defense Industrial Base (DIB), learn how contractors — primes and subs, large and small, foreign-owned — are handling the standards and requirements, as well as the…

Our Trusted Partners

Cyberark McAfee Thycotic RSA Tenable Alien Vault Alert Logic Microsoft

CMMC Con 2021 is here! Save your spot to hear the latest on CMMC from our expert speakers across the government and Defense Industrial Base.