July 15, 2015 By Kevin Beaver 2 min read

On any given day, in enterprises large and small, many decisions are made about information security. The decision-making that goes into running a strong program is critical. Some security decisions are made consciously by well-informed individuals. Others are based on assumptions — often half-baked information about the current network security posture.

Fear Impacts Decision-Making

In many situations, security decisions are based on fear:

  • The fear of losing a job or otherwise negatively impacting a career;
  • The fear of losing the respect of management and peers;
  • The fear of getting into trouble with auditors or the law.

This fear is a normal part of how we work as humans. In every choice we make, there’s either a desire for gain or a fear of loss. The problem is, I’m seeing more and more critical security decisions being made from this negative angle rather than from a positive perspective based on facts and common sense. Friedrich Nietzsche once said, “There are no facts, only interpretations.” Even so, too many decisions are based on misinformation at best or no information at worst. They’re often highly political and rarely in the best interest of the business. A lot of the time, money and effort are being wasted. Of all areas of business, information security is not the place to squander critical resources.

Every Decision Counts

Whether or not IT and security professionals will admit it, we humans are creatures of emotion. The common perception (especially in IT and security) is that people make decisions logically, but it’s actually just the opposite. People decide on things emotionally and justify them logically. Simply understanding how we operate can help tremendously when it comes to making your own choices and dealing with the decisions of others that impact your work.

Security improvements come from lots of small, seemingly meaningless decisions made with good intentions. Everything you do — or don’t do — in security counts. My favorite lyricist, Neil Peart of the band Rush, once wrote that if you choose not to decide, you still have made a choice. Some people bury their heads in the sand and don’t want to acknowledge their security problems, but that’s not for you.

Dig your well before you’re thirsty. Decide that you’re going to focus on making sound security decisions in the best interest of the business. Form a security committee. Work to get and keep others on your side. Lead by example. People all around you, from your executives to your users to your colleagues outside of the business, are continually framing their opinions of you based on your choices and how you deal with theirs. Fear is a natural part of how we all operate. Just don’t let it define you, your role or information security in your organization.

These issues are complex at the core, yet they’re simple to deal with. It’s up to you to make it happen.

More from Risk Management

Cybersecurity dominates concerns among the C-suite, small businesses and the nation

4 min read - Once relegated to the fringes of business operations, cybersecurity has evolved into a front-and-center concern for organizations worldwide. What was once considered a technical issue managed by IT departments has become a boardroom topic of utmost importance. With the rise of sophisticated cyberattacks, the growing use of generative AI by threat actors and massive data breach costs, it is no longer a question of whether cybersecurity matters but how deeply it affects every facet of modern operations.The 2024 Allianz Risk…

Adversarial advantage: Using nation-state threat analysis to strengthen U.S. cybersecurity

4 min read - Nation-state adversaries are changing their approach, pivoting from data destruction to prioritizing stealth and espionage. According to the Microsoft 2023 Digital Defense Report, "nation-state attackers are increasing their investments and launching more sophisticated cyberattacks to evade detection and achieve strategic priorities."These actors pose a critical threat to United States infrastructure and protected data, and compromising either resource could put citizens at risk.Thankfully, there's an upside to these malicious efforts: information. By analyzing nation-state tactics, government agencies and private enterprises are…

6 Principles of Operational Technology Cybersecurity released by joint NSA initiative

4 min read - Today’s critical infrastructure organizations rely on operational technology (OT) to help control and manage the systems and processes required to keep critical services to the public running. However, due to the highly integrated nature of OT deployments, cybersecurity has become a primary concern.On October 2, 2024, the NSA (National Security Agency) released a new CSI titled “Principles of Operational Technology Cybersecurity.” This new guide was created in collaboration with the Australian Signals Directorate’s Australian Cyber Security Centre (ASD SCSC) to…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today