p1ags105a4ofk1n5136f11d44se6.jpg
Security Questions Every CIO Must Be Able to Answer
Every organization is a potential target of a cyber-attack, and most security studies warn that the majority are overly confident in their defenses. Knowing how safe and secure your organization really is may depend on how you answer these critical questions.
p1ags10a3f11le1kra9ee15371g0p7.jpg
Security Questions Every CIO Must Be Able to Answer
Cybercrime is an insidious business; it happens in plain sight, avoids detection and causes damage quickly. There are even cybercrime-as-a-service offerings available to criminals who lack the technical know-how to reap the big jackpots capable of totaling tens of millions of dollars, according to Logicalis, an international IT solutions and managed services provider (www.us.logicalis.com). So, how do you prepare your organization to overcome an eventual attack? The firm stresses that any solution begins by answering these important questions:
p1ags10c2hudnoespsf6pc1ifb8.jpg
Security Questions Every CIO Must Be Able to Answer
If you knew that your company was going to be breached tomorrow, what would you do differently today?
p1ags10ea06od1p5r1h4k17rp1q559.jpg
Security Questions Every CIO Must Be Able to Answer
Has your company ever been breached? How do you know?
p1ags10g0pppi3lh4hhu9d18m6a.jpg
Security Questions Every CIO Must Be Able to Answer
What assets am I protecting, what am I protecting them from (i.e., theft, destruction, compromise), and who am I protecting them from (i.e. cybercriminals or even insiders)?
p1ags118bn10m21rc3t1fa5u13i4g.jpg
Security Questions Every CIO Must Be Able to Answer
What damage will we sustain if we are breached (i.e., financial loss, reputation, regulatory fines, loss of competitive advantage)?
p1ags11e1cg11nla1eno1njp1cu3h.jpg
Security Questions Every CIO Must Be Able to Answer
Have you moved beyond an “inside vs. outside” perimeter-based approach to information security?
p1ags11ku8aduecnhd8775q3ki.jpg
Security Questions Every CIO Must Be Able to Answer
Does your IT security implementation match your business-centric security policies? Does it rely on written policies, technical controls or both?
p1ags11rvqf0aqamku01jtog9bj.jpg
Security Questions Every CIO Must Be Able to Answer
What is your security strategy for IoT (also known as “the Internet of threat”)?
p1ags121at3p2133ocp81uog1p4ik.jpg
Security Questions Every CIO Must Be Able to Answer
What is your security strategy for “anywhere, anytime, any device” mobility?
p1ags127k83r51i8g15m91g9417dvl.jpg
Security Questions Every CIO Must Be Able to Answer
Do you have an incident response plan in place?
p1ags12d8v17s9157tg8i1rp71fu9m.jpg
Security Questions Every CIO Must Be Able to Answer
What is your remediation process? Can you recover lost data and prevent a similar attack from happening again?