Skip to main content

Find us on

facebook youtube flickr twitter itunes u logo

 

Past Programs  

mechael youtube

Keynote: Securing IT in Healthcare: Part III
Patty Mechael
mHealth Alliance
May 16, 2013

 nilsen youtube

Keynote: SITH3, Technology-Enabled Remote Monitoring and Support
Wendy Nilsen
National Institutes of Health (NIH)
May 17, 2013

sith3 panel1 youtube

Intersection of mHealth and Behavioral Health
SITH3 Workshop, Panel 1
May 17, 2013

 

Newsletter 

ists newsletter summer 2012

 

ISTS Information Pamphlet


2012BrochureCover

 

Institute for Security, Technology, and Society
Dartmouth College
6211 Sudikoff Laboratory
Hanover, NH 03755 USA
info.ists@dartmouth.edu

Business Education for the Security Professional (BESP)

Project Summary

An important part of ensuring our national security is the security of the nation's critical infrastructures, including the business organizations that compose them and are so important to our way of life. These organizations and infrastructures consist mainly of private or publicly-held firms, and the security of them depends centrally on the approaches that value chains/extended enterprises (groups of companies), individual firms, and decision-makers take with respect to information security and continuity planning.

There is a prevailing view at many levels in corporate America that "information security today is much like quality was twenty years ago: bolted-on, not built-in, viewed as an inhibitor of operations, and residing in a 'special' department" (Dynes 2004). This has to change and, while it is certainly a leadership issue, to a large extent it is up to the information security professionals in any enterprise to help guide corporate leadership to this change.

Information security professionals in many firms find their security initiatives hindered because of their inability to communicate effectively within the business. Simply understanding the technology and the technical risks is often not enough to generate action. Typically, this communication failure stems from an underlying lack of business education, a lack of understanding of how to change the corporate culture around security, and an inability to communicate the business case for information security.

Last Updated: 9/11/12