SlideShare a Scribd company logo
Business Process Revamp/Re-engineering is paramount in 2024:
Happy New year everyone! This is to thank everyone in my network and the
entire Cyber Security Community that I associated and affiliated with in 2023.
Thanks for your patronage! Let us be optimistic and look forward to a more
productive year 2024. The threat vectors are overwhelming! A hail lot of ongo-
ing and outrageous investments and deployments of Security tools as though it
is ALL about how much and how many Security Tools are deployed to maintain
a resilient security posture. I suggest every organization needs a revamp or a de-
liberate walk-through around their Enterprise Architecture(EA) starting from:1.
The Corporate Governance of the Organization. 2.The Business Processes(with
a level of granularity in each Business Unit). 3. The Information Technology
Architecture (covering all the infrastructures; the hosts; platforms; the Iden-
tity and Access Management(IAM) frameworks(covering ALL Identities- Ma-
chine Identities, Application Identities, Federated Identities, Cloud Identities,
Internet-of-Things & Devices(BYOD)); The ERP or Core Business Applica-
tions and other Third Party and in-house developed Applications; The Elec-
tronic Channels and associated Applications; The Networks and Telecommuni-
cations Infrastructures (wide area network(WAN), Local Area Network(LAN),
The Clouds, the Internet, Wireless, extranets); The Systems Infrastructures
(Servers, Hosts, End-Points, The Data Center, Racks, The Environments for
Apps, End-users, Operating Systems and others); The Information Technol-
ogy Operations Center(Back-ups, Systems and Applications in Custody, Daily
routines around Applications, incident response plan, IT help desk and other
routines); The IT Risks Operations Center(Business Continuity Planning(BCP),
Disaster Recovery Planning(DRP)) and other lines of Information Technology).
It is important to revamp or establish a walk-through around these processes be-
cause it is no longer technology as usual in this age. The emerging and evolving
rate of Technology and Digitalization has created a wide paradigm shift across
all business Processes. A deliberate walk-through around ALL lines of business
with a granular approach would help us establish a clear-cut Information Tech-
nology Security Architecture driven from the IT Security Governance covering
the Policies, Standards, Procedures, Baselines and necessary guidelines across
the organizations. Such revamps and re-structuring would make Risk Manage-
ment, Business Impact Analysis, Business Continuity Planning, Alignment of
processes with the standard frameworks more seamless. Until we deliberately
review each of these processes, it would be difficult to establish a map-out or
inventory of ALL your Information Assets and the entire workflow. The truth
is that the organizations are embracing more security tools than managing and
streamlining what they have got for optimal use. Permit me to re-inforce that
reviewing your portfolio and capacity could reveal that quite a lot of your exist-
ing security tools are being under-utulized. A Revamp and walk-through around
your business processes would help the organizations to seamlessly plug-in more
Tech Tools as Technology emerges.
Again, virtually ALL Business Processes are transforming rapidly with Artificial
1
Intelligence, Large Language Machine learning, Generative Artificial Intelligence
and most importantly the Cloud Subscriptions. Most businesses now prefer
their secondary or off-site environments in the Cloud, some also have their
development and testing environments in the Cloud. In as much as it is good to
embrace the Technology as it emerges, I would suggest that organizations take
a thorough walk-through of their existing processes, gateways and outlets to
reveal the hidden lines that could pose issues of disclosures, leakages, breaches,
unauthorized tampering of Data, abuse of Privacy(both corporate and Personal)
and unauthorized destruction and denial of use when it matters most.
Your Information Technology Security Architecture is a clear-cut road map that
can assist your organization to run with a healthy Security Posture if only you
could pay attention to first things first- A thorough walk through and revamp
right from the Organizational Governance down to IT Operations.
Your Security Team(Physical Security, Administrative Security and Technical
Security) or your Security Steering Committee could not achieve much in
this digital age if a deliberate structured walk-through, revamp or process
re-engineering is not established periodically and with a holistic approach. In
conclusion, each emerging Technology could give rise to loosed-ends in some
business Processes which may not be identified prior to or after implemention
or apparently detected after the bad guys must have scored a goal.
It is important to walk-through each Business process with all stakeholders in-
volved. Always walk-through with Industry-specific Standard frameworks, Infor-
mation Technology Standard Frameworks(ITIL-IT Infrastructires Library, ISO
22301-IT Service Mgt., ISO 20000-Business Continuity Planning, TOGAF); In-
formation Security Standard Frameworks (ISO 27001-InfoSec, ISO 27002-Codes
of Practice, ISO 27005-Risk Mgt., COBIT-Control Objectives for Information
and Related Technology); Data Privacy Frameworks(NDPR, GDPR, ISO 27018-
Clood Data Privacy) and other necessary frameworks such as Artificial Intelli-
gence Standard Frameworks (ISO 42001) and Supply Chain Security Manage-
ment Frameworks(ISO 28000). Frameworks would help you with a clue and
checklist of what is expected in each line of Business with Security best practices
in mind and to ascertain seamless security plug-in with the edges in technology.
Frameworks are good for ascertaining the security or control gaps around your
business processes. Frameworks would also help Businesses to re-align with the
series process modernizations currently ongoing across the globe. Your Security
Operations Center should re-align with the modernizations that are automated
driven and necessary synchronizations and integrations that would improve the
rate of discoveries with transparent visibility and enhance response plans.
Would it not be a great proactive move revamping and walking through the
Business processes with optimal Security that would reasonably assure the Confi-
dentiality, Integrity, Availability, Privacy, Authenticity and Safety around your
Critical Information Assets in 2024? Policies are better off when they are work-
able and could be seamlessly complied and enforced .
2
I suggest you minimize cumbersome procurements in 2024 and embrace a re-
vamp or walk-through that could reveal the under-utilized resources that could
be re-engineered for Optimal Security. I also suggest you leverage on automa-
tions only when you have ascertained a thorough walk-through of your business
processes and could reasonable assure that there is minimal room for breaches,
disclosures and abuse of privacies.
Wishing every organization a Safe and Secure Cyber World!
Happy New Year from Chinatu Uzuegbu, Managing Cyber Security Consultant,
RoseTech CyberCrime Solutions Limited! Combating Cybercrimes.
3

