SlideShare a Scribd company logo
1 of 3
Download to read offline
Business Process Revamp/Re-engineering is paramount in 2024:
Happy New year everyone! This is to thank everyone in my network and the
entire Cyber Security Community that I associated and affiliated with in 2023.
Thanks for your patronage! Let us be optimistic and look forward to a more
productive year 2024. The threat vectors are overwhelming! A hail lot of ongo-
ing and outrageous investments and deployments of Security tools as though it
is ALL about how much and how many Security Tools are deployed to maintain
a resilient security posture. I suggest every organization needs a revamp or a de-
liberate walk-through around their Enterprise Architecture(EA) starting from:1.
The Corporate Governance of the Organization. 2.The Business Processes(with
a level of granularity in each Business Unit). 3. The Information Technology
Architecture (covering all the infrastructures; the hosts; platforms; the Iden-
tity and Access Management(IAM) frameworks(covering ALL Identities- Ma-
chine Identities, Application Identities, Federated Identities, Cloud Identities,
Internet-of-Things & Devices(BYOD)); The ERP or Core Business Applica-
tions and other Third Party and in-house developed Applications; The Elec-
tronic Channels and associated Applications; The Networks and Telecommuni-
cations Infrastructures (wide area network(WAN), Local Area Network(LAN),
The Clouds, the Internet, Wireless, extranets); The Systems Infrastructures
(Servers, Hosts, End-Points, The Data Center, Racks, The Environments for
Apps, End-users, Operating Systems and others); The Information Technol-
ogy Operations Center(Back-ups, Systems and Applications in Custody, Daily
routines around Applications, incident response plan, IT help desk and other
routines); The IT Risks Operations Center(Business Continuity Planning(BCP),
Disaster Recovery Planning(DRP)) and other lines of Information Technology).
It is important to revamp or establish a walk-through around these processes be-
cause it is no longer technology as usual in this age. The emerging and evolving
rate of Technology and Digitalization has created a wide paradigm shift across
all business Processes. A deliberate walk-through around ALL lines of business
with a granular approach would help us establish a clear-cut Information Tech-
nology Security Architecture driven from the IT Security Governance covering
the Policies, Standards, Procedures, Baselines and necessary guidelines across
the organizations. Such revamps and re-structuring would make Risk Manage-
ment, Business Impact Analysis, Business Continuity Planning, Alignment of
processes with the standard frameworks more seamless. Until we deliberately
review each of these processes, it would be difficult to establish a map-out or
inventory of ALL your Information Assets and the entire workflow. The truth
is that the organizations are embracing more security tools than managing and
streamlining what they have got for optimal use. Permit me to re-inforce that
reviewing your portfolio and capacity could reveal that quite a lot of your exist-
ing security tools are being under-utulized. A Revamp and walk-through around
your business processes would help the organizations to seamlessly plug-in more
Tech Tools as Technology emerges.
Again, virtually ALL Business Processes are transforming rapidly with Artificial
1
Intelligence, Large Language Machine learning, Generative Artificial Intelligence
and most importantly the Cloud Subscriptions. Most businesses now prefer
their secondary or off-site environments in the Cloud, some also have their
development and testing environments in the Cloud. In as much as it is good to
embrace the Technology as it emerges, I would suggest that organizations take
a thorough walk-through of their existing processes, gateways and outlets to
reveal the hidden lines that could pose issues of disclosures, leakages, breaches,
unauthorized tampering of Data, abuse of Privacy(both corporate and Personal)
and unauthorized destruction and denial of use when it matters most.
Your Information Technology Security Architecture is a clear-cut road map that
can assist your organization to run with a healthy Security Posture if only you
could pay attention to first things first- A thorough walk through and revamp
right from the Organizational Governance down to IT Operations.
Your Security Team(Physical Security, Administrative Security and Technical
Security) or your Security Steering Committee could not achieve much in
this digital age if a deliberate structured walk-through, revamp or process
re-engineering is not established periodically and with a holistic approach. In
conclusion, each emerging Technology could give rise to loosed-ends in some
business Processes which may not be identified prior to or after implemention
or apparently detected after the bad guys must have scored a goal.
It is important to walk-through each Business process with all stakeholders in-
volved. Always walk-through with Industry-specific Standard frameworks, Infor-
mation Technology Standard Frameworks(ITIL-IT Infrastructires Library, ISO
22301-IT Service Mgt., ISO 20000-Business Continuity Planning, TOGAF); In-
formation Security Standard Frameworks (ISO 27001-InfoSec, ISO 27002-Codes
of Practice, ISO 27005-Risk Mgt., COBIT-Control Objectives for Information
and Related Technology); Data Privacy Frameworks(NDPR, GDPR, ISO 27018-
Clood Data Privacy) and other necessary frameworks such as Artificial Intelli-
gence Standard Frameworks (ISO 42001) and Supply Chain Security Manage-
ment Frameworks(ISO 28000). Frameworks would help you with a clue and
checklist of what is expected in each line of Business with Security best practices
in mind and to ascertain seamless security plug-in with the edges in technology.
Frameworks are good for ascertaining the security or control gaps around your
business processes. Frameworks would also help Businesses to re-align with the
series process modernizations currently ongoing across the globe. Your Security
Operations Center should re-align with the modernizations that are automated
driven and necessary synchronizations and integrations that would improve the
rate of discoveries with transparent visibility and enhance response plans.
Would it not be a great proactive move revamping and walking through the
Business processes with optimal Security that would reasonably assure the Confi-
dentiality, Integrity, Availability, Privacy, Authenticity and Safety around your
Critical Information Assets in 2024? Policies are better off when they are work-
able and could be seamlessly complied and enforced .
2
I suggest you minimize cumbersome procurements in 2024 and embrace a re-
vamp or walk-through that could reveal the under-utilized resources that could
be re-engineered for Optimal Security. I also suggest you leverage on automa-
tions only when you have ascertained a thorough walk-through of your business
processes and could reasonable assure that there is minimal room for breaches,
disclosures and abuse of privacies.
Wishing every organization a Safe and Secure Cyber World!
Happy New Year from Chinatu Uzuegbu, Managing Cyber Security Consultant,
RoseTech CyberCrime Solutions Limited! Combating Cybercrimes.
3

