What does it take to become a Successful IT Security Manager?
...

Eshna

Published on February 13, 2015


  • 387 Views
Given today’s stupendous growth of the Internet and different types of attacks being devised, IT Security professionals, Information Security professionals or InfoSec professionals are the most sought after professionals today.

The role of the IT Security manager is a recent one and many are grappling with how to define it. A decade or so ago, security was just a name and no special significance was attached to it. It is not the case today. Today, the IT Security manager is an important person in the organization.

These are some personal qualities that a successful security manager will possess:

An ideal IT Security manager will have a proper mix of education and experience to start with. The CISSP, CISA, CEH and other GIAC certifications are great to have.  It is said that “Knowledge is power” and more the amount of information in this developing field the better it is for the professional.

Other advantageous tools to have in the personal arsenal might be a good amount of networking experience. Other must haves for the Security manager should be that she/he must definitely be technically very sound and knowledgeable in all aspects related to technology.

Additional traits to become a successful IT manager can be defined as follows:
  1. Must be able to lead the way. The first and foremost amongst the important qualities for an Information Security manager should be that he/she must be a charismatic leader. He/she must be able to able to lead the entire team with a broad vision on the long-term impact on the organization. Having a pleasant demeanor and always being a good listener are other crucial personal special traits necessary for a successful Security manager. Visioning the security scenario five years hence or ten years hence helps the planning process a little bit better.
 
  1. Enable management to understand Information Security issues. Since Information Security is still not considered a major component of today’s infrastructure, it is the duty of the IT Security manager to help the management understand the Information Security issues within an organization. If there is information, it must be protected. If there are physical assets, it must be protected.
 
The manager helps the top-level management understand the information security risks and how they correspond to the business risks of an organization. Communication skills are a key asset to the manager here and he/she will explain the risks to all levels of the management. Once the risks have been identified, appropriate countermeasures have to be devised. These countermeasures have to be devised in such a way that their cost is below the cost of the asset they are trying to protect.
 
  1. Information Security manager should be aligned with business objectives of an organization
Before creating information security controls, it is important for the manager to devise security controls aligning with the business objectives of an organization. The information security unit of an organization and the overall business of the organization have to work in tandem. Only when the business objectives and security objectives work together they will be able to protect the resources and assets of the organization.
 
  1. Information Security manager should be able to bridge the gap between upper management and peers. It is also important for the security manager to bridge the gap between the upper management and peers. While it is crucial for the security manager to emphasize the importance of security issues to upper management, the same has to be communicated to the peers. Prioritizing tasks, sticking to budgets and making sure appropriate security controls are implemented are also equally important for the security manager.
 
  1. The IT Security manager should make sure that all aspects of the Information security program are followed. Last but not the least security manager should make sure that security education is an ongoing program and it is continually updated. It is the security manager’s duty to ensure that an information security program is diligently followed. Failure to do will result in great losses to assets to the organization.
 
If all these tips seem to be a fairy list of qualities to have, then it is important for an ideal and successful Security manager to target the qualities that they do not possess and work on it. It is said that “Impossible is nothing” and working towards a goal with a firm objective will definitely bring success.
 

Conclusion

Due to enormous growth in the field of information security and the popularity of this profession, the competition for the role of information security might intensify over the years. With a continuous growth in number of information security professionals, it might get tougher to establish long-term goals in IT security without a thorough preparation. Being ‘Good’ might not be sufficient to succeed in IT security. You will now have to be ‘better’ in order to realize your dreams.

References:

http://www.isaca.org/Knowledge-Center/Research/Documents/CritElemInfoSec.pdf

About the Author

Eshna is a writer at Simplilearn. She has done Masters in Journalism and Mass Communication and is a Gold Medalist in the same. A voracious reader, she has penned several articles in leading national newspapers like TOI, HT and The Telegraph. She loves traveling and photography.


{{detail.h1_tag}}

{{detail.display_name}}
... ...

{{author.author_name}}

{{detail.full_name}}

Published on {{detail.created_at| date}} {{detail.duration}}

  • {{detail.date}}
  • Views {{detail.downloads}}
  • {{detail.time}} {{detail.time_zone_code}}

Registrants:{{detail.downloads}}

Downloaded:{{detail.downloads}}

About the On-Demand Webinar

About the Webinar

Hosted By

...

{{author.author_name}}

{{author.author_name}}

{{author.about_author}}

About the E-book

View On-Demand Webinar

Register Now!

First Name*
Last Name*
Email*
Company*
Phone Number*

View On-Demand Webinar

Register Now!

Webinar Expired

Download the Ebook

Email
{{ queryPhoneCode }}
Phone Number {{ detail.getCourseAgree?'*':'(optional)'}}

Show full article video

About the Author

{{detail.author_biography}}

About the Author

{{author.about_author}}