Technology is only skin deep. When it comes to a solid security approach, it's what's on the inside that counts. I was a teenage security werewolf.Well, loosely speaking, anyway. I wasn’t really a teenager. But when it came to security, I was young and naive and all about the technology. And then one day I had an epiphany: I realized that sometimes what I considered to be an unacceptable security practice could still be an acceptable business risk. It isn’t important, really, how I got there. I finally realized I had been missing the point, attempting to throw the latest and greatest technology solutions at the security issues I had identified. And I began to see that it was impossible to assess a company’s security program without understanding its culture and how the business management processes evolved within it.Now, maybe that’s not news to most people. But to me, it was a revelation that rocked my world. So I set off to transform myself from a technology werewolf to a more sophisticated security managera true career enhancement decision. Reality set in on day one of my new job when I sat down with my security staff and outlined how we were going to review policies, practices and guidelines surrounding our security capabilities. We would take the organization’s enterprise security architecture to new heights. If the company’s security architecture was at level six, we’d make it a seven. Or even an eight. I discovered pretty quickly that, when it came to security planning, my new company was really back at square one. I should have guessed it right away. I remember worrying that something was missing during corporate’s 10-hour new-hire orientation program. I didn’t hear anything on computer security, let alone information technology in general. IT was simply not on the radar. Digging deeper, I learned from the IT guys that the servers were “locked down,” which gave the company the false notion that it was operating in a secure environment. The proverbial honeymoon was over before it even started.Still, I was determined, so I set out to transform the psyche of my new company, convincing it that IT security has to start with understanding the business needs and then developing a strategy to address those needs. Now, what we’re all so fond of calling best practices can often be generic and unspecified recommendations from vendors or outside authorities that don’t really understand the details of individual business needs. True best practiceswhether security-specific or notcome from within. You need to understand how the business management processes evolved before you can prescribe any suggested practices.Likewise, security compliance must come from within. My new company had been basing its security criteria on the assumptions of outside “authorities” rather than on what was actually happening within the business. But until you get a solid security policy in place, your organization cannot even begin to communicate or implement security expectations, let alone train employees. Without a core security program, there is no compliance to security because there is nothing with which to comply. As I see it now, there are four main beasts that may misalign any security program: No senior management support. Even if programs appear to have senior management sponsorship and dedicated security budgets, they won’t be accepted if employees see them as controlling, wasteful and unproductive. Unreasonable directives. Does technology dictate your business objectives, or does your business dictate your technology needs? Lack of communication. Sometimes, it’s best to let senior management and users “discover” security practices.Limited funding. Budgets are forever tight. Get innovative. Instead of purchasing the learning management system, see what infrastructure already exists.Once a security program is outlined, you can use a consultant to help develop specific security capabilities to enhance it. Every organization is different. Its security needs will also differ. Try to identify and understand how the corporate culture dictates, adopts and evolves security initiatives. And remember: Communication and representation are key factors in your transformation into a successful security manager. Related content news analysis Companies are already feeling the pressure from upcoming US SEC cyber rules New Securities and Exchange Commission cyber incident reporting rules don't kick in until December, but experts say they highlight the need for greater collaboration between CISOs and the C-suite By Cynthia Brumfield Sep 28, 2023 6 mins Regulation Data Breach Financial Services Industry news UK data regulator warns that data breaches put abuse victims’ lives at risk The UK Information Commissioner’s Office has reprimanded seven organizations in the past 14 months for data breaches affecting victims of domestic abuse. By Michael Hill Sep 28, 2023 3 mins Electronic Health Records Data Breach Government news EchoMark releases watermarking solution to secure private communications, detect insider threats Enterprise-grade software embeds AI-driven, forensic watermarking in emails and documents to pinpoint potential insider risks By Michael Hill Sep 28, 2023 4 mins Communications Security Threat and Vulnerability Management Security Software news SpecterOps to use in-house approximation to test for global attack variations The new offering uses atomic tests and in-house approximation in purple team assessment to test all known techniques of an attack. By Shweta Sharma Sep 28, 2023 3 mins Penetration Testing Network Security Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe