Jump to content

Welcome to Geeks to Go - Register now for FREE

Geeks To Go is a helpful hub, where thousands of volunteer geeks quickly serve friendly answers and support. Check out the forums and get free advice from the experts. Register now to gain access to all of our features, it's FREE and only takes one minute. Once registered and logged in, you will be able to create topics, post replies to existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile and so much more.

Create Account How it Works
Photo

What pain points do you experience with cyber security?


  • Please log in to reply

#1
Benmclarke

Benmclarke

    New Member

  • Member
  • Pip
  • 2 posts

Hi wonderful people!  

 

I am looking to start a cyber security business and, to help determine what the focus of the business should be, I would like to know what pain points you experience in your day to day work in terms of managing cyber security? 

 

Alternatively, what cyber security services or software would you like to see that would make your personal or professional life easier?? 

 

Thanks in advance for your time! 

 

Ben 


  • 0

Advertisements


#2
Nemesis-Dinu

Nemesis-Dinu

    Member

  • Member
  • PipPip
  • 31 posts

This introduction guide, with case study, is the first document in a series planned around the Business Model for Information Security. Based on the white paper “Systemic Security Management,” developed by the USC Marshall School of Business Institute for Critical Information Infrastructure Protection, this guide provides a starting point for discussion and future development. It defines the core concepts that will evolve into practical aids information security and business unit managers can use to align security program activities with organizational goals and priorities, effectively manage risk, and increase the value of information security program activities to the enterprise.

The Business Model for Information Security does not replace the many sources of security program best practices. It does, however, provide a view of information security program activities within the context the larger enterprise, to integrate the disparate security program components into a holistic system of information protection.

This guide introduces the model and its core concepts to enterprises, particularly to:

  • Senior executives
  • Information security managers
  • Those who have responsibility for managing business risk
  • Individuals who have responsibility for the design, implementation, monitoring and improvement of an information security management system

Edited by Nemesis-Dinu, 11 October 2019 - 02:03 PM.

  • 0

#3
Benmclarke

Benmclarke

    New Member

  • Topic Starter
  • Member
  • Pip
  • 2 posts

 

This introduction guide, with case study, is the first document in a series planned around the Business Model for Information Security. Based on the white paper “Systemic Security Management,” developed by the USC Marshall School of Business Institute for Critical Information Infrastructure Protection, this guide provides a starting point for discussion and future development. It defines the core concepts that will evolve into practical aids information security and business unit managers can use to align security program activities with organizational goals and priorities, effectively manage risk, and increase the value of information security program activities to the enterprise.

The Business Model for Information Security does not replace the many sources of security program best practices. It does, however, provide a view of information security program activities within the context the larger enterprise, to integrate the disparate security program components into a holistic system of information protection.

This guide introduces the model and its core concepts to enterprises, particularly to:

  • Senior executives
  • Information security managers
  • Those who have responsibility for managing business risk
  • Individuals who have responsibility for the design, implementation, monitoring and improvement of an information security management system

 

 

Interesting! Thanks for the info :) I will check it out. 


  • 0

#4
phillpower2

phillpower2

    Mechanised Mod

  • Moderator
  • 23,061 posts
Alternatively, what cyber security services or software would you like to see that would make your personal or professional life easier?? 

 

 

A world wide registered Kennel Club targeting spam hounds across forums and BBs would be helpful, levity apart, having read replies to the same OP that you have post on other forums it would appear that you are in good hands;

 

Are you a conceptualizer and a programmer, or, are you a deep, in-depth, networker and power-user?

 

 

I need to go and have a lay down  :help:


  • 0

#5
rootwilliamson

rootwilliamson

    New Member

  • Member
  • Pip
  • 2 posts

The actual pain point for me is data security when I used public wifi.


Edited by rootwilliamson, 14 October 2019 - 05:53 AM.

  • 0






Similar Topics

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users

As Featured On:

Microsoft Yahoo BBC MSN PC Magazine Washington Post HP