BMO's Marson: Information Security Demands Processes As Well As Tools
"In the security space, there are tons of different vendors and it really is not about implementing a tool," Marson said. "You can have a tool that will essentially do anything ─ but what I'd like to propose is that it's not about the tool; it's about the associated processes involved with that tool. For example, it's no good to identify vulnerabilities on your systems if you have no method with which to remediate those vulnerabilities. You need to have people looking at those vulnerabilities, going out there and fixing them." The tools, in other words, can only do so much.
Marson said that a firm can go out and buy the very best-of-breed security tool for anti-virus protection or security-log management, but if the processes around information security are bespoke and unclear, that tool will not be used properly.
Users, Marson contended, have to gain a better understanding as to what the tools they are purchasing actually do. They need to think about the processes around how they're going to use that tool, and need to think about how that tool can mature.
The toughest aspect of information security (IS) is proactively identifying the emerging areas that will require attention. Because the audience in Toronto was largely comprised of people in IT ─ and not necessarily security professionals like Marson ─ he said that IT should look to work closely with the security professionals at their firms, because these professionals tend to be a tight-knit bunch
"Information security professionals are very close because our firms don't compete on security, so we talk to one another. You should ask your security professionals what they're concerned about," he said.
Information security professionals are very close because our firms don't compete on security, so we talk to one another. You should ask your security professionals what they're concerned about.
Marson said that it's key to first define your IS capabilities and then apply specific processes to all component of the firm's infrastructure, developing them to stretch across the various tiers and components of the organization.
"When you think about it this way, you can look at security in a different way. You can start to look at how you apply your IS capabilities across all your different tiers; this way you can pick a single capability and see how you're protected across all your different levels," he said. "Or, you can look at it the other way ─ you can take an individual component and figure out how you apply all your different security capabilities to that particular component.
"One of the fundamentals of information security is defense and depth-layered security," he continued. "By looking at it this way you can look at all the different protections you have in place for individual components and how those things might work together."
Finally, Marson said that these processes and tools ─ these capabilities ─ need to be able to mature over time as risk threats change and evolve.
"It's very important to not only develop your IS capabilities and deploy them everywhere, but also mature them onto your riskiest systems," he said.
Only users who have a paid subscription or are part of a corporate subscription are able to print or copy content.
To access these options, along with all other subscription benefits, please contact info@waterstechnology.com or view our subscription options here: http://subscriptions.waterstechnology.com/subscribe
You are currently unable to print this content. Please contact info@waterstechnology.com to find out more.
You are currently unable to copy this content. Please contact info@waterstechnology.com to find out more.
Copyright Infopro Digital Limited. All rights reserved.
As outlined in our terms and conditions, https://www.infopro-digital.com/terms-and-conditions/subscriptions/ (point 2.4), printing is limited to a single copy.
If you would like to purchase additional rights please email info@waterstechnology.com
Copyright Infopro Digital Limited. All rights reserved.
You may share this content using our article tools. As outlined in our terms and conditions, https://www.infopro-digital.com/terms-and-conditions/subscriptions/ (clause 2.4), an Authorised User may only make one copy of the materials for their own personal use. You must also comply with the restrictions in clause 2.5.
If you would like to purchase additional rights please email info@waterstechnology.com
More on Emerging Technologies
This Week: Startup Skyfire launches payment network for AI agents; State Street; SteelEye and more
A summary of the latest financial technology news.
Waters Wavelength Podcast: Standard Chartered’s Brian O’Neill
Brian O’Neill from Standard Chartered joins the podcast to discuss cloud strategy, costs, and resiliency.
SS&C builds data mesh to unite acquired platforms
The vendor is using GenAI and APIs as part of the ongoing project.
Chevron’s absence leaves questions for elusive AI regulation in US
The US Supreme Court’s decision to overturn the Chevron deference presents unique considerations for potential AI rules.
Reading the bones: Citi, BNY, Morgan Stanley invest in AI, alt data, & private markets
Investment arms at large US banks are taken with emerging technologies such as generative AI, alternative and unstructured data, and private markets as they look to partner with, acquire, and invest in leading startups.
Startup helps buy-side firms retain ‘control’ over analytics
ExeQution Analytics provides a structured and flexible analytics framework based on the q programming language that can be integrated with kdb+ platforms.
The IMD Wrap: With Bloomberg’s headset app, you’ll never look at data the same way again
Max recently wrote about new developments being added to Bloomberg Pro for Vision. Today he gives a more personal perspective on the new technology.
LSEG unveils Workspace Teams, other products of Microsoft deal
The exchange revealed new developments in the ongoing Workspace/Teams collaboration as it works with Big Tech to improve trader workflows.