The 5 W’s of Security Management | Netsurion (2024)

The 5 W’s of security management

I’ve seen it happen about a thousand times if I’ve seen it once. A high profile project ends up in a ditch because there wasn’t a proper plan defined AHEAD of time. I see this more often in “squishy” projects like security management because success isn’t easily defined. It’s not like installing a web application firewall, which will be deemed a success if it blocks web attacks.

Security management needs a different set of drivers and a more specific and focused discussion of what is “success,” before solutions are evaluated. Before vendors are consulted. Before you do anything. I know it’s hard, but I want you to take a deep breath. If you can’t answer the following questions about your project, then you have a lot of work to do before you are ready to start thinking about specific solutions.

First and foremost, you need to have a clear understanding of your goals and your budget and make sure to line up your executive support. Ultimately someone is going to have to pay the check for whatever it is you want to buy. So you will be a lot better off if you take a bit of time up front and answer all these sticky questions.

A favorite tactic of mine is to ask the 5 W’s. You remember those, right? It was a grade school thing. Who, what, where, when and why? Pretty much anything you need to do can be clarified and distilled by isolating the issues into the 5 W’s. I’m going to kick start your efforts a bit and walk you through the process I take with clients as they are trying to structure their security management initiative.

Why?
The first thing to understand is WHY you are thinking about security management? What is the driver for the project? Are important things falling through the cracks and impacting your operation efficiency? Did an incident show a distinct lack of data that hindered the investigation? Maybe an auditor mandated a more structured approach to security management? Each of these (and a ton of other reasons) is a legitimate driver for a security management project and will have a serious impact on what the project needs to be and accomplish.

Once you have a clear understanding of why, you need to line up the forces for the battle. That means making sure you understand who has money to pay for the project and who has the final approvals? If you don’t understand these things, it’s very unlikely you’ll drive the project through.

Who?
After you have a clear idea of which forces will be at your disposal, you can determine the WHO, or which folks need to be part of the project team. Do the network folks need to be involved, the data center folks and/or the application folks? Maybe it’s all of the above, although I’d push you to focus your efforts up front. You don’t want to be in a position where you are trying to boil the ocean. You want to be focused and you want to have the right people on the team to make sure you can achieve what you set out to achieve. Which brings us to the next question…

What?
This gets down to managing expectations, which is a blind spot for pretty much every security professional I know. Let me broaden that. It’s an issue for everyone I know, regardless of what they do for a living. If you aren’t clear and thus your senior team isn’t clear about what this project is supposed to achieve, it’s going to be difficult to achieve it.

Any organization looking at security management needs to crisply define what the outcomes are going to be and design some success metrics to highlight those outcomes. If it’s about operations, how much more quickly will issues be pinpointed? What additional information can be gathered to assist in investigations, etc? This is really about making sure the project has a chance of success because the senior team (the ones paying the bill) knows where it’s going ahead of time.

Where?
This question is all about scope. Believe me, defining the scope effectively is perhaps the most critical thing you can do. Get it wrong on the low side and you have budget issues, meaning you don’t have nearly enough money to do what your senior team thinks is going to get done. Budget too high and you may have an issue pushing the project through or getting the approval in the first place.

Budgeting is much more of an art, rather than a skill. You need to understand how your organization gets things done to understand how you can finesse the economic discussion. A couple of questions to understand are: Is this an enterprise deployment? Departmental? Regional? Most importantly, is everyone on board with that potential scoping?

When?
The last W is about understanding the timeline. What can/should be done first? This is where the concept of phases comes into play, especially if your budget is tight. How do you chunk up the project into smaller pieces that can be budgeted for separately? That usually makes a big number go down a bit easier.

The key is to make sure you have a firm understanding of the end goal, which is presumably an enterprise-wide deployment of a security management platform. You can get there in an infinite number of ways, depending on the project drivers, the budget, and the skill set you have at your disposal.

But you certainly can’t get there if you don’t ask these questions ahead of time and determine a logical strategic plan to get to where you need to be. Many projects fail from a lack of planning rather than a lack of execution. As long as all of your ducks are in a row when you start the process, you have a much better chance to get to the end of the process.

Or you can hope for a good outcome. I heard that’s a pretty dependable means of getting things done.

Industry News

Cyber-crime bigger threat than cyber-terror

Although the threat of cyber-terrorism exists, the greatest risk to Internet communication, commerce and security is from cyber-crime motivated by profit. Attacks have evolved from cracking passwords into vast coordinated attacks from thousands of hijacked computers for blackmail and theft.

The 5 W’s of Security Management | Netsurion (2024)

FAQs

The 5 W’s of Security Management | Netsurion? ›

Who, what, where, when and why? Pretty much anything you need to do can be clarified and distilled by isolating the issues into the 5 W's. I'm going to kick start your efforts a bit and walk you through the process I take with clients as they are trying to structure their security management initiative.

What are the 5 Ws in security? ›

What, When, Where, Who, Why and How? And so, to solve a problem, either in the physical world, or your cyber environment, these elements are the factors you must question and decipher to solve a problem or collect the right information. We call this method “5W+H”.

What are the answer to the five Ws? ›

The 5 Ws are who, what, when, where, and why. These are all questions that a writer should be able to ask and answer while composing their work. If they are unable to answer any of these questions successfully, the writing may not be detailed enough, and readers may lose interest or fail to be persuaded.

How to answer the 5 Ws and H? ›

For each incident he tries to discover:
  1. What happened? This entails spelling out the sequence of events and the actions of those involved (Step 35).
  2. Where did it happen? ...
  3. When did it happen? ...
  4. Who was involved? ...
  5. Why did they act as they did? ...
  6. How did the offender carry out the crime?

