Action or Reaction
Information technology professionals, executive leadership and organizations as a whole “react” when cyber security incidents occur. It takes a mature entity to procure, deploy, manage and maintain a viable and successful security team that moves towards a proactive defense. Numerous high-profile breaches over the past few years, from the city of Atlanta ransomware attack, to the OMB data theft and Target point of sale credit card theft incident, highlight this fact. Proactive cyber defense includes three key factors, people, process and technology. When companies, government agencies and individuals understand the need to properly utilize people, processes and technologies in the cyber security arena, they can move away from panicked response into preventative actions and protective environment creation.
Read the complete white paper by Eric Jeffery:
Note: Eric will present at the International Cyber Security and Intelligence Conference July 16-18, 2019 in Toronto, Canada on this topic. Eric has 20 years’ experience in Cyber Security and currently works as a senior managing consultant and solutions architect for IBM Security in their Security Information and Operations Consulting practice. Mr. Jeffery’s focus involves network design, network implementations, and network security. He has a Bachelor of Arts degree in Economics from the University of Colorado at Boulder and resides in Southern Colorado with his wife.
The comments, suggestions, and statements in this article are my own and don’t necessarily represent IBM’s positions, strategies or opinions.