Getting Started

Getting Started

Analyzing other dimensions about your security program tells you things that just looking at effectiveness alone does not. Don't get me wrong -- effectiveness is a good starting point. If you don't understand whether your countermeasures are appropriate and working well, you've got some fairly sizable fish to fry.

However, if you want to take the next step and ensure that you're a responsible steward of your organization's resources, then stopping there just doesn't cut it. Why? Because governance, at its core, is about making the best use of resources to advance the organization's mission optimally. How can you do that if you don't understand the efficiency, resilience or maturity of the security measures you have in place?

The question for security executives therefore becomes how you can understand other dimensions of security systematically and holistically. There are a few ways to get started. One approach starts with an objective stock-taking of countermeasures according to an economic or maturity point of view.

Maturity is straightforward -- systematically work through and evaluate critically how each security mechanism you have in place stacks up along the maturity spectrum. The important part is to be as objective as possible; if you are challenged in being objective, maybe bring in an unbiased third party, such as an audit firm or security consultant, to help with this evaluation.

An economic viewpoint is a bit more involved, but still not rocket science. Start by understanding what it costs on an annual basis to operate the countermeasures you have in place, both in soft costs (such as staff time and human-power) and in hard dollars (costs like licensing costs for software, or maintenance costs paid to vendors or service providers).

It's important that you not try to boil the ocean at first. Even if your financial calculation model isn't perfect, scale is more important than pinpoint accuracy out of the gate. Why? Because each mechanism you can understand in this way allows you to evaluate security mechanisms relative to each other.

The more you can evaluate, the more inefficiencies you can find, which will result in better decisions about future investments. Keep in mind that you can improve the accuracy of your models down the road as you start to see the benefits of taking this type of approach.


To view or add a comment, sign in

More articles by Leah Freiman

  • Chrome users panic as new scam spreads

    During the previous quarter, fake Chrome notifications urging users to dial a tech support number have grown…

  • What Kills Over Half of Small Businesses within Six Months?

    Security breaches. Cybercrime.

  • How To Keep Your Mobile Devices Safe

    Increased productivity and constant collaboration are two of the main reasons why businesses have integrated a mobile…

  • 5 Ways To Protect Your IoT Devices

    Just a few years ago, smart appliances seemed like novelty products for rich business owners. Now, the Internet of…

  • Microsoft Enhances Workplace Analytics

    Microsoft’s Workplace Analytics is a handy tool for managers who would like to assess their employees’ performance…

  • I Need Your Help

    Hi, I have a small favor to ask that in the end will benefit you. But first, let me explain what’s led up to this… Over…

  • 6 tips to get the most out of Office 365

    Microsoft’s Office 365 comes with a broad range of tools that will make you and your colleagues more productive. It has…

  • Three Ways to Keep Your Business More Secure

    Cybercrime is a HUGE problem. Data from last year tells us that there have been over 317 million new instances of…

  • Thank You!

    This post is a simple THANK YOU to @smartbookscorp for all they do for our company. Simple accounting absolutely…

Others also viewed

Explore content categories