Part 7: Refocus on the Glide Path

Part 7: Refocus on the Glide Path

(Did you miss Part 1, 2, 3, 4 , 5 or 6? Click here for part 1; here for part 2; here for part 3; here for part 4; here for part 5; and here for part 6 to catch up!)

Often missing from the professionalization of Information Security debate is that of business intersection. The best-trained and certified professional will be of little use if injected into a working environment that is unconscious to need or risk. Where would the medical profession be today if it had not professionalized? What about the airline industry?

Providing businesses with trained professionals (not only in the technical aspects but also in the business aspects), combined with certification on a national or global level delivers to the business some basic assurance. A professional organizing body creating paths for the field and bringing together the brightest to help forge general directions and coverage across business verticals becomes a natural process benefiting practitioner and business alike.

However, the largest benefit comes from elevating the field into the business arena, where businesses are aware of, better understand the role of, and are able to fit Information Security into the proper level of business process. No longer would Information Security be just an IT problem, but what it actually is: a business problem. When businesses undertake Information Security like any other business risk, businesses enhance their level of security; this enhancement flows down to the products and services they deliver. When the current ad-hoc approach is exchanged with a holistic approach, it benefits the business, the industry, the consumer and the nation.

The rapid growth of technology since the birth of computers has revolutionized the world and the way both individuals and corporations leverage the Internet and computing devices. However, the rate of change has created new paradigms in business models at the same time complexity and risk acceptance has increased homogeneously.

Reliance on this multifarious cyber universe has likewise intensified and is projected to be increasingly ubiquitous as the “Internet of Things” looms on the near horizon. Yet the foundations baked into the very fabric of this creation were never designed to be secure. A central basic maxim of Information Security is that security after the fact is more costly, less effective and has a longer time to value. The current state of Information Security has borne out this truth in its very own industry.

Information Security is playing catch up at the same time it is trying to define a core in a multitude of security frameworks. As a relatively new industry, Information Security is facing challenges not unlike other new industries but it is not self-realizing its own deficiencies. Like the entry-level Information Security professional, that dives too deep into extraneous threat vectors but is unable to connect real business risk to the business, so goes the Information Security profession as a whole.

The Information Security profession must connect real business risk with the business in such a way that places the business in a position to lead Information Security. Professionalizing this industry may just be the only hope of making that switch and thus solidifying a permanent positive impact

About the Author

Martin Zinaich is the information security officer for the City of Tampa’s Technology and Innovation department. The insights in this article were shared at a Wisegate member event, where senior IT professionals discussed these pressing security issues.

Featured

  • Cyber Overconfidence Is Leaving Your Organization Vulnerable

    The increased sophistication of cyber threats pumped by the relentless use of AI and machine learning brings forth record-breaking statistics. Cyberattacks grew 44% YoY in 2024, with a weekly average of 1,673 cyberattacks per organization. While organizations up their security game to help thwart these attacks, a critical question remains: Can employees identify a threat when they come across one? A Confidence Gap survey reveals that 86% of employees feel confident in their ability to identify phishing attempts. But things are not as rosy as they appear; the more significant part of the report finds this confidence misplaced. Read Now

  • Mission 500 Debuts Refreshed Identity Ahead of Security 5K/2K at ISC West

    Mission 500, the security industry’s nonprofit charity dedicated to supporting children in need across the US, Canada, and Puerto Rico, has unveiled a refreshed brand identity ahead of ISC West. The charity’s new look includes a modernized logo with refined messaging to reinforce Mission 500’s nearly decade-long commitment to serving the needs of children and families in crisis. Read Now

    • Industry Events
  • Meeting Modern Demands

    Door hardware and access control continue to be at the forefront of innovation within the security industry, continuously evolving to meet the dynamic needs of commercial spaces. Read Now

  • Leveraging IoT and Open Platform VMS for a Connected Future

    The evolution of urban environments is being reshaped by the convergence of Internet of Things (IoT) technology and open platform VMS. As cities worldwide grapple with growing populations and increasing operational complexities, these integrated technologies are emerging as powerful tools for creating more livable, efficient, and secure urban spaces. Read Now

New Products

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file.