Intelligent CISO Issue 24 | Page 38

FEATURE Zero Trust combined with strict access control is critical. and devices, Zero Trust combined with strict access control is critical. To better secure those network environments even further, security teams must also introduce two-factor authentication and implement dynamic network segmentation to limit who sees what while also carefully monitoring devices. 3. Stay up-to-date on privacy laws Massive penalties await those who violate the EU’s strict data protection regulations (GDPR). With new privacy laws on the books across the globe, including California’s new California Consumer Privacy Act which went into effect on January 1, 2020, it can be easy to go astray. Organisations should look for security tools that will offer guidance on remaining compliant amid digital innovation. 4. Monitoring web presence As cybercriminals continue to target vulnerable websites, security teams must take additional steps to ensure their websites and web applications are able to stand up against these threats. This includes securing SaaS apps, deploying web app firewalls and implementing Cloud Access Security Broker (CASB) solutions and endpoint security tools for mobile users. Organisations should also only choose solutions that are designed to function as an integrated system for seamless coverage and no security gaps. 5. Securing apps Software developers who build the apps used across organisations do not always prioritise security, especially in third-party apps that are typically installed on personal devices. For these types of apps, organisations should deploy endpoint security tools, while 38 Issue 24 | www.intelligentciso.com