More Related Content

Similar to Business Process Revamp is Paramount in 2024.pdf

Cit security offering-overview_20111123
Cit security offering-overview_20111123Cit security offering-overview_20111123
Cit security offering-overview_20111123tommy62dm
 
Enterprise Information Security Architecture_Paper_1206
Enterprise Information Security Architecture_Paper_1206Enterprise Information Security Architecture_Paper_1206
Enterprise Information Security Architecture_Paper_1206Apoorva Ajmani
 
Cybersecurity Audit
Cybersecurity AuditCybersecurity Audit
Cybersecurity AuditEC-Council
 
Strategically moving towards a secure hybrid it
Strategically moving towards a secure hybrid itStrategically moving towards a secure hybrid it
Strategically moving towards a secure hybrid itAvancercorp
 
Integrating-Cyber-Security-for-Increased-Effectiveness
Integrating-Cyber-Security-for-Increased-EffectivenessIntegrating-Cyber-Security-for-Increased-Effectiveness
Integrating-Cyber-Security-for-Increased-EffectivenessAyham Kochaji
 
Zero Trust vs Defense in Depth
Zero Trust vs Defense in DepthZero Trust vs Defense in Depth
Zero Trust vs Defense in DepthCIO Talk Network
 
Security of the future - Adapting Approaches to What We Need
Security of the future - Adapting Approaches to What We NeedSecurity of the future - Adapting Approaches to What We Need
Security of the future - Adapting Approaches to What We Needsimplyme12345
 
BCS ITNow 201606 - Insider Threats
BCS ITNow 201606 - Insider ThreatsBCS ITNow 201606 - Insider Threats
BCS ITNow 201606 - Insider ThreatsGareth Niblett
 
ZSAH Security - Web
ZSAH Security - WebZSAH Security - Web
ZSAH Security - WebFahd Khan
 
Building Security Into Your Cloud IT Practices
Building Security Into Your Cloud IT PracticesBuilding Security Into Your Cloud IT Practices
Building Security Into Your Cloud IT PracticesMighty Guides, Inc.
 
