Slow Down and LEAD…So That You Can MANAGE

By Eric Noonan • January 14, 2013

…that’s my advice for managers and CISO’s who find themselves on the hamster wheel of incident response and day to day operations. It’s easy to get locked into a permanent schedule of daily meetings punctuated by operational crisis and mistakenly believe that security is different from anything else in your business and can’t be managed. Of course, it can, but like anything worth doing (dieting and exercise come to mind), it’s hard and results take time to materialize. To do it you have to lead so that you can manage.

CISO’s have to set the strategic direction for the organization and define success criteria that can be measured and shared with the business. One way to change the pace of your organization from frantic to controlled chaos, with a goal of getting to the point where you manage security like a business unit, is to define and implement a process for collecting, analyzing and reporting metrics. Take an incident response as an example:

How many incidents did you have this month?

Where were they (geography)?

What business units were impacted the most?

Did you lose any data?

On average how long did it take you to remediate an incident?

Is that better or worse than last month? Why?

By collecting and analyzing the data you force the organization to slow down and start analyzing what’s working and what’s not. Which tools are performing the best? Which business units need more focused attention because they are more often targeted? Is the peanut butter spread approach to security working or does it make sense to better focus your resources? If you are not taking the time to collect and analyze the data you will never know.

If you don’t lead, you will never be able to manage.

Cybersheath Blog

3 Reasons Why You Need a Privileged Access Risk Assessment

A privileged account is one used by administrators to log in to servers, networks, firewalls, databases, applications, cloud services and other systems used by your organization. These accounts give enhanced permissions that allow the privileged user to access sensitive data or modify key system functions, among other things. You can…

Incident Response – Learning the Lesson of Lessons Learned

“Those who do not learn from history are condemned to repeat it.” Over the years, variations of this famous quote have been spoken by everyone from philosophers to world leaders. The message — that we must learn from our mistakes or continue to repeat them — is also highly relevant…

What is DFARS 252.204-7012 and NIST SP 800-171?

With the Department of Defense (DoD) promising the release of an update to NIST Special Publication 800-171, it is imperative defense contractors understand what DFARS 252.204-7012 and NIST SP 800-171 Clause is and how noncompliance with the Clause will impact their business.  Compliance is mandatory for contractors doing business with…

Our Trusted Partners

Cyberark McAfee Thycotic RSA Tenable Alien Vault Alert Logic Trace Security