July 15, 2015 By Kevin Beaver 2 min read

On any given day, in enterprises large and small, many decisions are made about information security. The decision-making that goes into running a strong program is critical. Some security decisions are made consciously by well-informed individuals. Others are based on assumptions — often half-baked information about the current network security posture.

Fear Impacts Decision-Making

In many situations, security decisions are based on fear:

  • The fear of losing a job or otherwise negatively impacting a career;
  • The fear of losing the respect of management and peers;
  • The fear of getting into trouble with auditors or the law.

This fear is a normal part of how we work as humans. In every choice we make, there’s either a desire for gain or a fear of loss. The problem is, I’m seeing more and more critical security decisions being made from this negative angle rather than from a positive perspective based on facts and common sense. Friedrich Nietzsche once said, “There are no facts, only interpretations.” Even so, too many decisions are based on misinformation at best or no information at worst. They’re often highly political and rarely in the best interest of the business. A lot of the time, money and effort are being wasted. Of all areas of business, information security is not the place to squander critical resources.

Every Decision Counts

Whether or not IT and security professionals will admit it, we humans are creatures of emotion. The common perception (especially in IT and security) is that people make decisions logically, but it’s actually just the opposite. People decide on things emotionally and justify them logically. Simply understanding how we operate can help tremendously when it comes to making your own choices and dealing with the decisions of others that impact your work.

Security improvements come from lots of small, seemingly meaningless decisions made with good intentions. Everything you do — or don’t do — in security counts. My favorite lyricist, Neil Peart of the band Rush, once wrote that if you choose not to decide, you still have made a choice. Some people bury their heads in the sand and don’t want to acknowledge their security problems, but that’s not for you.

Dig your well before you’re thirsty. Decide that you’re going to focus on making sound security decisions in the best interest of the business. Form a security committee. Work to get and keep others on your side. Lead by example. People all around you, from your executives to your users to your colleagues outside of the business, are continually framing their opinions of you based on your choices and how you deal with theirs. Fear is a natural part of how we all operate. Just don’t let it define you, your role or information security in your organization.

These issues are complex at the core, yet they’re simple to deal with. It’s up to you to make it happen.

More from Risk Management

What can businesses learn from the rise of cyber espionage?

4 min read - It’s not just government organizations that need to worry about cyber espionage campaigns — the entire business world is also a target.Multipolarity has been a defining trend in geopolitics in recent years. Rivalries between the world’s great powers continue to test the limits of globalism, resulting in growing disruption to international supply chains and economics. Global political risk has reached its highest level in decades, and even though corporate attention to geopolitics has dropped since peaking in 2022, the impact…

Cost of a data breach: Cost savings with law enforcement involvement

3 min read - For those working in the information security and cybersecurity industries, the technical impacts of a data breach are generally understood. But for those outside of these technical functions, such as executives, operators and business support functions, “explaining” the real impact of a breach can be difficult. Therefore, explaining impacts in terms of quantifiable financial figures and other simple metrics creates a relatively level playing field for most stakeholders, including law enforcement.IBM’s 2024 Cost of a Data Breach (“CODB”) Report helps…

How Paris Olympic authorities battled cyberattacks, and won gold

3 min read - The Olympic Games Paris 2024 was by most accounts a highly successful Olympics. Some 10,000 athletes from 204 nations competed in 329 events over 16 days. But before and during the event, authorities battled Olympic-size cybersecurity threats coming from multiple directions.In preparation for expected attacks, authorities took several proactive measures to ensure the security of the event.Cyber vigilance programThe Paris 2024 Olympics implemented advanced threat intelligence, real-time threat monitoring and incident response expertise. This program aimed to prepare Olympic-facing organizations…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today