Intelligent CISO Issue 18 | Page 39

FEATURE detection and response by focusing on attacker behaviours rather than focusing on identifying previous known threats. Such an automated approach leaves no security blinds spots, even in IoT heavy enterprises. SCOTT GORDON, (CISSP) CMO, PULSE SECURE To balance the embrace of IoT and its inherent risk, enterprises and CISOs should consider multiple preventive measures to safely connect IoT to the network and its critical resources. They first need to take a cautious approach, carefully researching and profiling the devices they plan to onboard before they fully commit to them. www.intelligentciso.com | Issue 18 You must be able to see and track every endpoint and device on the network in order to protect it. Visibility and control over those devices is paramount. You must be able to see and track every endpoint and device on the network in order to protect it. Implement strong network segmentation so that IoT devices remain in their own realm, separated from other IoT classes and certainly separated from critical information systems. This means that if a breach ever comes via an IoT device, the threat is contained and cannot spread laterally to other, more critical parts of the network. Automating the onboarding of IoT devices within a zero trust model brings many benefits. It allows devices to be authenticated, classified and dynamically placed in their respective network realm, with their respective access profiles. This makes life easier for security staff who are already understaffed and inundated with administrative tasks. From a higher-level perspective, it means that security policies are always enforced, providing continuous compliance, making security audits more bearable. u 39