Governance & Risk Management , IT Risk Management , Next-Generation Technologies & Secure Development

How to Minimize the Risk of Security Control Degradation

Josh Mayfield of Absolute Software on the Unstoppable Force of Entropy
Josh Mayfield, director of security strategy, Absolute Software

Information security programs continue to rely on not just security policies, but also the controls that ensure they get enforced. "Security controls are the enforcement of the intent that we had in mind," says Josh Mayfield of Absolute Software.

See Also: Demystifying Managed Detection and Response Services

Unfortunately, as research by Absolute Software has found, security controls in any environment inevitably degrade over time. As a result, organizations must put in place not just controls, but strategies for identifying when they degrade and taking action.

In a video interview with Information Security Media Group at RSA Conference 2019 in San Francisco, Mayfield discusses:

  • What makes for a security control;
  • Why security controls inevitably degrade over time, and how to predict what will go wrong;
  • How organizations can maintain needed levels of security.

Mayfield is Absolute's director of security strategy. His experience in cybersecurity has focused on network security, threat hunting, identity management and endpoint security.


About the Author

Mathew J. Schwartz

Mathew J. Schwartz

Executive Editor, DataBreachToday & Europe, ISMG

Schwartz is an award-winning journalist with two decades of experience in magazines, newspapers and electronic media. He has covered the information security and privacy sector throughout his career. Before joining Information Security Media Group in 2014, where he now serves as the executive editor, DataBreachToday and for European news coverage, Schwartz was the information security beat reporter for InformationWeek and a frequent contributor to DarkReading, among other publications. He lives in Scotland.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.eu, you agree to our use of cookies.