Perhaps it’s your first week of leading a cyber security
program that wasn’t effective. Or, maybe, you are getting the resources that
you need to begin to govern and secure a part of the company or a discipline
within the company that had been a gap.
One group will be certainly waiting for you. Perhaps even be
at the door to meet you.
The “previously ungoverned.”
The ones who did whatever they wanted to do before. The wild
west. Perhaps, no rules. Perhaps, only
the rules they wanted.
And, now, you’ll have to figure out how to get them in the
fold. Secured. Governed.
Rather than your standards text, you might want to start with a different lever: empathy.
Before anything else happens, understand what they do, how
they do it, and how they are measured. It’s also a good time to listen and understand
what their concerns are. “Listen and…”, not just “listen”
Next, identify the cyber security champion(s) with whom your team
should engage. These are the folks who need to understand and be able to explain
what governance means to the rest of the team. They should also be the ones
that you work to govern first. You’ll need to test and be sure that the things
that the team is measured on still work and that team can still make their
goals.
You’ll also work through the details of the broader plan with
the champion(s) for rolling out the changes to the rest of the team.
On the security champion(s) have no issues, begin the
rollout to the larger group. If the previously ungoverned population is large
for your governance efforts, work with smaller, more manageable groups until
all are in the fold. The group size should not exceed your team’s ability to
immediately respond and resolve issues that they may be having. Use the security
champion(s) as necessary to calm any fears.
Measure your progress and don’t be shy about publicly
praising the impacted team while in transition.
Most importantly, work in good faith. Keep whatever they are
measured by at the forefront of your efforts.
Often, only your empathy is necessary to reduce security
friction.
Follow me on Twitter
for discussion and the latest blog updates: @Opinionatedsec1. Or, start your
own discussion using #crazygoodcyberteams on twitter or Linkedin and I'll read
it.
SEE ALSO
No comments:
Post a Comment