Enterprising Developments

How Openness Can Drive IT Security

Joe McKendrick
Insurance Experts' Forum, May 10, 2012

Data and IT security is a constant worry for carriers, especially as more and more data comes online. The natural, and understandable, reaction is to build strong, multi-layered defenses, to wall up as much as possible to keep the bad guys—on the inside as well as outside—at bay.

There's nothing wrong with vigilance, but at least one financial services security leader also advises against taking a bunker mentality. Instead of building massive walls, perhaps more IT leaders should strive to move in the other direction, toward more openness and collaboration in IT security efforts, says John Meakin, global head of security solutions and architecture at Deutsche Bank, in a new post at Forbes.

Meakin makes the following recommendations:

Work closely with the business: All too often, I have seen examples of where business leaders brush off data security to the IT department—“It's your problem, handle it” is often accompanied by “but don’t expect additional budget.” Meakin points out that “information security is no longer an IT support issue; it’s a strategic business responsibility.” That’s why “it’s critical to me to develop strong working relationships with business leaders in other functions—operations, R&D, finance, legal, marketing.”

Encourage a learning environment: “Security leaders need every employee to be part of the solution,” writes Meakin. They need to champion a corporate culture in which security is “built into how work gets done.” To achieve such a one-for-all environment, employees need to be able to learn from each other and share their experiences. At Deutsche Bank, open and honest debates over social media channels are encouraged as a way to arrive at sensible and workable security practices. “One of the best sources of self-service in use of key security mechanisms that I have seen is the online wiki-style social network that we use at Deutsche Bank,” he relates. “Have a problem with that two-factor VPN sign-on? Need a software-token on your iPhone? Go to the social network and get hints, tips and real solutions through the advice of real users like you.”

Network with your peers: User groups and professional associations provide valuable opportunities to discuss best practices for security. “The bad guys are certainly teaming up and sharing best practices,” Meakin points out. “Why aren’t we?” He observes that his best and most timely intelligence on the latest sophisticated targeted attacks—before they actually hit—comes from fellow security leaders at other similar businesses.

Data and IT security can be automated to some degree, but the most effective practices rely on the engagement of everyone in the organization.

Joe McKendrick is an author, consultant, blogger and frequent INN contributor specializing in information technology.

Readers are encouraged to respond to Joe using the “Add Your Comments” box below. He can also be reached at joe@mckendrickresearch.com.

This blog was exclusively written for Insurance Networking News. It may not be reposted or reused without permission from Insurance Networking News.

The opinions of bloggers on www.insurancenetworking.com do not necessarily reflect those of Insurance Networking News.

Comments (0)

Be the first to comment on this post using the section below.

Add Your Comments...

Already Registered?

If you have already registered to Insurance Networking News, please use the form below to login. When completed you will immeditely be directed to post a comment.

Forgot your password?

Not Registered?

You must be registered to post a comment. Click here to register.

Blog Archive

Global Supply Chain, Local Problem

As a technology provider, your clientís ability to deliver products and services to their customers, when and where they need them, is at the heart of their business success.

Legacy Systems Are Increasingly a Competitive Handicap

Legacy systems, while reliable, increasingly hold insurers back, a new study finds

From Her to Watson, and What’s Next?

Imagine a learning system that can replace the performance of your best employee to provide the same level of support across the organization.

Five Reasons to Software-Define Your Operations

It may be possible to provision key services with the click of a mouse, but benefits go well beyond that.

3 Policy Admin Conversion Considerations

Insurers would be wise to learn these lessons before formulating a strategy to convert policies to a new policy administration system.

Boyle’s 4th Law - Response Time Matters!

Why many companies donít do a good job of measuring the thing that clients value the most.