Cybersecurity: The Truth About Blame
We blame technology on our failures. The machine crashed, the system was breached, the code was cracked, IT didn’t work. However, in a symbiotic relationship it takes two to tango… The machine crashed because we didn’t look after it, the system was breached because we didn’t understand the risks and adequately mitigate them, and the code was cracked because we didn’t work together to maintain its integrity through all the means at our disposal." - Chris Roberts, Dec 2020
We, as in, all of society, really should stop blaming the obscure machine, and start taking responsiblity for maintaining the outdated designs that went into the initial creation. Why do we ignore necessary changes? Here are a few reasons:
- "It is not broken, so don't fix it!" Although this applies to many manufactured things we use everyday. It does not apply when other factors influence the integrity of the functionality. Since changes in cyber technology happen everyday, maintenance of software and systems is critical to maintain product quality and Integrity. The cost/benefit of re-tooling software is a committment to quality that each company has to review for themselves. However, when it comes to Cyber Security, updates simply must be made.
There is no static environment in technology. We can't make a tool that lasts forever and doesn't become obsolite; or more importantly a piece of software that continues to be secure.
- No money in the Budget - This is a top down decision. In the near future it will be the Board of Directors that are held accountable for cyber failures, but for now it is all about blaming the machine, as stated above.
An individual or piece of code that intends to cause harm or control data elements in your network; storage devices; email servers; or even in RAM does not care if you protect your customers or not. In fact, they prefer that you fail to update your software and/or infrastructure.
Belinda's Bio:
Belinda has over 25 years of experience in the IT field. Since there was no opportunity for an MIS degree at the time of her undergraduate studies, she switched majors from software programming to Business Administration with all electives being in software development and computer theory.
Finding her true calling in Cybersecurity, she has had the opportunity to experience many aspects of cyber threats, risks, and compliance. She has the tenacity to get to the root of risks and issues, and the ability to communicate with the business stakeholders to create a plan of action.
The most important factor when implementing a security plan is Business Continuity - this should always be held first and foremost when developing and executing preventative measures in the plan.
SECURITY BUSINESS ANALYST / IT SECURITY PROJECT MANAGER:
Cyber Security Incident Response; Threat Remediation Tracking; Software Patching Compliance; Business/Operational PCI Process Assessment, EndPoint Protection, WAF, Business/Operational Process Documentation, Requirements Gathering and Analysis, Needs Assessment, PCI Compliance, Functional Requirements, Technical Requirements, Change Advisory Board (CAB), Governance Risk and Compliance, FIPS, NIST, SOCS, GAP Analysis, Policies and Procedures, PCI Compliance, Information Systems Audits in compliance with FISMA, Physical Security, CCTV, Software Design Specifications.
SOFTWARE & OPERATING SYSTEMS:
MS Office 2016 - including Visio 2013 and MS Project 2013; TeamTrack, HP ALM Quality Center v11.00, HP Service Manager 9.31, SharePoint, Team Foundation Server (TFS), Adept (SGML), HTML, JAVA (minimal), XML Spy, Coffee Cup (html + ftp); Audacity 2.0; Paint Shop Pro 8, Gimp, Writer} online tour development and graphic software.
CERTIFICATIONS:
In Progress - Certified Cloud Security Professional (CCSP), ISC2
October 2018 - Certified Information Security Manager (CISM), ISACA.org,

FORMAL EDUCATION:
May 1997 - Midwestern State University, Wichita Falls, Texas - Masters of Business Administration (MBA)
December 1991 - Augusta College, Augusta, Georgia - Bachelor of Business Administration, MIS Emphasis, (BBA)
CON'T EDUCATION:
September 2019 - CCSP Prep, ISC2 Contractor Sybex, Certificate of Completion
December 2017 - CISM Prep, Cybrary.it, Certificate of Completion
February 2017 - Cybersecurity and Its Ten Domains MOOC, University System of Georgia, Certificate of Completion - www.coursera.org, Certificate of Completion
September 2015 - Fundamentals of Project Planning and Management MOOC, U of V Darden School of Business - www.coursera.org, Certificate of Completion
September 2014 - Internet History Technology, and Security MOOC, University of Michigan - www.coursera.org, Certificate of Completion
November 2013 - Metadata: Organizing and Discovering Information MOOC, UNC at Chapel Hill - www.coursera.org, Certificate of Completion
March 2013 - Introduction to Databases MOOC, Stanford University - www.Class2Go.com, Certificate of Completion
|