Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
News

Guide available for Security Architects

British Computer Society (BCS) : 15 September, 2014  (New Product)
The British Computer Society has released a guide providing top tips to organisations on IT security architecture
Guide available for Security Architects

With the average cost of security breaches to large organisations increasing to between £600k - £1.15m in the last year - the role of the security architect has never been more important. Security architects are responsible for maintaining the security of an organisation's computer systems as well as developing and reviewing architectures to mitigate risks. Anyone considering a career in this exciting area or wanting to know more about what the role entails will learn a lot from Security Architect by Jon Collins.
 
The book is the first in a new series of security role books published by BCS, The Chartered Institute for IT and covers areas such as required skills, responsibilities, dependencies and career progression as well as relevant tools, standards and frameworks.
 
Jon explains: “While the role has become increasingly complex due to technology advances such as cloud computing and mobile working, the fundamentals of information security - protecting the confidentiality, integrity and availability of data wherever it is located - remain the same. A major part of the response comes down to how well the security architect understands the business needs of the organisation, coupled with the ability to define workable solutions that address business risks, that senior decision makers are prepared to sign off.”
 
The book also offers some top tips for on security architecture:

* Security architecture needs to be considered top down, starting with the organisation’s business needs and working with the buy-in of senior management.

* The starting point for successful security architecture is to consider the information assets to be protected, wherever they are.

* Given that much of the job is collating information and making recommendations, communications skills are an essential tool in the security architect’s tool kit

* Security recommendations will need to be costed and budget allocated. Therefore the security architect needs to have a firm grasp of how to evaluate risk and the cost of any recommendations.

* The security architect’s task is not to ‘boil the ocean’, but to focus on identifying and mitigating the most relevant information risks.
 
The new guide will be of interest to security and IT professionals looking to develop their knowledge of information security and learn how to apply the principles of security architecture in an enterprise context.
 
Rik Ferguson, Security Research, Trend Micro says: “This book is a serious attempt to define a rapidly evolving role in an ever-changing sector and makes sure to include even those technologies still only on the fringes of adoption. Required reading, not just for security architects or those entering the role, but also and perhaps more importantly for those responsible for hiring them.”

Bookmark and Share
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo