why conquering complexity is a critical component of an effective security program infosecurity...
TRANSCRIPT
1/4/2017 Why Conquering Complexity Is a Critical Component of an Effective Security Program | Infosecurity Europe Blog
http://blogs.infosecurityeurope.com/whyconqueringcomplexityisacriticalcomponentofaneffectivesecurityprogram/ 1/5
WhyConqueringComplexityIs a CriticalComponentof anE鎧�ectiveSecurityProgramJANUARY 4, 2017
BY INFOSECURITY EUROPE TEAM
IN EXPERT OPINION, UNCATEGORIZED.
Register toVisit
Register toExhibit
Contact Us
Connect withUs
Infosecurity Europe
Blog
1/4/2017 Why Conquering Complexity Is a Critical Component of an Effective Security Program | Infosecurity Europe Blog
http://blogs.infosecurityeurope.com/whyconqueringcomplexityisacriticalcomponentofaneffectivesecurityprogram/ 2/5
Dominic Vogel, Chief SecurityStrategist, Cyber.SC
An article published by ISACA
Security professionals tend to have apenchant for making things morecomplicated than they need to be. Butlife and our work are complicatedenough without us adding extra layersof needless complexity. When itcomes to operating an e鎧�ectiveenterprise security program, the oldadage of “complexity being the enemyof security” really does ring true.
Many CIOs and CISOs are guilty ofchasing the cool blinking lights ofnewer technologies and keep addingadditional technologies to an already
Categories
Best PracticeAdvice
Case Studies
Events
Events Information
ExhibitorInformation
Expert Opinion
Industry Opinion
News
ProductInformation
Uncategorized
Visitor Information
Featured ThisMonth
launch:‘IntelligentSecurity:Protect.Detect.Respond.Recover’⁄ APRIL 9, 2015
1/4/2017 Why Conquering Complexity Is a Critical Component of an Effective Security Program | Infosecurity Europe Blog
http://blogs.infosecurityeurope.com/whyconqueringcomplexityisacriticalcomponentofaneffectivesecurityprogram/ 3/5
overburdened and poorly integratedsecurity stack. Many enterprisesecurity programs look like ascattered city of isolated Jenga towers.From a risk management perspective,the more complex the infrastructure,the harder it is to defend.
Balancing usability, security andcomplexity seems like a daunting taskat times. Trying to do so on a dailybasis costs many of us our sanity(think of Homer Simpson when hewas forced to give up beer and TV!).
During one of my more salientmoments, I came across a useful andapplicable metaphor that securitypros should heed when it comes tobalancing that aforementioned unholytrinity…
Read the full article here.
TAGGED #INFOSEC17, ADVICE, BUSINESS ADVICE,CYBERSECURITY, DATA SECURITY, INFORMATION
SECURITY, ISACA.
WhyConqueringComplexity Isa CriticalComponent ofan E鎧�ectiveSecurityProgramJANUARY 4, 2017
In TheBoardroomWith ExtenuaCEO SteveViscontiNOVEMBER 2,2016
Cylance VicePresident JohnMcClurgre⽡ects on histime workingin CyberDefenceOCTOBER 6, 2016
What are thebiggestsecuritychallengeswithin the IoTtoday?SEPTEMBER 9,2016
The CEO ofPortsys talksabout how tomanagesecurity in amorecomprehensivemannerAUGUST 19, 2016
Recent Posts
Infosecurity Europe
1/4/2017 Why Conquering Complexity Is a Critical Component of an Effective Security Program | Infosecurity Europe Blog
http://blogs.infosecurityeurope.com/whyconqueringcomplexityisacriticalcomponentofaneffectivesecurityprogram/ 4/5
Leave a Comment
Comment
Name *
Email *
Infosecurity EuropeTeam
PREVIOUS:
In The BoardroomWith Extenua CEO
Steve Visconti
Your email address will not be published.Required ��elds are marked *
1/4/2017 Why Conquering Complexity Is a Critical Component of an Effective Security Program | Infosecurity Europe Blog
http://blogs.infosecurityeurope.com/whyconqueringcomplexityisacriticalcomponentofaneffectivesecurityprogram/ 5/5
Website
Are you human? * 3 + = four
ERROR for site owner: Invalid domain for site key reCAPTCHA
Privacy - Terms
Post Comment
Useful Links
Log in Infosecurity Europe 2015 Infosecurity Magazine Infosecurity Global ExecutiveNetwork Sponsorship Opportunities
InfosecurityMagazine News
We are
RE®_LOGO_WHITE_300x421
logo-reed-elsevier-100x13-white
© 2013 - 2015 Reed Exhibitions Ltd | Infosecurity and Infosec are registered trademarks of Reed Exhibitions Limited.
Notify me of follow-up comments by email. Notify me of new posts by email.
ICO ‘Breached PublicData’ Several TimesSince 2013
4 January 2017
Privacy watchdogforced to investigate