SlideShare a Scribd company logo
1/4/2017 Why Conquering Complexity Is a Critical Component of an Effective Security Program | Infosecurity Europe Blog
http://blogs.infosecurityeurope.com/why­conquering­complexity­is­a­critical­component­of­an­effective­security­program/ 1/5
Why
Conquering
Complexity
Is a Critical
Component
of an
E鎧�ective
Security
Program
JANUARY 4, 2017
BY INFOSECURITY EUROPE TEAM
IN EXPERT OPINION, UNCATEGORIZED.
Register to
Visit
Register to
Exhibit
Contact Us
Connect with
Us
Infosecurity Europe
Blog

1/4/2017 Why Conquering Complexity Is a Critical Component of an Effective Security Program | Infosecurity Europe Blog
http://blogs.infosecurityeurope.com/why­conquering­complexity­is­a­critical­component­of­an­effective­security­program/ 2/5
Dominic Vogel, Chief Security
Strategist, Cyber.SC
An article published by ISACA
 
Security professionals tend to have a
penchant for making things more
complicated than they need to be. But
life and our work are complicated
enough without us adding extra layers
of needless complexity. When it
comes to operating an e鎧�ective
enterprise security program, the old
adage of “complexity being the enemy
of security” really does ring true.
 
Many CIOs and CISOs are guilty of
chasing the cool blinking lights of
newer technologies and keep adding
additional technologies to an already
Categories
Best Practice
Advice
Case Studies
Events
Events Information
Exhibitor
Information
Expert Opinion
Industry Opinion
News
Product
Information
Uncategorized
Visitor Information
Featured This
Month
launch:
‘Intelligent
Security:
Protect.
Detect.
Respond.
Recover’
⁄ APRIL 9, 2015
1/4/2017 Why Conquering Complexity Is a Critical Component of an Effective Security Program | Infosecurity Europe Blog
http://blogs.infosecurityeurope.com/why­conquering­complexity­is­a­critical­component­of­an­effective­security­program/ 3/5
overburdened and poorly integrated
security stack. Many enterprise
security programs look like a
scattered city of isolated Jenga towers.
From a risk management perspective,
the more complex the infrastructure,
the harder it is to defend.
 
Balancing usability, security and
complexity seems like a daunting task
at times. Trying to do so on a daily
basis costs many of us our sanity
(think of Homer Simpson when he
was forced to give up beer and TV!).
 
During one of my more salient
moments, I came across a useful and
applicable metaphor that security
pros should heed when it comes to
balancing that aforementioned unholy
trinity…
 
Read the full article here.
TAGGED #INFOSEC17, ADVICE, BUSINESS ADVICE,
CYBERSECURITY, DATA SECURITY, INFORMATION
SECURITY, ISACA.
Why
Conquering
Complexity Is
a Critical
Component of
an E鎧�ective
Security
Program
JANUARY 4, 2017
In The
Boardroom
With Extenua
CEO Steve
Visconti
NOVEMBER 2,
2016
Cylance Vice
President John
McClurg
re⽡ects on his
time working
in Cyber
Defence
OCTOBER 6, 2016
What are the
biggest
security
challenges
within the IoT
today?
SEPTEMBER 9,
2016
The CEO of
Portsys talks
about how to
manage
security in a
more
comprehensive
manner
AUGUST 19, 2016
Recent Posts
Infosecurity Europe
1/4/2017 Why Conquering Complexity Is a Critical Component of an Effective Security Program | Infosecurity Europe Blog
http://blogs.infosecurityeurope.com/why­conquering­complexity­is­a­critical­component­of­an­effective­security­program/ 4/5
Leave a Comment
Comment
Name *
Email *
Infosecurity Europe
Team
PREVIOUS:
In The Boardroom
With Extenua CEO
Steve Visconti

