Subido por josemiguel.iriarte

TI versus SI

Anuncio
Hacker Combat LLC
Information
Technology
vs
Information
Security
Different Sides Of The Same Coin
Top Priorities
IT
Information Security
Responsible for
hardware, software,
and new technology
Responsible for systems,
processes, and risks
posed by end users
Ensuring hardware,
software, and other
network components
remain functional
Protecting data and
assets
Implements controls
Identifies which controls
to implement and tests
controls to ensure they
are working as intended
Top Priorities
IT
Information Security
Keeps hardware,
software, applications
updated and patched
Keeps up-to-date on new
threats and cyber attacks
that emerge daily
Often measured in
up-time and response
time
Recommends and
prioritizes action plans
and solutions to
mitigate risks
"Fix it first" approach
"Secure it first" approach
IT and Information Security must
work together to create a secure
environment in any organization.
Hacker Combat LLC
Descargar