A Missing Piece That’s Hurting Your Company’s Cyber Security Efforts

Begin Learning Cyber Security for FREE Now!

Already a Member Login Here

A Missing Piece That’s Hurting Your Company’s Cyber Security Efforts

Author: ginasilvertree | Published on May 6, 2016 | Views: 1580

process-cybraryTake a moment to consider your company’s cybersecurity efforts. Do you picture your IT and security teams devising proactive technical solutions and dealing with threats? If so, that’s a typical and valid response.


Yet, there’s another key piece that most companies don’t consider: business process. The ins and outs of how your company works affects cybersecurity more than you know.


Ken Chodnicki, COO at Deep Run Security, a consulting firm in Baltimore, Maryland speaks passionately about the inseparable nature of business process and cybersecurity. “Risk management, especially cyber risk management, is unquestionably bound to business process. But, business process isn’t a glamorous topic and companies don’t like to think or talk about it.”


Consulting firms who understand the critical connection between business process and cybersecurity see an obvious need to help companies reshape their current approaches. “Fundamentally, we believe the weakness is not directly in the technology on the market. History has shown the weakness to be in how the technology is utilized and the maturity of the tools and operations therein,” notes the Deep Run website. For many consulting companies in this space, their beliefs are applied through a range of services that often begin with a long, hard look “under the hood”  followed by process mapping that enhances cybersecurity.


These services appeal to companies that, at all levels, seek to understand where they currently stand and where they need to be in order to be more secure. Some consulting firms have found that one of the most empowering things a newly appointed C-level executive can have is an unbiased starting point, which gives them visibility and clarity regarding information security.


Gary Merry, CEO of Deep Run, adds to this idea by stating, Yes, we need innovative technology, and yes, IT must do all they can to protect our data, but security is not the sole purview of IT – it is everybody’s job.”


Merry closes with, “The concept of making security part of your business is not a new concept. But, unfortunately, it’s hard. It’s exponentially harder to make a cultural change to a business, especially with technology as the protagonist.”

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Support Cybrary

Donate Here to Get This Month's Donor Badge



Is Linux Worth Learning in 2020?
Views: 740 / December 14, 2019
How do I Get MTA Certified?
Views: 1312 / December 12, 2019
How much does your PAM software really cost?
Views: 1749 / December 10, 2019
How Do I Get into Android Development?
Views: 2139 / December 8, 2019

We recommend always using caution when following any link

Are you sure you want to continue?