• Skip to main content
  • Skip to secondary menu
  • Skip to primary sidebar
  • Skip to footer
  • Articles
  • News
  • Events
  • Advertize
  • Jobs
  • Courses
  • Contact
  • (0)
  • LoginRegister
    • Facebook
    • LinkedIn
    • RSS
      Articles
      News
      Events
      Job Posts
    • Twitter
Datafloq

Datafloq

Data and Technology Insights

  • Categories
    • Big Data
    • Blockchain
    • Cloud
    • Internet Of Things
    • Metaverse
    • Robotics
    • Cybersecurity
    • Startups
    • Strategy
    • Technical
  • Big Data
  • Blockchain
  • Cloud
  • Metaverse
  • Internet Of Things
  • Robotics
  • Cybersecurity
  • Startups
  • Strategy
  • Technical

A Starter Kit for Solving the Cyber Security Problem

Judy Selby / 4 min read.
July 1, 2016
Datafloq AI Score
×

Datafloq AI Score: 86.33

Datafloq enables anyone to contribute articles, but we value high-quality content. This means that we do not accept SEO link building content, spammy articles, clickbait, articles written by bots and especially not misinformation. Therefore, we have developed an AI, built using multiple built open-source and proprietary tools to instantly define whether an article is written by a human or a bot and determine the level of bias, objectivity, whether it is fact-based or not, sentiment and overall quality.

Articles published on Datafloq need to have a minimum AI score of 60% and we provide this graph to give more detailed information on how we rate this article. Please note that this is a work in progress and if you have any suggestions, feel free to contact us.

floq.to/Bt8o0

Ownership of a companys cybersecurity is akin to an issue like climate change or eco-preservation: Its a concern that touches everyone. For cybersecurity, however, universal ownership may not be the best approach to ensure accountability.

Technology is an integral part of the corporate environment, but the responsibility of protecting that interconnectivity doesnt always fit into neatly defined departments. Its everyonesand no onesjob until accountability is established. To do so, a company should select a leader with cybersecurity as her mission.

Its a question that was raised in a recent webinar, From Ashley Madison to the eBay Hack: Cybersecurity Best Practiceswhen it comes to leading the charge on cybersecurity, whos the right person for the job?

A Fearless Leader

The answer, not surprisingly, isnt simple. It depends on the companys size and structure. In a larger company, the role is often filled by a c-suite executive, such as chief privacy officer or chief information security officer (CISO), a board member, or general counsel.


Interested in what the future will bring? Download our 2023 Technology Trends eBook for free.

Consent

It doesnt necessarily matter which leader claims ownershiponly that someone does, and that the individual responsible seeks appropriate expertise to understand the technical complexities and operational issues at a sufficient level to make sound decisions. Whats most important is that she has the characteristics required for success:

  • True advocacy. The individual should be an effective advocate, publicly supported by corporate leadership. She must be passionate about her mission and eager to keep abreast of evolving threats and best practices.
  • Adequate resources. A leader in cybersecurity must be empowered to effect policy changes that manage the risk of a data breach. Having the power of the purse is crucial for obtaining external resources if necessary, as third-party objectivity can play an important role in building a credible and effective security program.
  • Appropriate authority. A cybersecurity leader must have the authority to mandate compliance; implement best practices and training programs; oversee information governance; manage vendor information security risk across the organization; assist in the procurement of cyberinsurance; and oversee incident response plans. Its a tall order. Sufficient authority and budget are critical to success, as is access to and collaboration with department heads across the organization.
  • Collaboration skills. Another must? Savvy relationship building. Cybersecurity work involves close collaboration with legal, human resources, marketing, accounting, information technology, and physical security departments, as well as the chief financial officer, chief information officer, office administration, and a companys social media users.

Cybersecurity Starter Kit

Once a leader has been tapped, there are a few basic best practices she can initiate immediately to get a companys cyber house in order.

  • Commission a Third-Party Assessment: A neutral party can benchmark an organization against industry standards and practices and provide a prioritized list of recommended actions. The recommendations can then be evaluated against the companys risk profile and budget to develop the action plan for the next 6 and 12 months. Not using an outside expert may expose a company to the risk of not knowing what you dont know.
  • Develop a Security Event Response Plan: A data breach can occur in any department across the company, and the early warning signs can be spotted by any employee. An incident response plan that is contained within IT misses the rest of the organization. But a plan that engages all departments and considers all exposure points, even those outside of the IT department, is far more effective in preventing, identifying, reporting, and containing a security event. A company that does not have an incident response plan that is practiced and current needs one immediately, and developing or updating this plan can be a mechanism for say, a new CISO, to collaborate with departments across the organization.
  • Review Security and Privacy Training: New threats evolve, and standards for prevention and detection should mature accordingly. As this occurs, training materials should be refreshed so that employees can properly protect their data and use the most secure workflows. A cybersecurity leader will also want to review the training program to ensure it is not an online, click-through-the-slides-once-a-year-and-check-the-box-that-you-met-the-requirement type training. Todays training is delivered point-in-time, periodically throughout the year and it is tailored to the job function of the employee receiving the information.

