- Get link
- X
- Other Apps
- Get link
- X
- Other Apps
Who in the company is actually responsible for information security? The IT department alone? Or does a “shared responsibility approach” make more sense?
A smartphone is a computer that can also
be used to make calls. Our vehicles are computers that you can also drive
with. In addition to many other functions, the television can also receive
television programs. Some find this very useful, others less so. The
fact is: Companies use digitization to optimize processes, improve their
customer communication and thus become more efficient and competitive. Despite
all the current errors and confusion: Digitization makes our lives easier. But
it also has a downside: it makes society increasingly dependent on the proper
functioning of systems and thus more vulnerable. As a result, information
security has become a key success factor for companies and society.
Innovative, but Safe
Digitization primarily means that
specialist departments such as sales, logistics, customer service, or human
resources
· introduce new applications in the process,
· develop mobile applications (or have them developed),
· process new information and/or use new cloud services.
This can quickly overwhelm traditionally
operating security organizations in companies. Traditionally this means
that a corresponding project is first checked and then approved by a central
information security department. This is resource-intensive and usually
not particularly fast. The result: In the best-case scenario, information
security becomes a brake on the planned project. In the worse, but in
reality common case, it is simply ignored or bypassed. Both of these are
unsuitable for building long-term trust with customers and partners or for
meeting regulatory requirements. The question is therefore how a company
can provide its services innovatively and still safely. How must information
security be organized so that digitized companies run optimally?
No More Tools, but New Concepts
In many organizations, information
security is primarily perceived as a technical problem. In fact, it is
primarily a conceptual and organizational matter. The technology is used
to implement the concepts and processes or to support people in doing so. This
view is necessary. It enables those responsible to grasp the new
challenges that a digitization strategy brings with it.
From Authorization to Orchestration
Technology alone will not solve the
problem of information security. The key lies in a conceptual approach
based on orchestration and a certain degree of decentralization: Shared Responsibility, known from cloud
hosting. That means: When it comes to compliance with and implementation
of security guidelines, departments receive
· and at the same time more responsibility.
Information security remains the top
security authority. However, it primarily takes on an advisory and
partnership role.
Security Manager in The Areas
How can such a shared responsibility
concept be implemented in reality? One possibility is the use of a project
or area-specific Information Security Officers (ISO) or security managers. You
will accompany and advise the specialist and/or IT departments in the design,
implementation, and operation of digital solutions. In doing so, they
ensure that operational and regulatory security requirements are complied with. However,
they are still subject to the security organization to counteract any
potential conflicts of interest.
Use the Strengths of The Organization
Alternative implementation options are:
· This not only raises the employees' awareness of safety aspects but also transfers valuable, practical knowledge.
Equip Selected Roles in The Departments with Special Knowledge
As a result, the relevant employees
bring this know-how to their respective areas. An HR employee who is
familiar with the aspects of data security can serve as an internal point of
contact and thus relieve the data privacy officer. A software
developer who has specialist knowledge in the area of security testing and
coding can give his colleagues appropriate assistance. This principle is
not new but is known in many organizations as superusers or, more recently, as user champions from
application support. The options for security are diverse here, but the
potential has so far not been fully exploited in practice.
Grab It and Win
Hesitation definitely doesn't pay off when it comes to information security. Digitization must be secure if it is to bring the desired success. The necessary concepts and technologies are available. It is important to adapt them to individual requirements and wishes and to implement them quickly. The most important part is to adapt antivirus software to bit fraudulent activities online. This lowers the risks and increases the chances of success.
Antivirus Software
Cyber-security
Digitization
Employees' Awareness of Safety
Information Security
Security Guidelines
- Get link
- X
- Other Apps
Comments
Post a Comment