What are the 5 key components of security management? ›

Overview of the 5 components of information security management. Information security management comprises five key components: security measures, security policies and procedures, physical and environmental protection, monitoring processes and systems, and asset management.

What do the 5 Ws stand for? ›

One of the best practices for writers is to follow "The 5Ws" guideline, by investigating the Who, What, Where, When and Why of a story.

What are the 5 stages of security? ›

It involves the identification, protection, detection, response, and recovery stages to ensure effective cybersecurity measures. This holistic approach enables organizations to proactively assess and address potential risks and vulnerabilities, as well as respond and recover from cyber incidents.

What are the 5 main questions? ›

(Who, what, why, how, where, when, with what)

What is the 5 Ws of strategy? ›

That's why we have the five Ws, the bread and butter of marketing, if you will – who, what, where, when and why. Put simply, if you can't answer one of these points, it's probably a good idea to review your strategy. Without the five Ws, planning and organising your brand strategy will be virtually impossible.

What are the 5 W questions in problem solving? ›

The five Ws stand for the questions who, what, where, when and why, and the H stands for how. When using the tool to help solve problems a useful order for the questions is: what, where, when, why, how, who. What is the problem? Where is it happening?

What are the 5 Ws at work? ›

The acronym 5Ws stands for Who, What, Where, When, and Why; some authors sometimes include a sixth question, How. The 5 Ws is a method of analysis that consists of multiple steps that examine a situation's core elements.

What is the 5 W problem statement? ›

Use data from research and reports, as well as facts from direct observation to answer the five Ws: who, what, when, where, and why. Whenever possible, get out in the field and talk directly with stakeholders impacted by the problem.

How do you remember the 5 Ws? ›

They are Who, What, When, Why and Where. Sometimes people will also ask 'How' something happened or took place, and this is referred to as 5 Ws and 1 H.

What are the 5 elements of security? ›

The U.S. Department of Defense has promulgated the Five Pillars of Information Assurance model that includes the protection of confidentiality, integrity, availability, authenticity, and non-repudiation of user data.

What are the 5 pillars of security management? ›

The five pillars of security for evaluating a corporation's security are Physical, People, Data, and Infrastructure Security, and Crisis Management.

What are the 5 C's in security? ›

Change, Compliance, Cost, Continuity, and Coverage; these are all fundamental considerations for an organization. For anyone challenged with evaluating and implementing technical solutions, these factors provide a useful lens through which to assess available options.

What are the 5 basic principles of security explain? ›

The U.S. Department of Defense has promulgated the Five Pillars of Information Assurance model that includes the protection of confidentiality, integrity, availability, authenticity, and non-repudiation of user data.

What are the 7 P's in security? ›

The fundamental SIA threat and risk assessment training encourages the CPO to use the seven Ps of principal threat profiling: people, places, personality, prejudices, personal history, political/religious views, and private lifestyle to look for direct and indirect threats.

Top Articles
How to verify your identity on Venmo, in order to send and receive money in the app
Is Western Union Safe? | Consumer Protection Information
Nullreferenceexception 7 Days To Die
Hotels Near 625 Smith Avenue Nashville Tn 37203
Cintas Pay Bill
Garrison Blacksmith Bench
Plaza Nails Clifton
Sarah F. Tebbens | people.wright.edu
Boggle Brain Busters Bonus Answers
Big Y Digital Coupon App
Osrs But Damage
Craigslist Cars Nwi
Babyrainbow Private
Craigslist Pikeville Tn
Samsung Galaxy S24 Ultra Negru dual-sim, 256 GB, 12 GB RAM - Telefon mobil la pret avantajos - Abonament - In rate | Digi Romania S.A.
Nalley Tartar Sauce
Enterprise Car Sales Jacksonville Used Cars
Bx11
G Switch Unblocked Tyrone
Aldi Bruce B Downs
Lakers Game Summary
Never Give Up Quotes to Keep You Going
1 Filmy4Wap In
Getmnapp
Kirk Franklin Mother Debra Jones Age
FAQ's - KidCheck
Uncovering the Enigmatic Trish Stratus: From Net Worth to Personal Life
Japanese Emoticons Stars
Brenda Song Wikifeet
Golden Tickets
Tendermeetup Login
Drabcoplex Fishing Lure
ENDOCRINOLOGY-PSR in Lewes, DE for Beebe Healthcare
Bones And All Showtimes Near Johnstown Movieplex
Gary Lezak Annual Salary
F9 2385
Panorama Charter Portal
2132815089
Hovia reveals top 4 feel-good wallpaper trends for 2024
Unlock The Secrets Of "Skip The Game" Greensboro North Carolina
St Vrain Schoology
Marcal Paper Products - Nassau Paper Company Ltd. -
Embry Riddle Prescott Academic Calendar
The Average Amount of Calories in a Poke Bowl | Grubby's Poke
Jane Powell, MGM musical star of 'Seven Brides for Seven Brothers,' 'Royal Wedding,' dead at 92
Crigslist Tucson
Www.homedepot .Com
Causeway Gomovies
Naughty Natt Farting
Kobe Express Bayside Lakes Photos
When Is The First Cold Front In Florida 2022
Latest Posts
Article information

Author: Virgilio Hermann JD

Last Updated:

Views: 5853

Rating: 4 / 5 (61 voted)

Reviews: 84% of readers found this page helpful

Author information

Name: Virgilio Hermann JD

Birthday: 1997-12-21

Address: 6946 Schoen Cove, Sipesshire, MO 55944

Phone: +3763365785260

Job: Accounting Engineer

Hobby: Web surfing, Rafting, Dowsing, Stand-up comedy, Ghost hunting, Swimming, Amateur radio

Introduction: My name is Virgilio Hermann JD, I am a fine, gifted, beautiful, encouraging, kind, talented, zealous person who loves writing and wants to share my knowledge and understanding with you.