5 principles of selling security initiatives to executives
- 11 January, 2012 09:18
In the world of data leaks and cybercrime, why is it that selling information security is considered a hard task? Is it because information security is pitched as a tool—buy software and it will fix everything—or is there a lack of understanding about what a healthy information security posture will achieve for an organisation.
Security vendors make the rounds trying to impress executives with some of the latest technology. Once implemented it solves all an organisation’s information security problems — well not really. Software tools and technology can only go so far, and automation of a specific capability is often just a point solution for a niche problem.
This creates a never-ending saga: ‘we have a security problem’, ‘we need to buy a tool’, ‘CIO/CFO/CEO gives the security team more money’. This approach has a limited life, implementing security tools doesn’t improve the security posture of the organisation, and over time, executives tend to resist every demand that come from security.
Most of us have lived through the pain of SAR-BOX—what a killer it was. Audit and security was king, which left executives exhausted from spending on soap opera security projects, the never-ending issues were a giant black hole.
Then the economy bombed out. Money for security became scarce and every dollar had to be justified. Fear, uncertainty and doubt (FUD) factors which had worked for the last decade, suddenly became obsolete. Security was being asked to be justify its spending and executives started asking questions about its business impact and effectiveness.
As a result, experience has taught us that these questions can be answered by following five principles:
- Align spend to your organisation’s Information Security Management System (ISMS) or Security Strategy and Roadmap
- Align security spend to compliance issues reported and recorded.
- Show how each dollar spent on security will address existing business risk and help improve the organisations operating risk posture.
- Standardise and consolidate tooling capability such that technology is fit for purpose and fit for use.
- Demonstrate a return on security investment (ROSI) through metrics either qualitative or quantitative.
These principles will help provide context to security spending, it can be justified. If it is decided that budget is not available, as a security professional you have responsibly informed your colleagues about the risk they have accepted by not implementing the proposed measures, they can make an informed decision based on facts and not FUD.
Sell security to executives as a measure to manage organisational and operational risk with clear metrics and finite timelines. Like anything, the more you do it the easier it becomes.
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
Why change management doesn’t work
Larry Page wants to see your medical records
Dual-Persona Smartphones Not a BYOD Panacea
After two-year hiatus, EFF accepts bitcoin donations again
CIOs struggle to deliver timely mobile business apps: survey
NetApp FAS6240 Clustered SAN Champion of Champions
Storage systems today must match agility with diversified I/O performance to satisfy an enterprise’s changing needs. In their review, Silverton Consulting ranks the NetApp FAS6240 Clustered SAN, as an Enterprise OLTP “Champion of Champions.” Read the results of their benchmark testing and the features that impressed them the most.
Spear-Phishing Email: Most Favored APT Attack Bait
This research paper presents findings on APT-related spear phishing from February to September 2012. We analysed APT-related spear-phishing emails collected throughout this period to understand and mitigate attacks. The information we gathered not only allowed us to obtain specific details on spear phishing but also on targeted attacks. We found, for instance, that 91% of targeted attacks involve spear-phishing emails, reinforcing the belief that spear phishing is a primary means by which APT attackers infiltrate target networks.
The Foundation for Cloud Management
For businesses looking to provide real-time business solutions to employees and customers alike, you need to have a comprehensive network management strategy. The network is the foundation of all successful cloud services; it must be robust to meet traffic, efficiency, and performance demands. Download today the four steps to get your network operations cloud-ready.