Ausnahme gefangen: SSL certificate problem: certificate is not yet valid ๐Ÿ“Œ Veracode CEO on the Relationship Between Security and Business Functions: Security Canโ€™t Be Effective in a Silo

๐Ÿ  Team IT Security News

TSecurity.de ist eine Online-Plattform, die sich auf die Bereitstellung von Informationen,alle 15 Minuten neuste Nachrichten, Bildungsressourcen und Dienstleistungen rund um das Thema IT-Sicherheit spezialisiert hat.
Ob es sich um aktuelle Nachrichten, Fachartikel, Blogbeitrรคge, Webinare, Tutorials, oder Tipps & Tricks handelt, TSecurity.de bietet seinen Nutzern einen umfassenden รœberblick รผber die wichtigsten Aspekte der IT-Sicherheit in einer sich stรคndig verรคndernden digitalen Welt.

16.12.2023 - TIP: Wer den Cookie Consent Banner akzeptiert, kann z.B. von Englisch nach Deutsch รผbersetzen, erst Englisch auswรคhlen dann wieder Deutsch!

Google Android Playstore Download Button fรผr Team IT Security



๐Ÿ“š Veracode CEO on the Relationship Between Security and Business Functions: Security Canโ€™t Be Effective in a Silo


๐Ÿ’ก Newskategorie: IT Security Nachrichten
๐Ÿ”— Quelle: veracode.com

Veracode CEO Sam King says that security can???t be successful, and in fact will become a blocker, if it operates in a silo. She recently sat down for a fireside chat with Mahi Dontamsetti, State Street CTRO, and Jim Routh, MassMutual CISO, to share her thoughts and observations on communicating about security to the Board๏พ‚?and the overall connection between the security function and business functions.

She notes that even though there are often designated technical experts on the Board, there is now an increased awareness around cybersecurity, even among the traditionally business-oriented members. So, it???s important to tailor messages to the business functions so that they too can understand the organizations??? risk posture. This doesn???t mean that you should try to make everyone on the Board a cybersecurity expert, but King remarks that there should be a ???baseline knowledge that all Board members have around cybersecurity.??? ๏พ‚?

Mahi Dontamsetti agrees with King that cybersecurity should be communicated to all members of the Board in an easy-to-understand manner. Dontamsetti goes on to say that sometimes it???s the non-technical experts who ask the best questions or have important insights into cybersecurity. They???re sometimes able to fill in the ???known unknowns.???

Jim Routh adds that Board members are actively seeking out cybersecurity knowledge. ???Board members today go to classes to improve their skill through NACD or other associations,??? he said. ???They're re-skilling and retooling themselves at a pretty significant pace, so that will give us more Board members with cybersecurity expertise.???

Routh also mentions the importance of level setting cybersecurity expectations with the Board. It shouldn???t be about eliminating all cybersecurity incidents because that???s unrealistic. The goal should be to ???recover quickly when you have security incidents and minimize the business impact.??? And the whole organization needs to work toward that goal. ???Every enterprise at any level of maturity today has to recognize that incident response for cybersecurity has to be a fabric for the entire enterprise. It's not just a siloed function in IT or in cybersecurity.???

How can you ensure that cybersecurity isn???t siloed? Routh recommends identifying your top 10 cybersecurity risks and making sure that they are well known throughout the company, especially with senior leaders. Resources should be allocated to the top 10 risks and projects and initiatives around those risks should be prioritized.

Not only should you come up with your top 10 cybersecurity risks, but it???s also worth identifying your top 10 business strategies. King makes the point that ???when you're looking at the top 10 of your business strategies as a company, regardless of whether you're a cybersecurity company like Veracode or you're a financial services company, or whatever industry you're in, cybersecurity has to be in that top 10.??? By making cybersecurity a top 10 business strategy, you ensure that executives and senior leaders are prioritizing risk mitigation strategies and, hopefully, integrating the strategies company-wide.

If cybersecurity is siloed, departments may try to ignore security best practices for the sake of speed. King remarks that without cybersecurity integration, you may hear a lot of, ???We're super excited about this project, but once we go to the security person there's going to be all of these different things that we have to be concerned about. And, will we be able to get it done or not????

But cybersecurity integration doesn???t have to slow down processes. If you start your project with security best practices in mind from the very beginning, there won???t be time-consuming or expensive rework down the line.

And how about obtaining cybersecurity resources and budget? Well, King explains that if cybersecurity is one of your top 10 business strategies, there won???t be arguments as to whether or not cybersecurity initiatives should be funded. Cybersecurity won???t be ???taking money??? from a different initiative if it was already determined that cybersecurity is a priority.

To learn more about communicating cybersecurity to the Board, or for tips on integrating cybersecurity best practices throughout your organization, check out the full webinar, Driving the Cybersecurity Agenda with the C-Suite and Boards.

...



