In this video, learn about the importance of collaborating across the business units.
- [Instructor] Security doesn't happen in a vacuum. As cybersecurity professionals, the soft skills in business are just as important to us as our in-depth technical knowledge. The truth of the matter is that we can't implement security solutions without the help of people across every discipline inside our organization. Security at the end of the day is really just a team sport. Not only do we need programmers and database engineers and network administrators, but we also need people such as the sales staff, management, financial, human resources, emergency response personnel, the facility manager, the physical security manager, and even the corporation's legal counsel when we're designing security controls for our systems, our networks, and our people.
Our ability to coordinate across silos inside our organization is really the key to our success. Everything we do as security practitioners is going to affect the business. And in turn, it's going to affect the other departments within our organization and our business. Our ability to gain a consensus across these departments for our proposed security measures especially when it comes to user training and user acceptance is really going to determine if we're able to successfully roll out a new security control or if our efforts are going to fall short.
Throughout my career, I have found that my ability to communicate the requirements for security into a language that's understandable outside of the technical disciplines has been crucial to my success and the success of my initiatives. Each department is a stakeholder in security, but it's not their singular focus. Instead, it's your responsibility to convince them that they need to get on board with your proposals. After all, without management buy-in and financial backing, your proposals will never be implemented in the network or throughout the organization.
- Best practices for conducting research
- Current threats and threat models
- Emerging social media platforms and their threats
- Integrating research into business functions
- Security activities across the systems and software development lifecycles
- Adapting solutions to meet business needs
- Collaborating with programmers, sales staff, facilities managers, and others
- Providing guidance to senior management