Keeping The Barbarians Out: How CIOs Can Secure Their Department and Company
By Jim Anderson
()
About this ebook
There are a lot of bad guys out there. For some odd reason, a lot of them seem to want to break into your company's networks and applications. As the CIO, it's your job to make sure that this does not happen. Got any thoughts on how to go about doing that?
What You'll Find Inside:
* CIO’S NEED TO LEARN HOW TO DEFEND AGAINST THE INSIDER THREAT
* WHY BYOD SPELLS DOOM FOR CIOS
* DO WE REALLY NEED TO ENCRYPT OUR CUSTOMER DATA?
* 3 WAYS TO GET YOUR COMPANY TO TAKE DIGITAL SECURITY SERIOUSLY
As much as we like to spend our time looking outwards in order to detect the next threat that our company may be facing, perhaps we're looking in the wrong direction. Just as big of a deal may be the insider threat that lurks within the company. No matter where it comes from, cybercrime is your problem to deal with.
CIOs have to deal with trends as they come and go. Right now the Bring Your Own Device To Work (BYOD) phase is in full swing and if you aren't careful could cause a lot of problems for the IT department. At the same time, it's the code that your teams create that will secure your applications. Do you know if they are writing secure code or are they leaving doors wide open?
In order to measure where the threats are coming from and how big of deal they are, CIOs need to become comfortable with measuring the level of risk that they are dealing with. A big part of measuring risk is getting information about threats from other CIOs. This can be difficult to do because CIOs really don't like to share information like this.
Since we can't always be certain that we can keep the bad guys out, we need to make sure that we've taken the needed steps to secure our networks. Should they happen to get inside of the company, we need to take extra steps to make sure that they can't get what they came for. This brings up the interesting question of whether or not we should go to the effort and expense of encrypting our customer data.
No matter what our final decision on encrypting the company's digital assets is, we still have a responsibly as CIO to make sure that the company understands the threats that it is facing and that it starts to take digital security seriously.
Jim Anderson
J Jim Anderson is Visiting Research Fellow in the Department of Educational Studies at Goldsmiths, University of London. His work focuses on: theories and methods of second language learning and bilingualism, including Content and Language Integrated Learning (CLIL); multilingualism and new literacies; and language policy. Underlying this is a commitment to an integrated and inclusive approach to language and literacy education incorporating the areas of foreign and community/heritage language learning as well as English as an Additional Language and English mother tongue. Jim is co-director with Dr Vicky Macleroy of the Critical Connections: Multilingual Digital Storytelling Project launched in 2012.
Read more from Jim Anderson
Power Distribution Unit (PDU) Secrets: What Everyone Who Works In A Data Center Needs To Know! Rating: 4 out of 5 stars4/5Reverse Mortgage Dangers Rating: 5 out of 5 stars5/5Unmasked: Exposing the Cultural Sexual Assault Rating: 5 out of 5 stars5/5Secrets To Planning The Perfect Speech For Motivational Speakers: How To Plan To Give The Best Speech Of Your Life! Rating: 0 out of 5 stars0 ratingsHow To Give A Great Presentation: Presentation Techniques That Will Transform A Speech Into A Memorable Event Rating: 0 out of 5 stars0 ratingsCIO Communication Skills Secrets: Tips And Techniques For CIOs To Use In Order To Become Better Communicators Rating: 0 out of 5 stars0 ratingsIT Manager Budgeting Skills: How IT Managers Can Request, Manage, Use, And Track Their Funding Rating: 0 out of 5 stars0 ratingsDelivering Excellence: How To Give Presentations That Make A Difference Rating: 0 out of 5 stars0 ratingsHow Software Defined Networking (SDN) Is Going To Change Your World Forever: The Revolution In Network Design And How It Affects You Rating: 0 out of 5 stars0 ratingsCustomer Lessons For Product Managers: Techniques For Product Managers To Better Understand What Their Customers Really Want Rating: 0 out of 5 stars0 ratingsProduct Manager Product Success: How To Keep Your Product On Track And Make It Become A Success Rating: 0 out of 5 stars0 ratingsCIO Business Skills: How CIOs Can Work Effectively With The Rest Of The Company! Rating: 0 out of 5 stars0 ratingsIT Manager Career Secrets: Tips And Techniques That IT Managers Can Use In Order To Have A Successful Career Rating: 0 out of 5 stars0 ratingsPrinciple-Based Leadership: Driving Your Success as a Leader Rating: 0 out of 5 stars0 ratingsTechnology That Every CIO Needs To Know About: How CIOs Can Stay On Top Of the Changes in the Technology That Powers the