Cookies help us display personalized product recommendations and ensure you have great shopping experience.

By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
SmartData CollectiveSmartData Collective
  • Analytics
    AnalyticsShow More
    warehouse accidents
    Data Analytics and the Future of Warehouse Safety
    10 Min Read
    stock investing and data analytics
    How Data Analytics Supports Smarter Stock Trading Strategies
    4 Min Read
    predictive analytics risk management
    How Predictive Analytics Is Redefining Risk Management Across Industries
    7 Min Read
    data analytics and gold trading
    Data Analytics and the New Era of Gold Trading
    9 Min Read
    composable analytics
    How Composable Analytics Unlocks Modular Agility for Data Teams
    9 Min Read
  • Big Data
  • BI
  • Exclusive
  • IT
  • Marketing
  • Software
Search
© 2008-25 SmartData Collective. All Rights Reserved.
Reading: The Four IT Security Principles: A Practical Guide to Improving Information Security
Share
Notification
Font ResizerAa
SmartData CollectiveSmartData Collective
Font ResizerAa
Search
  • About
  • Help
  • Privacy
Follow US
© 2008-23 SmartData Collective. All Rights Reserved.
SmartData Collective > IT > Security > The Four IT Security Principles: A Practical Guide to Improving Information Security
Security

The Four IT Security Principles: A Practical Guide to Improving Information Security

ryanward
ryanward
5 Min Read
Image
SHARE

ImageBelow are four principles to help you become a more effective IT security leader. While these principles won’t solve all your problems, if you practice them regularly, you can’t help but reduce risks and knock annoying security problems off your to-do lists.

Start a difficult information security task

ImageBelow are four principles to help you become a more effective IT security leader. While these principles won’t solve all your problems, if you practice them regularly, you can’t help but reduce risks and knock annoying security problems off your to-do lists.

Start a difficult information security task

More Read

Image
How to Clean Up the Mess: Surviving a Data Breach
Why Companies Should Leverage these Cybersecurity Tools?
How to Collect and Transform Data into Value for Your Business
Online Tech Speaks at Data Security Seminar
Everything You Need To Know About Mobile Security

Every IT security leader has a laundry list of items that need to be fixed in an organization to improve information security and lower risk. Some of these issues may instill a certain fear or anxiety in you that prevents you from taking that first step. You probably have a few scary items written on post it notes around your desk right now, so why are you waiting? It could be because you don’t like who you have to deal with to accomplish the task, or maybe it isn’t in your technology comfort zone, or….

Regardless of the reasons, the best security leaders face their fears head-on and pick up that phone, schedule that meeting or send that email NOW to initiate change rather than wait. What are you waiting for?

Start one nagging issues right now. I’ll wait…Know your stuff

In my personal opinion, there are way too many IT security professionals who don’t truly understand enough about technology. Many of the current leaders rose through a support role focused in one particular area, but never took the time or have the ability to learn another discipline.

Understanding all aspects of IT including networks, development languages, databases/queries, server configurations, Unix, Windows, etc. dramatically improves a security leader’s effectiveness. If nothing else, it allows you to speak to technologists in their terms. It also lets them know that they cannot make something up just to avoid implementing a security fix.

If you don’t get funding for big projects, fix security operations

All too often, IT security leaders use “lack of funding” as an excuse for why they haven’t done more to lower risks. Funding will always be an issue, but even if you do not receive funding to implement an identity and access management solution, DLP solution or any other project, there are considerable ways to improve information security just within day-to-day operations.

This is where having broad technical skills can help you truly become an effective IT security leader because it allows you to design and drive architecture improvements without massive project teams. Aside from technology, process improvements, process redesign, and lean operations can always be a focus. These areas should not require an official project.

Don’t accept excuses from matrix-managed teams

From performing risk assessments at a variety of organizations, I see a large number of organizations living with open vulnerabilities. They don’t follow best practices simply, because nobody stands up to the individual technology towers and effectively influences them to change.

With technology, anything is possible, so it is up to you to manage external teams effectively. I have found that change is easier when you take an educational approach to influence technologists. An IT security leader must help technologists understand why certain settings pose environment risks. It often helps to frame risks around technology and security changes over the years. This approach can deflect resistance based on historical reasons.

By applying these four principles to your information security management practices, you can lower risk and become a more effective IT leader with minimal change and without increased budgets. Give it a shot!

Share This Article
Facebook Pinterest LinkedIn
Share

Follow us on Facebook

Latest News

macro intelligence and ai
How Permutable AI is Advancing Macro Intelligence for Complex Global Markets
Artificial Intelligence Exclusive
warehouse accidents
Data Analytics and the Future of Warehouse Safety
Analytics Commentary Exclusive
stock investing and data analytics
How Data Analytics Supports Smarter Stock Trading Strategies
Analytics Exclusive
qr codes for data-driven marketing
Role of QR Codes in Data-Driven Marketing
Big Data Exclusive

Stay Connected

1.2KFollowersLike
33.7KFollowersFollow
222FollowersPin

You Might also Like

cybersecurity importance
Best PracticesData ManagementExclusiveITPrivacySecurity

10 Helpful Ways To Ensure Data Centric Cybersecurity

9 Min Read
data-driven cybersecurity
Analytics

How to Protect Your Small Business from Cyberattacks with Data Analytics

6 Min Read

Keeping Focus on Mission IT at ODNI CIO

5 Min Read

Are Public Clouds Complex Environments?

4 Min Read

SmartData Collective is one of the largest & trusted community covering technical content about Big Data, BI, Cloud, Analytics, Artificial Intelligence, IoT & more.

AI and chatbots
Chatbots and SEO: How Can Chatbots Improve Your SEO Ranking?
Artificial Intelligence Chatbots Exclusive
data-driven web design
5 Great Tips for Using Data Analytics for Website UX
Big Data

Quick Link

  • About
  • Contact
  • Privacy
Follow US
© 2008-25 SmartData Collective. All Rights Reserved.
Go to mobile version
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?