Enterprise security: Will the leadership understand it?


    Enterprise security is the process by which an organization decreases the risk of unauthorized access to data and IT systems. Infringement of confidentiality and integrity are vital parts of an organizations systems and data. Strategies are often put in place to reduce the risk of unauthorized information. The governance of enterprise security activities ought to be steady to with company’s compliance necessities, culture and administration strategies.

    A panel discussion deliberated at length on the topic of enterprise security, during the CIO Year Ahead event. The panel consisted of Dr. Bright Mawudor, the founder of Africa Hackon, Aprielle Moraa, MD at infosphere,and Charles Lewis, CISO at Manage Engine, moderated by Joan Omanjo, ISO at UAP.  “Do we have values and strategies when it comes to information security?” Asked Aprielle to the audience. Exemplifying how important it is for enterprise security conversations to be had.

    Charles Lewis then added, “strategic enterprise revolves around architecture and traceability” strengthening the idea that enterprise security works from the top of the organization downwards, it is a culture that should be infused.

    Every company that prioritizes the protection of its data and other important data has a sturdy enterprise security system in place. The risk that comes from unauthorized access is enough to make a company consider the value of an enterprise security system.

    The security mechanism that is the core driver within an enterprise security system, is governance. Governance of the data that is crucial to your organizations success. Business goals and value of data is the basis along which the development of a security mechanism dealing with the optimization of resources, and minimizing costs so as to ensure that the company’s information assets are not vulnerable.The Year Ahead event, themed; Turning Accelerated Disruption into Opportunities, the forum hosted the technology C-Suites from across the East African region to harness the power of disruptive technologies in order to better shape business experience.


    Do you have a story that you think would interest our readers?
    Write to us editorial@cio.co.ke


    Please enter your comment!
    Please enter your name here
    This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.