Security Operations Series Archives | Swimlane 

Swimlane Blog

Category Archives: Security Operations Series

Managing IT Security as a Business Risk - Intellectual Property

Why Managing Information Security as a Business Risk Is Critical, Part III: Intellectual Property

By | Security Operations Series | No Comments

Part III: Intellectual Property In the previous installments of this series, we covered the direct financial impact and reputational fallout—both for organizations and information security professionals—that can result from data breaches. A third and equally damaging result of a successful attack is the theft of intellectual property (IP). In any industry where innovation, creativity and trade secrets are valuable (which…

Read More
Managing Information Security - Reputational Harm

Why Managing Information Security as a Business Risk Is Critical, Part II: Reputational Harm

By | Security Operations Series | No Comments

Part II: Reputational Harm In Part I of this series, we covered the direct financial impact—like outright theft and costly website downtime for an e-commerce site—that a cyber security crisis can have on a business. Although immediate revenue loss is the most obvious consequence for an organization that suffers an attack, it is not the only repercussion. A security breach…

Read More
Managing Information Security as a Business Risk

Why Managing Information Security as a Business Risk Is Critical, Part I

By | Security Operations Series | No Comments

Part I: Direct Financial Impact One the most significant challenges facing IT professionals today is a persistent siloed mentality that keeps them separate from critical organizational business initiatives like risk management. The silo problem is particularly prevalent as it relates to information security; a recent study from defense contractor Raytheon of 1,006 of technology executives, for example, found that 66 percent…

Read More
Security Information Overload

Cyber Security Drivers Part IV: Security Information Overload

By | Security Operations Series | No Comments

This four-part series will tackle four primary drivers that are re-shaping the cyber security landscape and will continue to do so over the next three to five years. Thus far in this series we have covered how the Internet of Things (IoT), the information security talent shortage and the emerging threat landscape will impact security operations management over the next…

Read More
Cybersecurity Talent Shortage

Cyber Security Drivers Part II: The Talent Shortage

By | Security Operations Series | No Comments

This four-part series will tackle four primary drivers that are re-shaping the cyber security landscape and will continue to do so over the next three to five years. In Part I of this series we covered the significant impact the proliferation of IP-enabled devices—interconnected to form the Internet of Things (IoT)—will have on security operations management in the years to…

Read More

Improve your Security Operations