Who's responsible for security? Everyone!

Learn how to decentralize security responsibility in your organization.

This presentation by Ken Tyminski, VP and CISO of Prudential Financial, was given at Information Security Decisions

Spring 2005.


When the network is compromised or a worm sneaks through the AV screen, everyone looks to the security manager to find out what went wrong. Rather than having sole responsibility for security, others should be charged with security as well -- namely the business owners of the systems and data.

In this presentation, Ken Tyminski recounts his efforts to decentralize security in a company with 55,000 users. Get inside the walls of Prudential as Tyminski discusses his efforts to transfer the responsibility for security to the owners of business units, infrastructure and data. Besides security awareness training and stringent security policies, one of the most effective decentralizing methods Tyminski implemented was dismantling Prudential's SOC and making the network managers responsible for security. Hear firsthand how he did it and learn how to employ such practices within your own organization.

View this presentation

Visit our organizational communications and culture resource center


This was first published in May 2005

Dig deeper on Security Awareness Training and Internal Threats-Information

Pro+

Features

Enjoy the benefits of Pro+ membership, learn more and join.

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close