{"id":239,"date":"2013-05-09T00:00:00","date_gmt":"2013-05-09T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2013\/05\/09\/information-security-can-learn-from-physical-security\/"},"modified":"2021-12-30T11:36:49","modified_gmt":"2021-12-30T11:36:49","slug":"information-security-can-learn-from-physical-security","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2013\/05\/09\/information-security-can-learn-from-physical-security\/","title":{"rendered":"Information security can learn from physical security"},"content":{"rendered":"<p>Physical security can provide a number of guidelines when establishing an information security model, says Johann van der Merwe, global head of information security at De Beers \u201cYou can get a lot of tips from physical security when you want to get a company\u2019s information security off the ground,\u201d says Van der Merwe. He says it is important to remember that diamonds are at the centre of De Beers\u2019 pipeline and that everything \u2013 including information security \u2013 essentially revolves around that.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Van der Merwe has headed the information security of the largest diamond company in the world, by value, since its information security team was established.<\/p>\n<p style=\"margin: 0px;\">\u201cUnderstand who you are dealing with,\u201d said Van der Merwe, \u201cbecause it is often much more complex than you realise.\u201d<\/p>\n<p style=\"margin: 0px; min-height: 14px;\"><\/p>\n<p style=\"margin: 0px;\">\u201cIf someone asks, \u2018how much information am I losing really?\u2019, this is a very hard question to answer,\u201d explained Van der Merwe.<\/p>\n<p style=\"margin: 0px; min-height: 14px;\"><\/p>\n<p style=\"margin: 0px;\">\u201cIf you have a really strong threat model, the people in your organisation may become a victim of it,\u201d explained Van der Merwe. Know that people within your organisation could be targeted to become a pawn in the enemy\u2019s game, he added.<\/p>\n<p style=\"margin: 0px; min-height: 14px;\"><\/p>\n<p style=\"margin: 0px;\">\u201cYou have to be able to integrate all your teams when dealing with a strong targeted threat model,\u201d said Van der Merwe.<\/p>\n<p style=\"margin: 0px; min-height: 14px;\"><\/p>\n<p style=\"margin: 0px;\">\u201cThe only way to make sure all your systems are on standard is to have proper management systems in place that understand the objectives and are driven to reach them,\u201d said Van der Merwe.<\/p>\n<p>\nLink: <a href=\"http:\/\/www.itweb.co.za\/index.php?option=com_content&amp;view=article&amp;id=63857\">http:\/\/www.itweb.co.za\/index.php?option=com_content&amp;view=article&amp;id=63857<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-239","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/239","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=239"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/239\/revisions"}],"predecessor-version":[{"id":2726,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/239\/revisions\/2726"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=239"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=239"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=239"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}