8669840268?profile=original

Scenario: COVID-19 Pandemic:

We all are grown up with the idea of "prevention is better than cure" and the whole world is trying to live by the very same statement for COVID-19 pandemic.

  1. Maximum efforts are on prevention mechanism such as applying lockdown, wearing masks, building immunity, and so on. 
  2. Next best efforts are on identification and isolation for impact one.
  3. Then we have varying level of treatment for impacted one.
  4. The truth is those who lost the live are safely handled for the last rite.
  5. And we go back to point number 1 and this loop continues.

Scenario: Information Security:

We all are growing up with the idea of "Security and Privacy by design by default" and the whole world needs to live by the very same statement for Information Security.

  1. Maximum effort should be on building security and privacy during design itself, be it a software design, hardware design, network design or any other design.
  2. Next best effort should be on setting the most stringent security and privacy rules by default everywhere and change only if needed by knowing the associated risks.
  3. Then we should identify and isolate any and every possible security and privacy attacks and apply treatment to mitigate the damage and reduce the risks.
  4. The truth is some attacks are still successful and damages are done which should be safely removed. Its very important to apply the learning from learned attacks.
  5. And we go back to point number 1 and this loop continues.
Dear Information Security Leaders,

Let's start practicing "Security and Privacy by design by default" as soon as possible and as much as possible. This principle should be applied on both strategic and tactical approach for every business to efficiently manage the information security risks with optimal budget.

Dear Board Members,

We need your support to work on the principle - Security and Privacy by design by default to optimally manage and win over information security and business risks.

Dear Reader,

In case you would like to share your perspective please respond and we can start the conversation towards this important topic of Information Security.

You need to be a member of CISO Platform to add comments!

Join CISO Platform