2. 1/4/2017 Why Conquering Complexity Is a Critical Component of an Effective Security Program | Infosecurity Europe Blog
http://blogs.infosecurityeurope.com/whyconqueringcomplexityisacriticalcomponentofaneffectivesecurityprogram/ 2/5
Dominic Vogel, Chief Security
Strategist, Cyber.SC
An article published by ISACA
Security professionals tend to have a
penchant for making things more
complicated than they need to be. But
life and our work are complicated
enough without us adding extra layers
of needless complexity. When it
comes to operating an e鎧�ective
enterprise security program, the old
adage of “complexity being the enemy
of security” really does ring true.
Many CIOs and CISOs are guilty of
chasing the cool blinking lights of
newer technologies and keep adding
additional technologies to an already
Categories
Best Practice
Advice
Case Studies
Events
Events Information
Exhibitor
Information
Expert Opinion
Industry Opinion
News
Product
Information
Uncategorized
Visitor Information
Featured This
Month
launch:
‘Intelligent
Security:
Protect.
Detect.
Respond.
Recover’
⁄ APRIL 9, 2015
3. 1/4/2017 Why Conquering Complexity Is a Critical Component of an Effective Security Program | Infosecurity Europe Blog
http://blogs.infosecurityeurope.com/whyconqueringcomplexityisacriticalcomponentofaneffectivesecurityprogram/ 3/5
overburdened and poorly integrated
security stack. Many enterprise
security programs look like a
scattered city of isolated Jenga towers.
From a risk management perspective,
the more complex the infrastructure,
the harder it is to defend.
Balancing usability, security and
complexity seems like a daunting task
at times. Trying to do so on a daily
basis costs many of us our sanity
(think of Homer Simpson when he
was forced to give up beer and TV!).
During one of my more salient
moments, I came across a useful and
applicable metaphor that security
pros should heed when it comes to
balancing that aforementioned unholy
trinity…
Read the full article here.
TAGGED #INFOSEC17, ADVICE, BUSINESS ADVICE,
CYBERSECURITY, DATA SECURITY, INFORMATION
SECURITY, ISACA.
Why
Conquering
Complexity Is
a Critical
Component of
an E鎧�ective
Security
Program
JANUARY 4, 2017
In The
Boardroom
With Extenua
CEO Steve
Visconti
NOVEMBER 2,
2016
Cylance Vice
President John
McClurg
re⽡ects on his
time working
in Cyber
Defence
OCTOBER 6, 2016
What are the
biggest
security
challenges
within the IoT
today?
SEPTEMBER 9,
2016
The CEO of
Portsys talks
about how to
manage
security in a
more
comprehensive
manner
AUGUST 19, 2016
Recent Posts
Infosecurity Europe