Thursday, 31 March 2011
A timely reminder about Data security
This week I attended a seminar on how to be a SIRO, Senior Information Risk Owner
In other words how to protect the organisation from data abuse.
In an age where we are trying to encourage staff to use data and information properly it was useful to be reminded of how things go wrong. In particular we looked at a few examples across the UK and how disaster can be avoided.
The role and value of data and information has changed and become much more valuable as an asset to our organisation
In essence information is;
o A political issue
o A key asset
o A toxic liability
So we considered the challenges that face all organisations and specifically by senior managers. These included:
a. There is less money to spend on protection. It is seen as an overhead
b. Sometimes there is a lack of Board support
c. Whatever we do, we need to “apply controls without strangling the business”
d. Our response needs to be Proportionate
e. As well as our own people we need to manage the access of external partners
f. We must create and deliver a mature approach with staff
g. We need to make data security relevant to staff
The challenge to leaders therefore is to Lead and Foster cultural change in a rapidly changing technological world.
Whilst we try to create the right balance we need to understand that people coming into our organisations have different expectations and understanding of what technology can do.
CPNI good practice guidance on their website
We considered why people abuse data and information. These included
o Personal Financial benefit
o Coercion by another
o Revenge against an individual group or the organisation
o A sense of Noble Cause
o For Political benefit either party or other
o Perhaps even to gain a sense of Emotional gain
In other words there are a range of reasons and these are not unique or exclusive
It was a useful session delivered well by the NPIA and particularly the ACPO lead.
A very valuable day……………..now where did I put that USB.Drive
Labels: police it security
Popular Posts in last 7 Days
The guy behind the swim is Najib Belhadi Here is his swimming CV http://openwaterpedia.com/index.php?title=Nejib_Belhedi A remarkable and...
The Apple FBI saga The disagreement over Apple and the FBI has become a microcosm of the world of cyber and digital crime. Warrant...
ECPAT is an international charity aiming to tackle Child Prostitution and Trafficking. It is a great charity and here is a tale of what som...
Over the last few years I have been engaged in a range of online issues, including e-crime fraud and earlier the establishment of CEOP. Wha...
The Blue Lamp Trial Next week I am embarking on my longest swim. The length of Windermere. The intention is two-fold. First to raise awar...
This week I attended a seminar on how to be a SIRO, Senior Information Risk Owner In other words how to protect the organisation from data a...
This morning I spent time with the Scout movement. Or rather I visited the Ratlingate camp site near Carlisle and met a large number of troo...
Back in 2012 I undertook research to look at the number of times that the term Facebook was referred to in the Police Communications Logs. T...
Today HRH Prince Charles visited Cumbria and was given the opportunity to meet a range of people, businesses and buildings across the county...
Every year to check I am still relatively healthy and not been spoilt or rendered unhealthy by copious pies I do my annual physical. Mt Vent...