I recently tweeted about what I call the “information security chain”. It is the name I use to cover the chain of effective information security management that needs to be in place to help ensure that all parties involved in the information economy can have confidence in the confidentiality, availability and integrity of their data or the promises they make to others about information security.

As with any other chain the old adage of “as strong as the weakest link” applies.

So who’s in the chain? Arguably we all are!

Society generates and consumes information and surely therefore all elements within it have a role to play in ensuring that we can be confident individually and collectively in the confidentiality, integrity and availability of information and information systems within the information economy.

Read my next blog post: Cogs in the Information Security Chain: The Citizen