Company Rating: 0 out of 5 stars0 ratingsHow To Become A Better Speaker By Changing How You Speak Rating: 2 out of 5 stars2/5Ladies, Women, and Wenches: Choice and Constraint in Antebellum Charleston and Boston Rating: 0 out of 5 stars0 ratingsWhat CIOs Need To Know In Order To Successfully Manage An IT Department Rating: 0 out of 5 stars0 ratingsProduct Development Lessons For Product Managers: How Product Managers Can Create Successful Products Rating: 0 out of 5 stars0 ratingsCommunication Skills That Every CIO Must Have: Tips And Techniques For CIOs To Use In Order To Become Better Communicators Rating: 0 out of 5 stars0 ratingsProduct Failure Lessons For Product Managers: Examples Of Products That Have Failed For Product Managers To Learn From Rating: 0 out of 5 stars0 ratingsSecrets To Planning The Perfect Speech For Marketing Managers: How To Plan To Give The Best Speech Of Your Life! Rating: 0 out of 5 stars0 ratingsHow To Build High Performance IT Teams: Tips And Techniques That IT Managers Can Use In Order To Develop Productive Teams Rating: 0 out of 5 stars0 ratings
Related to Keeping The Barbarians Out
Related ebooks
Communication Skills That Every CIO Must Have: Tips And Techniques For CIOs To Use In Order To Become Better Communicators Rating: 0 out of 5 stars0 ratingsNew IT Technology Issues Facing CIOs: How CIOs Can Stay On Top Of The Changes In The Technology That Powers The Company Rating: 0 out of 5 stars0 ratingsHow CIOs Can Make Innovation Happen: Tips And Techniques For CIOs To Use In Order To Make Innovation Happen In Their IT Department Rating: 0 out of 5 stars0 ratingsCIO Secrets For Growing Innovation Rating: 0 out of 5 stars0 ratingsTechnology That Every CIO Needs To Know About: How CIOs Can Stay On Top Of the Changes in the Technology That Powers the Company Rating: 0 out of 5 stars0 ratingsThe Business Of Being A CIO: How CIOs Can Use Their Technical Skills To Help Their Company Solve Real-World Business Problems Rating: 0 out of 5 stars0 ratingsCIO Communication Skills Secrets: Tips And Techniques For CIOs To Use In Order To Become Better Communicators Rating: 0 out of 5 stars0 ratingsWhat CIOs Need To Know In Order To Successfully Manage An IT Department Rating: 0 out of 5 stars0 ratingsCritical CIO Management Skills: Decision Making Skills That Every CIO Needs to Have in Order to Be Able to Make the Right Choices Rating: 0 out of 5 stars0 ratingsSolving the Technology Challenge for IT Managers: Technologies That IT Managers Can Use In Order to Make Their Teams More Productive Rating: 0 out of 5 stars0 ratingsHow To Build High Performance IT Teams: Tips And Techniques That IT Managers Can Use In Order To Develop Productive Teams Rating: 0 out of 5 stars0 ratingsKiller Staffing Skills Managers Need To Know: Tips And Techniques That Managers Can Use In Order To Develop Leadership Skills Rating: 0 out of 5 stars0 ratingsTeam Building Strategies for IT Managers: Tips And Techniques That IT Managers Can Use In Order To Develop Productive Teams Rating: 0 out of 5 stars0 ratingsHow IT Managers Can Make Innovation Happen Rating: 0 out of 5 stars0 ratingsSave Yourself, Save Your Job: How To Manage Your IT Career Rating: 0 out of 5 stars0 ratingsHow CIOs Can Take Their Career To The Next Level: How CIOs Can Work With The Entire Company In Order To Be Successful Rating: 0 out of 5 stars0 ratingsSecrets Of Effective Leadership For IT Managers: Tips And Techniques That IT Managers Can Use In Order To Develop Leadership Skills Rating: 0 out of 5 stars0 ratingsRethinking IT Outsourcing: The New IT Offshoring Rating: 3 out of 5 stars3/5Your Success As A CIO Depends On How Well You Communicate Rating: 0 out of 5 stars0 ratingsBuilding The Perfect Team: What Staffing Skills Do IT Managers Need? Rating: 0 out of 5 stars0 ratingsMarketing Skills For Product Managers: How Product Managers Can Use Marketing To Make Their Product A Success Rating: 0 out of 5 stars0 ratingsSecrets Of Managing Budgets: What IT Managers Need To Know In Order To Understand How Their Company Uses Money Rating: 0 out of 5 stars0 ratingsAvoiding Software Project Pitfalls: Seven Simple Ground Rules That Could Save Your Career Rating: 4 out of 5 stars4/5How To Become A Digital Marketing Hero Rating: 0 out of 5 stars0 ratings
Management For You