More Related Content

Similar to Business Process Revamp is Paramount in 2024.pdf

Cit security offering-overview_20111123
Cit security offering-overview_20111123Cit security offering-overview_20111123
Cit security offering-overview_20111123tommy62dm
 
Enterprise Information Security Architecture_Paper_1206
Enterprise Information Security Architecture_Paper_1206Enterprise Information Security Architecture_Paper_1206
Enterprise Information Security Architecture_Paper_1206Apoorva Ajmani
 
Cybersecurity Audit
Cybersecurity AuditCybersecurity Audit
Cybersecurity Audit
EC-Council
 
Strategically moving towards a secure hybrid it
Strategically moving towards a secure hybrid itStrategically moving towards a secure hybrid it
Strategically moving towards a secure hybrid it
Avancercorp
 
Integrating-Cyber-Security-for-Increased-Effectiveness
Integrating-Cyber-Security-for-Increased-EffectivenessIntegrating-Cyber-Security-for-Increased-Effectiveness
Integrating-Cyber-Security-for-Increased-EffectivenessAyham Kochaji
 
Safeguarding the Enterprise
Safeguarding the EnterpriseSafeguarding the Enterprise
Safeguarding the Enterprise
ADGP, Public Grivences, Bangalore
 
Zero Trust vs Defense in Depth
Zero Trust vs Defense in DepthZero Trust vs Defense in Depth
Zero Trust vs Defense in Depth
CIO Talk Network
 
Small Business Playbook for Security and Compliance Success.pdf
Small Business Playbook for Security and Compliance Success.pdfSmall Business Playbook for Security and Compliance Success.pdf
Small Business Playbook for Security and Compliance Success.pdf
elizabethrdusek
 
Small Business Playbook for Security and Compliance Success.pptx
Small Business Playbook for Security and Compliance Success.pptxSmall Business Playbook for Security and Compliance Success.pptx
Small Business Playbook for Security and Compliance Success.pptx
elizabethrdusek
 
Security of the future - Adapting Approaches to What We Need
Security of the future - Adapting Approaches to What We NeedSecurity of the future - Adapting Approaches to What We Need
Security of the future - Adapting Approaches to What We Need
simplyme12345
 
Managing Compliance
Managing ComplianceManaging Compliance
Managing Compliance
SecPod Technologies
 
BCS ITNow 201606 - Insider Threats
BCS ITNow 201606 - Insider ThreatsBCS ITNow 201606 - Insider Threats
BCS ITNow 201606 - Insider Threats
Gareth Niblett
 
ZSAH Security - Web
ZSAH Security - WebZSAH Security - Web
ZSAH Security - WebFahd Khan
 
ICISS Newsletter Sept 14
ICISS Newsletter Sept 14ICISS Newsletter Sept 14
ICISS Newsletter Sept 14
Capt SB Tyagi, COAC'CC*,FISM,CSC,
 
Building Security Into Your Cloud IT Practices
Building Security Into Your Cloud IT PracticesBuilding Security Into Your Cloud IT Practices
Building Security Into Your Cloud IT Practices
Mighty Guides, Inc.
 
Running Head CYBERSECURITY FRAMEWORK1CYBERSECURITY FRAMEWORK.docx
Running Head CYBERSECURITY FRAMEWORK1CYBERSECURITY FRAMEWORK.docxRunning Head CYBERSECURITY FRAMEWORK1CYBERSECURITY FRAMEWORK.docx
Running Head CYBERSECURITY FRAMEWORK1CYBERSECURITY FRAMEWORK.docx
healdkathaleen
 
Business value of Enterprise Security Architecture
Business value of Enterprise Security Architecture Business value of Enterprise Security Architecture
Business value of Enterprise Security Architecture
Ajay Kumar Uppal
 
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdfMicrosoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
ParishSummer
 
MCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationMCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service Presentation
William McBorrough
 
CompTIA CySA+ Domain 2 Software and Systems Security.pptx
CompTIA CySA+ Domain 2 Software and Systems Security.pptxCompTIA CySA+ Domain 2 Software and Systems Security.pptx
CompTIA CySA+ Domain 2 Software and Systems Security.pptx
Infosectrain3
 

Similar to Business Process Revamp is Paramount in 2024.pdf (20)

Cit security offering-overview_20111123
Cit security offering-overview_20111123Cit security offering-overview_20111123
Cit security offering-overview_20111123
 
Enterprise Information Security Architecture_Paper_1206
Enterprise Information Security Architecture_Paper_1206Enterprise Information Security Architecture_Paper_1206
Enterprise Information Security Architecture_Paper_1206
 
Cybersecurity Audit
Cybersecurity AuditCybersecurity Audit
Cybersecurity Audit
 
Strategically moving towards a secure hybrid it
Strategically moving towards a secure hybrid itStrategically moving towards a secure hybrid it
Strategically moving towards a secure hybrid it
 
Integrating-Cyber-Security-for-Increased-Effectiveness
Integrating-Cyber-Security-for-Increased-EffectivenessIntegrating-Cyber-Security-for-Increased-Effectiveness
Integrating-Cyber-Security-for-Increased-Effectiveness
 
Safeguarding the Enterprise
Safeguarding the EnterpriseSafeguarding the Enterprise
Safeguarding the Enterprise
 
Zero Trust vs Defense in Depth
Zero Trust vs Defense in DepthZero Trust vs Defense in Depth
Zero Trust vs Defense in Depth
 
Small Business Playbook for Security and Compliance Success.pdf
Small Business Playbook for Security and Compliance Success.pdfSmall Business Playbook for Security and Compliance Success.pdf
Small Business Playbook for Security and Compliance Success.pdf
 
Small Business Playbook for Security and Compliance Success.pptx
Small Business Playbook for Security and Compliance Success.pptxSmall Business Playbook for Security and Compliance Success.pptx
Small Business Playbook for Security and Compliance Success.pptx
 
Security of the future - Adapting Approaches to What We Need
Security of the future - Adapting Approaches to What We NeedSecurity of the future - Adapting Approaches to What We Need
Security of the future - Adapting Approaches to What We Need
 
Managing Compliance
Managing ComplianceManaging Compliance
Managing Compliance
 
BCS ITNow 201606 - Insider Threats
BCS ITNow 201606 - Insider ThreatsBCS ITNow 201606 - Insider Threats
BCS ITNow 201606 - Insider Threats
 
ZSAH Security - Web
ZSAH Security - WebZSAH Security - Web
ZSAH Security - Web
 
ICISS Newsletter Sept 14
ICISS Newsletter Sept 14ICISS Newsletter Sept 14
ICISS Newsletter Sept 14
 
Building Security Into Your Cloud IT Practices
Building Security Into Your Cloud IT PracticesBuilding Security Into Your Cloud IT Practices
Building Security Into Your Cloud IT Practices
 
Running Head CYBERSECURITY FRAMEWORK1CYBERSECURITY FRAMEWORK.docx
Running Head CYBERSECURITY FRAMEWORK1CYBERSECURITY FRAMEWORK.docxRunning Head CYBERSECURITY FRAMEWORK1CYBERSECURITY FRAMEWORK.docx
Running Head CYBERSECURITY FRAMEWORK1CYBERSECURITY FRAMEWORK.docx
 
Business value of Enterprise Security Architecture
Business value of Enterprise Security Architecture Business value of Enterprise Security Architecture
Business value of Enterprise Security Architecture
 
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdfMicrosoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
 
MCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationMCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service Presentation
 
CompTIA CySA+ Domain 2 Software and Systems Security.pptx
CompTIA CySA+ Domain 2 Software and Systems Security.pptxCompTIA CySA+ Domain 2 Software and Systems Security.pptx
CompTIA CySA+ Domain 2 Software and Systems Security.pptx
 

More from Chinatu Uzuegbu

Preventing Cloud Data Breaches.pdf
Preventing Cloud Data Breaches.pdfPreventing Cloud Data Breaches.pdf
Preventing Cloud Data Breaches.pdf
Chinatu Uzuegbu
 
Securing The Clouds Proactively-BlackisTech.pptx
Securing The Clouds Proactively-BlackisTech.pptxSecuring The Clouds Proactively-BlackisTech.pptx
Securing The Clouds Proactively-BlackisTech.pptx
Chinatu Uzuegbu
 
Securing The Clouds with The Standard Best Practices-1.pdf
Securing The Clouds with The Standard Best Practices-1.pdfSecuring The Clouds with The Standard Best Practices-1.pdf
Securing The Clouds with The Standard Best Practices-1.pdf
Chinatu Uzuegbu
 
World Password Management Day, 2023.pdf
World Password Management Day, 2023.pdfWorld Password Management Day, 2023.pdf
World Password Management Day, 2023.pdf
Chinatu Uzuegbu
 
The Nigerian Cybersecurity Space-How Regulated Are We?
The Nigerian Cybersecurity Space-How Regulated Are We?The Nigerian Cybersecurity Space-How Regulated Are We?
The Nigerian Cybersecurity Space-How Regulated Are We?
Chinatu Uzuegbu
 
Fundamentals for Stronger Cloud Security2.pdf
Fundamentals for Stronger Cloud Security2.pdfFundamentals for Stronger Cloud Security2.pdf
Fundamentals for Stronger Cloud Security2.pdf
Chinatu Uzuegbu
 
Effectiveness of Cyber Security Awareness.pdf
Effectiveness of Cyber Security Awareness.pdfEffectiveness of Cyber Security Awareness.pdf
Effectiveness of Cyber Security Awareness.pdf
Chinatu Uzuegbu
 
What The Cyber Entails-2.pdf
What The Cyber Entails-2.pdfWhat The Cyber Entails-2.pdf
What The Cyber Entails-2.pdf
Chinatu Uzuegbu
 
What The Cyber Entails-1.pdf
What The Cyber Entails-1.pdfWhat The Cyber Entails-1.pdf
What The Cyber Entails-1.pdf
Chinatu Uzuegbu
 
Combating Cyber Crimes Proactively.pdf
Combating Cyber Crimes Proactively.pdfCombating Cyber Crimes Proactively.pdf
Combating Cyber Crimes Proactively.pdf
Chinatu Uzuegbu
 
Identity & Access Management Day 2022.pdf
Identity & Access Management Day 2022.pdfIdentity & Access Management Day 2022.pdf
Identity & Access Management Day 2022.pdf
Chinatu Uzuegbu
 
Combating cyber crimes chinatu
Combating cyber crimes chinatuCombating cyber crimes chinatu
Combating cyber crimes chinatu
Chinatu Uzuegbu
 
Understanding Identity Management and Security.
Understanding Identity Management and Security.Understanding Identity Management and Security.
Understanding Identity Management and Security.
Chinatu Uzuegbu
 
Practical approach to combating cyber crimes
Practical approach to combating cyber crimesPractical approach to combating cyber crimes
Practical approach to combating cyber crimes
Chinatu Uzuegbu
 
Cyber Security Awareness Month 2017-Wrap-Up
Cyber Security Awareness Month 2017-Wrap-UpCyber Security Awareness Month 2017-Wrap-Up
Cyber Security Awareness Month 2017-Wrap-Up
Chinatu Uzuegbu
 
Cyber Security Awareness Month 2017-Nugget 6
Cyber Security Awareness Month 2017-Nugget 6Cyber Security Awareness Month 2017-Nugget 6
Cyber Security Awareness Month 2017-Nugget 6
Chinatu Uzuegbu
 
Cyber crime (prohibition,prevention,etc)_act,_2015
Cyber crime (prohibition,prevention,etc)_act,_2015Cyber crime (prohibition,prevention,etc)_act,_2015
Cyber crime (prohibition,prevention,etc)_act,_2015
Chinatu Uzuegbu
 
Cyber Security Awareness Month 2017-Nugget 3
Cyber Security Awareness Month 2017-Nugget 3Cyber Security Awareness Month 2017-Nugget 3
Cyber Security Awareness Month 2017-Nugget 3
Chinatu Uzuegbu
 
Cyber Security Awareness Month 2017- Nugget2
Cyber Security Awareness Month 2017- Nugget2Cyber Security Awareness Month 2017- Nugget2
Cyber Security Awareness Month 2017- Nugget2
Chinatu Uzuegbu
 
Cyber Security Awareness Month 2017
Cyber Security Awareness Month 2017Cyber Security Awareness Month 2017
Cyber Security Awareness Month 2017
Chinatu Uzuegbu
 

More from Chinatu Uzuegbu (20)

Preventing Cloud Data Breaches.pdf
Preventing Cloud Data Breaches.pdfPreventing Cloud Data Breaches.pdf
Preventing Cloud Data Breaches.pdf
 
Securing The Clouds Proactively-BlackisTech.pptx
Securing The Clouds Proactively-BlackisTech.pptxSecuring The Clouds Proactively-BlackisTech.pptx
Securing The Clouds Proactively-BlackisTech.pptx
 
Securing The Clouds with The Standard Best Practices-1.pdf
Securing The Clouds with The Standard Best Practices-1.pdfSecuring The Clouds with The Standard Best Practices-1.pdf
Securing The Clouds with The Standard Best Practices-1.pdf
 
World Password Management Day, 2023.pdf
World Password Management Day, 2023.pdfWorld Password Management Day, 2023.pdf
World Password Management Day, 2023.pdf
 
The Nigerian Cybersecurity Space-How Regulated Are We?
The Nigerian Cybersecurity Space-How Regulated Are We?The Nigerian Cybersecurity Space-How Regulated Are We?
The Nigerian Cybersecurity Space-How Regulated Are We?
 
Fundamentals for Stronger Cloud Security2.pdf
Fundamentals for Stronger Cloud Security2.pdfFundamentals for Stronger Cloud Security2.pdf
Fundamentals for Stronger Cloud Security2.pdf
 
Effectiveness of Cyber Security Awareness.pdf
Effectiveness of Cyber Security Awareness.pdfEffectiveness of Cyber Security Awareness.pdf
Effectiveness of Cyber Security Awareness.pdf
 
What The Cyber Entails-2.pdf
What The Cyber Entails-2.pdfWhat The Cyber Entails-2.pdf
What The Cyber Entails-2.pdf
 
What The Cyber Entails-1.pdf
What The Cyber Entails-1.pdfWhat The Cyber Entails-1.pdf
What The Cyber Entails-1.pdf
 
Combating Cyber Crimes Proactively.pdf
Combating Cyber Crimes Proactively.pdfCombating Cyber Crimes Proactively.pdf
Combating Cyber Crimes Proactively.pdf
 
Identity & Access Management Day 2022.pdf
Identity & Access Management Day 2022.pdfIdentity & Access Management Day 2022.pdf
Identity & Access Management Day 2022.pdf
 
Combating cyber crimes chinatu
Combating cyber crimes chinatuCombating cyber crimes chinatu
Combating cyber crimes chinatu
 
Understanding Identity Management and Security.
Understanding Identity Management and Security.Understanding Identity Management and Security.
Understanding Identity Management and Security.
 
