How to Keep IT Employees Fully Engaged

In my last article, I wrote about the importance of training, and how I believe it is the missing ingredient to IT success. This is something I feel rather strongly about and will discuss with anyone who listens.

But as I mentioned, the word training comes with some negative connotations – at least for myself. I associate it with being a student in a structured classroom setting where I’m supposed to follow the teacher’s instructions. Unfortunately, I’m afraid that many of my peers feel the same way.

But this is just one surface-level symptom of a larger issue. The fact of the matter is that many organizations don’t understand how to fully engage their IT departments. As a result, continuing education suffers, employees begin to lose focus, and productivity wanes.

This is why I’m a major proponent of finding better ways to engage IT employees and make them feel like what they’re doing is important and appreciated. In doing so, the entire organization benefits.

Ideas for Keeping Employees Engaged
How do we engage our IT employees? That’s a question that organizations need to consider as we move forward. And while there are some IT-specific strategies, a larger organizational perspective is critically important. Committing to engaging the company as a whole will lead to benefits for the IT department.

The first idea is to pull back on mindless restrictions that aim to establish pointless uniformity in the organization. This is something Zappos, the online shoe retailer, is adamant about.

“Zappos has a casual work environment where employees can be their most authentic selves,” according to an article in U.S. News & World Report. “The dress code is relaxed so they can feel comfortable. As long as their outfits are respectable and work-appropriate, employees have the freedom to express their individual style.”

When employees feel like themselves, they’re more engaged. It tears down the imaginary barrier between work and personal life and starts to feel more natural.

The second thing I recommend is for companies to invest in regular departmental team-building outings. Your IT employees would do well to get out of their comfort zones and try something they’ve never done before. I would recommend an activity like whitewater rafting. I did this while working for a previous employer, and we all left feeling like we knew each other better.

The goal of a team-building outing is to force employees to rely on one another. This increases trust and allows each individual to better understand the strengths and weaknesses of his or her co-workers. Upon returning to a work setting, everyone feels like they have a better picture of what they’re doing.

The third key is to be clear with your company’s vision and the IT department’s goals.

“People want to understand the vision that senior leadership has for the organization, and the goals that leaders or departmental heads have for the division, unit, or team,” according to Dan Crim, an expert in organizational behavior. “Success in life and organizations is, to a great extent, determined by how clear individuals are about their goals and what they really want to achieve.”

Make the Investment in Engagement
I’ve worked in a number of organizations and can tell you that there’s a huge difference between companies that focus on employee engagement and those that ignore it.

Become a company that prioritizes engagement, and your IT employees will appreciate your investment.

Larry Alton, Writer, LarryAlton.Com

[ISACA Now Blog]

TechDocs: Protect Your SaaS with the Latest Aperture Features

The Aperture team is working hard to make your life easier and keep your SaaS applications secure. New features introduced recently include:

  • Automatic Risk Remediation: The Aperture service introduces a powerful new feature that can automatically discover and remediate risks. You can create policy rules that automatically quarantine compromised assets, change sharing to maintain network security, and notify owners when an asset is vulnerable. When you automatically remediate risks, the Aperture service can process and fix large volumes of risks in record time with minimal overhead. Aperture supports automatic remediation on Outlook 365, Google Drive, Box, and Dropbox.
  • Support for Salesforce Sandbox: SaaS applications supported by the Aperture service now include Salesforce Sandbox applications. A Sandbox creates copies of your Salesforce organization in separate environments. You can use them for development, testing, and training, without compromising the data and applications in your Salesforce production account.
  • Enhanced Administrator Roles: Account choices in the Aperture service include a new Read Only administrator role. There are now three administrator roles you can manage to give you greater control over which tasks administrators can and cannot perform.

As always, you can find our content on our Technical Documentation page under the Aperture documentation page.

Happy reading!
Your friendly Technical Documentation team

Have questions? Contact us at: documentation@paloaltonetworks.com

[Palo Alto Networks Research Center]

2017 Cybersecurity Predictions: Automation and Playbook Models Take On Key Roles in Threat Intelligence Sharing

Threat intelligence sharing among vendor and industry peers has come a long way, and in 2017 there will be more opportunities than ever to demonstrate its value; especially as conversations around sharing intelligence between the public and private sectors continues.

