• Home
  • Events Calendar
  • Blueprint Guidelines
  • Privacy Policy
  • Subscribe to Daily Newsletter
  • NextGenInfra.io
No Result
View All Result
Converge Digest
Sunday, April 12, 2026
  • Home
  • Events Calendar
  • Blueprint Guidelines
  • Privacy Policy
  • Subscribe to Daily Newsletter
  • NextGenInfra.io
No Result
View All Result
Converge Digest
No Result
View All Result

Home » Blueprint: Building an IT Security Road Map to Avoid Cyber Attacks

Blueprint: Building an IT Security Road Map to Avoid Cyber Attacks

December 4, 2014
in All, Blueprints
A A

by Matthew Goche

Will you be (or have you been) the subject of a headline? The
victim of a damaging cyber attack or intrusion? If you’ve avoided it, count
yourself lucky. But if you’ve already been victimized, you aren’t alone. It
appears that such attacks and data breaches are practically inevitable today.

However, help is at hand. Organizations can build a strong
IT security road map to counter – and more importantly, prevent – what was once
an occasional hacking attempt to today’s constant bombardment by savvy cyber gangs.
 

Consider this your Cybersecurity Roadmap and Toolkit

The first priority is to perform an initial gap analysis. This
will identify weaknesses in your network and other IT infrastructure defenses.
It helps you locate where the starting point is, where to spend your time and
where you need to improve.

As my colleague Chris Sell advised in a recent article on information security gap
analysis, you should compare your security program as it stands versus overall
best security practices. This will help pinpoint vulnerabilities and risks.
Also, have a clear understanding of the security threats you should be looking
for or may find.

In addition, develop a security organizational chart that
clearly outlines all participants’ roles and responsibilities to disarm
intruders. This is vital because today’s security world has become much more
complicated. There’s more hardware and software to monitor – period. Regulators
also have become much more in-your-face about protecting their constituents,
who likely are your customers and who you are protecting – especially if you’re
in the financial services, retail and health-care sectors. Auditors, too, have
higher thresholds to examine operations.

Identify your ‘Security Chieftain’

In developing that security chart, first identify the ‘security
chieftain’ empowered to lead this group. If you have a chief information
security officer (CISO), this is likely your leader. If you’re a smaller
organization without a CISO, tap someone with authority – someone who has a
seat at the executives’ table but who also doesn’t have a blatant conflict of
interest.

The chief information officer (CIO) is fine, unless she or
he also holds the CISO role. If an IT professional is responsible for uptime of
applications, that person shouldn’t be the security chief because of an
inherent conflict. Too many pressures exist in terms of uptime and innovation
that can influence that individual’s mindset. In these cases, the security
chief’s role usually falls to the lead infrastructure specialist. 

Be sure to build in checks and balances. If the organization
chart lists the person responsible for managing a firewall device, also include
the person ensuring the firewall device is managed correctly. At every stage, insert
in an additional layer of control.

Consider including someone that deals with risk on a
broader basis. A trend has begun that converges security roles and budgets into
the same hub overseeing continuity and recovery roles, as well as budgets. An
organization will likely reap real benefits by assessing the different
categories of risk and judging them on their merits while measuring them
together. In doing this, you can distill a clear understanding of overall risks
and risk tolerance and invest, accordingly, for business continuity and data
recovery.

Find a Hacker and Let Him Loose

Here’s a revolutionary suggestion – but a good one. Appoint
your own internal hacker to poke holes in your IT systems, identifying
vulnerabilities and seeking ways to strengthen those weak links. Initially when
enterprises searched for a third-party internal hacker, they could find few
candidates without criminal records.

Today, an increase in ethical training grounds has boosted
the number of legit IT professionals trained to take on that role. Since most
organizations don’t have an IT professional trained for such duties, it’s best
to look to a third-party source.

Next, develop a clear methodology that allows for testing
of the basics. Why? Because most successful attacks reflect a basic element
that wasn’t followed. Also, inject methodologies that test the latest malware
and other threats to outages.

Develop a plan for “application interdependence” that
identifies where third-party vendors leave companies the most vulnerable to be
hacked. Some of the most recent major cyber intrusions involved the attackers
getting into an enterprise’s system through a vulnerable third-party security
weakness. Target’s data breach late last year is an example.