Running Head CYBERSECURITY FRAMEWORK1CYBERSECURITY FRAMEWORK.docx
Running Head CYBERSECURITY FRAMEWORK1CYBERSECURITY FRAMEWORK.docxRunning Head CYBERSECURITY FRAMEWORK1CYBERSECURITY FRAMEWORK.docx
Running Head CYBERSECURITY FRAMEWORK1CYBERSECURITY FRAMEWORK.docxhealdkathaleen
 
Business value of Enterprise Security Architecture
Business value of Enterprise Security Architecture Business value of Enterprise Security Architecture
Business value of Enterprise Security Architecture Ajay Kumar Uppal
 
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdfMicrosoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdfParishSummer
 
MCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationMCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationWilliam McBorrough
 
CompTIA CySA+ Domain 2 Software and Systems Security.pptx
CompTIA CySA+ Domain 2 Software and Systems Security.pptxCompTIA CySA+ Domain 2 Software and Systems Security.pptx
CompTIA CySA+ Domain 2 Software and Systems Security.pptxInfosectrain3
 
The Fundamentals and Significance of Security Orchestration Tools
The Fundamentals and Significance of Security Orchestration ToolsThe Fundamentals and Significance of Security Orchestration Tools
The Fundamentals and Significance of Security Orchestration Toolssecuraa
 
Enterprise Architecture - Information Security
Enterprise Architecture - Information SecurityEnterprise Architecture - Information Security
Enterprise Architecture - Information SecurityAjay Kumar Uppal
 

Similar to Business Process Revamp is Paramount in 2024.pdf (20)

Cit security offering-overview_20111123
Cit security offering-overview_20111123Cit security offering-overview_20111123
Cit security offering-overview_20111123
 
Enterprise Information Security Architecture_Paper_1206
Enterprise Information Security Architecture_Paper_1206Enterprise Information Security Architecture_Paper_1206
Enterprise Information Security Architecture_Paper_1206
 
Cybersecurity Audit
Cybersecurity AuditCybersecurity Audit
Cybersecurity Audit
 
Strategically moving towards a secure hybrid it
Strategically moving towards a secure hybrid itStrategically moving towards a secure hybrid it
Strategically moving towards a secure hybrid it
 
Integrating-Cyber-Security-for-Increased-Effectiveness
Integrating-Cyber-Security-for-Increased-EffectivenessIntegrating-Cyber-Security-for-Increased-Effectiveness
Integrating-Cyber-Security-for-Increased-Effectiveness
 
Safeguarding the Enterprise
Safeguarding the EnterpriseSafeguarding the Enterprise
Safeguarding the Enterprise
 
Zero Trust vs Defense in Depth
Zero Trust vs Defense in DepthZero Trust vs Defense in Depth
Zero Trust vs Defense in Depth
 
Security of the future - Adapting Approaches to What We Need
Security of the future - Adapting Approaches to What We NeedSecurity of the future - Adapting Approaches to What We Need
Security of the future - Adapting Approaches to What We Need
 
Managing Compliance
Managing ComplianceManaging Compliance
Managing Compliance
 
BCS ITNow 201606 - Insider Threats
BCS ITNow 201606 - Insider ThreatsBCS ITNow 201606 - Insider Threats
BCS ITNow 201606 - Insider Threats
 
ZSAH Security - Web
ZSAH Security - WebZSAH Security - Web
ZSAH Security - Web
 
ICISS Newsletter Sept 14
ICISS Newsletter Sept 14ICISS Newsletter Sept 14
ICISS Newsletter Sept 14
 
Building Security Into Your Cloud IT Practices
Building Security Into Your Cloud IT PracticesBuilding Security Into Your Cloud IT Practices
Building Security Into Your Cloud IT Practices
 
Running Head CYBERSECURITY FRAMEWORK1CYBERSECURITY FRAMEWORK.docx
Running Head CYBERSECURITY FRAMEWORK1CYBERSECURITY FRAMEWORK.docxRunning Head CYBERSECURITY FRAMEWORK1CYBERSECURITY FRAMEWORK.docx
Running Head CYBERSECURITY FRAMEWORK1CYBERSECURITY FRAMEWORK.docx
 
Business value of Enterprise Security Architecture
Business value of Enterprise Security Architecture Business value of Enterprise Security Architecture
Business value of Enterprise Security Architecture
 
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdfMicrosoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
 
MCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationMCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service Presentation
 
CompTIA CySA+ Domain 2 Software and Systems Security.pptx
CompTIA CySA+ Domain 2 Software and Systems Security.pptxCompTIA CySA+ Domain 2 Software and Systems Security.pptx
CompTIA CySA+ Domain 2 Software and Systems Security.pptx
 
