{"id":90524,"date":"2020-01-30T09:00:28","date_gmt":"2020-01-30T17:00:28","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\/?p=90524"},"modified":"2023-05-15T23:28:42","modified_gmt":"2023-05-16T06:28:42","slug":"changing-the-monolith-part-3-whats-your-process","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/01\/30\/changing-the-monolith-part-3-whats-your-process\/","title":{"rendered":"Changing the Monolith\u2014Part 3: What\u2019s your process?"},"content":{"rendered":"

In my 25-year journey, I have led security and privacy programs for corporations and provided professional advisory services for organizations of all types. Often, I encounter teams frantically running around in their own silos, trying to connect the dots and yet unsure if those are the right <\/em>dots. Connecting the dots becomes exponentially difficult in an environment where everyone is trying to achieve a different goal.<\/p>\n

Here are a few tips to create teams unified around a common mission:<\/p>\n

1. Define the mission and implement it like any other business plan<\/h3>\n

First, you must know what you are trying to achieve<\/a>. Are you protecting trade secrets? Limiting reputation damage? Reducing the chance of unauthorized access to sensitive data? Complying with all local, regional, and national data protection laws? Trying to keep employees safe? Keep patients, passengers, customers, and business partners safe? Is the answer \u201cAll the above?\u201d Define an order of risk magnitude.<\/p>\n

Focus on what success looks like, identify quick wins, and get the opinions of executive leadership. What do they view as success? Don\u2019t settle for unrealistic answers such as \u201cWe want 100 percent security.\u201d Explain what is realistic and offer your approach as a business plan.<\/p>\n

2. Define success\u2014be able to articulate what it is and how it can be measured<\/h3>\n

When you start any endeavor, how do you determine when it is finished? While information security has a lifecycle that never ends, certain foundations must be established to foster a culture of security and privacy. Success could look like reducing risk to trade secrets, reducing the impact of third-party risk, or protecting an organization\u2019s reputation.<\/p>\n

However, success is defined for your mission, success needs to be measurable. If you can\u2019t summarize success during an elevator pitch, a monthly CEO report, or a board presentation, you haven\u2019t defined it appropriately.<\/p>\n

3. Leverage a methodology and make it part of the game plan<\/h3>\n

Think of the methodology as a game plan. There aren\u2019t enough people, not enough time, and a finite amount of money. Attempting to do everything all at once is a fool\u2019s errand. The moment you know what you\u2019re trying to achieve, it allows you to create a plan of attack. The plan should follow a proven set of steps that move in the right direction.<\/p>\n

A popular methodology right now is the Zero Trust<\/a> model, which has been waiting in the wings for its big debut for over a decade. Zero Trust<\/a> has made it to the spotlight largely because the conventional perimeter has been deemed a myth. So, what is your approach to achieving security, compliance, and privacy once you have chosen a methodology?<\/p>\n

\n

\n\t
\n\t\t
\n\n\t\t\t\t\t\t\t
\n\t\t\t\t\t\"\"\t\t\t\t<\/div>\n\t\t\t\n\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t

Zero Trust<\/h2>\n\n\t\t\t\t\t
\n\t\t\t\t\t\t

Reach the optimal state in your Zero Trust journey.<\/p>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t