Retain an external consultancy or partnership with expertise
in business continuity/disaster recovery or in the regulatory/compliance sectors.
This firm can review your security processes and test the resiliency and
compliance of your IT infrastructure.

Consider identifying a partnership with a managed security services
provider that, basically, can serve to augment your current resources. Its IT
professionals can provide 24/7 eyes and ears monitoring your environment and
looking for the gaps and weaknesses in your defenses.  

This managed security services provider is performing, not
reviewing, operations. These providers do this for a living, so their specialists
maintain constant communication with law-enforcement agencies, perhaps global
in nature, that identify new types of security attacks cropping up somewhere and
advising companies and organizations to watch out for them. 

While you can never be certain you’ll be completely safe
from a cyber attack, you can definitely take measures that will make it more
difficult for today’s sophisticated cyber thieves to crack the safe.

Plan. Prepare. Prevent. These three Ps can lead to a
hopeful outcome that also begins with a fourth P: Peace. 

About the Author

Matthew Goche is
director of Security Consulting at Sungard Availability Services, which helps
clients keep mission-critical information and applications available,
recoverable and secure.   

Got an idea for a Blueprint column?  We welcome your ideas on next gen network architecture.
See our guidelines.

Tags: BlueprintBlueprint columnsCyber Security
ShareTweetShare
Previous Post

ON.Lab Releases its Open Source SDN Network Operating System

Next Post

Busy week for Partnership Tie-ups in Networking Land

Staff

Staff

Related Posts

Blueprint: Super-Coherent Optics for the Long-Haul
Blueprints

Blueprint: Super-Coherent Optics for the Long-Haul

August 27, 2023
Blueprint: Brazil looks to municipal Wi-Fi 6E
Blueprints

Blueprint: Brazil looks to municipal Wi-Fi 6E

February 21, 2023
Blueprint: Building wholesale networks with OTN
All

Blueprint: Building wholesale networks with OTN

December 20, 2022
Oracle opens cloud region in Chicago
All

Oracle opens cloud region in Chicago

December 20, 2022
BT trials C-RAN in Leeds
All

BT trials C-RAN in Leeds

December 19, 2022
T-Mobile builds cloud native 5G converged core with Cisco
All

T-Mobile builds cloud native 5G converged core with Cisco

December 15, 2022
Next Post
Busy week for Partnership Tie-ups in Networking Land

Busy week for Partnership Tie-ups in Networking Land

Please login to join discussion

Categories

  • 5G / 6G / Wi-Fi
  • AI Infrastructure
  • All
  • Automotive Networking
  • Blueprints
  • Clouds and Carriers
  • Data Centers
  • Enterprise
  • Explainer
  • Feature
  • Financials
  • Last Mile / Middle Mile
  • Legal / Regulatory
  • Optical
  • Quantum
  • Research
  • Security
  • Semiconductors
  • Space
  • Start-ups
  • Subsea
  • Sustainability
  • Video
  • Webinars

Archives

Tags

5G All AT&T Australia AWS Blueprint columns BroadbandWireless Broadcom China Ciena Cisco Data Centers Dell'Oro Ericsson FCC Financial Financials Huawei Infinera Intel Japan Juniper Last Mile Last Mille LTE Mergers and Acquisitions Mobile NFV Nokia Optical Packet Systems PacketVoice People Regulatory Satellite SDN Service Providers Silicon Silicon Valley StandardsWatch Storage TTP UK Verizon Wi-Fi
Converge Digest

A private dossier for networking and telecoms

Follow Us

  • Home
  • Events Calendar
  • Blueprint Guidelines
  • Privacy Policy
  • Subscribe to Daily Newsletter
  • NextGenInfra.io

© 2025 Converge Digest - A private dossier for networking and telecoms.

No Result
View All Result
  • Home
  • Events Calendar
  • Blueprint Guidelines
  • Privacy Policy
  • Subscribe to Daily Newsletter
  • NextGenInfra.io

© 2025 Converge Digest - A private dossier for networking and telecoms.

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.
Go to mobile version