Data Center Attacks

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 1

who are the characters of the game?

After you have played the game create a post that addresses
the following questions:
1. The game gives you multiple options to balance the needs of the various people: In the real world
how difficult do you think it would be for a CIO to strike that balance? What should be their priority?
2. One aspect of the game is the budget that you have to work with. How would you expect a CIO to
balance the needs of their various business groups and IT departments (including security) and
remain within their budget?
3. We were discussing the challenges of changing the “security mind-set;” the difficulty in moving
someone who believes that their “method” is successful mostly because they never see any
evidence to the contrary.” How do you overcome that greatest friction of all, “it will never happen to
me?”

The characters of the game are the doctor, the nurse, the Chief Information Security Officer, Mark
Jefferson, the Company employee, and David, the Operations Manager.
1. In the real world, the difficulty for a CIO to strike that balance needed would be in the extremes.
This is not only a high-stress level situation, but also a breach that endangers both the company and
the patients. The reasonable priority in the situation would be to further enforce security around the
system and then take precautionary measures to ensure that a breach would not occur, to
strengthen the infrastructure of the system and if possible also add further security in the cloud
access as modern times dictates that the current trend is that almost every aspect of culture and
development is digitalized.
2. A CIO would need a solution that balances the needs of their various business groups and IT
Business and remain within their budget through thorough planning and implementation of an
integrated solution that offers central management and visibility for all the different server
infrastructure.
3. In order to avoid the challenge of a collision of opinion or methods between a person, it is optimal
to discuss the issue that has arised and present further solutions to the problem. It is best to avoid
being confrontational and acknowledge first the solution presented by other people, and then
discuss and implement a much more secure and established solution. There is a need to be able to
persuade without confrontation and be able to dissuade the mindset of the person as it is not a
matter of pride, but to address a security issue that concerns not only the overall staff and company,
but also the stakeholders and the patients involved.

You might also like