sb-nz logo
Story image

Enabling cybersecurity professionals with project management skills

29 Jan 2020

Article by CompTIA A/NZ Channel Community executive council member and The Missing Link general manager Karen Drewitt.

IT projects have many moving parts and require the kind of strategic approach provided by a project manager to limit problems and delays. Project management skills are valuable for ensuring that any undertaking is accomplished to maximise budget and resources, while keeping collective efforts within defined time and performance constraints.

Cybersecurity professionals are increasingly expected to master project management skills to meet the objectives of their positions. But technical skills are only the tip of the iceberg. It’s essential to approach cybersecurity not simply from a security knowledge standpoint, but also with business goals in mind.

Data is currency and companies are eager to capitalise on it. But this issue is far larger than simply accessing data and putting it to work. The sheer influence of data and data processing means that, if businesses want to use them, they also need to protect them. To do that, organisations look to cybersecurity professionals.

The pervasive nature of digitised business has organisations extremely dependent on IT systems. Because infrastructure, software, cloud deployments and other IT-related initiatives are often tremendously complex, projects must be managed with care.

Because of this there is an increasing need for IT professionals be able to envision how a project makes the journey from inception to completion taking into consideration stakeholder concerns, business processes, and budgetary and timeline limitations. To do this many are turning to project management skills.

Many project management competencies are essential for cybersecurity projects including:

  • Engaging stakeholders and garnering executive buy-in. Before a cybersecurity project can even begin development, it’s essential to engage stakeholders and executives. IT projects can easily fail without the necessary support from decision makers. To align goals and frameworks, cybersecurity experts need to promote executive engagement.
     
  • Setting clear project expectations in the initial planning process. Cybersecurity initiatives often involve several contributors and multiple stakeholders. When expectations are not clarified during the initial planning stages, projects don’t have a defined focus and tasks and roles cannot be successfully determined. As an important step that drives a project from idea to deliverable, it’s imperative to outline exactly what is expected from the final product before individual tasks are assigned.
     
  • Keeping projects within budget and time constraints. Even when there are clear expectations, projects also frequently face problems with timelines and costs. Project managers are well-versed in evaluating and defining timelines and budgetary constraints. These constraints are often set by stakeholders, but it falls on contributors to meet them.
     
  • Articulating project scope and matching tasks to goals. A large project often seems overwhelming to those in the trenches and therefore project scope becomes a point of concern. It can be difficult for project contributors to tie the role of each member to the overall project outcomes. Without understanding the business objectives and the entire project scope, cybersecurity projects easily go astray. Project scope and task development is critical. A work breakdown structure (WBS), which is a project management approach to tasks, is useful for cybersecurity professionals to see the deliverables associated with each task and understand how each task impacts the final outcome.
     
  • Identifying risks for cybersecurity projects and business goals. Project management and cybersecurity truly intersect when it comes to risk management. Identifying and mitigating risks is at the core of both disciplines. While cybersecurity addresses risks to infrastructure, software and other IT deployments, project management assesses business impact and organisational risk. With both sides making decisions regarding risk effective communication, a foundational element in project management, can ensure that potential risks are addressed from both technical and organisational perspectives.
     
  • Documenting project successes and failures for future improvements. Formal project management training leans heavily on documentation throughout the course of a project. After the completion of a project, it’s essential to evaluate successes and failures to eliminate project delays in future endeavours.

Ultimately, project management competencies are needed to ensure a successful project from start to finish. Organisations need to ensure that their cybersecurity strategy accounts for the business goals. Certifying cybersecurity pros with project management credentials is the meshing of technology into an organisation, the place where technical truly meets the needs of the business.

Story image
Infrastructure-as-code, and how it can secure the cloud
Bridgecrew recognised IaC early on as one of the best ways for modern teams to delegate security ownership to individual contributors while distributing it across existing frameworks within CI/CD pipelines. This attribute meant that IaC was invaluable in securing cloud-native environments.More
Story image
Need for greater understanding of data security responsibility as cloud adoption grows - report
Despite the accelerated adoption of cloud services, there was a lack of clarity and confidence regarding the protection and recovery of data stored in public clouds.More
Story image
Addressing the challenges of least privilege access
Enforcing the right privilege policies across the environment with the right visibility and observability will ensure that the policy mandates hold tight against any behaviour changes.More
Story image
Why organisations should rethink the approach to retail demand planning and forecasting
Why organisations should rethink the approach to retail demand planning and forecastingMore
Story image
Video: 10 Minute IT Jams - Who is Okta?
Okta is an identity and access management company, specialising in secure user authentication. It's an enterprise-grade identity management service, built for the cloud, but compatible with many on-premises applications.More
Story image
Ransomware and Microsoft Exchange attacks surging 
There are global surges in ransomware attacks alongside increases in cyber attacks targeting Microsoft Exchange Server vulnerabilities, according to Check Point Research.More