๐Ÿ“Œ Veracode CEO on the Relationship Between Security and Business Functions: Security Canโ€™t Be Effective in a Silo


๐Ÿ“ˆ 109.74 Punkte

๐Ÿ“Œ Serverless Prey - Serverless Functions For Establishing Reverse Shells To Lambda, Azure Functions, And Google Cloud Functions


๐Ÿ“ˆ 36.58 Punkte

๐Ÿ“Œ Functions of Commercial Bank: Primary Functions and Secondary Functions


๐Ÿ“ˆ 36.58 Punkte

๐Ÿ“Œ Veracode Scan for VS Code: Now with Veracode Fix


๐Ÿ“ˆ 35.09 Punkte

๐Ÿ“Œ The difference between Arrow functions and Normal functions in JavaScript


๐Ÿ“ˆ 34.53 Punkte

๐Ÿ“Œ The relationship between security maturity and business enablement


๐Ÿ“ˆ 34.21 Punkte

๐Ÿ“Œ BrandPost: The Relationship Between Security Maturity and Business Enablement


๐Ÿ“ˆ 34.21 Punkte

๐Ÿ“Œ Pandemic 'improved relationship' between CIOs and other business leaders


๐Ÿ“ˆ 33.04 Punkte

๐Ÿ“Œ Avoiding the Silo: Bridging the Divide Between Security + Dev Teams - Brian Joe - PSW #699


๐Ÿ“ˆ 31.52 Punkte

๐Ÿ“Œ A strong relationship between security and engineering teams accelerates the transition to DevSecOps


๐Ÿ“ˆ 28.7 Punkte

๐Ÿ“Œ Fixing Vulnerabilities at Speed: How To Strengthen the Relationship Between Security andโ€ฆ


๐Ÿ“ˆ 28.7 Punkte

๐Ÿ“Œ Four ways to improve the relationship between security and IT


๐Ÿ“ˆ 28.7 Punkte

๐Ÿ“Œ The Strengthening Relationship Between India and Israel Will Greatly Benefit Both Parties


๐Ÿ“ˆ 27.53 Punkte

๐Ÿ“Œ Friday Squid Blogging: The Symbiotic Relationship Between the Bobtail Squid and a Particular Microbe


๐Ÿ“ˆ 27.53 Punkte

๐Ÿ“Œ Understanding the Relationship Between AI and Cybersecurity


๐Ÿ“ˆ 27.53 Punkte

๐Ÿ“Œ Understanding the Relationship Between AI and Cybersecurity


๐Ÿ“ˆ 27.53 Punkte

๐Ÿ“Œ What is the relationship between Linux and Capitalism ?


๐Ÿ“ˆ 27.53 Punkte

๐Ÿ“Œ Watch gaming rekindle the relationship between a grandfather and grandson


๐Ÿ“ˆ 27.53 Punkte

๐Ÿ“Œ The pandemic is evolving the relationship between businesses and service providers; hereโ€™s why


๐Ÿ“ˆ 27.53 Punkte

๐Ÿ“Œ Whatโ€™s the relationship between โ€œaโ€ heap and โ€œtheโ€ heap?


๐Ÿ“ˆ 27.53 Punkte

๐Ÿ“Œ Relationship between TP, MP, and AP


๐Ÿ“ˆ 27.53 Punkte

๐Ÿ“Œ The Unsettling Relationship Between Russia and Wikileaks


๐Ÿ“ˆ 27.53 Punkte

๐Ÿ“Œ Forging a Cooperative Relationship Between Intโ€™l Crim. Court and a Special Tribunal for Russian Aggression Against Ukraine


๐Ÿ“ˆ 27.53 Punkte

๐Ÿ“Œ Tim Cook touts โ€˜symbioticโ€™ relationship between Apple and China


๐Ÿ“ˆ 27.53 Punkte

๐Ÿ“Œ The dynamic relationship between AI and application development


๐Ÿ“ˆ 27.53 Punkte

๐Ÿ“Œ The Unsettling Relationship Between Russia and Wikileaks


๐Ÿ“ˆ 27.53 Punkte

๐Ÿ“Œ What is the Relationship Between Ransomware and Phishing?ย 


๐Ÿ“ˆ 27.53 Punkte

๐Ÿ“Œ An Unexpected Relationship Between Nuclear Power and Low Birth Weight


๐Ÿ“ˆ 27.53 Punkte

๐Ÿ“Œ Relationship between Price Elasticity of Demand and Total Expenditure


๐Ÿ“ˆ 27.53 Punkte

๐Ÿ“Œ The Relationship Between Edge Computing and Cloud Computing


๐Ÿ“ˆ 27.53 Punkte

๐Ÿ“Œ This AI Research from China Provides Empirical Evidence on the Relationship between Compression and Intelligence


๐Ÿ“ˆ 27.53 Punkte

๐Ÿ“Œ Apple TV+ series โ€˜Siloโ€™ Season 2 is in the can


๐Ÿ“ˆ 25.33 Punkte











matomo