About Us | Contact Us
View Cart

Thank Reality for Continuous Improvement Process!

By Dan Hadaway | Wednesday, November 26, 2014 - Leave a Comment

Will the FFIEC adopt the NIST Cybersecurity Standard?


This is where Dan predicts a Paradigm Shift in 2015!
Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . .


Thanksgiving marks the beginning of the end for us here at infotex.

We’ve got our short list of audits to finish, and then we actually slow down for a week or two.  So I would have to say first and foremost, I’m thankful for the phenomenon of “cycle.”  Cycle means the year is going to end.  Cycle means it’s a process not an objective, and process is the key word in “continuous improvement process!”  Cycle is what we auditors live by.  Cycle means we can finish this for now, knowing we’ll come back again next year and “take it up a notch.”

I teach that one of the fundamentals of IT Governance is that it’s a business process . . . . meaning that it’s cyclical, that you never cross it off the list.  And I remind my Clients . . . . especially those who are disappointed audit Clients . . . . that the good news about the cyclical nature of Information Technology Governance is that we can always draw a line on “completeness,” recognizing that we’ll be able to return to the process next year, and “take it up a notch.”

The FFIEC is going to take it up a notchcontinous_improvement_process. At least that’s what I’m predicting based on what I’ve been reading and hearing.  But continuous process improvement . . . . taking things up a notch a bit at a time . . . . that’s what the whole Cybersecurity Assessment study is all about, in my opinion.  I’m predicting that next year, we’ll be getting some sort of guidance as a result of the assessment.  And though it’s going to require some work . . . . we’ll all have to re-tool all our policies and procedures, and apply a new “paradigm shift” called NIST, I am indeed thankful they’re forcing us to do it.  We risk becoming complacent with our existing programs.  This risk also brings about a belief that we are safe, and our information security program quickly becomes a myth.

You see, the extra work won’t be a bad thing if you plan for it.  Planning for improvement is part of the continuous improvement process (CIP), and for that I’m thankful!  It means that, if we think things through, we can get the most important things done at the expense of the least important.  Our lives will still be more hectic, but because we’re focusing on what we have proactively determined to be “critical” rather than “urgent,” we achieve more value.  At least that’s the theory, and for infotex, that theory has been working for almost 15 years now!

And at infotex, updating our templates and checklists, audit processes and compliance programs, to conform to the new NIST framework will be a critical, important priority.

At the IT Security and Risk Management Conference last week, Dr. Kevin Streff stressed continuous process improvement, that we don’t have to go from 2 to 9, we need to go from 2 to 3.  And then 3 to 4.  Etc.  His whole point is that we can NOT let perfection get in the way of effectiveness.  The goal isn’t to instantly become perfect, the goal should be “incremental improvements, over time.”

Attendance at the conference was flat for the first time this year.  So we polled those who dropped us.  Every single one of them responded saying that they liked the conference and had intended to return, but could not make it “from a timing perspective.”

From a timing perspective, we have been bouncing from a 5 to a 4 to a 5 to a 4.  We keep trying to move the conference, and always run into those who wanted to come, but couldn’t make it because it was right smack in the middle of long-standing appointments.  Though we’re not sure how to address that, we have at least become aware of it and as you all know, I believe awareness is 9/11’s of the battle.

I love the conference if for no other reason, because it causes me to reflect.  Next year we’ll probably be moving it back to October (early October, I hope) as another attempt to address the timing thing.  But we’ll also be “reaching outside the box” with other “controls” such as shortening the conference, re-considering the venue and location, modifying the agenda, etc.  (If you have any ideas, let us know!)

Though I’ve thought several times, in my post-conference reflection, that “the week before Thanksgiving was a mistake,” I have to admit that having the conference the week before I’m to write my Thanksgiving Article has its benefits.  Because it’s good to reflect on things when you’re feeling grateful.  It’s good to do a “post-mortem” while in a “thankful mood.”

And it’s good that we Americans include the act of “Thanksgiving” in our annual cycle!

It has put America on a Continuous Improvement Process!


We’d like to take this opportunity to thank our readers, Clients, friends, and families for helping us make 2014 one of our most successful years!  And, of course, we are VERY thankful to the team at infotex . . . . Stacey, Sean, Chad, Mike, Bryan, Ryan, Jacob, Adam, Chelsea, Dani, Dave, and everybody else who has helped us help our Clients!

THANK YOU!


Original article by Dan Hadaway CRISC CISA CISM. Founder and Managing Partner, infotex

“Dan’s New Leaf” is a “fun blog to inspire thought in the area of IT Governance.”

 


same_strip_012513


 

Latest News
    Reasons why we should be considered! infotex provides a number of services that can be checked out if you click over to offerings.infotex.com! We even made a movie with all the reasons why infotex should be your next MSOC!  
    infotex and GoTo To all infotex managed security service Clients: As recently reported by major news outlets there was a data breach affecting GoTo (formerly LogMeIn) wherein attackers stole encrypted backups containing customer information in November 2022.  Based on the advisory from GoTo the products they offer that are affected include LogMeIn Pro, LogMeIn Central, […]
    An option for increasing security for ALL organizations. . . The threat landscape is evolving daily, and it is becoming increasingly difficult for even large organizations providing cyber defense services to keep up. As Brandao (2021) notes, it is important for organizations to adapt holistic technologies that can correlate all attack events. Therefore, developing XDR […]
    Another awareness poster for YOUR customers (and users).  Now that we have our own employees aware, maybe it’s time to start posting content for our customers! Check out posters.infotex.com for the whole collection! Download the large versions here: Awareness Poster (Portrait) Awareness Poster (Landscape) You are welcome to print out and distribute this around your […]
    A relic of the internet’s less secure past, many small firms struggle to secure their email systems… An article review. With a great deal of cybersecurity related news focused on new threats and similarly new techniques aimed at combating them, it can be easy to forget some of the older threats that have never gone […]
    Seven Trends . . . …that small bank Information Security Officers face in 2023 Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . Welcome to the Magnificent Seven, my annual predictive article about the seven trends in technology that will impact the Information Security Officers of […]
    System Security and Cybersecurity are not the same thing. . . Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . Regarding “information security,” the last thirty years have seen an evolution of frameworks, laws, and assessment approaches which intimidate the management team with their complexity.  […]
    The cryptographic algorithm is vulnerable to attack and is no longer considered secure… An article review. NIST has announced that it plans to retire the SHA-1 cryptographic algorithm by the end of 2030, citing multiple vulnerabilities in the standard, effectively ending its use after nearly 30 years.  Introduced in 1995, SHA-1 used a 160-bit hash […]
    Another awareness poster for YOUR customers (and users).  Now that we have our own employees aware, maybe it’s time to start posting content for our customers! Check out posters.infotex.com for the whole collection! Download the large versions here: Awareness Poster (Portrait) Awareness Poster (Landscape) You are welcome to print out and distribute this around your […]
    Trending: Awareness Posters Meet Infographics Here are the top seven posters as of the last twelve months! As always, our Awareness Posters were a hit in 2022! So we decided to run some reports to see what our most popular posters were since November 2021. As everybody loves top ten lists and contests, we thought […]