Intelligent CISO Issue 79 | Page 52

COVER story

While we may not be able to make sweeping changes , we can refine and enhance our approach based on past experiences .
them very seriously . We combine awareness , policies , procedures and defences against emerging threats to address the cybersecurity risks we encounter .
How can organisations ensure the security of their digital infrastructure during high-traffic periods or major events , and what protocols are essential for mitigating cyberthreats in real-time ?
This question is particularly relevant to our environment , as we often experience high traffic during major events . To manage this , we employ a multi-layered security approach .
Firstly , we ensure scalability and redundancy , including geo-redundancy , to handle the high volume of traffic and to protect our reputation and brand . Our infrastructure must be highly available , not only in terms of the physical network but also in terms of the protocols we implement . We work closely with multiple telecom service providers in a load-balancing environment to maintain this availability .
Before each event , we conduct regular stress tests and security drills , drawing on the experiences from previous years . We review the lessons learned and make continuous improvements to our security landscape . This is an evolving process ; while we may not be able to make sweeping changes , we can refine and enhance our approach based on past experiences .
In addition to these measures , we use essential technologies like encryption and regularly update security patches . These are fundamental components of our core infrastructure , crucial for ensuring high availability and mitigating cyberthreats during peak periods .
With the increasing use of IoT devices in various industries , how should organisations address the cybersecurity risks associated with these technologies ?
This is a million-dollar question , and I ’ ll tell you why . Often , organisations focus heavily on securing their core infrastructure services while neglecting IoT and OT ( Operational Technology ) devices , even though they are just as critical .
To effectively address the risks associated with IoT and OT , organisations need a comprehensive approach . One key strategy is network segmentation . It ’ s crucial to ensure that IoT and OT devices operate in separate network segments . This way , if there ’ s an issue with these devices , it won ’ t affect the broader infrastructure or on-going operations .
We also need to ensure that these devices are regularly patched and that strong authentication measures are in place . Regular risk assessments should be conducted , similar to those performed for core infrastructure services . We even carry out stress tests during off-peak periods when we ’ re not in the event cycle . This allows us to thoroughly assess and address any vulnerabilities in our IoT environment , ensuring that these segments do not negatively impact the overall network .
In a nutshell , proactively managing these potential risks is essential to maintaining a secure and resilient environment .
52 WWW . INTELLIGENTCISO . COM