The Fundamentals and Significance of Security Orchestration Tools
The Fundamentals and Significance of Security Orchestration ToolsThe Fundamentals and Significance of Security Orchestration Tools
The Fundamentals and Significance of Security Orchestration Tools
 
Enterprise Architecture - Information Security
Enterprise Architecture - Information SecurityEnterprise Architecture - Information Security
Enterprise Architecture - Information Security
 

More from Chinatu Uzuegbu

Preventing Cloud Data Breaches.pdf
Preventing Cloud Data Breaches.pdfPreventing Cloud Data Breaches.pdf
Preventing Cloud Data Breaches.pdfChinatu Uzuegbu
 
Securing The Clouds Proactively-BlackisTech.pptx
Securing The Clouds Proactively-BlackisTech.pptxSecuring The Clouds Proactively-BlackisTech.pptx
Securing The Clouds Proactively-BlackisTech.pptxChinatu Uzuegbu
 
Securing The Clouds with The Standard Best Practices-1.pdf
Securing The Clouds with The Standard Best Practices-1.pdfSecuring The Clouds with The Standard Best Practices-1.pdf
Securing The Clouds with The Standard Best Practices-1.pdfChinatu Uzuegbu
 
World Password Management Day, 2023.pdf
World Password Management Day, 2023.pdfWorld Password Management Day, 2023.pdf
World Password Management Day, 2023.pdfChinatu Uzuegbu
 
The Nigerian Cybersecurity Space-How Regulated Are We?
The Nigerian Cybersecurity Space-How Regulated Are We?The Nigerian Cybersecurity Space-How Regulated Are We?
The Nigerian Cybersecurity Space-How Regulated Are We?Chinatu Uzuegbu
 
Fundamentals for Stronger Cloud Security2.pdf
Fundamentals for Stronger Cloud Security2.pdfFundamentals for Stronger Cloud Security2.pdf
Fundamentals for Stronger Cloud Security2.pdfChinatu Uzuegbu
 
Effectiveness of Cyber Security Awareness.pdf
Effectiveness of Cyber Security Awareness.pdfEffectiveness of Cyber Security Awareness.pdf
Effectiveness of Cyber Security Awareness.pdfChinatu Uzuegbu
 
What The Cyber Entails-2.pdf
What The Cyber Entails-2.pdfWhat The Cyber Entails-2.pdf
What The Cyber Entails-2.pdfChinatu Uzuegbu
 
What The Cyber Entails-1.pdf
What The Cyber Entails-1.pdfWhat The Cyber Entails-1.pdf
What The Cyber Entails-1.pdfChinatu Uzuegbu
 
Combating Cyber Crimes Proactively.pdf
Combating Cyber Crimes Proactively.pdfCombating Cyber Crimes Proactively.pdf
Combating Cyber Crimes Proactively.pdfChinatu Uzuegbu
 
Identity & Access Management Day 2022.pdf
Identity & Access Management Day 2022.pdfIdentity & Access Management Day 2022.pdf
Identity & Access Management Day 2022.pdfChinatu Uzuegbu
 
Combating cyber crimes chinatu
Combating cyber crimes chinatuCombating cyber crimes chinatu
Combating cyber crimes chinatuChinatu Uzuegbu
 
Understanding Identity Management and Security.
Understanding Identity Management and Security.Understanding Identity Management and Security.
Understanding Identity Management and Security.Chinatu Uzuegbu
 
Practical approach to combating cyber crimes
Practical approach to combating cyber crimesPractical approach to combating cyber crimes
Practical approach to combating cyber crimesChinatu Uzuegbu
 
Cyber Security Awareness Month 2017-Wrap-Up
Cyber Security Awareness Month 2017-Wrap-UpCyber Security Awareness Month 2017-Wrap-Up
Cyber Security Awareness Month 2017-Wrap-UpChinatu Uzuegbu
 
Cyber Security Awareness Month 2017-Nugget 6
Cyber Security Awareness Month 2017-Nugget 6Cyber Security Awareness Month 2017-Nugget 6
Cyber Security Awareness Month 2017-Nugget 6Chinatu Uzuegbu
 
