Knowledge Management in Cybersecurity - Security Boulevard

Knowledge Management in Cybersecurity

Data has been called “the new oil.” Ensuring that the right people have access to the data that they need, and that users cannot access sensitive data without proper authorization, is an important role within an organization.

The National Institute of Standards and Technology has developed the NICE framework in an attempt to standardize terminology and job roles across the cybersecurity industry. The role of knowledge manager is defined in this framework, as well as its associated duties and the knowledge, skills and abilities necessary to be effective in the role.

What Is a Knowledge Manager?

As defined in NIST’s NICE framework, the role of a knowledge manager is to manage the flow of data throughout an organization. This includes oversight over tools and processes related to identifying, documenting and accessing the organization’s stored data and intellectual property.

What Does a Knowledge Manager Do?

Knowledge managers are tasked with managing all aspects of an organization’s intellectual capital. This includes ensuring that users have access to the data they need to perform their duties and that all data is properly secured within the organization. The tasks performed by an individual in the role of knowledge manager include the following:

  1. Identify Needs: The knowledge manager is responsible for determining what information can be beneficial to an end user for fulfillment of their duties
  2. Provide Access: The role includes developing portals and other means of making access to data easy for end users
  3. Promote Usage: The knowledge manager should promote the available data access portals and the use of data throughout the organization, including the sharing of information across boundaries (e.g., eroding silos)
  4. Infrastructure: This role includes ensuring that the organization has the infrastructure necessary to make full use of their available data, including databases, portals, indexing systems and storage (Read more...)

*** This is a Security Bloggers Network syndicated blog from Infosec Resources authored by Howard Poston. Read the original post at: