Joe’s 7 Security Principals
Make copies
We make copies so that if something is lost,
corrupted or changed we can recover it to a
known state. Business continuity, Disaster
recovery & Backup.
Prevent
Where we know of a security risk we use
proportionate means to prevent it. Do the
basics, but do them well. Know what you are
protecting and why.
Detected
Security is a constant evolutionary battle, we
must know what is normal in our systems and
investigate changes in behaviour, Include data
classification in this
Deal
A breach will occur at some time and at some
level, if we already know what to do and what
to say we can stop it becoming worse.
Educate
Security is only as strong as its weakest link, this
has always been proven to be people – by
education we make the system stronger.
“The People are
the Castle”.
Make a strong
security culture.
Test
We must test our systems to see if they work,
to see if people know what to do and to
update them where necessary, so they are
ready if a breach occurs.
Slow Down
Security is never absolute, we must assume
that a breach will occur so we look to slow
down that breach so it can be detected and
dealt with.

Seven security principles

  • 1.
  • 2.
    Make copies We makecopies so that if something is lost, corrupted or changed we can recover it to a known state. Business continuity, Disaster recovery & Backup.
  • 3.
    Prevent Where we knowof a security risk we use proportionate means to prevent it. Do the basics, but do them well. Know what you are protecting and why.
  • 4.
    Detected Security is aconstant evolutionary battle, we must know what is normal in our systems and investigate changes in behaviour, Include data classification in this
  • 5.
    Deal A breach willoccur at some time and at some level, if we already know what to do and what to say we can stop it becoming worse.
  • 6.
    Educate Security is onlyas strong as its weakest link, this has always been proven to be people – by education we make the system stronger. “The People are the Castle”. Make a strong security culture.
  • 7.
    Test We must testour systems to see if they work, to see if people know what to do and to update them where necessary, so they are ready if a breach occurs.
  • 8.
    Slow Down Security isnever absolute, we must assume that a breach will occur so we look to slow down that breach so it can be detected and dealt with.

Editor's Notes

  • #2 Minimalist Shichinin no samurai (Seven Samurai)
  • #3 Paricutin volcano in Mexico
  • #4 Great Barrier Reef in Australia
  • #5 Grand Canyon in Arizona, USA
  • #6 Mount Everest in Nepal
  • #7 Northern Lights
  • #8 Victoria Falls in Zambia/Zimbabwe
  • #9 Harbor of Rio de Janeiro, Brazil