The implications of this for organisations looking to stay focused on their roadmaps is that they should look outward , not just at consumers but at the threat landscape .
? editor ’ s question e must remember that
W cybersecurity and Digital Transformation are not mutually exclusive . Security teams must realise that the business needs to be agile in order to respond to customer needs , competitors or macro-economic factors . But at the same time , business leaders must recognise the risk inherent in rapid change and heed the security team ’ s warnings when it comes to threats that the organisation must face .
The implications of this for organisations looking to stay focused on their roadmaps is that they should look outward , not just at consumers but at the threat landscape . And they should also consider looking inward , not just at products , services and operations , but at the potential risks of each . If you create something or change something that introduces a security flaw and that flaw is exploited to inflict damage , then how much value was really added ? Staying with the roadmap can be
The implications of this for organisations looking to stay focused on their roadmaps is that they should look outward , not just at consumers but at the threat landscape .
paradoxically self-defeating without strong cybersecurity practices baked in .
Start with the basics : strong password policies , Multi-Factor Authentication ( MFA ), software management , network and endpoint monitoring and protection , and user access control . Be sure to enact the latest versions of these
VIBIN SHAJU , VP SOLUTIONS ENGINEERING EMEA AT TRELLIX practices , as they have matured over the years , to match changes in IT suites and the threat landscape . With this strong foundation , organisations will find it easier to adapt to the escalations in volume and sophistication that cybercriminals are throwing at us right now . And they should be able to integrate modern approaches in the security industry that seek to address new behaviours among our adversaries .
What enterprises cannot do is accept their current security postures . Point solutions have stacked up over decades , creating a security suite that bombards analysts with red flags that often lead to dead ends and false alarms . Security teams are suffering from this alert fatigue , becoming jaded and demoralised so that when a genuine threat arrives , they cannot operate effectively . The answer is a unification of tools into a single pane of knowledge and response where threats are accurately visible , prioritised and remediated . These are the attributes of an XDR platform which is why it isn ’ t surprising that in Trellix ’ s recent Mind of the CISO research , 56 % of organisations across the UAE and KSA stated that they already have XDR as part of their security strategy .
The digitisation roadmap has recently included cloud adoption for almost every business . In focusing on the roadmap , businesses should give due attention to the shared responsibility model . And they should find ways to integrate service providers into risk management rather than opting for sweeping technology overhaul . Defences should fit the operating model and infuse the latest threat intelligence so that an organisation , with strong fundamentals and risk management behind it , can get on with the business of business and have confidence in its threat posture . www . intelligentciso . com
37