Seminar Highlights: The Human Face of Information Risk

I would like to thank all those who attended our Human Face of Information Risk seminar in Bristol last Thursday.I hope you enjoyed the event as much as the Ascentor team did.

What a fantastic evening. Speaking alongside mewas Gordon Morrison, Director of Defence and Security at Intellect and Simon Moore, South West Regional Director at the CBI . I’d like to thank them both for their enlightening presentations.

So, the highlights. If you missed the event and want a quick summary, here is a run down of the main messages that came out of the talks.

  1. Cyber security, information security, information assurance – whatever term you’d like to use this is fast becoming a real priority for companies here in the UK.
  2. We are all increasingly dependent on IT at home and at work and new technologies pose new threats. The Cloud, Facebook, Twitter, QR codes and smart phones all introduce new vulnerabilities.
  3. There’s now a growing gap between the security we have and the security we need, says Intellect.
  4. Over 96% of companies have suffered some form of information security issue in the last twelve months, says the CBI. More people are victims of online crime than of offline crime, says Intellect.
  5. The Government is getting really concerned about cyber security and they should. A study by Detica showed that cyber attack costs the UK economy £27 billion per year. The Government wants the UK to be a centre of excellence in cyber security, to attract more business. It’s a national imperative.
  6. Technology is essential to solve the problem but it’s not the whole story. Companies need to take a holistic view.
  7. It’s easy to blame attacks from the East for the problem butthe threats often come from much closer to home – from suppliers and even your own employees, as Ascentor’s recent research shows.
  8. Malicious attack is one risk – and this is on the rise. Cyber crime is big business and the attackers are getting more sophisticated.
  9. Deliberate acts of sabotage are a very real risk too. Disgruntled employees pose a real threat.Well over half (57%) of the people we polled in our research said that there were circumstances in which they would deliberately sabotage or compromise their employer.
  10. Accidental loss is another challenge. Losing important files, talking about sensitive information on the train.
  11. You can protect your company – and it doesn’t have to cost you a fortune. 80% of the threats can be mitigated by implementing basic security controls .
  12. Where do you start? Recognise the threat; identify your valuable information; identify the risks; manage and mitigate them. And keep going – Information Risk Management should be an ongoing process.
  13. GCHQ recommends that the solution is an Information Risk Management approach, not security standards. Unlike standards, IRM takes business context into consideration, so business benefit and business risk can be balanced,says Dave James.
  14. How do we inspire people to invest in information security? Make it real for them. Show them what to do as home users, reveal the threats they are under and perhaps they will understand the threat to their companies and want to do something about it.
  15. Simple initiatives can make a massive difference. HR has an important role to play, as of course does IT, but it is the Board that needs to take ultimateresponsibility.The challenge is to get the ‘manage your information risk’ message out to every Board of Directors and inspire them to take action.

In summary, when it comes to information security, your people must berecognisedas a source of risk but they are also part of the solution. We all stressed the need to educate and train staff, to alert them to the threat and put the right policies and procedures in place to mitigate the risk they pose.

Add the human element to the increasing threat of malicious attack and the outlook is pretty scary. Yes, there is a clear and present danger but we can all do something about it. Be aware of the information security risks facing your firm and make sure your company is secure.Effective Information Risk Management will not just mitigate the risk, it can bring you business benefit.

If you would like a copy of the slides from this event please email Dave James at [email protected] . Do get in touch if you have any questions or would like some guidance for your firm.

Article by Dave James , MD of Ascentor

Related content:

You may also be interested in:

Building business resilience

Building business resilience - through Information Security, Business Continuity and Disaster Recovery

How strong is your business resilience to threats to IT, information and physical security? And how can security standards like ISO 27001 and ISO 22301 help?

Ascentor's cyber security review 2020

Ascentor’s cyber security review of 2020

It was the year a different kind of virus dominated. But that didn’t stop cyber criminals exploiting it. We look back at 2020.

Cyber security myths of SMEs

Cyber security myths putting SMEs at risk

SMEs have long been a favourite hunting ground for cyber criminals and, in the worst case scenario, may not survive. We look at some of the myths that put SMEs at risk of cyber crime.