Social Network For Security Executives: Help Make Right Cyber Security Decisions
A CISO need to understand the exact requirement before designing the BYOD domain in the organization. Keeping in mind the exact business need and value add which can be or intended to obtain using this technology.
(Read more: 5 easy ways to build your personal brand !)
Build of solution for BYOD is directly related to business requirement without any compromise to security of information or unauthorized access. Solutions should be designed basis of:-
Security of data residing
(Read more: Top 5 Big Data Vulnerability Classes)
The key parameters based on which a CISO should choose a vendor for the same:
Vendor selection parameters should be the same basis of solution requirement in addition following should also be considered:-
Maturity of processes towards handling of customer information
IT Security certifications
DR Infra availability
Industry reference / prior installations
Top Questions to ask vendor for evaluating the offering/Vendor Evaluation Checklist
Questions and queries from vendor will be around the selection criteria for project and vendor as mentioned above to have clear understanding of vendor readiness and comfort about his infrastructure and service offerings. In addition, understanding of various solution designs and related alternatives should be a part of evaluation criteria for vendor checklist. Solution design is a critical part of this complete project with usage of latest available technology and integration of the same with available IT Infrastructure.
Top mistakes to avoid while selecting a vendor
While selecting a vendor the top most priority should be given to organizational business requirement and not to the selling or advantages showcased by vendor about his service offerings. Hence we should not go by just the differentiating factor showcase by the vendor which separate his service offerings with other vendors rather more emphasis should be on the own business need and how a vendor can do the best through their service offerings. To avoid mistakes it is always better to have reference verification from the customers of the vendor to have a firsthand experience of the vendor offerings and support provisions.
-Nitin Chauhan, Head IT Security - CISO, Ratnakar Bank Ltd. tells us How should a CISO define the requirement for solutions for BYOD Security.