Building Strong Relationships in Cybersecurity Risk Assessments
Written on
Chapter 1: The Importance of Relationships
In the realm of cybersecurity, cultivating connections within your organization is crucial. This concept is well illustrated in a question from ISACA's CISM exam preparation material, which emphasizes the role of collaboration among business colleagues. The question highlights a scenario where HR plans to deactivate the records of a terminated employee within a day.
Although the focus may seem to be on systems, it is essential to remember that these systems are ultimately managed and operated by people.
Section 1.1: The Role of Information Security
When changes to technology or processes occur without the involvement of Information Security, numerous downstream complications can arise. While this applies to various departments within an organization, we will focus on the critical nature of cybersecurity.
Subsection 1.1.1: Ownership of Systems
Many systems are not solely owned by IT teams but are instead managed by business units. This reality underscores the importance of engaging with business leaders to discuss potential impacts of upcoming changes.
Section 1.2: Engaging Business Owners
Having conversations with business owners can provide insights into the following areas:
- Are they aware of the downstream effects of the planned change?
- What is the rationale behind the change, and what benefits does it offer to the business teams?
- Has this change been communicated effectively to all stakeholders?
- Will there be any training required?
- What does the operational model look like post-change, and what support will they need from you?
Chapter 2: Effective Communication
In today’s fast-paced work environment, it is easy to rely on quick emails or instant messages. However, these methods can interrupt colleagues who are focused on implementing new processes.
The first video, "What Is a Cybersecurity Risk Assessment (and HOW TO DO THEM!)", delves into the essential elements of conducting a cybersecurity risk assessment, emphasizing the importance of thorough communication and planning.
The second video, "How to Perform Effective OT Cyber Security Risk Assessments", provides insights on how to effectively assess cybersecurity risks in operational technology environments, showcasing practical strategies for engagement.
Building robust relationships with your colleagues involves more than simply completing a checklist task; it requires dedication and effort. However, the rewards are significant: uncover potential issues early, earn the respect of your peers, and secure support for incorporating cybersecurity into future projects.
Happy leadership!