Why security breaches happen – Part 4 of 6 – Glenn Buggy

I’m in discussion again with Glenn Buggy, continuing our conversation about the General Data Protection Regulations (GDPR) impact on talent (human capital) in the workplace.

Glenn’s unique viewpoint on this complicated issue has been very helpful to hear, with his extensive knowledge of the legal and financial fields.

This is part four of six. We’re very much looking forward to your ideas or thoughts on the various parts we discussed.

Today I’m asking,

Breaches are usually caused by human mistakes, what can we learn from that with regards to our human capital strategy?

Why Breaches Happen

A breach happens not only due to a weakness in technology but, more likely, because an employee made a mistake. This is one reason why your data talent leadership needs to have a keen sense of the backend framework of cyber security, and also be able to take that information and train every employee at your company on how to practice due diligence and protect customer information every step of the way.

Companies need someone with just as strong communication and influencing skills as technical abilities to be good at this job. The right talent needs to be able to address board members’ technical questions and the financial ramifications, as well as address the importance of cyber security to the lay employee in a way they can understand.

Finding that right talent can seem like a needle in a haystack when you try to conduct the search on your own.

Prioritize Hiring

The cost of experts in this space has dramatically increased and will continue to increase. Though it’s an expensive endeavor, it is one you should not put off. If you do not invest in the right people for this area and act quickly, that potential employee you were considering is susceptible to being picked off by another firm.

Some roles you may consider to better protect your company could be: Information Security Analyst, Chief Data Officer, Data Protection Governance Officer, Digital Risk Officer, Chief of Staff for Security, Data Security Scientist, Security Ombudsman, or a Digital Ecosystem Manager.

I describe these roles for my clients’ companies and help them identify the role(s) that would suit their business and employees best for the long run.

Information security is a competitive and fast-moving space as companies are working to assemble the right teams to avoid a breach or security disaster. This role touches so many areas of your organization and the right hire can ensure that every facet of your business is locked down and protected as best they can.

 

 

 

 

Read more from Glenn.

Tags: Glenn Buggy, Glenn M Buggy, Caldwell Partners, Talent Transforms, Financial Services Practice, Legal, Risk and Regulatory Oversight Practice, Caldwell’s Asset & Wealth Management Practice, #GlennBuggy, #CaldwellPartners, Executive Search, Kristin Sheridan

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s