The 7 Habits of Highly Effective People: 30th Anniversary Edition Rating: 5 out of 5 stars5/5The 12 Week Year: Get More Done in 12 Weeks than Others Do in 12 Months Rating: 4 out of 5 stars4/5Malcolm Gladwell's Blink The Power of Thinking Without Thinking Summary Rating: 4 out of 5 stars4/5Principles: Life and Work Rating: 4 out of 5 stars4/5Extreme Ownership: How U.S. Navy SEALs Lead and Win | Summary & Key Takeaways Rating: 4 out of 5 stars4/5Emotional Intelligence Habits Rating: 5 out of 5 stars5/5The 5 Languages of Appreciation in the Workplace: Empowering Organizations by Encouraging People Rating: 4 out of 5 stars4/5Multipliers, Revised and Updated: How the Best Leaders Make Everyone Smarter Rating: 4 out of 5 stars4/5Leveling Up: 12 Questions to Elevate Your Personal and Professional Development Rating: 0 out of 5 stars0 ratingsGood to Great: Why Some Companies Make the Leap...And Others Don't Rating: 4 out of 5 stars4/5Summary of The Laws of Human Nature: by Robert Greene - A Comprehensive Summary Rating: 4 out of 5 stars4/5Managing Oneself: The Key to Success Rating: 4 out of 5 stars4/5The Ideal Team Player: How to Recognize and Cultivate The Three Essential Virtues Rating: 4 out of 5 stars4/5The Five Dysfunctions of a Team: A Leadership Fable, 20th Anniversary Edition Rating: 4 out of 5 stars4/5Summary of The 5 AM Club: by Robin Sharma - Own Your Morning. Elevate Your Life. - A Comprehensive Summary Rating: 5 out of 5 stars5/5Managing Oneself Rating: 4 out of 5 stars4/5The 4 Disciplines of Execution: Revised and Updated: Achieving Your Wildly Important Goals Rating: 4 out of 5 stars4/5The New One Minute Manager Rating: 5 out of 5 stars5/5How to Get Ideas Rating: 5 out of 5 stars5/5The Hard Thing About Hard Things: Building a Business When There Are No Easy Answers Rating: 4 out of 5 stars4/52600 Phrases for Effective Performance Reviews: Ready-to-Use Words and Phrases That Really Get Results Rating: 3 out of 5 stars3/5The 360 Degree Leader Workbook: Developing Your Influence from Anywhere in the Organization Rating: 4 out of 5 stars4/5Crucial Conversations: Tools for Talking When Stakes are High, Third Edition Rating: 4 out of 5 stars4/5Leadershift: The 11 Essential Changes Every Leader Must Embrace Rating: 5 out of 5 stars5/5Company Rules: Or Everything I Know About Business I Learned from the CIA Rating: 4 out of 5 stars4/5The Coaching Habit: Say Less, Ask More & Change the Way You Lead Forever Rating: 4 out of 5 stars4/5Great Ceos Are Lazy: How Exceptional Ceos Do More in Less Time Rating: 4 out of 5 stars4/5
Reviews for Keeping The Barbarians Out
0 ratings0 reviews
Book preview
Keeping The Barbarians Out - Jim Anderson
There are a lot of bad guys out there. For some odd reason, a lot of them seem to want to break into your company's networks and applications. As the CIO, it's your job to make sure that this does not happen. Got any thoughts on how to go about doing that?
As much as we like to spend our time looking outwards in order to detect the next threat that our company may be facing, perhaps we're looking in the wrong direction. Just as big of a deal may be the insider threat that lurks within the company. No matter where it comes from, cybercrime is your problem to deal with.
CIOs have to deal with trends as they come and go. Right now the Bring Your Own Device To Work (BYOD) phase is in full swing and if you aren't careful could cause a lot of problems for the IT department. At the same time, it's the code that your teams create that will secure your applications. Do you know if they are writing secure code or are they leaving doors wide open?
In order to measure where the threats are coming from and how big of deal they are, CIOs need to become comfortable with measuring the level of risk that they are dealing with. A big part of measuring risk is getting information about threats from other CIOs. This can be difficult to do because CIOs really don't like to share information like this.
Since we can't always be certain that we can keep the bad guys out, we need to make sure that we've taken the needed steps to secure our networks. Should they happen to get inside of the company, we need to take extra steps to make sure that they can't get what they came for. This brings up the interesting question of whether or not we should go to the effort and expense of encrypting our customer data.
No matter what our final decision on encrypting the company's digital assets is, we still have a responsibly as CIO to make sure that the company understands the threats that it is facing and that it starts to take digital security seriously.
For more information on what it takes to be a great CIO, check out my blog, The Accidental Successful CIO, at:
www.TheAccidentalSuccessfulCIO.com
Good luck!
Dr. Jim Anderson
About The Author
I must confess that I never set out to be a CIO. When I went to school, I studied Computer Science and thought that I'd get a nice job programming and that would be that. Well, at least part of that plan worked out!
My first job was working for Boeing on their F/A-18 fighter jet program. I spent my days programming fighter jet software in assembly language and I loved it. The U.S. government decided to save some money and went looking for other countries to sell this plane to. This put me into an unfamiliar role: I started to meet with foreign military officials and I ended up having to manage groups of engineers who were working on international