Intelligent CISO Issue 27 | Page 46

industry unlocked • Understand that the perimeter cannot be the only defensive strategy, deploy solutions that bring extreme visibility concerning network use by monitoring all traffic for anomalous behaviour • Segregate the network to protect your crown jewels, this is very basic but we have seen that this is being rarely implemented especially with OT, IoT, and IT convergence What best practice advice would you offer CISOs within this sector looking to create a robust longterm security strategy? Cybersecurity should be viewed as an investment in improving value. Employees and all stakeholders need to work together to secure businesses from within and outside. Periodic audits conducted with the same level of diligence as financial audits need to be conducted while best practices are adopted at a regular frequency. A siloed approach to cybersecurity defeats the core purpose of securing an enterprise so all stakeholders need to come together to fight the forces of disruption while adopting a Zero Trust stand. Can a good cybersecurity posture also provide business benefits? Yes – it helps build credibility, reduces the risks of revenue attrition due to cyberattacks and ransom payments. Beyond all this, cybersecurity instils discipline and improves situational awareness among all stakeholders. Typically, according to our calculations, RoI from improving cybersecurity can be gained within the first year itself, if not earlier. Considering the average cost of a breach, it could even happen earlier. Can you tell us about the work Subex is doing to protect businesses? We are providing critical infrastructure grade cybersecurity to businesses around the world. This includes telcos, oil and gas entities, Smart Cities, manufacturing plants and new-age manufacturers. We run the world’s largest threat intelligence gathering facility that supports our cybersecurity solution and the services we offer. We can provide asset visibility, identify, mitigate and analyse the unique threats that emerge as also conventional threats and those that emerge from converged environments. u Malware potency is increasing and hackers are using persuasive messages in phishing emails to cause a breach through insider activity. 46 Issue 27 | www.intelligentciso.com