{"id":245,"date":"2013-05-24T00:00:00","date_gmt":"2013-05-24T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2013\/05\/24\/auscert-2013-visibility-critical-when-selling-it-security-to-execs-says-foxtel-cso\/"},"modified":"2021-12-30T11:36:50","modified_gmt":"2021-12-30T11:36:50","slug":"auscert-2013-visibility-critical-when-selling-it-security-to-execs-says-foxtel-cso","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2013\/05\/24\/auscert-2013-visibility-critical-when-selling-it-security-to-execs-says-foxtel-cso\/","title":{"rendered":"AusCERT 2013: Visibility critical when selling IT security to execs, says Foxtel CSO"},"content":{"rendered":"<p style=\"margin: 0px;\">Hard-to-find security skills and the rapid pace of malware evolution make a strong relationship with a managed security services (MSS) provider as important as maintaining the internal tools to keep business executives apprised of IT-security risk, Foxtel information security manager Kevin Shaw has advised. Properly informing those relationships, however, remains one of the security executive\u2019s biggest ongoing challenges: different expectations, changing technologies, malleable business objectives \u2013 and the constant dread of being the one confessing a security breach to a risk and audit committee or angry CEO \u2013 all force security executives to be as proactive as possible when it comes to managing risk. \u201cI want to know that if someone adds a new server, that I can come back through my actionable intelligence and confirm that box has the right agents, has been hardened for the criteria we\u2019ve mandated,\u201d Shaw said. Under Shaw\u2019s guidance, Foxtel has maintained a long-term MSS relationship with Symantec, which provides extra skilled staff that not only keep apprised of new threats, but monitor the company\u2019s infrastructure 24\/7 for signs of malicious activity.<\/p>\n","protected":false},"excerpt":{"rendered":"<p style=\"margin: 0px;\">Everybody owns [infrastructure] when they don\u2019t want you to touch it, but nobody owns it when it\u2019s their bum on the line if things go wrong<\/p>\n<p style=\"margin: 0px; min-height: 14px;\"><\/p>\n<p style=\"margin: 0px;\">Building on the MSS relationship not only allows Foxtel to be more proactive in maintaining its security posture, but supports interactions with executives who are less concerned with technical minutiae but think of IT security in terms of business risk.<\/p>\n<p style=\"margin: 0px; min-height: 14px;\"><\/p>\n<p style=\"margin: 0px;\">Analysis of internal cost-recovery claims is a great way to marry IT-security activity to potential business change: once the IT staff know which business units are paying for what systems and services, it\u2019s much easier to know how any potential security issue will affect which parts of the business. Everybody owns it when they don\u2019t want you to touch it, but nobody owns it when it\u2019s their bum on the line if things go wrong.\u201d<\/p>\n<p style=\"margin: 0px; min-height: 14px;\"><\/p>\n<p style=\"margin: 0px;\">Shaw has often found it\u2019s easier for an internal security organisation to get leverage with other business units by handballing the bad news to the MSS: \u201cit\u2019s always effective bringing in external parties to talk to your executives,\u201d he laughed. \u201cYour executives are not going to give you budget unless you can marry together the value from MSS, actionable intelligence \u2013 unless you can demonstrate the value to the business and where the business is trying to go.<\/p>\n<p style=\"margin: 0px;\"><\/p>\n<p style=\"margin: 0px;\">Link: <a href=\"http:\/\/www.cso.com.au\/article\/462775\/auscert_2013_visibility_critical_when_selling_it_security_execs_says_foxtel_cso\/\">http:\/\/www.cso.com.au\/article\/462775\/auscert_2013_visibility_critical_when_selling_it_security_execs_says_foxtel_cso\/<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-245","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/245","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=245"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/245\/revisions"}],"predecessor-version":[{"id":2732,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/245\/revisions\/2732"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=245"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=245"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=245"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}