Cyber crime (prohibition,prevention,etc)_act,_2015
Cyber crime (prohibition,prevention,etc)_act,_2015Cyber crime (prohibition,prevention,etc)_act,_2015
Cyber crime (prohibition,prevention,etc)_act,_2015Chinatu Uzuegbu
 
Cyber Security Awareness Month 2017-Nugget 3
Cyber Security Awareness Month 2017-Nugget 3Cyber Security Awareness Month 2017-Nugget 3
Cyber Security Awareness Month 2017-Nugget 3Chinatu Uzuegbu
 
Cyber Security Awareness Month 2017- Nugget2
Cyber Security Awareness Month 2017- Nugget2Cyber Security Awareness Month 2017- Nugget2
Cyber Security Awareness Month 2017- Nugget2Chinatu Uzuegbu
 
Cyber Security Awareness Month 2017
Cyber Security Awareness Month 2017Cyber Security Awareness Month 2017
Cyber Security Awareness Month 2017Chinatu Uzuegbu
 

More from Chinatu Uzuegbu (20)

Preventing Cloud Data Breaches.pdf
Preventing Cloud Data Breaches.pdfPreventing Cloud Data Breaches.pdf
Preventing Cloud Data Breaches.pdf
 
Securing The Clouds Proactively-BlackisTech.pptx
Securing The Clouds Proactively-BlackisTech.pptxSecuring The Clouds Proactively-BlackisTech.pptx
Securing The Clouds Proactively-BlackisTech.pptx
 
Securing The Clouds with The Standard Best Practices-1.pdf
Securing The Clouds with The Standard Best Practices-1.pdfSecuring The Clouds with The Standard Best Practices-1.pdf
Securing The Clouds with The Standard Best Practices-1.pdf
 
World Password Management Day, 2023.pdf
World Password Management Day, 2023.pdfWorld Password Management Day, 2023.pdf
World Password Management Day, 2023.pdf
 
The Nigerian Cybersecurity Space-How Regulated Are We?
The Nigerian Cybersecurity Space-How Regulated Are We?The Nigerian Cybersecurity Space-How Regulated Are We?
The Nigerian Cybersecurity Space-How Regulated Are We?
 
Fundamentals for Stronger Cloud Security2.pdf
Fundamentals for Stronger Cloud Security2.pdfFundamentals for Stronger Cloud Security2.pdf
Fundamentals for Stronger Cloud Security2.pdf
 
Effectiveness of Cyber Security Awareness.pdf
Effectiveness of Cyber Security Awareness.pdfEffectiveness of Cyber Security Awareness.pdf
Effectiveness of Cyber Security Awareness.pdf
 
What The Cyber Entails-2.pdf
What The Cyber Entails-2.pdfWhat The Cyber Entails-2.pdf
What The Cyber Entails-2.pdf
 
What The Cyber Entails-1.pdf
What The Cyber Entails-1.pdfWhat The Cyber Entails-1.pdf
What The Cyber Entails-1.pdf
 
Combating Cyber Crimes Proactively.pdf
Combating Cyber Crimes Proactively.pdfCombating Cyber Crimes Proactively.pdf
Combating Cyber Crimes Proactively.pdf
 
Identity & Access Management Day 2022.pdf
Identity & Access Management Day 2022.pdfIdentity & Access Management Day 2022.pdf
Identity & Access Management Day 2022.pdf
 
Combating cyber crimes chinatu
Combating cyber crimes chinatuCombating cyber crimes chinatu
Combating cyber crimes chinatu
 
Understanding Identity Management and Security.
Understanding Identity Management and Security.Understanding Identity Management and Security.
Understanding Identity Management and Security.
 
Practical approach to combating cyber crimes
Practical approach to combating cyber crimesPractical approach to combating cyber crimes
Practical approach to combating cyber crimes
 
Cyber Security Awareness Month 2017-Wrap-Up
Cyber Security Awareness Month 2017-Wrap-UpCyber Security Awareness Month 2017-Wrap-Up
Cyber Security Awareness Month 2017-Wrap-Up
 
Cyber Security Awareness Month 2017-Nugget 6
Cyber Security Awareness Month 2017-Nugget 6Cyber Security Awareness Month 2017-Nugget 6
Cyber Security Awareness Month 2017-Nugget 6
 
