SearchSecurity.com

Lessons of cyberwar: A chance to boost information security budgets

A lot of vendors are using the war in Iraq as a platform to trumpet the threat of cyberterror (or cyberwar, or whatever they call it). Sorry to be a party pooper, but this is a convenient excuse to convince you to buy new stuff, whether you need it or not.

I won't discount the possibility of a cyberwar component to Gulf War II. But it's far more likely that the impact will be along the lines of "cybernuisance." A couple of viruses, some Web defacements, maybe a DoS or two. Nothing you can't handle or aren't already prepared for.

Security is all about windows of opportunity. Our adversaries live by this rule. So should we.

War has a unifying effect on people. Like everyone else, your managers have a need to "do something." The risk is that, lacking your guidance and input, they'll throw money at stuff you don't really need. Meanwhile, you'll have missed your opportunity to shore up one of the most-often overlooked areas of infosecurity: business continuity planning.

If you're still not convinced, keep the following story in mind. After Sept. 11, most companies took a hard look at their security program, both digital and physical. In one case, the CEO of a company told the CSO that he wanted personal bodyguards. The CSO told him, in effect, that that was silly and unnecessary.

A couple weeks later, the CSO was demoted--not because he didn't support the bodyguard idea, but because he didn't respond to the CEO's need to "do something" in the wake of the terrorist attacks. True story.

Security is all about windows of opportunity. Our adversaries live by this rule. So should we. The best time to ask for more budget is right after you've been hacked. And the best time to shore up your business continuity plan and security awareness program is when the threat of discontinuity is most visible. Whether that threat ever materializes is inconsequential.

About the author:
Andrew Briney is editor-in-chief if Information Security.

01 Apr 2003

All Rights Reserved, Copyright 2000 - 2013 , TechTarget | Read our Privacy Statement