Your email address will not be published.
Required ��elds are marked *
1/4/2017 Why Conquering Complexity Is a Critical Component of an Effective Security Program | Infosecurity Europe Blog
http://blogs.infosecurityeurope.com/why­conquering­complexity­is­a­critical­component­of­an­effective­security­program/ 5/5
Website
Are you human? *
3 + = four
ERROR for site owner:
Invalid domain for site key reCAPTCHA
Privacy - Terms
Post Comment
Useful Links
Log in
Infosecurity Europe 2015
Infosecurity Magazine
Infosecurity Global Executive
Network
Sponsorship Opportunities
Infosecurity
Magazine News
We are
RE®_LOGO_WHITE_300x42
1
logo-reed-
elsevier-
100x13-
white
© 2013 - 2015 Reed Exhibitions Ltd | Infosecurity and Infosec are registered trademarks of Reed Exhibitions Limited.
Notify me of follow-up comments by email.
Notify me of new posts by email.
ICO ‘Breached Public
Data’ Several Times
Since 2013
4 January 2017
Privacy watchdog
forced to investigate

More Related Content

PDF
Bill checkpoint
PDF
Intelligent Cybersecurity for the Real World
PDF
Cisco Connect 2018 Malaysia - Changing the equation-cybersecurity in digital ...
PDF
Defending the Academy from Cyber Threats
PDF
DIU ISACA STUDENT GROUP 2019 version2
PDF
ITAM AUS 2017 Harnessing the power of SAM Intelligence for Cyber Security
PDF
PDF
Cyber Defense in 2016
Bill checkpoint
Intelligent Cybersecurity for the Real World
Cisco Connect 2018 Malaysia - Changing the equation-cybersecurity in digital ...
Defending the Academy from Cyber Threats
DIU ISACA STUDENT GROUP 2019 version2
ITAM AUS 2017 Harnessing the power of SAM Intelligence for Cyber Security
Cyber Defense in 2016

What's hot (19)

DOCX
letter of recommendation
PDF
7 Steps for Law Firms to Combat Cyber Threats
PDF
Antivirus offer
PPTX
Antivirus offer
PDF
Security is a process not a magic
PDF
Misinformation on the internet: Video and AI
PDF
Nixu Cyber Defense Center - You have one fear less.
PDF
DWS16 - Plenary Privacy Paradox - Stephane Geyres, Accenture
PDF
DWS16 - Plenary - Privacy Paradox - Yannick Sadowy, Accenture
ODP
Software freedom-day
PPTX
BSides NYC Wysopal Keynote
PDF
Paradigm of Dependable Security
PDF
Instagram safety
DOCX
Chris Ward Short Bio and CV 2016 (1)
PDF
Container Security Research
PPTX
Nsc42 - is the cloud secure - is easy if you do it smart ECC Conference
PDF
Cisco canada education @ CAIS IT leadership conference 2014
PDF
SSFIPS - cert of completion
PDF
Network as a sensor
letter of recommendation
7 Steps for Law Firms to Combat Cyber Threats
Antivirus offer
Antivirus offer
Security is a process not a magic
Misinformation on the internet: Video and AI
Nixu Cyber Defense Center - You have one fear less.
DWS16 - Plenary Privacy Paradox - Stephane Geyres, Accenture
DWS16 - Plenary - Privacy Paradox - Yannick Sadowy, Accenture
Software freedom-day
BSides NYC Wysopal Keynote
Paradigm of Dependable Security
Instagram safety
Chris Ward Short Bio and CV 2016 (1)
Container Security Research
Nsc42 - is the cloud secure - is easy if you do it smart ECC Conference
Cisco canada education @ CAIS IT leadership conference 2014
SSFIPS - cert of completion
Network as a sensor
Ad

Viewers also liked (6)

PDF
GMITCS-2016-Agenda.August
PDF
BCAWARE_ProgramBook_FINAL_Proof
PDF
csxnewsletter
PDF
Hacking Security - Tech Talent Meetup (Vancouver, BC) _ Meetup
PDF
Brochure - Jan 14
PDF
Tech Talent Meetup Hacking Security Event Recap
GMITCS-2016-Agenda.August
BCAWARE_ProgramBook_FINAL_Proof
csxnewsletter
Hacking Security - Tech Talent Meetup (Vancouver, BC) _ Meetup
Brochure - Jan 14
Tech Talent Meetup Hacking Security Event Recap
Ad

