<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>The Business Model of Security &#187; isc2</title>
	<atom:link href="http://businessmodelofsecurity.com/tag/isc2/feed/" rel="self" type="application/rss+xml" />
	<link>http://businessmodelofsecurity.com</link>
	<description>Demand Driven Security Program Management</description>
	<lastBuildDate>Wed, 31 Jul 2013 18:39:41 +0000</lastBuildDate>
	<language>en-US</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>https://wordpress.org/?v=4.0.38</generator>
	<item>
		<title>Defining Security Strategy</title>
		<link>http://businessmodelofsecurity.com/bmos/introduction/defining-security-strategy/</link>
		<comments>http://businessmodelofsecurity.com/bmos/introduction/defining-security-strategy/#comments</comments>
		<pubDate>Tue, 02 Mar 2010 11:50:40 +0000</pubDate>
		<dc:creator><![CDATA[Brandon Dunlap]]></dc:creator>
				<category><![CDATA[Introduction]]></category>
		<category><![CDATA[competitive strategy]]></category>
		<category><![CDATA[information security]]></category>
		<category><![CDATA[isc2]]></category>
		<category><![CDATA[risk management]]></category>

		<guid isPermaLink="false">http://competitivecompliance.com/?p=123</guid>
		<description><![CDATA[<p>When developing your security strategy, it is important to recognize the limitations on your team. In this case, choosing what to do is often less important than choosing what NOT to do. This deck is used to drive conversation around the choices we make as security practitioners in what we choose to tackle, and what [&#8230;]</p>
<p>The post <a rel="nofollow" href="http://businessmodelofsecurity.com/bmos/introduction/defining-security-strategy/">Defining Security Strategy</a> appeared first on <a rel="nofollow" href="http://businessmodelofsecurity.com">The Business Model of Security</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>When developing your security strategy, it is important to recognize the limitations on your team. In this case, choosing what to do is often less important than choosing what NOT to do. This deck is used to drive conversation around the choices we make as security practitioners in what we choose to tackle, and what choose not to do in our daily quest to mitigate and manage risk.</p>
<div id="__ss_3318386" style="width: 425px;"><object classid="clsid:d27cdb6e-ae6d-11cf-96b8-444553540000" width="425" height="355" codebase="http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab#version=6,0,40,0"><param name="allowFullScreen" value="true" /><param name="allowScriptAccess" value="always" /><param name="src" value="http://static.slidesharecdn.com/swf/ssplayer2.swf?doc=definingsecuritystrategy-100302123240-phpapp02&amp;stripped_title=defining-security-strategy" /><param name="allowfullscreen" value="true" /><embed type="application/x-shockwave-flash" width="425" height="355" src="http://static.slidesharecdn.com/swf/ssplayer2.swf?doc=definingsecuritystrategy-100302123240-phpapp02&amp;stripped_title=defining-security-strategy" allowscriptaccess="always" allowfullscreen="true"></embed></object></p>
<div style="padding: 5px 0 12px;"></div>
</div>
<p>The post <a rel="nofollow" href="http://businessmodelofsecurity.com/bmos/introduction/defining-security-strategy/">Defining Security Strategy</a> appeared first on <a rel="nofollow" href="http://businessmodelofsecurity.com">The Business Model of Security</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://businessmodelofsecurity.com/bmos/introduction/defining-security-strategy/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Language of Risk</title>
		<link>http://businessmodelofsecurity.com/bmos/introduction/language-of-risk/</link>
		<comments>http://businessmodelofsecurity.com/bmos/introduction/language-of-risk/#comments</comments>
		<pubDate>Sat, 27 Feb 2010 03:29:01 +0000</pubDate>
		<dc:creator><![CDATA[Brandon Dunlap]]></dc:creator>
				<category><![CDATA[Introduction]]></category>
		<category><![CDATA[information security]]></category>
		<category><![CDATA[isc2]]></category>
		<category><![CDATA[Language of Risk]]></category>
		<category><![CDATA[organizational strategy]]></category>
		<category><![CDATA[risk management]]></category>

		<guid isPermaLink="false">http://competitivecompliance.com/?p=116</guid>
		<description><![CDATA[<p>Why is “The Language of Risk” so important right now?  What are the drivers for Business and Security to speak the same language?  The answer is change: massive, fundamental change in both camps. Technology has moved to center stage as a partner in business enablement, and has brought along its associated risks.  IT and IT [&#8230;]</p>
<p>The post <a rel="nofollow" href="http://businessmodelofsecurity.com/bmos/introduction/language-of-risk/">Language of Risk</a> appeared first on <a rel="nofollow" href="http://businessmodelofsecurity.com">The Business Model of Security</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>Why is “The Language of Risk” so important right now?  What are the drivers for Business and Security to speak the same language?  The answer is change: massive, fundamental change in both camps.</p>
<p>Technology has moved to center stage as a partner in business enablement, and has brought along its associated risks.  IT and IT Security see massive changes daily in the very nature of the capabilities and services they provide.  Transformative changes and their resulting risks and benefits impact the business enterprise overall.</p>
<p>What changes?  EVERYTHING. This is a paradigm shift far greater than that of changing from mainframes and terminals to desktop computing. Potential anarchy lurks, and security risks change hourly.  IT Security can no longer manage risk in a vacuum.  The risks to IT Security are the risks to the enterprise, period.</p>
<p>It is imperative now for the Language of Risk to be a common element between Business and IT Security.  Each of these transformative changes in IT brings the potential for competitive advantage, cost savings and economies of scale.  The security risks bring potential for financial ruin, loss of reputation and regulatory fines.  Technology evolves, but it is past time for IT Security and Business to define what is essential, the security and availability for the resources required to do business.</p>
<p>We need a common lexicon.  We need “The Language of Risk.”  Let’s talk.</p>
<p>Here is the opening set of slides from the (ISC)<sup>2</sup> 2010 Security Leadership Series on Competitive Compliance which outlines how thinking like the business leads to improved communication between parties on risk.</p>
<p><object width="425" height="355" classid="clsid:d27cdb6e-ae6d-11cf-96b8-444553540000" codebase="http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab#version=6,0,40,0"><param name="allowFullScreen" value="true" /><param name="allowScriptAccess" value="always" /><param name="src" value="http://static.slidesharecdn.com/swf/ssplayer2.swf?doc=thelanguageofrisk-100226203521-phpapp01&amp;rel=0&amp;stripped_title=the-language-of-riskintroduction" /><param name="allowfullscreen" value="true" /><param name="allowscriptaccess" value="always" /><embed width="425" height="355" type="application/x-shockwave-flash" src="http://static.slidesharecdn.com/swf/ssplayer2.swf?doc=thelanguageofrisk-100226203521-phpapp01&amp;rel=0&amp;stripped_title=the-language-of-riskintroduction" allowFullScreen="true" allowScriptAccess="always" allowfullscreen="true" allowscriptaccess="always" /></object></p>
<p>The post <a rel="nofollow" href="http://businessmodelofsecurity.com/bmos/introduction/language-of-risk/">Language of Risk</a> appeared first on <a rel="nofollow" href="http://businessmodelofsecurity.com">The Business Model of Security</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://businessmodelofsecurity.com/bmos/introduction/language-of-risk/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
