Close
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity

    It’s Time to Go on the Attack in Cyber-Security Battle

    By
    Darryl K. Taft
    -
    October 24, 2016
    Share
    Facebook
    Twitter
    Linkedin

      PrevNext

      1It’s Time to Go on the Attack in Cyber-Security Battle

      1 - It's Time to Go on the Attack in Cyber-Security Battle

      In football, it’s often said that the best defense is a good offense. That same could be said about an organization’s approach to cyber-security. Here’s what businesses could learn from football teams.

      2CIO = the Head Coach

      2 - CIO = the Head Coach

      CIOs call the plays and determine the strategic direction of their company’s IT infrastructure and applications, ensuring the entire organization can securely deliver the apps and data employees and executives need while making sure the organization complies with all security and regulatory requirements. The support from the coach will not only create visibility for specific security needs, but also empower other team players and business units to drive new revenue streams and operate more efficiently. And by shifting IT infrastructure and apps to the cloud, the CIO/coach can accelerate the offense, much like the West Coast offense makes new scoring opportunities possible.

      3Sensitive Corporate/Employee/Customer Data = the Football

      3 - Sensitive Corporate/Employee/Customer Data = the Football

      For an enterprise organization, protecting sensitive corporate, employee and customer data and applications is a top priority. Just like in the game of football, at the end of the day, it’s all about protecting the ball. While the quarterback is often closest to the data, he passes on the responsibility of getting it into the end zone to other team members, each with specialized skills.

      4Line-of-Business Manager = the Quarterback

      4 - Line-of-Business Manager = the Quarterback

      Line-of-business managers are responsible for the smooth operations and success of a particular function, business unit or process within an organization. As the quarterbacks, they execute on the IT strategies identified by the coach and coordinate closely with the rest of their team to make sure security needs are clearly communicated and implemented in a way that maximizes efficiency within organization policies. The quarterbacks also need the ability to call an audible, and roll out new applications to take advantage of emerging opportunities and move the offense, without losing the ball. Which means the CIO/coach needs a way to give quarterbacks more flexibility to enable them to score.

      5Information Security/Malware Analysts = the Center

      5 - Information Security/Malware Analysts = the Center

      Today’s cyber-criminals are smart, ruthless and relentless. Information security or malware analysts constantly must assess weaknesses and make judgments about how to better protect their systems against hackers. Just like the center position in football handles the ball at the beginning of the play and starts the ball in motion, analysts must understand how to maintain data protection in all stages, including at rest and in transit, so the quarterback and the rest of the offense are not blindsided.

      6Application Security Manager = the Running Back

      6 - Application Security Manager = the Running Back

      Application security managers are in charge of ensuring that any applications produced or used by their organization meet security and privacy standards to protect the ball as the business moves forward. As agile development continues to accelerate the pace of app development and deployment, just like running backs must be tuned into the play and watching for tacklers, AppSec managers must have visibility into the organization’s next play. And, as applications continue to reside across different environments including public, private and hybrid clouds, AppSec managers must be able to have a full view of how applications move in the playing field as they run full speed ahead.

      7Security Engineer = the Tight End

      7 - Security Engineer = the Tight End

      Tight ends are constantly keeping their eyes on the ball in case the quarterback throws a pass, and must create openings that allow the ball to move forward safely. Similarly, security engineers are tasked with many responsibilities and must plan for any interference to enterprise systems. Depending on the organization, security engineers may be responsible for everything from unified communications to hardware, and while policies and programs may change, security engineers must keep their eye on the data at all times while ensuring passes are complete so the business can continue to advance and score.

      8Network or Operations Manager = the Offensive Line

      8 - Network or Operations Manager = the Offensive Line

      Because network issues can take the entire organization offline, network managers must monitor, diagnose and fix network issues to ensure the secure delivery of the apps and data people need to work. Rather than developing strategies for reacting to a cyber-attack after it’s already happened, they can take a proactive approach by monitoring networks for abnormal behavior—much like the offensive line must protect the quarterback and running backs from rushing tacklers, so a defensive player (or an adversary) can’t break up the plays as the offensive team advances toward the end zone.

      PrevNext
      Get the Free Newsletter!
      Subscribe to Daily Tech Insider for top news, trends & analysis
      This email address is invalid.
      Get the Free Newsletter!
      Subscribe to Daily Tech Insider for top news, trends & analysis
      This email address is invalid.

      MOST POPULAR ARTICLES

      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Applications

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Applications

      Kyndryl’s Nicolas Sekkaki on Handling AI and...

      James Maguire - November 9, 2022 0
      I spoke with Nicolas Sekkaki, Group Practice Leader for Applications, Data and AI at Kyndryl, about how companies can boost both their AI and...
      Read more
      Cloud

      IGEL CEO Jed Ayres on Edge and...

      James Maguire - June 14, 2022 0
      I spoke with Jed Ayres, CEO of IGEL, about the endpoint sector, and an open source OS for the cloud; we also spoke about...
      Read more
      Careers

      SThree’s Sunny Ackerman on Tech Hiring Trends

      James Maguire - June 9, 2022 0
      I spoke with Sunny Ackerman, President/Americas for tech recruiter SThree, about the tight labor market in the tech sector, and much needed efforts to...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2022 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×