Thursday, 31 March 2011
A timely reminder about Data security
This week I attended a seminar on how to be a SIRO, Senior Information Risk Owner
In other words how to protect the organisation from data abuse.
In an age where we are trying to encourage staff to use data and information properly it was useful to be reminded of how things go wrong. In particular we looked at a few examples across the UK and how disaster can be avoided.
The role and value of data and information has changed and become much more valuable as an asset to our organisation
In essence information is;
o A political issue
o A key asset
o A toxic liability
So we considered the challenges that face all organisations and specifically by senior managers. These included:
a. There is less money to spend on protection. It is seen as an overhead
b. Sometimes there is a lack of Board support
c. Whatever we do, we need to “apply controls without strangling the business”
d. Our response needs to be Proportionate
e. As well as our own people we need to manage the access of external partners
f. We must create and deliver a mature approach with staff
g. We need to make data security relevant to staff
The challenge to leaders therefore is to Lead and Foster cultural change in a rapidly changing technological world.
Whilst we try to create the right balance we need to understand that people coming into our organisations have different expectations and understanding of what technology can do.
CPNI good practice guidance on their website
We considered why people abuse data and information. These included
o Personal Financial benefit
o Coercion by another
o Revenge against an individual group or the organisation
o A sense of Noble Cause
o For Political benefit either party or other
o Perhaps even to gain a sense of Emotional gain
In other words there are a range of reasons and these are not unique or exclusive
It was a useful session delivered well by the NPIA and particularly the ACPO lead.
A very valuable day……………..now where did I put that USB.Drive
Labels: police it security
Popular Posts in last 7 Days
So Saturday was the Big March. Anywhere between 300 and 500,000 peaceful protesters protesting. All magnificently managed by the Met suppo...
Ransomware Seminar 19th May 09.30-11.30 Ransomware is now one of the biggest threats to industry, charities, health and citizens. Fin...
The company Wethersoons seems to have been hit by the next in a long series of hacks. See http://www.computerweekly.com/news/4500260119/Wet...
I am helping Leeds University with a business Cybercrime Survey go to www.bit.do/cybersurvey to complete it or use the QR code. Many tha...
The guy behind the swim is Najib Belhadi Here is his swimming CV http://openwaterpedia.com/index.php?title=Nejib_Belhedi A remarkable and...
An issue for us and many others is how you offer guidance to staff about their use of social media. Should we create a new set of rules to c...
The Apple FBI saga The disagreement over Apple and the FBI has become a microcosm of the world of cyber and digital crime. Warrant...
Well here goes for Blog number 1 Before I started this I asked for some guidance and advice from others to see what should be in and what s...
Many people are told when they call the police to report a fraud, especially a cyber based one that they should call ActionFraud or report ...
A few days ago the Register published an article about the waste of £20million pounds on Cyber Prevention. http://www.theregister.co.uk/2016...