How do you fund your security program?
Here are simple ways to get management buy-in
How do you enable the business?
Speak in terms of risk.
Show small wins
Yes, you are under attack now, your organization is under attack, your personal computer and mobile devices are under attack now. Your data is no longer secure. Your privacy may be breached.
Security is a board level discussion now. The Chief Information Security Officer sits at the heart of the response to the growing threat. They have increased budgets now to address the growing threat and to keep the IT organizations safe.
56% ORGANIZATIONS HAVE BEEN THE TARGET OF NATION-STATE CYBER ATTACK – so there is a 50% chance that your organization may be attacked
CLICK
Also, Gartner survey of Enterprise CIO’s the 5 biggest challenges that enterprise faced in Security and risk were:
Managing Risk
Reduce CAPEX
Fill Security Gaps
Optimize security gaps
Adapt to changing regulations
Key Points
Why is Processing Human Information Different?
Human Information is made up of ideas, is diverse, and has context.
Ideas don’t exactly match like data does; they have distance.
Human Information is not static – it’s dynamic and lives everywhere.
Legacy / Past techniques have all fallen short.
Average annual cost of cyber crime in 2012 to individual businesses in the U.S.
The Open Source Vulnerability Database reported 7,477 vulnerabilities in 2011, and reported 7,998 before the end of November, 2012.
More than 20 per day
Point in time review is essential, but that is today.
What about tomorrow?
Key Points
Lots of data, lots of opportunity
Data lives within and outside your company in various places and formats
Opportunity has to overcome the challenge
Using ‘systemsthinking’ toconvince mgmt they need to do something