Critical.
Authoritative.
Strategic.
Subscribe to CIO Magazine »

How CIOs Are Making Security an Enterprise Necessity

So, a guy walks up to another guy who is clapping. The first guy asks, "Why are you clapping?" The second one answers, "To keep the alligators away." Confused, the first guy says, "But there are no alligators around here." And the second says, "See? It's working!"

Such is the situation that many CIOs find themselves in when selling IT security to the executive committee. "When the CIO says, 'I'd like to spend this amount on security,' it's rarely, 'Are you sure you're spending enough?'" says Steve Rubinow, CIO of FXall, an electronic foreign exchange platform. "Instead it's, 'We haven't had any problems; maybe you're spending too much!'"

The ROI Paradox. Perhaps the clearest aspect of the IT security paradox is this: "There is no easy ROI on security." And, says Rubinow, you cannot guarantee that your systems are 100 percent secure. Plus, security threats can be subtle, with countries targeting intellectual property, not customer data.

To continue reading, register here to become an Insider . You'll get free access to premium content from CIO, Computerworld, CSO, InfoWorld, and Network World. See more Insider content or sign in.

Register or Login to continue

This article is only available for subscribers. Sign up now for free and get free access to premium content from ARN, CIO, CMO, and Computerworld.

Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.

More about: CSO
Comments are now closed.
Related Coverage
Related Whitepapers
Latest Stories
Community Comments
Tags: freemium, Technology Topics | Security, alignment, information security, security, Technology Topics, CIO
Latest Blog Posts
Whitepapers
  • Software Defined Protection - The Enterprise Security Blueprint
    In a world with high-demanding IT infrastructures and networks, where perimeters are no longer well defined and where threats grow more intelligent every day, we need to define the right way to protect enterprises in the ever-changing threat landscape. Download today to define your security blueprint.
    Learn more »
  • Facebook Graph Search POV
    A description and analysis of Facebook Social Graph, monetization opportunities and its value to businesses.
    Learn more »
  • Migrating from BlackBerry? See Our Trusted Method.
    Are your business leaders demanding a migration plan from BlackBerry? Let the mobile experts at Good help you migrate without migraines. Our Professional Services team has deep experience supporting Fortune 500 organizations through the transition; read this sample planning chart and see our trusted method.
    Learn more »
All whitepapers
rhs_login_lockGet exclusive access to Invitation only events CIO, reports & analysis.
Salary Calculator

Supplied by

View the full Peoplebank ICT Salary & Employment Index


Computerworld
ARN
Techworld
CMO