2 hours 39 minutes
welcome back to acid security course, and in this lesson I'm going to talk about people involved in asset protection.
So in the previous lessons I have taught talked about ways to achieve asset protection. Now we're coming to the people factor who is going to do that and how the whole organization functions.
So you've seen this lesson, uh, over about what are the roles that exist in the company that are involved with acid security?
And we'll talk about this advantages off hierarchical or role based organisation, which exists in many companies today.
So let's first see about who are the people we're talking about. So this is a typical way that the decisions are made and things were done in a company's. You have this board
and at the top you have CEO usually,
and he's chief executive officer, and he's basically in charge of companies. Now, arrest other people there that are involved in other parts of businesses, have nothing to do with us and security, for example, like business manager or maybe sales manager,
or somebody who is handling the channel business. If companies sales company and though does it drew channel partners?
If it's a manufacturing company. There is probably some kind off officer or somebody in charge of manufacturing. Somebody may be in charge of her and the on dso on, and so also means chief technology officer and so on. So
there are quite a lot of people what? We're not going to talk about these roles. So
under CEO first person in charge of all these things is CEO chief information officer,
his responsibilities to make sure that all I t services function in order to support support the main business
off the company. So if it's a company making cars, then CEO has to make sure that whoever is making cars or selling them has all the I T services available at every possible moment. So under CEO, you usually have natural cat mean idea. I mean,
there are many roles.
Then you have, ah, data custodian, for example. So so Data custodian is, ah, person in a company that is responsible for technical environment and database structure. Basically, he's in charge of data, so
sometimes we call that person database administrator
and then you have ah, data owner and the owner is ah,
basically someone who approves data, glossaries and definitions and initiate data quality authorities and so on. And so so
basically they are They're in charge off
structuring data on being
in charge of the data being properly distributed in the company. Not in the technical sense, but in an organizational sense.
Then we have S o R C I S o R c So is it's usually cold. So it's ah short for information security officer or chief information security officer. And
they are in charge of making sure that company follows all the guidelines. Allow the regulations, regulatory
and stuff like to obey laws that air
considering the information security in arrested security in that particular branch of industry in which they companies working. And usually they under them. They have something called soccer team or
security operations center, which is in charge of
basically implementing and managing security tools to investigate a special activities. Eso They use things like a sigh e m. Dole's toe to monitor the
the things happening on the network and to
see if something unusual is happening in them to investigate. Also, they have ah task to reduce the downtime and sure business continue nitty and to create security strategy, and this is very important. So basically security strategy of the company is, uh
it is owned by a soc team.
then way Have chief financial officer who is not directly involved in any technical aspect off acid security,
but because they are signing the checks.
They are fundamentally the responsible for all the assets in the company, especially for physical assets. As a matter of fact, in some companies we still have, and I have seen that in Europe, in in many companies, in my experience, the company's I have been working with they have this
so some some kind off a military approach to
asset ownership inside the company. So basically, if you're a manager of a department, you're essentially responsible for all the assets that department has so chairs, tables, whatever. And then you
get to your job. First time they give you a piece of paper in which you basically sign that you are now responsible for all the essence there. Now you you you put that down to people working for you. So if you're for example, I t manager,
then you signed for all the network equipment and then you get your network admin, and then you make him sign for all off networking equipment and I t admin signs for all the servers
and point administrator signs for all the PC's in the company. Or you delegate that to the managers off
business groups in which these species are used. So
this is how it works now. We also have some people which are not directly in this hierarchy
or functions. First of all, we have auditors, so these are guys who are not responsible to anybody. But they're especially except sometimes directly to CEO.
And their job is to audit and to inspect everybody else and see if they're doing their job. So it can be one auditor. It can be team. It can be hierarchically organized or the terror team that has people doing financial auditing and I t auditing whatever
and a za rule day. They cannot be responsible. They cannot be subordinate to people who were there all the things, so they have to sit on the side,
and then you have committees and on how panels and boards which are convened. Sometimes they don't function
all the time, but they're they're made
to work sometimes when the huge decision has to be made. For example, if a company has to make transition from one operating system toe another,
then then the penalties O. R or board is organized to do some kind of transition.
And if you look at the structure of the company to usually looks like this. So I didn't put all of the functions there. This is just the example off. So you have CEO and then you have CEO under him and then you have network at me nightie and mandate owner.
They take custodian or database administrator and so on. So on, so on. So so and then under CSO, you have wrestled
C team and
let's not going to and in further details,
I mentioned this picture just because
I want to show you when this works really good first.
And this structure is really good when something goes wrong and you have to,
um, determined responsibility.
when you have to implement strategy. So you have decided on strategy, for example, you are making security strategy and company Assoc team has defined strategy
and then it has to be implemented and then the meeting. You decide whose responsibilities, but they're angry and they're tossed. They have their subordinate people there. They have their teams. They convey the message. People start working, everything works perfectly. Of course, if these are
if these people know what they're doing, which is in big companies, usually the case also,
uh, But these air with these higher after the structures are really good. This quality and productivity by quality because the people working in in the structures are specialised in their jobs.
And if they're paid well, if companies in good shape, they're really good people, they know how to do their job.
So as a result, they do it very well. And because they're quite enough people for everything in the company, they can do it highly, productively and very fast.
So when this thing doesn't work well,
ah, the 1st 1 is that these people have sometimes opposed interests, for example, there
they're all fighting for the same budget.
And then you have people who are in charge of database and they need more harder for storage, for example, and then their security people who want some new software implemented.
And in these situations, they might fight over the same amount of money that is Ah, disposal. And then something gets, Ah, cut. And this is not really good. So in my experience in these situations, the people who are
getting the most money are not those who actually need the most money.
They're the people who
have better personal connections with somebody who is making the final decision in this case, the Cee Lo, our CFO.
Um, the other thing, when these things
have a tendency to produce bad results, these hierarchical structures
is when, um
you have to think outside the box
and you have to find new solutions.
So thinking outside the box is not the characteristic of people who specialized in one Phil field. So if you have ah network and mean he's focusing on network issues a same time, you have i d mn. He's focusing on service, working and stuff like that.
They're all fighting with the budget constraints
on and when there is a new solution needed
when, when? When there is, um
they face the idea that something is done. Then they organize a panel, some or at her board. Sometimes they hire outside consultants,
but This is usually, in my experience, the last resort. Because all these people,
um, are basically when they propose that outside consultant is to be hired,
they are admitting their incompetence in their field,
which is not the case. But this is normal human reaction.
So when you have to, for example, you face to the security issue and the current structure cannot solve it. So you have to change something
then these hierarchical structures tend to be really slow in producing the quality solution.
Andi, I will talk about the other ways to do it a little bit later in the lessons to come.
So in this video in this So listen, you have Ah,
so at the end, largest recap This lesson in which I have been talking about who are the people that are in any way connected with acid security,
the people in the company providing that the companies hire accurately structured at least people working with this security. And I also talked about the advantages and disadvantages of hierarchical Orel based
the organization in the company. When it comes to assess resolving some issues
that they are in touch with as its security
Intermediate PC Security
The Intermediate PC Security course will teach students about endpoint protection. Students will learn ...
4 CEU/CPE Hours Available
Certificate of Completion Offered
MTA 98-367 Security Fundamentals
The Microsoft Technology Associate (MTA) is Microsoft’s newest suite of technology certification exams that validate ...
2 CEU/CPE Hours Available
Certificate of Completion Offered