123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> System-Network-Administration >> View Article

Communication Is Key To Effective Enterprise Security

Profile Picture
By Author: fiona
Total Articles: 191
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

Ever wonder what approach information security managers should take to ensure their a Exams organizations IT infrastructures are defended from all kinds of threats? Well, ISACA has just released a list of six crucial facets of a successful IT security strategy in a report based on a global survey of executives, senior management, information security managers and staff, research directors and consultants. Surprisingly, none of these recommendations are especially technical in nature.

The underlying theme with all of these is more effective communication on the part of IT security managers, said Sharon OBryan, CISA, president and CEO of OBryan Advisory Services Inc. and author of ISACA report.Certainly, one of the underlying themes through this project was the need for drastic change in the approach to educating the information security manager,she said.One of the realizations that came through was there's a gap in skills, everything from knowing how to manage complex budgets to developing real business cases.

Perhaps we are not doing the job we need to be doing to learn how ...
... to communicate with those executives,she added.Heretofore, information security managers have continued to get their continuing education in the area of information security. It's time for those managers to start letting go of some of the technical-skills maintenance they've been pursuing and really start pursuing what I refer to as MBA-type skills. People have to recognize that after years of not getting the message through, you've got to take responsibility Network+ certification for effective communication. The executives are not going to get it until we know how to effectively communicate in business terms.

In addition to ascertaining that IT security managers needed enhanced communication skills, the report delineated a few recommendations on how they can improve their capabilities in this area.Number one, they have got to get a mentor within their organization from a critical business area and actively seek to understand the business and what the recommendations are for pursuing outside training to learn more about the business,OBryan said.That ties into one of the other recommendations, and that's for information security managers to look more into industry training. For example, in the financial services industry, it would be bank administration.

Speaking of finance, another suggestion OBryan offered was for information security managers to familiarize themselves with budgetary issues and concerns.I think information security managers need to really beef up their skills in finance,OBryan said.In order to really participate in executive-level or senior management meetings, you have to understand what's going on in the financial reports. There's so much information in the annual reports, and it's amazing how many information security managers either don't read those reports or don't know how to decipher that information.

Finally, she said the information security industry needs to accept that formal training in communications and other soft skills was a necessity. This includes a regimen that teaches them how to extract relevant data from information security operations and translate it into the parlance of high-level executives and managers.We, as an industry, need to figure out how we are going to educate information security managers in presenting business cases at the executive level,OBryan said.Some organization needs to step up and create it. How do you create a program that's going to teach the general skills at a detailed enough level to make the person effective when they leave the training and also cover the points that are critical to the industry? This is not something you get from a 45-minute session at a conference. This is something takes MCSE exams a roll the sleeves up and dig into it attitude.

Total Views: 354Word Count: 593See All articles From Author

Add Comment

System/Network Administration Articles

1. Cost-effective Network Solutions For Offices In Singapore
Author: Entrust Network Services

2. Choosing Between Uv Light And Heat Ovens For Superior Performance
Author: James

3. The Right Tools And The Right Radius Are Vital In A Fiber Optic Polishing Process
Author: James

4. Lc And Sc Connectors Explained: Which Fiber Connection Is Right For You?
Author: James

5. A Closer Look At Armored Fiber Patch Cables
Author: James

6. The Essential Guide To Fiber Connectors: Sc, Fc, Lc, And St Explained
Author: Ryan

7. Wireless Network Setup Solutions For Offices By Entrust Network
Author: Entrust Network Services

8. Pcb Manufacturing: Understanding The Burn-in Test Process
Author: Ryan

9. Know About The Fiber Optic Cabling Solutions
Author: Ryan

10. Choosing The Perfect Cat6a Cable For Your 10g Networks
Author: Ryan

11. Pm Plc Splitter: Boost Efficiency Of Optical Network
Author: Ryan

12. Integrated Circuit Packaging Has Ic Substrate As Its Foundation
Author: Ryan

13. Boc Package Substrate: The Pillar Of Semiconductor Packaging
Author: Ryan

14. What Are The Leading Brands Or Manufacturers Of Growing Rack Systems?
Author: doris zhang

15. Polarization Maintaining Fiber Coupler: A Basic High Precision Fiber Sensor Component
Author: Ryan

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: