on preventing existing threats, rather than
using threat intelligence and advanced
tools to identify and respond to unknown
vulnerabilities and zero days.
The second challenge is around getting
cybersecurity buy-in and participation
from the executive suite and from the
various lines of business.
Among various security initiatives, the
prevention, detection and response to
insider threats are consistently listed
among CISOs’ top-tier priorities.
Managing insider threats, both
intentional and unintentional – like
clicking on a phishing link, using weak
passwords, or exposing the network to
an unsecured device – eat up a lot of
the security team’s time and resources,
preventing them from focusing on threats
from external sources.
Putting employees at the centre
of cybersecurity
To address this, CISOs should give
employees a more active role in
cybersecurity. The key is to teach them
According to recent
reports, 35% of
CISOs believe the
lack of a centralised
cybersecurity
strategy and the
lack of support
from senior
management are the
top constraints to
effective security.
64
how to avoid common attack tactics
without limiting their productivity. In
practice, this means developing a
strategy around three main areas:
1. Upskill the IT team: A truly
efficient IT team will focus on threat
detection and remediation rather
than prevention. To achieve this,
CISOs should ensure their security
team has regular opportunities
for further education in deploying,
configuring and managing advanced
security tools, as well as identifying
and addressing new emerging
threats. Proficiency in these types
of integrated tools provides IT
teams with enhanced visibility
into how data is used and moved
through the network, in addition
to simplified management and
analytics abilities. Additionally,
hands-on training will ensure
they have the ability to configure,
install and troubleshoot their
organisation’s security solution.
2. Give time back to security teams:
Cyberattacks are happening at
machine speed – meaning security
teams cannot keep up with threat
correlation or basic remediation
efforts on their own. One way to
tackle this challenge is to deploy
security solutions that make
extensive use of automation through
Issue 20
|
www.intelligentciso.com