{"id":163,"date":"2006-12-08T00:00:00","date_gmt":"2006-12-08T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/12\/08\/ideas-you-can-steal-from-six-sigma\/"},"modified":"2021-12-30T11:36:37","modified_gmt":"2021-12-30T11:36:37","slug":"ideas-you-can-steal-from-six-sigma","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/12\/08\/ideas-you-can-steal-from-six-sigma\/","title":{"rendered":"Ideas You Can Steal from Six Sigma"},"content":{"rendered":"<p>Six Sigma&#8217;s data-driven, acronym-laden focus on quality improvement might seem like a mismatch if the rest of your company isn&#8217;t on the program.  But if you listen to a few well-respected security veterans of Six Sigma talk about its benefits, you might be ready to give some Six Sigma ideas a try.  &#8220;Six Sigma is all about measuring process improvement, about taking defects out of a process,&#8221; explains Frank Taylor, CSO of General Electric.  As fiscal pressures and consequences of security grow, business leaders are going to demand that we have a way to indicate how effective our programs have been,&#8221; Taylor points out.  Once you&#8217;ve got that in place, here are a few Six Sigma tenets that stand to deliver the biggest bang for the buck in terms of improving the efficiency and effectiveness of both physical and information security.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>With the blessing of top management, security looked at the entire supply chain and made some discoveries that were not apparent to individual managers.<\/p>\n<p>Voice of the Customer (VOC) VOC is the process used to determine the needs of the customer, aimed at improving the customer experience and increasing loyalty.  &#8220;Voice of the Customer forces you to leave the ivory tower and reach out and interface with your customers,&#8221; explains Greg Avesian, vice president of enterprise IT security at Textron.  Following VOC&#8217;s directives to interface directly and frequently with the customer (Avesian meets formally with business unit CIOs every quarter, for example) ensures that security&#8217;s focus is on servicing the business units rather than guarding the bits and bytes, he says.<\/p>\n<p>Failure Modes and Effects Analysis (FMEA) The FMEA procedure aims to identify every possible way in which a process or product might fail, rank on a scale of one to 10 those possible failures and probable causes, and prioritize solutions.  &#8220;For security, the twist would be to say not just how could a given step fail, but how can we make it fail, how can we force it to fail?&#8221;<\/p>\n<p>http:\/\/www.csoonline.com\/read\/120106\/fea_six_sigma.html<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-163","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/163","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=163"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/163\/revisions"}],"predecessor-version":[{"id":2650,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/163\/revisions\/2650"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=163"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=163"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=163"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}