Keeping The Barbarians Out: How CIOs Can Secure Their Department and Company

Business & Finance, Management & Leadership, Management Science
Cover of the book Keeping The Barbarians Out: How CIOs Can Secure Their Department and Company by Jim Anderson, Jim Anderson
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Jim Anderson ISBN: 9781370033027
Publisher: Jim Anderson Publication: November 22, 2016
Imprint: Smashwords Edition Language: English
Author: Jim Anderson
ISBN: 9781370033027
Publisher: Jim Anderson
Publication: November 22, 2016
Imprint: Smashwords Edition
Language: English

There are a lot of bad guys out there. For some odd reason, a lot of them seem to want to break into your company's networks and applications. As the CIO, it's your job to make sure that this does not happen. Got any thoughts on how to go about doing that?

What You'll Find Inside:
* CIO’S NEED TO LEARN HOW TO DEFEND AGAINST THE INSIDER THREAT
* WHY BYOD SPELLS DOOM FOR CIOS
* DO WE REALLY NEED TO ENCRYPT OUR CUSTOMER DATA?
* 3 WAYS TO GET YOUR COMPANY TO TAKE DIGITAL SECURITY SERIOUSLY

As much as we like to spend our time looking outwards in order to detect the next threat that our company may be facing, perhaps we're looking in the wrong direction. Just as big of a deal may be the insider threat that lurks within the company. No matter where it comes from, cybercrime is your problem to deal with.

CIOs have to deal with trends as they come and go. Right now the Bring Your Own Device To Work (BYOD) phase is in full swing and if you aren't careful could cause a lot of problems for the IT department. At the same time, it's the code that your teams create that will secure your applications. Do you know if they are writing secure code or are they leaving doors wide open?

In order to measure where the threats are coming from and how big of deal they are, CIOs need to become comfortable with measuring the level of risk that they are dealing with. A big part of measuring risk is getting information about threats from other CIOs. This can be difficult to do because CIOs really don't like to share information like this.

Since we can't always be certain that we can keep the bad guys out, we need to make sure that we've taken the needed steps to secure our networks. Should they happen to get inside of the company, we need to take extra steps to make sure that they can't get what they came for. This brings up the interesting question of whether or not we should go to the effort and expense of encrypting our customer data.

No matter what our final decision on encrypting the company's digital assets is, we still have a responsibly as CIO to make sure that the company understands the threats that it is facing and that it starts to take digital security seriously.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

There are a lot of bad guys out there. For some odd reason, a lot of them seem to want to break into your company's networks and applications. As the CIO, it's your job to make sure that this does not happen. Got any thoughts on how to go about doing that?

What You'll Find Inside:
* CIO’S NEED TO LEARN HOW TO DEFEND AGAINST THE INSIDER THREAT
* WHY BYOD SPELLS DOOM FOR CIOS
* DO WE REALLY NEED TO ENCRYPT OUR CUSTOMER DATA?
* 3 WAYS TO GET YOUR COMPANY TO TAKE DIGITAL SECURITY SERIOUSLY

As much as we like to spend our time looking outwards in order to detect the next threat that our company may be facing, perhaps we're looking in the wrong direction. Just as big of a deal may be the insider threat that lurks within the company. No matter where it comes from, cybercrime is your problem to deal with.

CIOs have to deal with trends as they come and go. Right now the Bring Your Own Device To Work (BYOD) phase is in full swing and if you aren't careful could cause a lot of problems for the IT department. At the same time, it's the code that your teams create that will secure your applications. Do you know if they are writing secure code or are they leaving doors wide open?

In order to measure where the threats are coming from and how big of deal they are, CIOs need to become comfortable with measuring the level of risk that they are dealing with. A big part of measuring risk is getting information about threats from other CIOs. This can be difficult to do because CIOs really don't like to share information like this.

Since we can't always be certain that we can keep the bad guys out, we need to make sure that we've taken the needed steps to secure our networks. Should they happen to get inside of the company, we need to take extra steps to make sure that they can't get what they came for. This brings up the interesting question of whether or not we should go to the effort and expense of encrypting our customer data.

No matter what our final decision on encrypting the company's digital assets is, we still have a responsibly as CIO to make sure that the company understands the threats that it is facing and that it starts to take digital security seriously.

More books from Jim Anderson

Cover of the book How To Show What You Mean During A Presentation: How To Use Visual Techniques To Transform A Speech Into A Memorable Event by Jim Anderson
Cover of the book What CIOs Need To Know About Working With Partners: Techniques For CIOs To Use In Order To Be Able To Successfully Work With Partners by Jim Anderson
Cover of the book IT Manager Career Secrets: Tips And Techniques That IT Managers Can Use In Order To Have A Successful Career by Jim Anderson
Cover of the book Tools Speakers Need In Order To Give The Perfect Speech by Jim Anderson
Cover of the book How IT Managers Can Use New Technology To Meet Today's IT Challenges: Technologies That IT Managers Can Use In Order to Make Their Teams More Productive by Jim Anderson
Cover of the book How A Marriage and Family Therapist Can Prepare For A Successful Negotiation: What You Need To Do BEFORE A Negotiation Starts In Order To Get The Best Possible Outcome by Jim Anderson
Cover of the book Use The Power Of Arguing To Win Your Next Negotiation: How To Develop The Skill Of Effective Arguing In A Negotiation In Order To Get The Best Possible Outcome by Jim Anderson
Cover of the book How To Heal A Broken Leg: Fast! by Jim Anderson
Cover of the book How Product Managers Can Sell More Of Their Product by Jim Anderson
Cover of the book Managing Your CIO Career: Steps That CIOs Have To Take In Order To Have A Long And Successful Career by Jim Anderson
Cover of the book Organizing A Successful Speech: How To Put Together A Speech That Will Clearly Communicate Your Message To Your Audience by Jim Anderson
Cover of the book Secrets To Organizing A Speech For Maximum Impact: How To Put together A Speech That Will Capture And Hold Your Audience's Attention by Jim Anderson
Cover of the book How CIOs Can Take Their Career To The Next Level: How CIOs Can Work With The Entire Company In Order To Be Successful by Jim Anderson
Cover of the book Getting What You Want In A Negotiation By Learning How To Signal: How To Develop The Skill Of Effective Signaling In A Negotiation In Order To Get The Best Possible Outcome by Jim Anderson
Cover of the book How A CEO Can Prepare For A Successful Negotiation: What You Need To Do Before A Negotiation Starts In Order To Get The Best Possible Outcome by Jim Anderson
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy