Wednesday, July 25, 2007
Wednesday, July 11, 2007
Corporate Strategy, Business Strategy, and Information Security Strategy
In Contemporary Strategy Analysis, Robert Grant describes successful strategy as the combination of "clear goals, understanding the competitive environment, resource appraisal, and effective implementation."
He also makes a strong case that strategy is not a plan: "Strategy is not a detailed plan or program of instructions; it is a unifying theme that gives coherence and direction to the actions and decisions of an individual or organization."
Corporate Strategy looks at industry attractiveness and asks "what industries should we be in?" while Business Strategy aims for competetive advantage by looking at "How should we compete?"
If you have an Information Security Strategy, what is it, and how does it relate to your corporate and business strategy?
To a large extent it depends on the view of how strategy is made and how to characterize it: as intended strategy (authored by management) realized strategy (actual implementation) or emergent strategy: "decisions that emerge from the complex processes in which individual managers interpret the intended strategy and adapt..."
Some published examples of Information Security Strategy fall in the intended category, such as:
- Comprehensive Strategy on Information Security: Executive Summary (Japan)
"To enhance competitiveness and national security for Japan: Building economic and cultural power through realization of world-class "highly reliable society" - NATIONAL INFORMATION SECURITY STRATEGY PROPOSAL (Finland)
"Finland will be an information-secure society that everyone can trust in and that enables all parties to manage and communicate information safely." - Tulane Comprehensive Information Security Program (Tulane University, US) "To secure Tulane University Information and Information systems from cyber attacks while complying with legal, statutory, contractual, and internally developed requirements."
So much for 'building security in' from the outset. But isn't that the case for every organization?
In Competetive Strategy Michael Porter describes three generic strategies for achieving competitive advantage: cost leadership, differentiation, and focus.
Are there generic strategies for Information Security? In terms of intended strategy, probably so but for the good of our industry the emergent strategy differs from these approaches. They deserve better titles, but for now I think of them as:
- Bodyguard Security - identify the goals of the organization, and map security activities against each of these goals
- Martial Law Security - implement industry best practices of defense in depth, least privilege. Make exceptions difficult to approve, to discourage non-standard configurations.
- Lifeguard Security - minimize restrictions on user activity. Monitor the environment in real time, and move swiftly to respond to detected problems.
Does your organization explicitly take a different approach?
Posted by Jeff Reava at 8:42 PM 0 comments
Labels: strategy development
Wednesday, July 04, 2007
GETTING STARTED
On Day One of my Strategic Management class at JMU our professor handed out a table showing the evolution of corporate strategy in the United States from the 1950s through today.
To me the most interesting feature was how closely the entries tracked competitive pressures and innovations in strategic approaches. Business strategy evolved to help organizations become more valuable, even as they faced stronger, more disruptive competitors.
So how does this relate to Information Security?
Competition naturally drives organizations to think and act more strategically, and the most successful organizations have known their capabilities and opportunities, articulated a realistic plan for achieving success, and energized their staff to execute it.
Information Security management faces similar pressures, but also has the ability to apply the same approach to success. Based on current trends I think a strong case can be made that every organization needs an Information Security Strategy, for the following three reasons:
- We don't have unlimited resources.
- Effective risk reduction requires an awareness and response to dynamic threats that actively work to circumvent or overcome deployed controls.
- The natural tendency of security products and processes, absent customer involvement in their design, is to hinder the effectiveness of the organizations we are trying to protect.
In short, a security strategy makes an organization explicitly resource aware, threat aware, and customer aware.
Posted by Jeff Reava at 1:00 AM 0 comments
Labels: strategy development