Eliminating the blind spots: How to be accountable for an organisation’s overall security
Lorraine Dryland
Additional contact information
Lorraine Dryland: First Sentier Investors, Finsbury Circus House, UK
Cyber Security: A Peer-Reviewed Journal, 2022, vol. 5, issue 4, 350-360
Abstract:
The aim of this paper is to share my experiences of being accountable for an organisation’s overall security and the challenges I have faced. In particular, this paper focuses on being accountable for the protection of data. I found that it was impossible for me to achieve my goals given that you cannot protect what you cannot see, which is true for so many aspects of the security world. I found that to be in a position to protect data, I first needed visibility and then needed to ensure that the business was able to manage and control the data. Depending on the size of the company, it often falls to information security to drive such initiatives, as often the security technologies are able to provide this visibility and the security policies support the control and continued management. Specifically, this paper has a tight focus on building foundational capability that can support data protection, life cycle management, integrity and many of the other components needed for data management, touching on each but not in significant detail, as these topics justify papers in their own right. My hope is that if, like me, you are in the sphere of managing data, you can take some comfort that you are not alone, and that this paper has mirrored some or all of your journey, or that one or more of these insights and lessons learned are helpful in your considerations in managing your data.
Keywords: data management; data visibility; data protection; data security; data discovery; data life-cycle (search for similar items in EconPapers)
JEL-codes: M15 (search for similar items in EconPapers)
Date: 2022
References: Add references at CitEc
Citations:
Downloads: (external link)
https://hstalks.com/article/7009/download/ (application/pdf)
https://hstalks.com/article/7009/ (text/html)
Requires a paid subscription for full access.
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:aza:csj000:y:2022:v:5:i:4:p:350-360
Access Statistics for this article
More articles in Cyber Security: A Peer-Reviewed Journal from Henry Stewart Publications
Bibliographic data for series maintained by Henry Stewart Talks ().