Access your Pro+ Content below.
A call to action for technology risk management professionals
This article is part of the Information Security magazine issue of October 2013 Vol. 15 / No. 8
Advanced persistent threats delivering zero days via watering holes have become a reality. Attackers targeting SCADA systems, heart monitors, automobiles and other devices are waiting in the wings. Calls for government to address cybersecurity have reached a fevered pitch. And the breaches continue. As technology invades our lives and Skynet continues to develop with the Internet of Things, the potential downsides are becoming apparent in the "technology risk management" field. How can we be rational and reasonable in our world of downsides? After hearing, once again, that he faced a decision involving tradeoffs, President Truman once famously exclaimed, "Find me a one-armed economist!" in the hope that he would eliminate "the other hand." In reality, even an economist named Bob (get it?) will discuss alternatives and options, because that's what economics is about. Opportunity costs involve all the things we could have done but didn't, once the alternative choice was made. Tradeoffs and scarce resources In the technology risk...
Access this PRO+ Content for Free!
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Features in this issue
In this special report, Gartner's Anton Chuvakin uses SIEM processes to show how security monitoring can make or break a SIEM implementation.
Expect Microsoft Word to write the next great American novel? Success or failure with SIEM products rests on your security monitoring capabilities.
SDN is a design with security as its foundation, and it has the potential to solve traditional networking's glaring security issues.
Columns in this issue
We've tallied the votes in our Readers' Choice Awards 2013. Find out the best security products of the year.
In his inaugural Security Economics column, Peter Lindstrom looks at technology risk management, and how to make the hard decisions pay off.
Iowa State University recruits industry professionals and hackers to provide students with "real-world" security education.