The Forrester Wave™: Information Security And Risk Consulting Services, Q3 2010
The above is an excerpt quoted from the Forrester website.
A place for me to ramble, rample and whatever securely. Let my thoughts roam freely, about the state of security in information around me and I follow them and seek to engage. Ideas and plans and my dreams of security. And a place for events which inspire me or stoke the urge to comment.
The above is an excerpt quoted from the Forrester website.
Oh yes make sure she is not three rungs below you in seniority (according to Idea Cellular it is inappropriate to get into a relationship with someone who is your junior .... ROTFL) - one or two may be okay ;-) else try another department at the same level and on the same floor.
[My opinion] The newspaper report does not mention any closure. No complaint has been filed; no settlement is made. Nothing at all to suggest that animosities have been locked up and the keys are at the bottom of the sea. Of course both parties must have had to sign a hundred pages of legal documents and I am doubly sure they may not have read it.
[My opinion] The company seem to have a weak incident response, incident management and remediation process. They have not resolved potential conflicts leading to the loss of a high performer. If there is truth in the charges and this had been closed two years earlier there may have been more "bright" ideas sirji in time to come! Now they have to search for a successor and this has to be done pronto since the CMO seat is now vacant.
Eight years is a long time and I am sure many other seniors/peers in the organization felt very bad about letting him go but that does not absolve them of the error of inaction or early action.
Surprisingly, when the investigation committee has given a clean chit the press is talking about sexual harassment - so who has created this PR bungle ?
On July 22, MediaNama reported that he is leaving the company to pursue personal interests and on Aug 12 Mumbai Mirror is screaming sexual harassment ! There is an obvious leak somewhere or is there more here than can be seen... rivalry, revenge etc
I don't think this is going to go easy - I am sure a non-poaching clause was inserted it the F & F with him but is there an I-will-not-leave clause with the people whom he mentored or worked with ? And there will be a date when the non-poaching clause will die - besides, how does one prove that some who joined him was poached and in any case there are a zillion ways to get around this.
"Employee Churn", "Attrition", "Head Hunting", "Poachers"... combine these words with morale et al and a picture emerges which may not be very pleasant.
In any case,sir this is your baby and my purpose is to comment on incidents and I am going to also write about sexual harassment so you may want to keep a watch on my blog.
[My opinion] It is not easy to live in a man's world and to carry on a fight for sexual harassment for a woman. And when the woman is in sales it will be a bigger challenge because you are constantly engaged in inter-personal professional relationships.
You have to admire her confidence in her case because she withheld her mobile (prime evidence) and presented hard copies of the SMS messages and got the committee to accept this - now that is good legal advice and negotiating skills which seem to be missing elsewhere.
And I am curious to know why did she not present any evidence when she first reported the harassment by registered mail maybe someone will enlighten me someday ! If she continued in the company for a year after the first compliant she must be interacting with him all along so how come no one knows about the relationship ... good, close, only friends, enemies, hate etc. Certainly HR needs to come up with some sort of explanation.
And if this did not affect the work it is awesome ! Then what will ?
"You must do a background check when accepting a friend on any social network or taking a friendship further"Another blooper that comes to my mind is about wifi networks, when Mumbai and Pune experts were obsessed with doing war driving to get information about open wifi networks.
"An open wifi connection is like showing an open door to terrorists to come into the country !"I do not want to name names as I do not want to be party to their fame which is widespread. These experts are all over except in circles where one finds some genuine knowledgeable professionals. Mind you I am not one and nor do I claim to be one - I work in Information Security and spend every moment of my waking time trying to learn what my peers know.
City ban for £6m drunk rogue trader
30/06/2010
An alcoholic rogue trader who cost his oil firm £6million was yesterday fined £72,000 and banned from working in the City for five years. Read more...
Computerworld covers this incident here
one only needs to think ‘inclusively’
We grew up seeing mountains of files in the backrooms of our parents offices – an age when we cut trees to make paper and created filing systems that could occupy buildings. Then came the digital age and we continue to fell trees and create complex filing / storage systems in servers which are housed in huge data centers.
The digital age promised savings in space, storage efficiency, lightning fast data access and retrieval, remote access… in short, information at your fingertips for a wired you !
Notwithstanding these claims, we continue to struggle to find “that” file, as much as we struggled in the Paper Age. And, if, in that age, we needed warehouses to store files such that they were safe from the weather and were findable, we are no better today when we need large data centers with backup facilities in addition to the huge back-office and front office data processing facilities.
Fundamentally, the technology is right and so is the process which is where we placed our bets. We forgot the people and this is what is making us lose out. There are smart companies who have not overlooked the people factor and are enjoying the fruits of the digital age, but a majority continue to live with the mirage of digital efficiency.
