The science of information security

1 April 2016 Conferences & Events, News & Events

Information security is rarely achievable through the random application of IT security components. It is about understanding the value of an organisation's information assets, determining the risks to the information and the systems that contain it, and designing appropriately scoped solutions to remove or mitigate the risks.

So said Steve Jump, head: Corporate Information Security Governance at Telkom, who will be presenting on the science of information security at the ITWeb Security Summit 2016, at Vodacom World from 17 to 19 May.

He says, as with all such exercises, to measure how well information security is done requires a model with metrics and an understanding of what the business considers to be its main objectives.

"Although this is often seen as an engineering problem, we look at this process as obtaining knowledge about the organisation, its purpose, its staff, its products and its information assets that go beyond the technical. We consider this to be the science of information security."

In terms of what South African businesses are doing wrong when it comes to information security, Jump says the easy route is looking at what everyone else is doing, and buying or renewing the same systems that have always been in place.

It is also easy to continue spending money on the support, maintenance and operation of these systems, because not to do so would make things harder.

"Because of this, if an organisation has not reviewed the function of technical and procedural information security systems against its own current business threats in the last 24 months, it is very likely that it is paying for systems that are not being fully used, and are not protecting the assets that the business expects them to."

According to Jump, any security tool that is tested on a system will discover a 'new threat'. "As a security executive you are responsible for making sure that the cost of detection and removal of that ‘new threat' is actually a real reduction in your business' risk profile, and that the investment in its acquisition and use is appropriate to the benefit."

He says merely having the latest and fastest security systems does not automatically mean that the organisation is safe, but if there is an understanding of what is being protected, the right resources can be applied to the right problems. "Not only will that help you manage the cost of your security solutions, it will help you to manage their operation."

ITWeb Security Summit 2016

Steve Jump from Telkom will be presenting at the 11th ITWeb Security Summit 2016 on 17 and 18 May. He will discuss the science of information technology and how you can prove that your current security system and process is working for you, or not. To view the full agenda, click here. To register, click here





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Highest increase in global cyberattacks in two years
Information Security News & Events
Check Point Global Research released new data on Q2 2024 cyber-attack trends, noting a 30% global increase in Q2 2024, with Africa experiencing the highest average weekly per organisation.

Read more...
Amendments to the Private Security Industry Regulations
Technews Publishing Agriculture (Industry) News & Events Associations
SANSEA, SASA, National Security Forum, CEO, TAPSOSA, and LASA oppose recently published Amendments to the Private Security Industry Regulations regarding firearms.

Read more...
Historic Collaboration cuts ATM Bombings by 30%
Online Intelligence Editor's Choice News & Events Security Services & Risk Management
Project Big-Bang, a collaborative industry-wide task team, has successfully reduced ATM bombings in South Africa by 30,7% during the predetermined measurement period of November, December and January 2024/5.

Read more...
World-first safe K9 training for drug detection
Technews Publishing SMART Security Solutions Editor's Choice News & Events Security Services & Risk Management Government and Parastatal (Industry)
The Braveheart Bio-Dog Academy recently announced the results of its scientific research into training dogs to accurately detect drugs and explosives without harming either the dogs or their handlers.

Read more...
The IoT trends shaping a smarter, more connected future
IoT & Automation News & Events
The Internet of Things (IoT) is revolutionising sectors across Africa. In 2025, IoT is expected to continue driving digital innovation, enhancing operational efficiencies, and enabling the creation of smarter, more sustainable ecosystems.

Read more...
Stay safe while using AI assistants
Kaspersky Information Security News & Events AI & Data Analytics
The new DeepSeek AI assistant has attracted a lot of attention, including the interest of cybercriminals. Kaspersky experts have detected scam activity related to it.

Read more...
Q-Vision Pro Wins Best of Innovation Award
Suprema Access Control & Identity Management News & Events
Suprema AI, a specialised provider of on-device AI solutions based on video analysis, announced that it has won the Best of Innovation Award in the Embedded Technology category at CES 2025.

Read more...
Scammers take advantage of desperate need for cash
Editor's Choice News & Events Security Services & Risk Management
Revitalised from their end-of-year holiday, South Africans typically tackle the new year with gusto and renewed vigour, but so do the criminals as they prepare for the rush back to school or university

Read more...
Saving lives with fire safety technology
Fire & Safety News & Events
The fire protection landscape is evolving swiftly, fuelled by technological advancements designed to improve safety and efficiency in fire detection, control, and suppression. These innovations transform traditional methods and establish new safety standards in residential and commercial spaces.

Read more...
From QR code to compromise
Information Security News & Events
A new attack vector involves threat actors using fraudulent QR codes emailed in PDF attachments to bypass companies' phishing security measures by requiring users to scan the code with their mobile phones.

Read more...