Crossing the Last Mile With Threat Intelligence

Security vendors and white hat researchers continuously seek new indicators of vulnerability. Once found, they convert them into prevention and detection controls and deploy them as quickly as possible. This is called actionable intelligence. The problem for the past decade is that most network defenders take days, weeks or even months to finish the last mile—if they do it at all.

What is needed is an automatic way to make the journey. Instead of analysts reading intelligence reports, deciding that the intelligence is pertinent to their environment, crafting prevention and detection controls for their deployed systems, and then deploying those controls, network defenders will, in the future, rely on automated systems which do that for them. They will have to trust that the automation will not take the network down.

Read more predictions on The Cipher Brief.

[Palo Alto Networks Research Center]

Behavox on course for Level 2 STAR Attestation from the Cloud Security Alliance

Rigorous Third Party Independent Assessment To Validate Company’s Security Posture

SEATTLE, WA – December 28, 2016 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment, today announced that Behavox, the specialist AI enterprise software company offering compliance solutions for capital markets, has begun its audit towards achieving the Cloud Security Alliance’s (CSA) Level 2 Security, Trust & Assurance Registry (STAR) Attestation, a rigorous third party independent assessment of the security of a cloud service provider.

Schellman & Company, LLC (Schellman), a leading provider of compliance and audit services, is conducting the examination of the entirety of Behavox’s compliance platform.

“This is an important certification for Behavox and we are pleased to be working with the CSA which has set the worldwide industry standard for cloud transparency and security,” said Erkin Adylov, CEO of Behavox.  “With its rigorous approach to audit, the additional requirements beyond other standards such as SOC2, and the ability to gain this attestation through a credible third party audit arbiter like Schellman, our customers can be assured that we have the most stringent security controls and policies for cloud environments. With membership comes the need for continuous update and annual testing – there is no better evidence of our commitment to the highest standards of data security.”

The Behavox system provides multiple layers of defence for any regulated financial institution. At its core is the comfort that an institution’s entire data set (structured and unstructured): is held in a real-time accessible archive; is searchable; can be easily controlled (escalated; used for reporting; data retention); is presented holistically (for surveillance and other purposes); provides a full audit trail and a complete picture of every recorded interaction between an employee and another individual to facilitate discovery, trade reconstruction, full historic analysis of a contested situation.

“We look forward to helping Behavox and their team on their journey towards full compliance” said Jim Reavis, CEO of the CSA. “In adhering to the industry’s most stringent security controls, Behavox is set to join an elite class of cloud providers capable of effectively and securely meeting enterprise-level security needs.”

The CSA STAR program is the industry’s most powerful program for security assurance in the cloud and encompasses the key principles of transparency, rigorous auditing, harmonization of standards, with continuous monitoring.

Behavox has published its CSA STAR Self-Assessment documenting the extent to which its security controls and procedures are already compliant with the CSA’s required standards – the path to full compliance and third party audit confirmation is the next logical step for the business in 2017.

About Cloud Security Alliance

The Cloud Security Alliance (CSA) is the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment. CSA harnesses the subject matter expertise of industry practitioners, associations, governments, and its corporate and individual members to offer cloud security-specific research, education, certification, events and products. CSA’s activities, knowledge and extensive network benefit the entire community impacted by cloud — from providers and customers, to governments, entrepreneurs and the assurance industry — and provide a forum through which diverse parties can work together to create and maintain a trusted cloud ecosystem. For further information, visit us at www.cloudsecurityalliance.org, and follow us on Twitter @cloudsa.

About Behavox

Behavox is an enterprise compliance software company providing holistic employee surveillance solutions. Our solutions allow Senior Management, Risk & Compliance Officers to detect cases of market abuse, insider threat, collusion and reckless behavior in real time. Through the combination of cutting-edge technology, thought leadership and industry collaboration, we have created a Risk and Compliance ecosystem which transforms the way that firms conduct surveillance and supervise risk within their business. We provide an effective and scalable solution that delivers compliance with finance regulations such as Dodd Frank, MAR, FCPA, SMR & MIFID II. By linking structured internal communication (voice, email, chat etc) data with other internal unstructured data (GPS, browser history etc), users can discover, visualize and quantify relationships between people, organizations and content. In addition to this, the Behavox machine learning algorithms compare this data to a series of proprietary scenarios developed by our regulatory experts, which can also be configured to meet existing and future institutional policies.

Contacts

Kari Walker for the CSA
ZAG Communications
703.928.9996
kari@zagcommunications.com

[Cloud Security Alliance Research News]

English
Exit mobile version