Intelligent CISO Issue 04 | Page 50

FEATURE
is a requisite to defend against advanced threats.
4. Understand your organisation’ s risk appetite: No two organisations have exactly the same relationship with risk. Gaining an understanding of how much risk and what types of risk your new organisation is willing to accept is a critical. This information will guide your prioritisation of security initiatives and what – and what not to – focus on. In addition to your board of directors and CEO, your line-of-business leaders hold valuable insights on the company’ s risk appetite.
5. Know your role, build relationships accordingly: Relationships are critical for any executive. CISOs need to start building network connections that encompass everyone from the boardroom, to the executive team, to various members of the network and security teams. Today’ s CISO must be not only fully conversant in cybertechnologies and threats but also speak the language of the business.
6. Structure the team, bring in reinforcements: All of the above factors will inform how you structure your existing team and what skills you will look for with any new hires. Unfortunately, attracting and retaining talent is expected to be an increasing challenge going forward. CISOs must quickly begin developing a talent pool of potential recruits who bring the right skills and thrive in the corporate culture.
7. Be strategic about technology investments: Given that the threat landscape, your IT environment and the direction of your business are dynamic, your security architecture must be adaptive. A security fabric approach deploys a common set of layered security tools across the entire on-premises and cloud environment. It provides a single pane of glass from which the company’ s security posture at a given moment can be assessed and addressed.
8. Track, measure and report results: Objective measurement and communication of your company’ s security posture visà-vis risk tolerance and business objectives – which includes industry, governmental and security compliance – is critical to your success. An important starting point for tracking, measuring and reporting results is to align business-security initiatives based on Key Performance Indicators( KPIs) and Key Risk Indicators( KRIs).
Best practice for CISOs at SMBs
HADI HADI JAAFARAWI JAAFARAWI, MANAGING
, MANAGING DIRECTOR DIRECTOR, QUALYS, QUALYS MIDDLE ME EAST
Hadi Jaafarawi, Managing Director Qualys ME
SMBs falsely assume that they aren’ t susceptible to cyberattacks, but in reality, they are more vulnerable and face greater challenges to network security due to smaller budgets, lesssophisticated infrastructure and lack of security personnel.
Therefore, it’ s crucial for SMBs to be smart about defensive choices and focus on what matters most.
Instead of thinking of the security budget in terms of cost, understanding the risk associated with a potential cyberattack is the first step towards a strong cybersecurity posture.
Chief Information Security Officers( CISOs) need to gain an understanding of the types of threats that target their company, the weaknesses that exist within their current infrastructures, identify the vital business assets that entails protection and the level of protection required.
This security assessment provides a comprehensive security baseline that helps CISOs select an easy and comprehensive solution that continuously assesses their security posture, complies and responds to the ever-changing regulations and security threats, as well as helping build a solid and secure IT environment without the hassle and costs of deploying point solutions.
Qualys makes it possible for businesses to strengthen the security of their networks and applications with their continuous security and compliance management solutions.
The newly introduced Qualys Community Edition, a free cloud-based service gives small organisations unified visibility of their own or their clients’ IT and web assets.
It also allows users to leverage the power of the Qualys Cloud Platform, which performs billions of scans annually to automatically gather and analyse security and compliance data from hybrid IT environments.
This accurate and immediate visibility helps organisations maintain a higher level of security and provides auditors with trusted compliance reports, while consolidating their stack and drastically reducing costs.
Furthermore, the importance of providing information security awareness training to the employees cannot be understated. A security awareness programme offers employees the knowledge they need to better protect the organisation’ s information through proactive, security conscious behaviour.
Employees should gain a basic understanding of security policies as well as their respective responsibilities in protecting personal and business assets.
To be effective, CISOs should implement an ongoing security awareness programme that includes continuous training, communication and reinforcement. u
50 Issue 04 | www. intelligentciso. com