industry unlocked
• Understand that the perimeter
cannot be the only defensive
strategy, deploy solutions that
bring extreme visibility concerning
network use by monitoring all traffic
for anomalous behaviour
• Segregate the network to protect
your crown jewels, this is very basic
but we have seen that this is being
rarely implemented especially with
OT, IoT, and IT convergence
What best practice advice would
you offer CISOs within this sector
looking to create a robust longterm
security strategy?
Cybersecurity should be viewed as
an investment in improving value.
Employees and all stakeholders need
to work together to secure businesses
from within and outside. Periodic
audits conducted with the same level
of diligence as financial audits need to
be conducted while best practices are
adopted at a regular frequency. A siloed
approach to cybersecurity defeats the
core purpose of securing an enterprise
so all stakeholders need to come
together to fight the forces of disruption
while adopting a Zero Trust stand.
Can a good cybersecurity
posture also provide
business benefits?
Yes – it helps build credibility, reduces
the risks of revenue attrition due to
cyberattacks and ransom payments.
Beyond all this, cybersecurity instils
discipline and improves situational
awareness among all stakeholders.
Typically, according to our calculations,
RoI from improving cybersecurity can
be gained within the first year itself,
if not earlier. Considering the average
cost of a breach, it could even
happen earlier.
Can you tell us about the
work Subex is doing to
protect businesses?
We are providing critical infrastructure
grade cybersecurity to businesses
around the world. This includes telcos,
oil and gas entities, Smart Cities,
manufacturing plants and new-age
manufacturers. We run the world’s
largest threat intelligence gathering
facility that supports our cybersecurity
solution and the services we offer. We
can provide asset visibility, identify,
mitigate and analyse the unique threats
that emerge as also conventional
threats and those that emerge from
converged environments. u
Malware potency
is increasing
and hackers are
using persuasive
messages in
phishing emails
to cause a breach
through insider
activity.
46 Issue 27 | www.intelligentciso.com