When it comes to the safety of your data and technology systems, it’s vital that your organization recognizes the reality of the “information security lifecycle.” By its very name, the info security lifecycle indicates that true information security is a process, not a “one and done” solitary project. Information security has no end-point, and your operational framework should always strive to acknowledge that fact.
Read more »
At Garland Heart, we use a lifecycle model that serves as a useful baseline to help build a solid foundation for any security program across any type of organization and industry focus. Using the lifecycle model can provide you with a road map to ensure that your information security is continually being improved.
The twin gas pedals of globalization and technology have increased the speed of business to the point where you can blink and suddenly not recognize the landscape around you. This is especially true when it comes to information security, where the very concept of “hacking” and data theft went from Hollywood science fiction to a pressing fact of life in under a decade.
Like many businesses, you may question whether you’re properly prepared in the information security realm, even if you’ve created a titular Chief Information Security Officer (CISO). But titles alone aren’t enough, especially when an effective CISO is required to wear so many different hats.
From disaster recovery to security reporting, vendor management and more, you should be able to rely on a CISO who can fit every hat he or she needs to. Most surprisingly of all, an effective CISO may not even need to work in your actual office. Here’s why.
Read more »