12 Security
This chapter covers
- Important considerations for securing your enterprise
- Developing with security in mind
- Crisis management in the midst of an attack/breach
- Recognizing when a dedicated CISO (Chief Information Security Officer) is required
Security is one of those areas that if done properly, looks effortless and easy. If done poorly, then it gets in the way, doing the minimum to tick a box. Some organizations on the face of it have great security, but scratch the surface, you discover, they have gone and left the key under the mat, digitally speaking. Security is a seductive force; the longer you go without any sort of incident, the more you can convince yourself into believing you run a secure environment - not unlike thinking your house is fire-proof because it hasn’t suffered a fire.
There is no doubt, layering in security at the end, creates a lot of work and takes concentrated effort to get right with much disruption. That said, there are things you can do a lot to secure an existing platform, if there has been no real effort to build it in from the start. In this chapter we will go over some of the steps you can do to make significant progress to create a secure environment.