Chapter 6. Developing Radar

Every company that positions security technology within its business units has two critical areas of consideration:

  • The parts that are controllable: the systems and security technology itself

  • The parts that are uncontrollable: threats that are flowing into your systems

Threats—perceived and real—constantly try to enter (ping) your system. What do they mean? It is impossible to understand a ping unless you can see it, correlate it to millions of other pings, and feed that ping (if it is a serious threat) through to a common reporting point that I advocate should be constructed like a dashboard, converting technical data into business vocabulary in real time. I call this developing radar.

Get Mapping Security: The Corporate Security Sourcebook For Today's Global Economy now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.