123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> System-Network-Administration >> View Article

Communication Is Key To Effective Enterprise Security

Profile Picture
By Author: fiona
Total Articles: 191
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

Ever wonder what approach information security managers should take to ensure their a Exams organizations IT infrastructures are defended from all kinds of threats? Well, ISACA has just released a list of six crucial facets of a successful IT security strategy in a report based on a global survey of executives, senior management, information security managers and staff, research directors and consultants. Surprisingly, none of these recommendations are especially technical in nature.

The underlying theme with all of these is more effective communication on the part of IT security managers, said Sharon OBryan, CISA, president and CEO of OBryan Advisory Services Inc. and author of ISACA report.Certainly, one of the underlying themes through this project was the need for drastic change in the approach to educating the information security manager,she said.One of the realizations that came through was there's a gap in skills, everything from knowing how to manage complex budgets to developing real business cases.

Perhaps we are not doing the job we need to be doing to learn how ...
... to communicate with those executives,she added.Heretofore, information security managers have continued to get their continuing education in the area of information security. It's time for those managers to start letting go of some of the technical-skills maintenance they've been pursuing and really start pursuing what I refer to as MBA-type skills. People have to recognize that after years of not getting the message through, you've got to take responsibility Network+ certification for effective communication. The executives are not going to get it until we know how to effectively communicate in business terms.

In addition to ascertaining that IT security managers needed enhanced communication skills, the report delineated a few recommendations on how they can improve their capabilities in this area.Number one, they have got to get a mentor within their organization from a critical business area and actively seek to understand the business and what the recommendations are for pursuing outside training to learn more about the business,OBryan said.That ties into one of the other recommendations, and that's for information security managers to look more into industry training. For example, in the financial services industry, it would be bank administration.

Speaking of finance, another suggestion OBryan offered was for information security managers to familiarize themselves with budgetary issues and concerns.I think information security managers need to really beef up their skills in finance,OBryan said.In order to really participate in executive-level or senior management meetings, you have to understand what's going on in the financial reports. There's so much information in the annual reports, and it's amazing how many information security managers either don't read those reports or don't know how to decipher that information.

Finally, she said the information security industry needs to accept that formal training in communications and other soft skills was a necessity. This includes a regimen that teaches them how to extract relevant data from information security operations and translate it into the parlance of high-level executives and managers.We, as an industry, need to figure out how we are going to educate information security managers in presenting business cases at the executive level,OBryan said.Some organization needs to step up and create it. How do you create a program that's going to teach the general skills at a detailed enough level to make the person effective when they leave the training and also cover the points that are critical to the industry? This is not something you get from a 45-minute session at a conference. This is something takes MCSE exams a roll the sleeves up and dig into it attitude.

Total Views: 360Word Count: 593See All articles From Author

Add Comment

System/Network Administration Articles

1. Fiber Fused Biconical Taper Systems And Fiber Cable Cutting Machine Potential
Author: Ryan

2. Understanding Polarization Maintaining Fiber Rotation Systems And Their Applications
Author: Ryan

3. Cat6a Patch Cable: The Best Preference For Comprehensive Cabling
Author: Ryan

4. A Brief Idea About The Mtp/mpo Cables And Their Use
Author: Ryan

5. 5 Reasons Why A Smart Bus Ticketing System Is The Future Of Public Transport
Author: Limon

6. How To Implement Technology In Your Inbound Call Center?
Author: DialDesk

7. How To Choose An Enterprise Help Desk It Support Company
Author: Entrust Network Services

8. Cost-effective Network Solutions For Offices In Singapore
Author: Entrust Network Services

9. Choosing Between Uv Light And Heat Ovens For Superior Performance
Author: James

10. The Right Tools And The Right Radius Are Vital In A Fiber Optic Polishing Process
Author: James

11. Lc And Sc Connectors Explained: Which Fiber Connection Is Right For You?
Author: James

12. A Closer Look At Armored Fiber Patch Cables
Author: James

13. The Essential Guide To Fiber Connectors: Sc, Fc, Lc, And St Explained
Author: Ryan

14. Wireless Network Setup Solutions For Offices By Entrust Network
Author: Entrust Network Services

15. Pcb Manufacturing: Understanding The Burn-in Test Process
Author: Ryan

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: