{"id":298,"date":"2014-01-26T00:15:22","date_gmt":"2014-01-25T23:15:22","guid":{"rendered":"http:\/\/wp1149244.wp072.webpack.hosteurope.de\/?page_id=298"},"modified":"2022-03-26T10:29:11","modified_gmt":"2022-03-26T09:29:11","slug":"information-security-it-risk","status":"publish","type":"page","link":"https:\/\/www.klaushaller.net\/?page_id=298","title":{"rendered":"Information Security, IT Risk &#038; Compliance"},"content":{"rendered":"<div id=\"attachment_337\" style=\"width: 310px\" class=\"wp-caption alignright\"><a href=\"http:\/\/wp1149244.server-he.de\/wp-content\/uploads\/2014\/01\/ID-100187890.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-337\" class=\"size-medium wp-image-337\" src=\"http:\/\/wp1149244.server-he.de\/wp-content\/uploads\/2014\/01\/ID-100187890-300x199.jpg\" alt=\"Image courtesy of khunaspix \/ FreeDigitalPhotos.net\" width=\"300\" height=\"199\" srcset=\"https:\/\/www.klaushaller.net\/wp-content\/uploads\/2014\/01\/ID-100187890-300x199.jpg 300w, https:\/\/www.klaushaller.net\/wp-content\/uploads\/2014\/01\/ID-100187890.jpg 400w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><p id=\"caption-attachment-337\" class=\"wp-caption-text\">Image courtesy of khunaspix \/ FreeDigitalPhotos.net<\/p><\/div>\n<p>What is information security about? Many think about firewalls and fighting hackers and malware. Snowden is a good example for another class of information security threats. He represents the risk that an employee gets data \u2013 by mistake or on purpose \u2013 out of an organization using normal access rights, thereby harming a company\u2019s position on the market or violating compliance needs.<\/p>\n<p>Today, the business has more IT know-how than ever. As a consequence, much innovation and much investment in applications today circumvents the IT department. Shadow IT is the term used for this trend. My article<span class=\"Apple-converted-space\">&nbsp; <\/span><a href=\"http:\/\/www.klaushaller.net\/?page_id=721\"><i>How To Deal With Shadow-IT Application<\/i>s<\/a> discusses this trends and its implications from a governance perspective.<\/p>\n<p>The article <i><a href=\"http:\/\/www.klaushaller.net\/?p=630\">Business Applications: On the Tension between Efficient Testing and Compliance<\/a>, based on a keynote I gave at a workshop of the s<\/i>pecial group TAV of German Informatics Society, discusses the relationship between effectiveness, especially in testing, and compliance needs.<\/p>\n<p>The ISO27001 norm does not only impact an IT security Organization, but the software development and testing as well. Read the article <a href=\"http:\/\/www.klaushaller.net\/?page_id=552\"><i>What Developers and Testers have to know about the ISO 27001 Information Security Standard<\/i><\/a> for more details.<\/p>\n<p>The article <em><a title=\"Article: Data-Privacy Assessments for Application Landscapes \u2013 A Methodology\" href=\"http:\/\/wp1149244.wp072.webpack.hosteurope.de\/?page_id=323\">Data-Privacy Assessments for Application Landscapes: A Methodolog<\/a> <\/em>addresses how to test whether an application exposes sensitive data. So the focus is on identifying potential leaks which might be exploited later on.<\/p>\n<p>The article <em><a title=\"Article: Testdaten als Risikofaktor\" href=\"http:\/\/wp1149244.wp072.webpack.hosteurope.de\/?page_id=306\">Testdaten als Risikofaktor <\/a><\/em>(in German) explains the for losing sensitive data (or violating regulatory needs) in development and test environments .<\/p>\n<p>In <em><a title=\"Article: Data-Loss-Prevention-Tools minimieren Sicherheitsl\u00fccken in Testumgebungen\" href=\"http:\/\/wp1149244.wp072.webpack.hosteurope.de\/?page_id=315\">Data-Loss-Prevention-Tools minimieren Sicherheitsl\u00fccken in Testumgebungen <\/a><\/em>(in German), we discuss how data loss prevention tools can help managing compliance and data loss related risks of test environments.<\/p>\n<p>Besides the articles, the following two videos provide detailed information on when investing into data loss prevention tools makes sense plus how they identify sensitive data and information.<\/p>\n<p><iframe loading=\"lazy\" title=\"Why invest in Data Leakage Prevention Tools? (ReliableInformationSystems.TV)\" width=\"625\" height=\"352\" src=\"https:\/\/www.youtube.com\/embed\/LUk0NIcc-24?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/p>\n<p><iframe loading=\"lazy\" title=\"DLP Tools: How to find sensitive information?\" width=\"625\" height=\"352\" src=\"https:\/\/www.youtube.com\/embed\/SSEjRcUECak?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/p>\n","protected":false},"excerpt":{"rendered":"<p>What is information security about? Many think about firewalls and fighting hackers and malware. Snowden is a good example for another class of information security threats. He represents the risk that an employee gets data \u2013 by mistake or on purpose \u2013 out of an organization using normal access rights, thereby harming a company\u2019s position [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":6000,"comment_status":"open","ping_status":"open","template":"","meta":{"footnotes":""},"class_list":["post-298","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.klaushaller.net\/index.php?rest_route=\/wp\/v2\/pages\/298","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.klaushaller.net\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.klaushaller.net\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.klaushaller.net\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.klaushaller.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=298"}],"version-history":[{"count":14,"href":"https:\/\/www.klaushaller.net\/index.php?rest_route=\/wp\/v2\/pages\/298\/revisions"}],"predecessor-version":[{"id":1255,"href":"https:\/\/www.klaushaller.net\/index.php?rest_route=\/wp\/v2\/pages\/298\/revisions\/1255"}],"wp:attachment":[{"href":"https:\/\/www.klaushaller.net\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=298"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}