why conquering complexity is a critical component of an effective security program infosecurity...

5
1/4/2017 Why Conquering Complexity Is a Critical Component of an Effective Security Program | Infosecurity Europe Blog http://blogs.infosecurityeurope.com/whyconqueringcomplexityisacriticalcomponentofaneffectivesecurityprogram/ 1/5 Why Conquering Complexity Is a Critical Component of an Eective Security Program JANUARY 4, 2017 BY INFOSECURITY EUROPE TEAM IN EXPERT OPINION, UNCATEGORIZED. Register Visit Register to Exhibit Contact Connect with Us Infosecurity Europe Blog

Upload: dominic-vogel

Post on 23-Jan-2018

39 views

Category:

Technology


0 download

TRANSCRIPT

Page 2: Why conquering complexity is a critical component of an effective security program   infosecurity europe blog

1/4/2017 Why Conquering Complexity Is a Critical Component of an Effective Security Program | Infosecurity Europe Blog

http://blogs.infosecurityeurope.com/why­conquering­complexity­is­a­critical­component­of­an­effective­security­program/ 2/5

Dominic Vogel, Chief SecurityStrategist, Cyber.SC

An article published by ISACA

 

Security professionals tend to have apenchant for making things morecomplicated than they need to be. Butlife and our work are complicatedenough without us adding extra layersof needless complexity. When itcomes to operating an e鎧�ectiveenterprise security program, the oldadage of “complexity being the enemyof security” really does ring true.

 

Many CIOs and CISOs are guilty ofchasing the cool blinking lights ofnewer technologies and keep addingadditional technologies to an already

Categories

Best PracticeAdvice

Case Studies

Events

Events Information

ExhibitorInformation

Expert Opinion

Industry Opinion

News

ProductInformation

Uncategorized

Visitor Information

Featured ThisMonth

launch:‘IntelligentSecurity:Protect.Detect.Respond.Recover’⁄ APRIL 9, 2015

Page 3: Why conquering complexity is a critical component of an effective security program   infosecurity europe blog

1/4/2017 Why Conquering Complexity Is a Critical Component of an Effective Security Program | Infosecurity Europe Blog

http://blogs.infosecurityeurope.com/why­conquering­complexity­is­a­critical­component­of­an­effective­security­program/ 3/5

overburdened and poorly integratedsecurity stack. Many enterprisesecurity programs look like ascattered city of isolated Jenga towers.From a risk management perspective,the more complex the infrastructure,the harder it is to defend.

 

Balancing usability, security andcomplexity seems like a daunting taskat times. Trying to do so on a dailybasis costs many of us our sanity(think of Homer Simpson when hewas forced to give up beer and TV!).

 

During one of my more salientmoments, I came across a useful andapplicable metaphor that securitypros should heed when it comes tobalancing that aforementioned unholytrinity…

 

Read the full article here.

TAGGED #INFOSEC17, ADVICE, BUSINESS ADVICE,CYBERSECURITY, DATA SECURITY, INFORMATION

SECURITY, ISACA.

WhyConqueringComplexity Isa CriticalComponent ofan E鎧�ectiveSecurityProgramJANUARY 4, 2017

In TheBoardroomWith ExtenuaCEO SteveViscontiNOVEMBER 2,2016

Cylance VicePresident JohnMcClurgre⽡ects on histime workingin CyberDefenceOCTOBER 6, 2016

What are thebiggestsecuritychallengeswithin the IoTtoday?SEPTEMBER 9,2016

The CEO ofPortsys talksabout how tomanagesecurity in amorecomprehensivemannerAUGUST 19, 2016

Recent Posts

Infosecurity Europe

Page 4: Why conquering complexity is a critical component of an effective security program   infosecurity europe blog

1/4/2017 Why Conquering Complexity Is a Critical Component of an Effective Security Program | Infosecurity Europe Blog

http://blogs.infosecurityeurope.com/why­conquering­complexity­is­a­critical­component­of­an­effective­security­program/ 4/5

Leave a Comment

Comment

Name *

Email *

Infosecurity EuropeTeam

PREVIOUS:

In The BoardroomWith Extenua CEO

Steve Visconti

Your email address will not be published.Required ��elds are marked *

Page 5: Why conquering complexity is a critical component of an effective security program   infosecurity europe blog

1/4/2017 Why Conquering Complexity Is a Critical Component of an Effective Security Program | Infosecurity Europe Blog

http://blogs.infosecurityeurope.com/why­conquering­complexity­is­a­critical­component­of­an­effective­security­program/ 5/5

Website

Are you human? * 3 + = four

ERROR for site owner: Invalid domain for site key reCAPTCHA

Privacy - Terms

Post Comment

Useful Links

Log in Infosecurity Europe 2015 Infosecurity Magazine Infosecurity Global ExecutiveNetwork Sponsorship Opportunities

InfosecurityMagazine News

We are

RE®_LOGO_WHITE_300x421

logo-reed-elsevier-100x13-white

© 2013 - 2015 Reed Exhibitions Ltd | Infosecurity and Infosec are registered trademarks of Reed Exhibitions Limited.

Notify me of follow-up comments by email. Notify me of new posts by email.

ICO ‘Breached PublicData’ Several TimesSince 2013

4 January 2017

Privacy watchdogforced to investigate