Cyber crime (prohibition,prevention,etc)_act,_2015
Cyber crime (prohibition,prevention,etc)_act,_2015Cyber crime (prohibition,prevention,etc)_act,_2015
Cyber crime (prohibition,prevention,etc)_act,_2015
 
Cyber Security Awareness Month 2017-Nugget 3
Cyber Security Awareness Month 2017-Nugget 3Cyber Security Awareness Month 2017-Nugget 3
Cyber Security Awareness Month 2017-Nugget 3
 
Cyber Security Awareness Month 2017- Nugget2
Cyber Security Awareness Month 2017- Nugget2Cyber Security Awareness Month 2017- Nugget2
Cyber Security Awareness Month 2017- Nugget2
 
Cyber Security Awareness Month 2017
Cyber Security Awareness Month 2017Cyber Security Awareness Month 2017
Cyber Security Awareness Month 2017
 

Recently uploaded

RE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechRE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechNewman George Leech
 
Marketing Management Business Plan_My Sweet Creations
Marketing Management Business Plan_My Sweet CreationsMarketing Management Business Plan_My Sweet Creations
Marketing Management Business Plan_My Sweet Creationsnakalysalcedo61
 
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service DewasVip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewasmakika9823
 
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...lizamodels9
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMRavindra Nath Shukla
 
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In.../:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...lizamodels9
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis UsageNeil Kimberley
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Servicediscovermytutordmt
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCRsoniya singh
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Dipal Arora
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsApsara Of India
 
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
Catalogue ONG NUOC PPR DE NHAT .pdf
Catalogue ONG NUOC PPR DE NHAT      .pdfCatalogue ONG NUOC PPR DE NHAT      .pdf
Catalogue ONG NUOC PPR DE NHAT .pdfOrient Homes
 
Call Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any TimeCall Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any Timedelhimodelshub1
 
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...lizamodels9
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...anilsa9823
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfpollardmorgan
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
 
The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024christinemoorman
 

Recently uploaded (20)

RE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechRE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman Leech
 
Marketing Management Business Plan_My Sweet Creations
Marketing Management Business Plan_My Sweet CreationsMarketing Management Business Plan_My Sweet Creations
Marketing Management Business Plan_My Sweet Creations
 
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service DewasVip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
 
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSM
 
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In.../:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Service
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
 
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
Catalogue ONG NUOC PPR DE NHAT .pdf
Catalogue ONG NUOC PPR DE NHAT      .pdfCatalogue ONG NUOC PPR DE NHAT      .pdf
Catalogue ONG NUOC PPR DE NHAT .pdf
 
Call Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any TimeCall Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any Time
 
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 
The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024
 

