EDITOR ’ S question chieving an alignment between cyberrisk and security policy expectations
 A requires several steps . Each builds on the other and ensures that the IT security policies in place are the most appropriate for the organisation . The required steps include :
 • An initial review : The first step is to carefully review all the components that , together , create the organisation ’ s IT infrastructure . This includes everything from applications and databases to servers , networks and client devices .
 • Check data flows : Organisations need to review how data is transmitted , both within the business and externally , to uncover where any weaknesses might exist that need to be addressed .
 • Examine cloud resources : As businesses increasingly make use of cloud-based resources , it ’ s important to remember that the job of securing those resources is not left to the cloud provider . Review all usage of the cloud and ensure that appropriate layers of security have been put in place .
 • Determine acceptable levels of risk : Regardless of how much is spent and which security measures are implemented , there will always be a persistent level of risk . For this reason , it ’ s important to determine what level the business finds acceptable and whether this is the level that currently exists .
 • Manage that risk : Once the level of risk is understood , a strategy for its management can be developed . The security team can work to avoid risks , accept some risks , mitigate risks , or transfer risks . This can be achieved by engaging
 Regardless of how much is spent and which security measures are implemented , there will always be a persistent level of risk .
 an external specialist to manage security tools and other measures .
 • Conduct what-if scenarios : Once acceptable levels of risk have been identified , and measures put in place to maintain them , it ’ s time to run some what-if scenarios . This involves considering what the impact would be on the business if a particular event occurred . These events could include ransomware attacks , data theft , or malicious activity conducted by an insider .
 In addition , an effective measure which businesses can take to lessen its chances of falling victim to a data breach is to implement the measures outlined in the Australian Cyber Security Centre ’ s Essential Eight security guidelines . These clearly map out the steps an organisation should take to improve its level of cybersecurity and includes areas such as deploying Multi-Factor Authentication , undertaking patching of operating systems and applications and conducting regular data backups .
 Once implemented , they enable an organisation to have a much better chance of withstanding most of the IT security threats they are likely to face .
 SIMON HOWE , AREA VICE PRESIDENT FOR AUSTRALIA AND NEW ZEALAND , EXTRAHOP
 WWW . INTELLIGENTCISO . COM 29