Menu

Blogs

Showing Blog Posts: 1–8 of 8 tagged Budget

  • The Longevity Challenge in Infosec

    by Wendy Nather on October 4, 2016

    In a recent BankInfoSecurity article, U.S. Federal Chief Information Officer Tony Scott was quoted as saying one of the main factors behind the OPM breach was the tendency of Congress to “fund civilian agencies to maintain their information systems, not to modernize them.” This is endemic both in the public sector and in other organizations below the security poverty line, which I started writing…

  • A Note on #CISOProblems

    by Eric Cowperthwaite on August 11, 2015

    What is it about this time of year? In the past month or so I’ve noticed even more headlines and reports than usual about the problems plaguing today’s CSOs and CISOs. If you’ve somehow managed to dodge the onslaught of grim stats, I’ll sum it up for you: The “bad guys” are proliferating and becoming more sophisticated. Security managers are having a hard time getting enough “good guys” on their…

  • Webcast Recap: Finding Security Resources Inside Your Organization

    by Fahmida Y. Rashid on November 5, 2014

    As part of the budget planning exercise, security leaders have to prioritize their projects and initiatives for the next year. Savvy security leaders know to look for security resources in other areas of the organization, Denim Group principal John Dickson said in a recent RSAC webcast. "This is not about vendors selling security solutions to CISOs or CSOs," Dickson said. "This is about internal…

  • Risk Assessments Critical for Budget Planning

    by Fahmida Y. Rashid on October 22, 2014

    Planning for next year's budget is stressful for everyone involved, but information security professionals have the added challenge of translating their requests into business risks to get senior management buy-in. Understanding how the threats and gaps in protection map to business risks will help streamline the first round of budget planning. It is critical that you perform a full risk…

  • How Savvy Security Leaders Get the Budgets They Need

    by John Dickson on October 15, 2014

    I have been a student of security for nearly twenty years and have paid close attention to how certain security managers were able to secure scarce company resources to build their security programs while others were not. These are security managers in organization that had not yet encountered a major security breach or a similar "near death" experience. To state the obvious, marshaling resources…

  • Making Room for Security Training in Your Budget

    by Fahmida Y. Rashid on October 13, 2014

    When there are so many security threats demanding our attention and initiatives needing funding, it can be difficult to decide how to allocate the security budget. Security awareness training goes beyond preventing some attacks to improving an organization's overall security posture. Over the past few months, we've seen attackers increasingly relying on phishing and other social engineering…

  • Getting the InfoSec Budget You Need

    by Fahmida Y. Rashid on October 1, 2014

    There is a tongue-in-cheek saying that goes something like this: How do security professionals get the security budget they want? Wait for a data breach. It's a sad state of affairs that there is a grain of truth to this poor joke. This month, we explore how security professionals can tackle budget planning for next year. Security spending as a percentage of the overall IT budget has remained…

  • Does Size Matter in a Data Breach?

    by Fahmida Y. Rashid on September 22, 2014

    Cyber-criminals stole approximately 56 million cards in a five-month attack against Home Depot's point-of-sale systems, the home improvement giant said last Friday. Many media reports honed in on the fact that the breach was larger than the attack that hit Target last year, where 40 million credit and debit cards were stolen. "56 million cards may not be as big as the huge Heartland Payment…

This document was retrieved from https://www.rsaconference.com/blogs on Mon, 05 Dec 2016 19:42:50 -0500.
© 2016 EMC Corporation. All rights reserved.