A new report from the Information Security Forum (ISF) explores the key elements that are integral to optimizing a SOC’s performance, realizing operational efficiency and pursuing innovation, and equips organizations with a practical understanding of how to design, establish and enhance a SOC that is both empowered by the organization, and aligned with business requirements.
Despite the availability of an experimental vaccine and the recent experience of a major Ebola outbreak in West Africa, the Democratic Republic of the Congo (DRC) is failing to address what is now the world’s second-largest outbreak of the disease.
According to the Disaster Recovery Institute (DRI), the actual scope of work of a BC or resilience professional hasn’t really changed. Organizations still must have high-quality response and damage limitation plans formulated by skilled planners. The change in the resilience profession, however, is moving away from a technical specialization and into mainstream business risk management. DRI reports that consolidation of resilience disciplines has increased over the past year. The main result of this is that fewer organizations have independent business continuity departments, with BC professionals being incorporated into existing risk management or information security divisions.
U.S. Senators Rob Portman (R-OH) and Tom Carper (D-DE) published a report that documents the failure of eight federal agencies, over the course of two administrations, to address vulnerabilities in their IT infrastructure.
If there is any broad lesson we have learned over the past decade of global developments, it is the extent to which risks are connected and the shocks that can result if we do not acknowledge their linkages
Of the 15 percent of workers who changed or lost their jobs in the past year, half took confidential company data with them – and 52 percent didn’t view the use of such documents as a crime. A lack of security can impact an organization’s growth and innovation, making it more difficult to meet workforce and customer needs.
There is a need for security teams to consolidate their security solutions to increase visibility, reduce clutter, manage costs and simplify their cybersecurity processes. However, it’s important that we are clear with why security teams are facing this situation.