What Role Do Engineers Have In Managing Cyber Risks?
The term cyber risk could encompass many things which would stem from the failure of an organization’s information technology systems. For example, this could be financial loss, breaches of systems, be it unauthorized or accidental, or some form of data disruption. While it may seem that this can only happen to large businesses that appear to financially well off, this is not the case. Cyber crime can occur to any business regardless of its size and this can be seen through statistics alone. According to nbins.com, since 2015 when cyber crime became the second most common type of economic fraud in Canada, the number of incidents that occur has increased by an astonishing 160 percent. In order to keep the number of incidents to a minimum, professionals such as a cyber security engineer or an information systems security engineer, provide services pertaining to their specialized field. For information systems security engineers, they essentially are responsible for determining a system’s security requirements and building systems based off these requirements in order to fortify system and information security. They can also test for vulnerabilities within the network through periodic scans and penetration testing. When it comes to the Cyber security engineer, they can go by several other names such as an Application / Web security engineer, Data security engineer, and an IA / IT security engineer. Regardless of the name, the specialized services that they perform are slightly different from the information systems engineer’s but overall very similar. This would include defining security protocols, installing and configuring software, troubleshooting, penetration testing, or observing and responding to intrusion detection cues. For the most part, these engineers work together to provide an organization a service in the efforts of obtaining an optimally secure system so that the organization may continue to prosper throughout the years to come.
https://www.nbins.com/blog/cyber-risk/what-is-cyber-risk-2/