It Takes a Village

A leader is vital to tackle the cybersecurity issue. But truly, every employee has a role to play in cybersecurity, like staying up to date with training courses, remaining aware of new threats and reporting the first signs of a threat.

Categories: Cybersecurity
Tags: Big Data, big data security, collaboration, cyber, hackers, hacking, security

About Judy Selby

I co-chair BakerHostetler's Information Governance Team, founded the eDiscovery & Technology Management Team and counsel clients on ways to avoid information-related liability. I handle cutting edge privacy, data breach, information governance, cyber insurance and insurance coverage matters.

I frequently speak and write about information-related strategies and best practices. I have successfully completed a course on Tackling the Challenges of Big Data with the Massachusetts Institute of Technology (MIT), Professional Education and co-chair the Claims and Litigation Management Alliance (CLM) Cyber Liability Committee. I am a member of the ABA Big Data Committee and the Sedona Conference Data Security and Privacy Liability Working Group 11.

Primary Sidebar

E-mail Newsletter

Sign up to receive email updates daily and to hear what's going on with us!

Publish
AN Article
Submit
a press release
List
AN Event
Create
A Job Post
Host your website with Managed WordPress for $1.00/mo with GoDaddy!

Related Articles

The Advantages of IT Staff Augmentation Over Traditional Hiring

May 4, 2023 By Mukesh Ram

The State of Digital Asset Management in 2023

May 3, 2023 By pimcoremkt

Test Data Management – Implementation Challenges and Tools Available

May 1, 2023 By yash.mehta262

Related Jobs

  • Software Engineer | South Yorkshire, GB - February 07, 2023
  • Software Engineer with C# .net Investment House | London, GB - February 07, 2023
  • Senior Java Developer | London, GB - February 07, 2023
  • Software Engineer – Growing Digital Media Company | London, GB - February 07, 2023
  • LBG Returners – Senior Data Analyst | Chester Moor, GB - February 07, 2023
More Jobs

Tags

AI Amazon analysis analytics app application Artificial Intelligence BI Big Data business China Cloud Companies company costs crypto customers Data design development digital environment experience future Google+ government information learning machine learning market mobile Musk news Other public research sales security share social social media software strategy technology twitter

Related Events

  • 6th Middle East Banking AI & Analytics Summit 2023 | Riyadh, Saudi Arabia - May 10, 2023
  • Data Science Salon NYC: AI & Machine Learning in Finance & Technology | The Theater Center - December 7, 2022
  • Big Data LDN 2023 | Olympia London - September 20, 2023
More events

Related Online Courses

  • Oracle Cloud Data Management Foundations Workshop
  • Data Science at Scale
  • Statistics with Python
More courses

Footer


Datafloq is the one-stop source for big data, blockchain and artificial intelligence. We offer information, insights and opportunities to drive innovation with emerging technologies.

  • Facebook
  • LinkedIn
  • RSS
  • Twitter

Recent

  • 5 Reasons Why Modern Data Integration Gives You a Competitive Advantage
  • 5 Most Common Database Structures for Small Businesses
  • 6 Ways to Reduce IT Costs Through Observability
  • How is Big Data Analytics Used in Business? These 5 Use Cases Share Valuable Insights
  • How Realistic Are Self-Driving Cars?

Search

Tags

AI Amazon analysis analytics app application Artificial Intelligence BI Big Data business China Cloud Companies company costs crypto customers Data design development digital environment experience future Google+ government information learning machine learning market mobile Musk news Other public research sales security share social social media software strategy technology twitter

Copyright © 2023 Datafloq
HTML Sitemap| Privacy| Terms| Cookies

  • Facebook
  • Twitter
  • LinkedIn
  • WhatsApp

In order to optimize the website and to continuously improve Datafloq, we use cookies. For more information click here.

Dear visitor,
Thank you for visiting Datafloq. If you find our content interesting, please subscribe to our weekly newsletter:

Did you know that you can publish job posts for free on Datafloq? You can start immediately and find the best candidates for free! Click here to get started.

Not Now Subscribe

Thanks for visiting Datafloq
If you enjoyed our content on emerging technologies, why not subscribe to our weekly newsletter to receive the latest news straight into your mailbox?

Subscribe

No thanks

Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Necessary Cookies

Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.

If you disable this cookie, we will not be able to save your preferences. This means that every time you visit this website you will need to enable or disable cookies again.

Marketing cookies

This website uses Google Analytics to collect anonymous information such as the number of visitors to the site, and the most popular pages.

Keeping this cookie enabled helps us to improve our website.

Please enable Strictly Necessary Cookies first so that we can save your preferences!