Practical approach to combating cyber crimes
Practical approach to combating cyber crimesPractical approach to combating cyber crimes
Practical approach to combating cyber crimes
 
Cyber Security Awareness Month 2017-Wrap-Up
Cyber Security Awareness Month 2017-Wrap-UpCyber Security Awareness Month 2017-Wrap-Up
Cyber Security Awareness Month 2017-Wrap-Up
 
Cyber Security Awareness Month 2017-Nugget 6
Cyber Security Awareness Month 2017-Nugget 6Cyber Security Awareness Month 2017-Nugget 6
Cyber Security Awareness Month 2017-Nugget 6
 
Cyber crime (prohibition,prevention,etc)_act,_2015
Cyber crime (prohibition,prevention,etc)_act,_2015Cyber crime (prohibition,prevention,etc)_act,_2015
Cyber crime (prohibition,prevention,etc)_act,_2015
 
Cyber Security Awareness Month 2017-Nugget 3
Cyber Security Awareness Month 2017-Nugget 3Cyber Security Awareness Month 2017-Nugget 3
Cyber Security Awareness Month 2017-Nugget 3
 
Cyber Security Awareness Month 2017- Nugget2
Cyber Security Awareness Month 2017- Nugget2Cyber Security Awareness Month 2017- Nugget2
Cyber Security Awareness Month 2017- Nugget2
 
Cyber Security Awareness Month 2017
Cyber Security Awareness Month 2017Cyber Security Awareness Month 2017
Cyber Security Awareness Month 2017
 

Recently uploaded

Kseniya Leshchenko: Shared development support service model as the way to ma...
Kseniya Leshchenko: Shared development support service model as the way to ma...Kseniya Leshchenko: Shared development support service model as the way to ma...
Kseniya Leshchenko: Shared development support service model as the way to ma...
Lviv Startup Club
 
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdfMeas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
dylandmeas
 
Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)
Lviv Startup Club
 
Digital Transformation and IT Strategy Toolkit and Templates
Digital Transformation and IT Strategy Toolkit and TemplatesDigital Transformation and IT Strategy Toolkit and Templates
Digital Transformation and IT Strategy Toolkit and Templates
Aurelien Domont, MBA
 
Recruiting in the Digital Age: A Social Media Masterclass
Recruiting in the Digital Age: A Social Media MasterclassRecruiting in the Digital Age: A Social Media Masterclass
Recruiting in the Digital Age: A Social Media Masterclass
LuanWise
 
Authentically Social Presented by Corey Perlman
Authentically Social Presented by Corey PerlmanAuthentically Social Presented by Corey Perlman
Authentically Social Presented by Corey Perlman
Corey Perlman, Social Media Speaker and Consultant
 
Affordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n PrintAffordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n Print
Navpack & Print
 
What is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdfWhat is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdf
seoforlegalpillers
 
Company Valuation webinar series - Tuesday, 4 June 2024
Company Valuation webinar series - Tuesday, 4 June 2024Company Valuation webinar series - Tuesday, 4 June 2024
Company Valuation webinar series - Tuesday, 4 June 2024
FelixPerez547899
 
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdfikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
agatadrynko
 
VAT Registration Outlined In UAE: Benefits and Requirements
VAT Registration Outlined In UAE: Benefits and RequirementsVAT Registration Outlined In UAE: Benefits and Requirements
VAT Registration Outlined In UAE: Benefits and Requirements
uae taxgpt
 
Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111
zoyaansari11365
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
Cynthia Clay
 
-- June 2024 is National Volunteer Month --
-- June 2024 is National Volunteer Month ---- June 2024 is National Volunteer Month --
-- June 2024 is National Volunteer Month --
NZSG
 
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
BBPMedia1
 
Creative Web Design Company in Singapore
Creative Web Design Company in SingaporeCreative Web Design Company in Singapore
Creative Web Design Company in Singapore
techboxsqauremedia
 
amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05
marketing317746
 
Business Valuation Principles for Entrepreneurs
Business Valuation Principles for EntrepreneursBusiness Valuation Principles for Entrepreneurs
Business Valuation Principles for Entrepreneurs
Ben Wann
 
FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134
LR1709MUSIC
 
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
taqyed
 

Recently uploaded (20)

Kseniya Leshchenko: Shared development support service model as the way to ma...
Kseniya Leshchenko: Shared development support service model as the way to ma...Kseniya Leshchenko: Shared development support service model as the way to ma...
Kseniya Leshchenko: Shared development support service model as the way to ma...
 
