:
00:00:00
Welcome to Byte Sized Security, where we break down complex
2
:
00:00:03
security topics into digestible bits!
3
:
00:00:06
I'm your host, Marc, and today we're
diving into a topic that's sure to
4
:
00:00:10
challenge some opinions in the tech world.
5
:
00:00:12
Get ready for "The Great I T vs.
6
:
00:00:15
Security Smackdown: A
Comedy in Three Acts"!
7
:
00:00:18
Act One: The Myth of the I T Pedestal
8
:
00:00:21
You know what grinds my gears?
9
:
00:00:23
When people say, "Security
is a specialty of I T.
10
:
00:00:26
You can't work in security
without first being in I T."
11
:
00:00:30
Oh, that's adorable.
12
:
00:00:31
It's like saying you need to be a pro at
hide-and-seek before becoming a bodyguard.
13
:
00:00:36
While I T skills can certainly
be useful in security, they're
14
:
00:00:39
not the be-all and end-all.
15
:
00:00:41
Security is its own beast, with its own
set of skills, mindset, and approach.
16
:
00:00:47
Act Two: Plot Twist - I
T is Security's Sidekick
17
:
00:00:51
Security isn't I T's little sister.
18
:
00:00:53
I T is Security's overeager puppy.
19
:
00:00:56
That's right, we've had it backwards
this whole time, like trying to
20
:
00:00:59
put on pants before underwear.
21
:
00:01:01
Remember the CIA triad?
22
:
00:01:04
No, not the spy agency - I'm
talking Confidentiality,
23
:
00:01:07
Integrity, and Availability.
24
:
00:01:09
I T's basically that friend who
only shows up for the A in CIA.
25
:
00:01:13
They're all about Availability, while
Security's over here juggling all three
26
:
00:01:17
balls like a caffeinated circus performer.
27
:
00:01:20
Think about it:
28
:
00:01:21
- Confidentiality?
29
:
00:01:23
That's all about keeping data secret.
30
:
00:01:25
Not exactly I T's forte.
31
:
00:01:27
- Integrity?
32
:
00:01:28
Making sure data hasn't
been tampered with.
33
:
00:01:31
Again, security's playground.
34
:
00:01:33
- Availability?
35
:
00:01:34
Okay, I T, you can come out and play now.
36
:
00:01:37
Act Three: The Great Org Chart Tragedy
37
:
00:01:40
Picture this: Your company's org chart.
38
:
00:01:43
Where's the Cee SO?
39
:
00:01:45
Probably nestled under
the CIO's armpit, right?
40
:
00:01:48
It's like putting a vegetarian
in charge of a steakhouse.
41
:
00:01:51
The CIO's all about keeping things
running, while the Cee SO's trying to lock
42
:
00:01:55
things down tighter than a miser's wallet.
43
:
00:01:58
This reporting relationship is about
as functional as a chocolate teapot.
44
:
00:02:02
The CIO's agenda always wins,
leaving Security feeling like the
45
:
00:02:06
kid picked last for dodgeball.
46
:
00:02:08
But here's the kicker: In today's digital
landscape, security should be driving
47
:
00:02:13
the bus, not riding in the back seat.
48
:
00:02:15
When security takes a backseat
to I T, we're essentially telling
49
:
00:02:19
the world, "Hey, cybercriminals!
50
:
00:02:21
Our door's always open!"
51
:
00:02:23
The Real Breach Culprit
52
:
00:02:25
So, why do we still have breaches?
53
:
00:02:27
Is it because companies
are bad at security?
54
:
00:02:30
Nah, that's too easy.
55
:
00:02:32
I think it's because companies
are worse at org charts than
56
:
00:02:35
a toddler playing Jenga.
57
:
00:02:37
Security isn't I T's mini-me.
58
:
00:02:39
It's time we flip this
org chart upside down.
59
:
00:02:42
Maybe then we'll have
fewer breaches and more...
60
:
00:02:45
well, probably just
more confused employees.
61
:
00:02:48
But hey, that's progress, right?
62
:
00:02:50
That's all for this episode
of Byte Sized Security.
63
:
00:02:53
Remember, in the world of
cybersecurity, sometimes you need
64
:
00:02:56
to think outside the box - or in
this case, outside the org chart.
65
:
00:03:01
Until next time, stay secure and
keep those I T folks on their toes!