Intelligent CISO Issue 11 | Page 43

E R T N P X E INIO OP Modern network security requires a layered defence approach that factors in people, processes and technology. security teams can implement in order to layer their defences. That being said, it’s important that IT teams do not implement isolated point solutions as they layer their defences, but rather, select those tools based on their ability to be integrated and automated to create a Security Fabric that can facilitate the rapid detection and mitigation of threats. www.intelligentciso.com | Issue 11 Another tactic IT teams should leverage is deception technology. Network complexity is an Achilles heel for adversaries. Deception technologies level the playing field by automating the creation of dynamic decoys that are dispersed throughout the IT environment, making it harder for the adversary to determine which assets are fake and which are real. When an adversary can’t make this distinction, cybercriminals are forced to waste time on fake assets and exercise caution as they look for tripwires embedded in these fake environments. This may require them to alter their tactics, thereby increasing their chances of being detected by security teams. Finally, IT teams should leverage segmentation. Adversaries target networks to gain access to and exploit organisations’ business-critical data, whether that is their customer and personnel information, intellectual property, financial records, etc. Segmenting corporate networks enables IT teams to separate their applications and sensitive data into different segments of sub-networks with varying degrees of security. This allows for greater access control on critical systems, thereby limiting exposure if there is a breach. Final thoughts Modern network security requires a layered defence approach that factors in people, processes and technology. Together, such tactics – including creating a strong culture of security, conducting threat research, prioritising assets and deploying modern network controls – will enhance visibility and shorten threat response times, resulting in minimising the impact of cyberattacks. u 43