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdfMeas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
 
Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)
 
Digital Transformation and IT Strategy Toolkit and Templates
Digital Transformation and IT Strategy Toolkit and TemplatesDigital Transformation and IT Strategy Toolkit and Templates
Digital Transformation and IT Strategy Toolkit and Templates
 
Recruiting in the Digital Age: A Social Media Masterclass
Recruiting in the Digital Age: A Social Media MasterclassRecruiting in the Digital Age: A Social Media Masterclass
Recruiting in the Digital Age: A Social Media Masterclass
 
Authentically Social Presented by Corey Perlman
Authentically Social Presented by Corey PerlmanAuthentically Social Presented by Corey Perlman
Authentically Social Presented by Corey Perlman
 
Affordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n PrintAffordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n Print
 
What is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdfWhat is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdf
 
Company Valuation webinar series - Tuesday, 4 June 2024
Company Valuation webinar series - Tuesday, 4 June 2024Company Valuation webinar series - Tuesday, 4 June 2024
Company Valuation webinar series - Tuesday, 4 June 2024
 
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdfikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
 
VAT Registration Outlined In UAE: Benefits and Requirements
VAT Registration Outlined In UAE: Benefits and RequirementsVAT Registration Outlined In UAE: Benefits and Requirements
VAT Registration Outlined In UAE: Benefits and Requirements
 
Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
 
-- June 2024 is National Volunteer Month --
-- June 2024 is National Volunteer Month ---- June 2024 is National Volunteer Month --
-- June 2024 is National Volunteer Month --
 
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
 
Creative Web Design Company in Singapore
Creative Web Design Company in SingaporeCreative Web Design Company in Singapore
Creative Web Design Company in Singapore
 
amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05
 
Business Valuation Principles for Entrepreneurs
Business Valuation Principles for EntrepreneursBusiness Valuation Principles for Entrepreneurs
Business Valuation Principles for Entrepreneurs
 
FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134
 
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
 

Business Process Revamp is Paramount in 2024.pdf

  • 1. Business Process Revamp/Re-engineering is paramount in 2024: Happy New year everyone! This is to thank everyone in my network and the entire Cyber Security Community that I associated and affiliated with in 2023. Thanks for your patronage! Let us be optimistic and look forward to a more productive year 2024. The threat vectors are overwhelming! A hail lot of ongo- ing and outrageous investments and deployments of Security tools as though it is ALL about how much and how many Security Tools are deployed to maintain a resilient security posture. I suggest every organization needs a revamp or a de- liberate walk-through around their Enterprise Architecture(EA) starting from:1. The Corporate Governance of the Organization. 2.The Business Processes(with a level of granularity in each Business Unit). 3. The Information Technology Architecture (covering all the infrastructures; the hosts; platforms; the Iden- tity and Access Management(IAM) frameworks(covering ALL Identities- Ma- chine Identities, Application Identities, Federated Identities, Cloud Identities, Internet-of-Things & Devices(BYOD)); The ERP or Core Business Applica- tions and other Third Party and in-house developed Applications; The Elec- tronic Channels and associated Applications; The Networks and Telecommuni- cations Infrastructures (wide area network(WAN), Local Area Network(LAN), The Clouds, the Internet, Wireless, extranets); The Systems Infrastructures (Servers, Hosts, End-Points, The Data Center, Racks, The Environments for Apps, End-users, Operating Systems and others); The Information Technol- ogy Operations Center(Back-ups, Systems and Applications in Custody, Daily routines around Applications, incident response plan, IT help desk and other routines); The IT Risks Operations Center(Business Continuity Planning(BCP), Disaster Recovery Planning(DRP)) and other lines of Information Technology). It is important to revamp or establish a walk-through around these processes be- cause it is no longer technology as usual in this age. The emerging and evolving rate of Technology and Digitalization has created a wide paradigm shift across all business Processes. A deliberate walk-through around ALL lines of business with a granular approach would help us establish a clear-cut Information Tech- nology Security Architecture driven from the IT Security Governance covering the Policies, Standards, Procedures, Baselines and necessary guidelines across the organizations. Such revamps and re-structuring would make Risk Manage- ment, Business Impact Analysis, Business Continuity Planning, Alignment of processes with the standard frameworks more seamless. Until we deliberately review each of these processes, it would be difficult to establish a map-out or inventory of ALL your Information Assets and the entire workflow. The truth is that the organizations are embracing more security tools than managing and streamlining what they have got for optimal use. Permit me to re-inforce that reviewing your portfolio and capacity could reveal that quite a lot of your exist- ing security tools are being under-utulized. A Revamp and walk-through around your business processes would help the organizations to seamlessly plug-in more Tech Tools as Technology emerges. Again, virtually ALL Business Processes are transforming rapidly with Artificial 1
  • 2. Intelligence, Large Language Machine learning, Generative Artificial Intelligence and most importantly the Cloud Subscriptions. Most businesses now prefer their secondary or off-site environments in the Cloud, some also have their development and testing environments in the Cloud. In as much as it is good to embrace the Technology as it emerges, I would suggest that organizations take a thorough walk-through of their existing processes, gateways and outlets to reveal the hidden lines that could pose issues of disclosures, leakages, breaches, unauthorized tampering of Data, abuse of Privacy(both corporate and Personal) and unauthorized destruction and denial of use when it matters most. Your Information Technology Security Architecture is a clear-cut road map that can assist your organization to run with a healthy Security Posture if only you could pay attention to first things first- A thorough walk through and revamp right from the Organizational Governance down to IT Operations. Your Security Team(Physical Security, Administrative Security and Technical Security) or your Security Steering Committee could not achieve much in this digital age if a deliberate structured walk-through, revamp or process re-engineering is not established periodically and with a holistic approach. In conclusion, each emerging Technology could give rise to loosed-ends in some business Processes which may not be identified prior to or after implemention or apparently detected after the bad guys must have scored a goal. It is important to walk-through each Business process with all stakeholders in- volved. Always walk-through with Industry-specific Standard frameworks, Infor- mation Technology Standard Frameworks(ITIL-IT Infrastructires Library, ISO 22301-IT Service Mgt., ISO 20000-Business Continuity Planning, TOGAF); In- formation Security Standard Frameworks (ISO 27001-InfoSec, ISO 27002-Codes of Practice, ISO 27005-Risk Mgt., COBIT-Control Objectives for Information and Related Technology); Data Privacy Frameworks(NDPR, GDPR, ISO 27018- Clood Data Privacy) and other necessary frameworks such as Artificial Intelli- gence Standard Frameworks (ISO 42001) and Supply Chain Security Manage- ment Frameworks(ISO 28000). Frameworks would help you with a clue and checklist of what is expected in each line of Business with Security best practices in mind and to ascertain seamless security plug-in with the edges in technology. Frameworks are good for ascertaining the security or control gaps around your business processes. Frameworks would also help Businesses to re-align with the series process modernizations currently ongoing across the globe. Your Security Operations Center should re-align with the modernizations that are automated driven and necessary synchronizations and integrations that would improve the rate of discoveries with transparent visibility and enhance response plans. Would it not be a great proactive move revamping and walking through the Business processes with optimal Security that would reasonably assure the Confi- dentiality, Integrity, Availability, Privacy, Authenticity and Safety around your Critical Information Assets in 2024? Policies are better off when they are work- able and could be seamlessly complied and enforced . 2
  • 3. I suggest you minimize cumbersome procurements in 2024 and embrace a re- vamp or walk-through that could reveal the under-utilized resources that could be re-engineered for Optimal Security. I also suggest you leverage on automa- tions only when you have ascertained a thorough walk-through of your business processes and could reasonable assure that there is minimal room for breaches, disclosures and abuse of privacies. Wishing every organization a Safe and Secure Cyber World! Happy New Year from Chinatu Uzuegbu, Managing Cyber Security Consultant, RoseTech CyberCrime Solutions Limited! Combating Cybercrimes. 3