Connecting to LinkedIn...

W1siziisijiwmtuvmdqvmtuvmdgvntqvmzgvnzi1l01ptlrbu0hfqkxpr19vtljftkrfukvex0lnqudfx3jlc2l6zwrfyw5kx3jlbmrlcmvklmpwzyjdlfsiccisinrodw1iiiwimtkymhgxmjuwiyjdxq

Blog

Montash Blog: Governance risk compliance – The role of information security

16/04/2015 by Sharon Shahzad

W1siziisijiwmtuvmdqvmtyvmtivntmvndyvnti2l0zyyxvksw1nlmpwzyjdlfsiccisinrodw1iiiwinjawedqwmfx1mdazzsjdxq

Information security is no longer just a concern for the IT department. Insider threats, cryptography, threat vulnerabilities and public key infrastructure are just several of the activities that impact the ability of a business to adopt an effective governance risk compliance strategy. Modern businesses need to juggle data protection legislation, mitigate threats from inside and outside influences and inspect, record, destruct and account for every piece of data – all while ensuring business continuity is not affected.

Insider threats

Insider threats can pose a risk to the realisation of a modern organisation's objectives, so it is important that they are managed effectively – especially when personal issues arise. Staff reductions and performance plans can result in information security problems as disgruntled employees attempt to remotely access the computer system. Ensuring that legal, IT and human resources departments work in tandem to create a plan for communicating personal information can mitigate these security issues.

For example, HR will be the first to know about pending personnel changes and other sensitive information, so is it is vitally important that they notify the IT department about an elevated risk. This communication will ensure the company is vigilant about insider threats, which improves risk management as the threats are known and accounted for.

Cryptography and PKI

Cryptography and public key infrastructures are central to compliance strategies. The UK Data Protection Act states that SMEs and big corporations must know where their data is being processed and stored. Breaching these laws can have devastating consequences and result in lasting damage to a business’ reputation and huge fines. Public key infrastructure (PKI) provides the standards, protocols and a framework to deploy an information security system that works and is flexible to change. Certificates and certificate authorities are central to cryptography as they ensure that users on a network are genuine. Service providers such as Oracle can also deliver several default-trusted certificates. PKI enables delegated trust and improves information security across a business.

Threat vulnerabilities

Testing for threat vulnerabilities is an important information security process. Security flaws allow erroneous third parties to make a successful attack, so testing will improve a firm's ability to respond effectively in real time as dangers arise. It is also a core governance risk compliance strategy as it is invaluable for technology and policy development. Selecting the right technology will save both time and money and improve business-wide decision-making. The threat landscape is constantly in flux and open source code commonly used in an organisation's applications poses greater risks. Keeping track of these vulnerabilities through a proactive approach will reduce these operational risks.

This article has been written by John Winfield - Information Security Consultant,if you have any questions or would like a detailed discussion about your Information Security recruitment requirements for 2015, please contact John Winfield on: +44 (0)20 7014 0230 or send an email to johnw@montash.com.

Montash is a multi-award winning global technology recruitment business. Specialising in permanent and contract positions across mid-senior appointments across a wide range of industry sectors and IT functions, including:

ERP Recruitment, BI & Data Recruitment, Information Security Recruitment, IT Architecture & Strategy Recruitment , Energy Technology Recruitment, Demand IT and Business Engagement Recruitment, Digital and E-commerce Recruitment, Leadership Talent, Infrastructure and Service Delivery Recruitment, Project and Programme Delivery Recruitment.

Montash is headquartered in Old Street, London, in the heart of the technology hub. Montash has completed assignments in over 30 countries and has appointed technical professionals from board level to senior and mid management in permanent and contract roles.



comments powered by Disqus

Social Stream

Latest News

W1siziisijiwmtcvmdqvmtkvmtuvndivntgvnjcyl3nodxr0zxjzdg9ja18xmja3mdi1ndcuanbnil0swyjwiiwidgh1bwiilcizodb4mtawiyjdxq

Evolve or Die: The Importance of Being Agile

2017-04-19 18:00:00 +0100

In the high-speed world of IT, agility is essential if you want to stay on top. Over the last 20 years, Montash Managing Director Roy Dungworth has experienced many changes in the industry. But two things never change - the need for business agility and the importance of people. Roy shares his insights after two decades in the industry. The pace of the IT industry increases every year. The way people buy or consume information today is having an enormou...

W1siziisijiwmtcvmdmvmdgvmdkvmzkvmtqvmzgxl3dvbwvuigluigj1c2luzxnzlmpwzyjdlfsiccisinrodw1iiiwimzgwedewmcmixv0

Dear 18-year-old me: It’s a woman’s world too

2017-03-08 09:00:00 +0000

With International Women’s Day being all about celebrating the cultural, economic, political and social achievements of women, it highlights the issue of women in technology, which remains a contentious one. Recent research from WISE, which campaigns for gender balance in science, technology and engineering, found that women only make up just 17 per cent of all IT professionals in the UK. Montash Recruitment Consultant Sadiye Booker has shared her exper...