Business Process Revamp is Paramount in 2024.pdf

  • 1. Business Process Revamp/Re-engineering is paramount in 2024: Happy New year everyone! This is to thank everyone in my network and the entire Cyber Security Community that I associated and affiliated with in 2023. Thanks for your patronage! Let us be optimistic and look forward to a more productive year 2024. The threat vectors are overwhelming! A hail lot of ongo- ing and outrageous investments and deployments of Security tools as though it is ALL about how much and how many Security Tools are deployed to maintain a resilient security posture. I suggest every organization needs a revamp or a de- liberate walk-through around their Enterprise Architecture(EA) starting from:1. The Corporate Governance of the Organization. 2.The Business Processes(with a level of granularity in each Business Unit). 3. The Information Technology Architecture (covering all the infrastructures; the hosts; platforms; the Iden- tity and Access Management(IAM) frameworks(covering ALL Identities- Ma- chine Identities, Application Identities, Federated Identities, Cloud Identities, Internet-of-Things & Devices(BYOD)); The ERP or Core Business Applica- tions and other Third Party and in-house developed Applications; The Elec- tronic Channels and associated Applications; The Networks and Telecommuni- cations Infrastructures (wide area network(WAN), Local Area Network(LAN), The Clouds, the Internet, Wireless, extranets); The Systems Infrastructures (Servers, Hosts, End-Points, The Data Center, Racks, The Environments for Apps, End-users, Operating Systems and others); The Information Technol- ogy Operations Center(Back-ups, Systems and Applications in Custody, Daily routines around Applications, incident response plan, IT help desk and other routines); The IT Risks Operations Center(Business Continuity Planning(BCP), Disaster Recovery Planning(DRP)) and other lines of Information Technology). It is important to revamp or establish a walk-through around these processes be- cause it is no longer technology as usual in this age. The emerging and evolving rate of Technology and Digitalization has created a wide paradigm shift across all business Processes. A deliberate walk-through around ALL lines of business with a granular approach would help us establish a clear-cut Information Tech- nology Security Architecture driven from the IT Security Governance covering the Policies, Standards, Procedures, Baselines and necessary guidelines across the organizations. Such revamps and re-structuring would make Risk Manage- ment, Business Impact Analysis, Business Continuity Planning, Alignment of processes with the standard frameworks more seamless. Until we deliberately review each of these processes, it would be difficult to establish a map-out or inventory of ALL your Information Assets and the entire workflow. The truth is that the organizations are embracing more security tools than managing and streamlining what they have got for optimal use. Permit me to re-inforce that reviewing your portfolio and capacity could reveal that quite a lot of your exist- ing security tools are being under-utulized. A Revamp and walk-through around your business processes would help the organizations to seamlessly plug-in more Tech Tools as Technology emerges. Again, virtually ALL Business Processes are transforming rapidly with Artificial 1
  • 2. Intelligence, Large Language Machine learning, Generative Artificial Intelligence and most importantly the Cloud Subscriptions. Most businesses now prefer their secondary or off-site environments in the Cloud, some also have their development and testing environments in the Cloud. In as much as it is good to embrace the Technology as it emerges, I would suggest that organizations take a thorough walk-through of their existing processes, gateways and outlets to reveal the hidden lines that could pose issues of disclosures, leakages, breaches, unauthorized tampering of Data, abuse of Privacy(both corporate and Personal) and unauthorized destruction and denial of use when it matters most. Your Information Technology Security Architecture is a clear-cut road map that can assist your organization to run with a healthy Security Posture if only you could pay attention to first things first- A thorough walk through and revamp right from the Organizational Governance down to IT Operations. Your Security Team(Physical Security, Administrative Security and Technical Security) or your Security Steering Committee could not achieve much in this digital age if a deliberate structured walk-through, revamp or process re-engineering is not established periodically and with a holistic approach. In conclusion, each emerging Technology could give rise to loosed-ends in some business Processes which may not be identified prior to or after implemention or apparently detected after the bad guys must have scored a goal. It is important to walk-through each Business process with all stakeholders in- volved. Always walk-through with Industry-specific Standard frameworks, Infor- mation Technology Standard Frameworks(ITIL-IT Infrastructires Library, ISO 22301-IT Service Mgt., ISO 20000-Business Continuity Planning, TOGAF); In- formation Security Standard Frameworks (ISO 27001-InfoSec, ISO 27002-Codes of Practice, ISO 27005-Risk Mgt., COBIT-Control Objectives for Information and Related Technology); Data Privacy Frameworks(NDPR, GDPR, ISO 27018- Clood Data Privacy) and other necessary frameworks such as Artificial Intelli- gence Standard Frameworks (ISO 42001) and Supply Chain Security Manage- ment Frameworks(ISO 28000). Frameworks would help you with a clue and checklist of what is expected in each line of Business with Security best practices in mind and to ascertain seamless security plug-in with the edges in technology. Frameworks are good for ascertaining the security or control gaps around your business processes. Frameworks would also help Businesses to re-align with the series process modernizations currently ongoing across the globe. Your Security Operations Center should re-align with the modernizations that are automated driven and necessary synchronizations and integrations that would improve the rate of discoveries with transparent visibility and enhance response plans. Would it not be a great proactive move revamping and walking through the Business processes with optimal Security that would reasonably assure the Confi- dentiality, Integrity, Availability, Privacy, Authenticity and Safety around your Critical Information Assets in 2024? Policies are better off when they are work- able and could be seamlessly complied and enforced . 2
  • 3. I suggest you minimize cumbersome procurements in 2024 and embrace a re- vamp or walk-through that could reveal the under-utilized resources that could be re-engineered for Optimal Security. I also suggest you leverage on automa- tions only when you have ascertained a thorough walk-through of your business processes and could reasonable assure that there is minimal room for breaches, disclosures and abuse of privacies. Wishing every organization a Safe and Secure Cyber World! Happy New Year from Chinatu Uzuegbu, Managing Cyber Security Consultant, RoseTech CyberCrime Solutions Limited! Combating Cybercrimes. 3