- I'll let you in on a secret.…There's one security control…that organizations can use…that really will help with security incidents,…but it's so often overlooked.…And it's minimizing the amount of information that you have.…When you look at the history of security breaches,…probably the most damaging breaches that have occurred,…and the ones that make news headlines…are the ones that involve…really sensitive personal information.…Things like social security numbers and credit card numbers.…When you start digging into…what happened during those breaches,…so many times the organization…just had maintained massive amounts of information…that they either never needed in the first place,…or the need that they had for it had passed…and it was just kept either by accident…or just because somebody never…bothered to go and clean it up.…
So one of the most important things an organization can do…is go through and search all their systems and databases…and other information repositories…and seek out the really sensitive information.…
- How does one break into the cybersecurity field?
- What are the various career tracks?
- How do organizations prevent a security breach?
- What are the compliance issues?
- Who is responsible for security in the cloud?
- How does IT security impact other business divisions?
These are the kinds of insights that can help you explore a new career, focus on a course of study, or even prepare for an interview.
- Recognize the priority levels of the different types of cybersecurity risks.
- Recall three common responsibilities for cybersecurity professionals.
- Identify strategies for minimizing the impact of a security incident.
- Name three cornerstones of the information security profession.
- Explain the primary objective of cybersecurity professionals.
- Determine when it is appropriate to utilize encryption to protect information.