Integrated approach to security

 To address the huge geographic, organizational and technical differences in their networks and visibility, utilities must continue to adopt an integrated approach to security (see the column “A cyber security vision for a Latin American company with essential infrastructure”). Due to the pace and breadth of today's threats, it is unwise to allow organizational compartments to slow down detection, reaction and response.

A vision of cybersecurity for a Latin American company with essential infrastructure.

Concessionaires must continue to think critically, from the point of view of both the organization and the people, on how to deal with organizational silos that may, for valid business reasons, have very different requirements and indicators. This includes defining an agenda and standards for the cybersecurity program that can be used and implemented in even the most disparate business units, thus avoiding situations where one business unit implements cutting-edge protections while another remains unprepared for lack of resources or sense of urgency.

Know more: managed vs unmanaged switch

At the tactical and operational level, we have found that organizational design works best when the security organization's teams have visibility - if not decision authority - with respect to all IT and TO networks and architecture, allowing them to detect and communicate trends that can be indicative of a coordinated attack. A Latin American oil and gas company recently appointed safety advocates in factories and facilities, with a mission to be aware of security risks in IT and TO environments.


From the CEO to the ranks below, employees must continue to listen to coherent and aligned messages that emphasize the idea that safety is everyone's responsibility. While the appointment of a security advocate can create a point of responsibility for security, companies must make it clear that it is a shared responsibility.

Comments

Popular posts from this blog

International English Language Testing System (IELTS)

Prevention and Recovery: How can security tools help?

How to increase visibility and mitigate risks in the corporate network?