Yes You Do Have One– A Role in Cyber Security
August 6, 2015 | Authored by William Prohn CISSP, CISA, CGEIT, CRISC
Common axioms in information security are “everyone has a role to play,” and “a system is only as secure as its weakest link.” But just like a sports team which has a common goal (winning) but whose members have specific positions to play (offense, defense, special teams), so too are there very specific things that individuals at various levels and roles in an organization can and should do to effectively secure systems and information.
Members of the board, senior management, middle management, the I.T. (information technology) department, the HR department, customers, vendors, rank-and-file employees, and private citizens all have individual roles to play in cyber/information/IT security, and each should know and play his or her role effectively, lest they become the weakest link.
Comfortable with yours? Register for Business First’s Cyber Security Power Breakfast on Tuesday, August 11. I will be on a panel with experts from the FBI, Hodgson Russ and Lawley Insurance.
For more information, please contact William Prohn at wprohn@dopkins.com.
About the Author
William Prohn CISSP, CISA, CGEIT, CRISC
Bill oversees all aspects of information technology for the firm, and provides consulting services to a wide spectrum of Dopkins’ clients. He has over 30 years of experience in accounting and business information systems. His specific interests include creating meaningful, practical management information using computer technologies, and the security of business information and systems.