Intelligent CISO Issue 70 | Page 45

industry

UNLOCKED management , which has been instrumental to strengthening our defences .
We ’ ve also implemented Tanium Impact for risk assessment , enabling the team to swiftly identify , prioritise , and remediate access rights and dependencies , thus mitigating the risk of lateral movement when accessing a network .
We have also integrated Tanium with ServiceNow CMDB , ensuring a single source of truth for consistent and comprehensive security data that seamlessly feeds into ServiceNow for streamlined management .
While the integration with Microsoft Azure Sentinel expedites incident response and remediation using real-time data and control to resolve incidents and / or enforce compliance .
Looking ahead , we also plan to adopt a Zero Trust model to further bolster our defences . This approach acknowledges the perpetual risk of security threats from internal and external sources , adding an authentication or authorisation procedure to every person and device accessing our network for an additional layer of control . This enables the university to proactively minimise risk at every touchpoint . Crucial to this is driving cultural change , instilling a security-conscious culture across the university .
In your experience , what are the most common types of cyberattacks targeting educational institutions , and how can they be effectively countered ?
In my experience , the most common types of cyberattacks targeting educational institutions include phishing attacks , ransomware ( encrypting critical data and disrupting operations ), and exploitation of vulnerabilities in distributed networks .
Phishing attacks often aim to compromise university credentials through deceptive emails , exploiting the distributed nature of the university ’ s network and users . It only takes one individual to slip up for an attacker to gain access . Often , the goal is to either steal data to sell , or hold it for ransom and demand a large pay day .
We took a significant step by adopting Tanium to gain real-time visibility across our network
WWW . INTELLIGENTCISO . COM 45