El Diario del CISO (The CISO Journal) Volumen 7 2018 | Page 4
Influencers
Dottie Schindlinger,
VP/Governance Technology Evangelist
Five Questions on Board-Level Cybersecurity Considerations
ISACA Now: How do board directors and executive leaders go about
ensuring hackers don’t consider their organizations to be low-
hanging fruit?
Board members and executive leaders of organizations are
ultimately responsible for ensuring the long-term health of their
organizations – and this responsibility extends to mitigating cyber
risk. That doesn’t mean they have to be deeply involved in the day-
to-day operations of cybersecurity programs, but they can’t be
complacent.
The simplest thing directors can do to mitigate cyber risk is to ask
questions and hold themselves to a higher standard. First, boards
should ensure their organizations are providing the right set of tools
to ensure the board’s communications are kept secure – for
example, moving away from email in favor of a more holistic
“Enterprise Governance Management” solution.
firewall or perimeters are simply a way of separating things so you
can organize them better. An internet firewall is an organizing
principle between “stuff that’s not your problem” (the internet) and
“stuff that’s your problem” (your network).
The complete article is here
George Campbell
Emeritus Faculty, Security Executive Council
Is it Time for a Corporate Security Maturity Assessment?
Over the past few years, the Security Executive Council (SEC)
has been examining a variety of applications to assist in the
implementation of operational excellence (OpEx) in security
program management. Below, we address the potential
benefits of creating a Capability Maturity Model (CMM) as an
enabling process in OpEx. As an OpEx enabler, business
process maturity assessments have been around for a number
of years1 in support of process transformation efforts. As tools,
they are useful models because they seek to provide
straightforward results that are simple to understand and direct
in terms of where to focus on measurable improvements.
The complete article is here
The complete article is here
Marcus J. Ranum
Security Consultant
Perimeters Aren’t Dead – They’re Valuable
Since I first began building internet firewalls in the late 1980s, I have
periodically encountered claims that “the perimeter is dead” or
“firewalls don’t work.” These claims are rather obviously wrong: your
4