The CSO perspective on risk management
by Mirko Zorz - Editor in Chief - Thursday, 9 May 2013.
Candy Alexander is the CSO at Long Term Care Partners and volunteers as a member of the International Board of Directors for ISSA. In the past, she was invited to the White House to speak on the importance of security awareness to the President's Cyber-Czar staff and has held several position as CISO for which she managed Corporate Security Programs.

In this interview she gives a CSO perspective on the importance of risk management, threat mitigation and security awareness.

Companies are increasingly aware of the benefits of risk management. What’s your take on risk management's goals within an organization?

In setting up risk management programs, I like to keep things simple – that way they get done. The goals are to identify real risks to the important items within the company, mitigate the risks and continuously monitor the environment.

It is more than running a vulnerability scanner and addressing all of the “critical items”. It is talking with the business to understand what is it that they consider critical to their operation, and then focus on areas within the environment where the “important things” are. A risk manager needs to be a translator if you will, between the business which knows what’s important to the company” and the technology support side, which applies the safeguards and mitigation.

Is risk management a desirable career path? What can aspiring CSOs expect?

That’s an interesting question. I have been in information security for 25+ years and have seen the profession morph over the years and branch out into difference specialties. Risk management is what old school information security folks have been doing for years, security management.

So, it is desirable – you bet! It has been an unbelievable journey and only gets better. As for what aspiring CSOs can expect, that’s easy. It’s the same thing but only different. People will always have motive to do “bad things”, businesses will always need to be safeguarded - the thing that is different is technology.

My advice to aspiring CSOs is to be flexible and stay on top of technology and how it is being used. Take for example the whole BYOD thing. Many security folks were in denial that BYOD was being used within their environments, then they see things like their CEO using a mobile device in a meeting. You need to keep your ear to the ground and know what’s going on as quickly as possible. Build trusted relationships with as many people as you can – often times I have found out what’s going on from my “informal/off the record” conversations.

Is it realistic to expect an organization get ready to address all potential security risks? How much preparation is good enough?

No, it’s not realistic to address all potential security risks, just as it isn’t realistic to be 100% compliant. If a risk management program is going to be successful, then you need to be realistic and protect what matters. How much preparation is good enough - is all up to how much is the business willing to lose if something were to go wrong. Would they be able to sleep at night with the investment that they’ve made on protecting, monitoring and mitigating the important things? Only they can answer that.

What's your take on security awareness and employee training?

It is a necessary evil. The reason why I say that is evil is that many folks believe that posters, online training and things of that nature are good enough. Let’s face it, people are the reason why we need security. Many times I have performed investigations of internal incidents only to find that it was a user error.

Spotlight

Fake "Online Ebola Alert Tool" delivers Trojan

Posted on 29 October 2014.  |  Cyber scammers continue to take advantage of the fear and apprehension surrounding the proliferation of the Ebola virus.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Thu, Oct 30th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //