CYSE 200T: Protecting Availability

Written by Blaine Fromholzer

If I were a CISO for a publicly traded company I would first make sure there is an extremely secure way to log into the systems. For example it would have to go through me if someone was to be added to list of people who can access the information. I would also make sure there is a multi-step verification process to ensure that the person logging into the accounts is legit. I would then implement a system to where it would catch if someone were to fail one of the verification processes and have it sent to me to look over. It would also lock them out of logging onto the account until I grant access back. I would then make sure that the information available is put on a ranking list. For example, stuff like future plans, money, and client and employee information would be the most secure information. I would also put that information behind multiple systems of security that has multiple secure backups as well. That is what I would implement as a Chief Information Security Officer to ensure that the availability to the companies information is secure and limited to people who are authorized to see and use.

Leave a Reply

Your email address will not be published. Required fields are marked *