Part 7: Refocus on the Glide Path

Part 7: Refocus on the Glide Path

(Did you miss Part 1, 2, 3, 4 , 5 or 6? Click here for part 1; here for part 2; here for part 3; here for part 4; here for part 5; and here for part 6 to catch up!)

Often missing from the professionalization of Information Security debate is that of business intersection. The best-trained and certified professional will be of little use if injected into a working environment that is unconscious to need or risk. Where would the medical profession be today if it had not professionalized? What about the airline industry?

Providing businesses with trained professionals (not only in the technical aspects but also in the business aspects), combined with certification on a national or global level delivers to the business some basic assurance. A professional organizing body creating paths for the field and bringing together the brightest to help forge general directions and coverage across business verticals becomes a natural process benefiting practitioner and business alike.

However, the largest benefit comes from elevating the field into the business arena, where businesses are aware of, better understand the role of, and are able to fit Information Security into the proper level of business process. No longer would Information Security be just an IT problem, but what it actually is: a business problem. When businesses undertake Information Security like any other business risk, businesses enhance their level of security; this enhancement flows down to the products and services they deliver. When the current ad-hoc approach is exchanged with a holistic approach, it benefits the business, the industry, the consumer and the nation.

The rapid growth of technology since the birth of computers has revolutionized the world and the way both individuals and corporations leverage the Internet and computing devices. However, the rate of change has created new paradigms in business models at the same time complexity and risk acceptance has increased homogeneously.

Reliance on this multifarious cyber universe has likewise intensified and is projected to be increasingly ubiquitous as the “Internet of Things” looms on the near horizon. Yet the foundations baked into the very fabric of this creation were never designed to be secure. A central basic maxim of Information Security is that security after the fact is more costly, less effective and has a longer time to value. The current state of Information Security has borne out this truth in its very own industry.

Information Security is playing catch up at the same time it is trying to define a core in a multitude of security frameworks. As a relatively new industry, Information Security is facing challenges not unlike other new industries but it is not self-realizing its own deficiencies. Like the entry-level Information Security professional, that dives too deep into extraneous threat vectors but is unable to connect real business risk to the business, so goes the Information Security profession as a whole.

The Information Security profession must connect real business risk with the business in such a way that places the business in a position to lead Information Security. Professionalizing this industry may just be the only hope of making that switch and thus solidifying a permanent positive impact

About the Author

Martin Zinaich is the information security officer for the City of Tampa’s Technology and Innovation department. The insights in this article were shared at a Wisegate member event, where senior IT professionals discussed these pressing security issues.

Featured

  • AI to Help Resolve Non-Emergency Calls Across Utah and Decrease 911 Caller Wait Times

    The Utah Communications Authority (UCA), which oversees the state’s next generation 911 technology services, recently announced that public safety answering points (PSAPs) throughout the state plan to implement Motorola Solutions’ Virtual Response technology to automate the receipt and resolution of 10-digit non-emergency line calls in Utah with the help of AI. Read Now

  • Report: 2025 Video Surveillance Market Set to Grow After Small Decline in 2024

    Novaira Insights has unveiled its latest report, “World Market for Video Surveillance Hardware and Software – 2025 Edition.” The research indicates that the global market for video surveillance hardware and software experienced a slight decline of 0.3% in 2024. This performance fell short of previous forecasts, primarily due to a significant decrease of 7.8% in the Chinese market. Conversely, the rest of the world saw a growth of 4.9%. The global market for video surveillance equipment was estimated to be worth $25.0 billion in 2024. Read Now

  • Report Reveals Local Governments Face Surge in Ransomware Attacks with Minimal Resources

    KnowBe4, the cybersecurity platform that comprehensively addresses human risk management, recently released new research highlighting the critical cybersecurity challenges facing state, local, tribal, and territorial (SLTT) governments. The report details how government organizations have become prime targets for cybercriminals while simultaneously facing severe resource constraints. Read Now

  • Video Surveillance Trends to Watch

    With more organizations adding newer capabilities to their surveillance systems, it’s always important to remember the “basics” of system configuration and deployment, as well as the topline benefits of continually emerging technologies like AI and the cloud. Read Now

  • New Report Reveals Top Trends Transforming Access Controller Technology

    Mercury Security, a provider in access control hardware and open platform solutions, has published its Trends in Access Controllers Report, based on a survey of over 450 security professionals across North America and Europe. The findings highlight the controller’s vital role in a physical access control system (PACS), where the device not only enforces access policies but also connects with readers to verify user credentials—ranging from ID badges to biometrics and mobile identities. With 72% of respondents identifying the controller as a critical or important factor in PACS design, the report underscores how the choice of controller platform has become a strategic decision for today’s security leaders. Read Now

New Products

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame.

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.