Blog

The CISO’s New Duty: Building Trust

Trust, especially in this year of remote work, is an essential component of the work of IT Security Professionals. CISOs have already embraced the concept of trust as a deliverable and are making it the central theme of their entire security function.

 

Mary K. Pratt, in her piece for CSO Online, interviewed numerous IT Leaders and got their take on how cultivating trust will lead to greater organizational success.

Here were a few of my favorite quotes:

🤝 Michael Weisberg, CISO of Garnet River LLC, says, “If you don’t have the trust, then your motives become questioned…”

🤝 Monica Cole-Rowe CISSP, CISO of Mazuma Credit Union, says, “Trust gives you the ability to influence those decisions that affect the entire business.”

🤝 Steve Berez, partner at Bain & Co., says, “So broadly the CISO’s job has a great deal to do about trust and creating trust that the data provided to the company is secure. That’s probably the most important role of the CISO today.”

How Facial Recognition Can Be Applied Responsibly by IT Leaders

 

Facial recognition technology is becoming more and more mainstream. To read this, you first unlocked your iPhone- maybe using facial recognition. However, this technology is not without controversy.

In his piece for InformationWeekFrank Buytendijk, Distinguished VP and Gartner Fellow at Gartner, says IT leaders need to adhere to digital ethics in order to use facial recognition responsibly.

Here are the 4 actions IT Leaders should take in order to do so:

👀 To combat issues of bias and false positives, IT Leaders should aim to develop sufficient countermeasures or verification procedures.

👀 To establish proportional use of facial recognition, IT Leaders should ask: “Can we achieve the same end by less invasive and more consensual means?”

👀 To determine purpose boundaries for collected data, IT Leaders should explicitly determine and document its lineage of intent.

👀 To expand the rights of people identified in images, IT Leaders should work with their legal teams to understand the intellectual property rights relevant to facial recognition images and analysis.

Facial recognition technology isn’t going anywhere, it’s important to consider how to use this technology responsibly before it’s deployed at scale.

No alt text provided for this image

6 Ways to Keep Good Ideas Alive at Your Company

Don’t let an idea fade.

In large organizations, many things can kill promising ideas. But when these companies decide they need more “innovation,” they forget to address the things that killed the good ideas in the first place.

In his piece for Harvard Business ReviewScott Kirsner addresses the 6 ways organizations can get an idea “rolling” ✨:
https://bit.ly/376y7kc

💡 Start with a Survey: Ask the innovators in your firm about the dynamics of how executives approach decisions.

💡 Decide if it’s a consultancy or skunkworks: Consult with firm units, ask them to identify needs your team should work on. Compete with products the company sells.

💡 Get External Validation: Reading about an idea in the press helps a leader feel like “it’s their idea.”

💡 Invest Real Money: Businesses can give money to employees inventing. Investing money into a new creation can take a good “turn” for a business.

💡 Reward decision-makers who back winners: There is a upside for executives who back winners and “backing loser isn’t a career-ending-move” is vital to making sure new ideas get the support needed.

💡 Think weekly, not quarterly: Look for every tweak that can be improved with an innovation. Meet every week to discuss progress and not quarterly.

No alt text provided for this image

Top Strategies Of The Week for IT Business Leaders

The question of What Does It Mean to Build Enterprise Value has been a provocative one.

Here are some major highlights from recent discussions I’ve had with IT Leaders with over 20-25 + years of experience.

There is no algorithm we know of yet for experience 😀

Weekly Summary

IT Business Leadership, Strategy & Innovation

Offense & Defense Innovation

1.    What is the best bang for your buck for 2021- James Crifasi, COO/CTO at RedZone Technologies analyzes the effectiveness of security controls and why having multiple layers of security may not be beneficial.

2.    Your title matters when building enterprise value- Bill Murphy discusses the internal and external effects of titles in business.

3.    The 80/20 rule: Prioritizing wants vs. needs using the Pareto Principle- Bill Murphy discusses how using the Pareto Principle will help differentiate priorities from “must do’s.”

4.    Don’t let spammers take advantage of your fear- James Crifasi, COO/CTO at RedZone Technologies lays out how to avoid falling victim to email spammers.

5.    You will lose doing security 100% yourself- Bill Murphy clears up any confusion surrounding the value of virtual security teams.

About RedZone Technologies

Since 2001, RedZone Technologies has been the local leader in Managed Security Services, Data Governance, Security Assessments, Integration, and Policy Management, helping CIOs and Business IT Leaders prioritize cybersecurity spending based on risk while building enterprise value for IT business leaders who want to innovate and lead change.

RedZone Technologies specializes in:

•      RedZone MSP and MSSP: ‘On-Demand’ security and trusted advisor programs

•      Co-MITS – Co-Managed IT Security (‘Hands-on’ Managed Services)

•      Cloud Security and Secure IT Infrastructure Support

•      Virtual Information Security Operations Programs (IT SecOps and VISO)

Contact us at 410-897-9494 or myteam@redzonetech.net with any questions.

No alt text provided for this image

Capture Client Stops Malicious Files!

Be safe. Be Secure.

Capture Client is a unified endpoint platform used to 🚫block malicious files allowing only trusted users and clean files into a network.

🗸The next-generation malware application protects security inside and outside of firewalls. 🔥

✔️This platform restricts individual system access to ensure a better network protection and looks at the rapid growth of encryption malware by providing built-in capabilities.

RedZone Technologies will be discussing Capture Client and the 4 other top themes on our Live Security Talk Show in more detail happening today, Wednesday, October 14th from 3:00PM to 4:30PM.

1. SSL Decryption and outbound protocol control.

2. API based Account Takeover and Cloud Security

3. MFA and Conditional Access

4. Next-Gen Antivirus/ Client Security

5. Why are SIEM’s dead and how to better use that budget

Be safe. Be Secure. Capture Client is a unified endpoint platform used to 🚫block malicious files while allowing only trusted users and clean files into a user’s network. 🗸The next-generation malware application protects security inside and outside of firewalls. 🔥 ✔️This platform restricts individual system access to ensure a better network protection and accesses the rapid growth of encryption malware by providing built-in capabilities. RedZone Technologies will be discussing in detail Capture Client and the 4 other top themes on our Live Security Talk Show in more detail happening today, Wednesday, October 14th from 3:00PM to 4:30PM. 1. SSL Decryption and outbound protocol control. 2. API based Account Takeover and Cloud Security 3. MFA and Conditional Access 4. Next-Gen Antivirus/ Client Security 5. Why are SIEM’s dead and how to better use that budget https://adobe.ly/33TdXIc #Capture #Security #Block