O'Reilly logo

The Psychology of Information Security by Leron Zinatullin

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER 4: STAKEHOLDERS AND COMMUNICATION

As discussed in the previous chapter, stakeholder engagement is key in making sure that risks are addressed properly. The earlier people are involved in a security project, the easier it is to obtain their support. The same principle applies when security professionals have to be involved in other people’s projects. Andrew Martin, a director for IT risk at a global bank, shares an example of a security solution that was not successfully implemented. A company wanted to mitigate the risk of exploiting vulnerabilities in their applications and decided to deploy a code-scanning tool. This would make sure that applications are tested for exploits before they are released.

“Uptake on the use of this code-scanning ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required