Chapter 6. Developing Radar

Every company that positions security technology within its business units has two critical areas of consideration:

  • The parts that are controllable: the systems and security technology itself

  • The parts that are uncontrollable: threats that are flowing into your systems

Threats—perceived and real—constantly try to enter (ping) your system. What do they mean? It is impossible to understand a ping unless you can see it, correlate it to millions of other pings, and feed that ping (if it is a serious threat) through to a common reporting point that I advocate should be constructed like a dashboard, converting technical data into business vocabulary in real time. I call this developing radar.

Get Mapping Security: The Corporate Security Sourcebook For Today's Global Economy now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.