Time for Information Security Management to Go to War

Sun Tzu’s The Art of War has long been required reading for military leaders. Andrew Clark has taken this masterpiece of war-fighting strategy and built an inspiring corollary that draws on the techniques and motives of the war-fighter and places them in the information warfare arena. This innovative document may change the way you view your information technology defensive posture.

The concluding section is particularly thought-provoking, as can be seen from the following quote: “Today, many of us in the field of information security are expected to fill the role of general in the event of conflict. Few of us have felt the need to study the art of war — perhaps it is time to change that.”

Practices for Securing Critical Information Systems is a very comprehensive report recently produced by the Critical Infrastructure Assurance Office (CIAO). The document details the processes for locking down components of your information technology infrastructure. It provides guidance for the development of an effective computer security program and delineates the interrelationships of the individual components. This document represents a “total defence” approach to computer security and is a “must have” for your computer security library.

I also like the extensive hypertext links and pointers to information created and maintained by other leading public and private organizations. Just applying the ideas from the report’s Appendix E — Low-cost/No-cost Computer Security Measures — will greatly increase your organization’s security effectiveness.

The two reports (and many others) are available at http://www.fedcirc.gov/docsindex.html.

Leading Web Sites Supporting Security Management

1. ISSA — Information Systems Security Association

www.issa.org

2. COAST — Computer Operations, Audit and Security Technology

www.cs.purdue.edu/coast

3. CERT — Computer Emergency Response Team

www.cert.org

4. CSI — Computer Security Institute

www.gocsi.com

5. ICSA — International Computer Security Association (formerly NCSA)

www.icsa.net

6. NIST — National Institute of Standards and Technology

www.nist.gov

7. FEDCIRC — Federal Computer Incident Response Capability

www.fedcirc.gov

Dan Swanson is a management consultant with LGS Group in Winnipeg. He specializes in audit and management consulting and can be reached at dswanson@lgs.ca

Would you recommend this article?

Share

Thanks for taking the time to let us know what you think of this article!
We'd love to hear your opinion about this or any other story you read in our publication.


Jim Love, Chief Content Officer, IT World Canada

Featured Download

Previous article
Next article

Featured Articles

Cybersecurity in 2024: Priorities and challenges for Canadian organizations 

By Derek Manky As predictions for 2024 point to the continued expansion...

Survey shows generative AI is a top priority for Canadian corporate leaders.

Leaders are devoting significant budget to generative AI for 2024 Canadian corporate...

Related Tech News

Tech Jobs

Our experienced team of journalists and bloggers bring you engaging in-depth interviews, videos and content targeted to IT professionals and line-of-business executives.

Tech Companies Hiring Right Now