Podcast
Questions and Answers
What are the four important functions that information security performs for an organization?
What are the four important functions that information security performs for an organization?
- Protecting the organization’s ability to function, protecting the data and information the organization collects and uses, enabling the safe operation of applications running on the organization’s IT systems, safeguarding the organization’s technology assets. (correct)
- Protecting the organization’s financial assets, protecting the data and information the organization collects and uses, enabling the safe operation of applications running on the organization’s IT systems, safeguarding the organization’s physical assets.
- Protecting the organization’s ability to function, protecting the data and information the organization collects and uses, enabling the safe operation of applications running on the organization’s IT systems, safeguarding the organization’s human resources.
- Protecting the organization’s ability to function, protecting the data and information the organization collects and uses, enabling the safe operation of applications running on the organization’s IT systems, safeguarding the organization’s reputation.
What is the myth about protecting all assets in the organization the same way?
What is the myth about protecting all assets in the organization the same way?
- All data are created with equal value.
- The customer data associated with a bank’s credit-card program or a retailer’s loyalty-card program are of greater value than the generic invoice numbers and policy documents that companies generate in-house. (correct)
- Companies have endless resources to protect all data at any cost.
- Most companies deploy a tiered collection of security measures to protect their assets.
What is the myth about spending on cybersecurity?
What is the myth about spending on cybersecurity?
- An ad hoc approach to funding is effective in the long term.
- There is a direct correlation between spending on cybersecurity and success of a company’s cybersecurity program.
- Throwing money at the problem is a good idea in the short term.
- 100% security can be achieved. (correct)
What is the myth about advanced technology and cybersecurity?
What is the myth about advanced technology and cybersecurity?
What is the main focus of the "Business Needs First" approach in information security?
What is the main focus of the "Business Needs First" approach in information security?
Who should be involved in identifying and protecting an organization's "crown jewels"?
Who should be involved in identifying and protecting an organization's "crown jewels"?
What is the role of C-suite leaders in cybersecurity?
What is the role of C-suite leaders in cybersecurity?
What is the potential consequence of C-suite leaders not being involved in cybersecurity?
What is the potential consequence of C-suite leaders not being involved in cybersecurity?
What is the importance of transparency and trust between C-suite leaders and the IT department in cybersecurity?
What is the importance of transparency and trust between C-suite leaders and the IT department in cybersecurity?