#CIOChat

Why is security important? Tweet jammers talk IT protection priorities

Security breaches happen, but some cause more harm than others. How can professionals charged with IT protection and compliance activities ensure that their security efforts maximize protection? Where and why is security important?

More from our cybersecurity tweet jam

Avoid issues with

    Requires Free Membership to View

The traditional approach to cybersecurity typically focuses most resources on critical system components and on combatting the largest known threats. This method of defense leaves less-visible system components open to threats and other less-obvious risks unattended.

In SearchCIO's recent cybersecurity-themed tweet jam, participants discussed just that. How do you determine what needs protecting? Specifically, we asked the following:

Our tweet jam expert, Elliott Franklin, information security manager at San Antonio, Texas-based Whataburger Restaurants LLC, said that IT professionals should first focus on business-critical activities:

Speaking of the business, our tweet jam participants emphasized the importance of getting everyone on the same page when it comes to appropriate cybersecurity and understanding the foundations of security:

To combat security breaches, CIOs, chief information security officers and compliance officers must understand why security is important and what data they need to protect. From there, employee training must be a top priority, according to tweet jammers:

Expanding upon SearchCompliance's tweet, giving employees access to corporate information via mobile devices, take-home laptops or tablets opens a vector for security breaches. But is end-user training enough to combat this increased risk? Tweet jammers discussed how to maneuver the physical aspect of security breaches:

Creating a firewall and protecting data digitally is important, but #CIOChat participants were just as concerned about in-the-flesh threats:

Where are you security efforts focused? How do you decide what needs protecting, and to what extend do compliance regulations play a role? Tell us why you think security is important in the comments section below, then read the full #CIOChat conversation on Twitter.

This was first published in November 2013

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

Expert Discussion

TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Disclaimer: Our Tips Exchange is a forum for you to share technical advice and expertise with your peers and to learn from other enterprise IT professionals. TechTarget provides the infrastructure to facilitate this sharing of information. However, we cannot guarantee the accuracy or validity of the material submitted. You agree that your use of the Ask The Expert services and your reliance on any questions, answers, information or other materials received through this Web site is at your own risk.