Similar to Why conquering complexity is a critical component of an effective security program infosecurity europe blog (20)

PDF
2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...
PPTX
The Importance of Consolidating Your Infrastructure Security – by United Secu...
PPTX
Learn how to use an Analytics-Driven SIEM for your Security Operations
PDF
Top 10 Reasons to Learn Cybersecurity | Why Cybersecurity is Important | Edureka
PDF
Open Security and Privacy Reference Architecture
PDF
Effective IS Starts, Ends With Security Culture - ISACA Now
PDF
New Threat Trends in CII(Critical Information Infrastructure)
PDF
OS17 Brochure
PDF
Cisco Connect 2018 Philippines - security keynote
PDF
Dr. Aloysius Cheang. Top Cyber News MAGAZINE. April 2024
PPTX
SplunkLive! London 2017 - Building an Analytics Driven Security Operation Cen...
PPTX
Cisco Connect 2018 Indonesia - Cybersecurity Strategy
PDF
Tackling Data Security and Privacy Challenges of the IoT
PDF
"Evolving cybersecurity strategies" - Seizing the Opportunity
PPTX
Splunk Discovery Day Dubai 2017 - Security Keynote
PPTX
IT security
PPTX
Nsc42 - is the cloud secure - is easy if you do it smart UNICOM
PDF
European Cybersecurity Skills Framework Role Profiles.pdf
PDF
Information Security Awareness for everyone
PDF
The 10 Most Experts Cyber Security Leaders Making Waves in Industry, 2024.pdf
2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...
The Importance of Consolidating Your Infrastructure Security – by United Secu...
Learn how to use an Analytics-Driven SIEM for your Security Operations
Top 10 Reasons to Learn Cybersecurity | Why Cybersecurity is Important | Edureka
Open Security and Privacy Reference Architecture
Effective IS Starts, Ends With Security Culture - ISACA Now
New Threat Trends in CII(Critical Information Infrastructure)
OS17 Brochure
Cisco Connect 2018 Philippines - security keynote
Dr. Aloysius Cheang. Top Cyber News MAGAZINE. April 2024
SplunkLive! London 2017 - Building an Analytics Driven Security Operation Cen...
Cisco Connect 2018 Indonesia - Cybersecurity Strategy
Tackling Data Security and Privacy Challenges of the IoT
"Evolving cybersecurity strategies" - Seizing the Opportunity
Splunk Discovery Day Dubai 2017 - Security Keynote
IT security
Nsc42 - is the cloud secure - is easy if you do it smart UNICOM
European Cybersecurity Skills Framework Role Profiles.pdf
Information Security Awareness for everyone
The 10 Most Experts Cyber Security Leaders Making Waves in Industry, 2024.pdf

Recently uploaded (20)

PDF
GamePlan Trading System Review: Professional Trader's Honest Take
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
cuic standard and advanced reporting.pdf
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PPTX
Big Data Technologies - Introduction.pptx
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Modernizing your data center with Dell and AMD
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Advanced Soft Computing BINUS July 2025.pdf
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
GamePlan Trading System Review: Professional Trader's Honest Take
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
NewMind AI Monthly Chronicles - July 2025
cuic standard and advanced reporting.pdf
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Diabetes mellitus diagnosis method based random forest with bat algorithm
NewMind AI Weekly Chronicles - August'25 Week I
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Big Data Technologies - Introduction.pptx
Spectral efficient network and resource selection model in 5G networks
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Modernizing your data center with Dell and AMD
“AI and Expert System Decision Support & Business Intelligence Systems”
Advanced Soft Computing BINUS July 2025.pdf
Review of recent advances in non-invasive hemoglobin estimation
Mobile App Security Testing_ A Comprehensive Guide.pdf
Understanding_Digital_Forensics_Presentation.pptx
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...

Why conquering complexity is a critical component of an effective security program infosecurity europe blog