It is payback time and it is time analysts and architects working in the technology domain in data centers, infrastructure, security, governance et al remove their blinkers if they want to survive in the years to come. Else, we may as well prepare for the dark ages.
Data Centers are growing organically and their rate of reproduction would put a rat to shame. Unfortunately the executive measures his efficiency with the size of the data center or the number of computers in the hands of users, and considers security is in place with devices like firewalls, IDS/IPS or, lately, the UTM.
The truth cannot be further away and few farsighted and visionary companies have read between the lines and through the paper to enable people with the right mix of process and technology. This is done by simply following any best practice or standard in the spirit. Any best practice or standard, say an ISO 9001 or an ISO 27001 or a BS 25999 or a CobiT® can bring high ROI and provide clearer vision to management.
The CIO/ CTO/ CEO have to expand their vision… the IO and TO have to stop being IT centric and think enterprise and the EO has to include IT in the vision process, and maybe everyone has to learn about each other’s business. So the technology people must go to management school to learn financial statements and what makes the company tick and the executives should learn the essentials of systems in terms of how and what they can do. It will open up empathy across business lines since people will start thinking in terms of business and not just about how tough it is to get the executive to understand a simple thing like TCP/IP !
It is surprising that the technology executives have yet to think in terms of building-in security or process best practices when they conceptualize enterprise IT architecture. While they are quick to embrace new technologies like cloud, virtualization, SaaS etc they are scared to “experiment” (? This is the wrong word but I shall use it for the sake of generalization) with Open Source. Simply put innovation is not in place because the technology executive is not sure about technology and the benefits it is providing. They race to provide facilities and do not pause to measure; nor do they manage the race since they are driven by the geeky impulse to tinker with new technology, just to ensure high visibility optics.
Starting with data processing facilities, the technology office will do well with a general house inventory. The industry best practices have defined information assets but no one wants to classify digital information and sensitive repositories overlap general storage space. Apples and oranges are stored and handled in similar fashion and disasters will always be waiting to happen.
All practices lead into each other or provide supplementary and supporting value. To illustrate .. classification of information leads to the creation of a risk based inventory. This will help determine the server and storage location for the digital asset, it’s owner, backup, continuity and disaster recovery plans. In turn now one can provision resources for protection, availability and safeguarding to focus on assets that are critical, sensitive or important for business.
Industry figures say that organizations can save up to 30% of asset and resource investment just by having a risk based asset management that talks to change management, incident management and other processes in the organization.
Moving on, environment issues are being discussed fiercely over the past few years but inclusion of Green IT practices in organizations has been surprisingly slow. And that too in the face of the fact that green practices can provide immediate savings in the data center.
Including green practices is simply an activity that extends the best practice processes that may already be in place. The asset inventory done earlier has provided the organization with a map of the information store and the next step is to move non-sensitive information in to virtual data stores and free up server / rack space. Any organization (small, medium, large) will usually save upto 30% of their hardware utilization if information (data) is managed in a structured manner. The fallout is pleasantly evident in immediate returns by way of reduced power consumption and freeing of hardware assets and rackspace (real estate). The power savings accrue due to the reduced number of servers, lowered air-conditioning and lighting requirements.
Similarly managing paper and toner consumption on printers and running awareness programs to reduce unnecessary printing lead to substantial cost savings.
End point security is a big issue and every sysadmin wanting to demonstrate diligence will spend hours looking for exceptions, using state-of-the-art network monitoring tools. Unfortunately he/she is not guided to extend the monitoring to switching off unmanned machines. This is a security best practice and leads to energy efficiency which means immediate hard savings in energy bills.
Intelligent compliance provides overlap points and easy extensibility of best practices for the CIO/CTO/CSO to extract savings in hard cash or intangibles. Green initiatives include virtualization, switching off devices and lights, lowering energy consumption through alternative cooling efficiency systems in data centers, managing server load processing, optimizing network bandwidth use (for example managing spam or unnecessary exchange of files as attachment), introduction of automation and workgroup / file sharing tools, monitoring energy usage with remote shutdown and management, adopting energy and money friendly lighting systems.
Loosely this translates into uncommon common sensical initiatives. Every technology and security manager is exposed to new initiatives in the world of innovation and has to start looking at innovation that will provide value to the enterprise in terms of savings, income, efficiency or productivity. The answer is at hand and only needs the CxO to extend the line from vanilla best practices and standards to thinking of compliance convergence and then to garnish this mixture with a dash of innovation ! It is easy and the benefits are quick to come by.