Just in:
Majority of CIOs Overspend on Cloud Budgets, Survey Reveals // Ripple’s RLUSD Stablecoin Enhances Cross-Border Payments and Gains Kraken Listing // Aspire Secures Capital Markets Services Licence from Monetary Authority of Singapore // ChatGPT Reaches 1 Million Users in an Hour Amid New AI Image Feature // Absa Group to Establish Dubai Office Amid Strengthening Africa-Gulf Investment Ties // Singapore Exchange Probes City Developments Amid Family Dispute // Dubai Advances Autonomous Taxi Services with Global Tech Partnerships // ICONSIAM’s ‘THAICONIC SONGKRAN CELEBRATION 2025’ to Captivate Visitors with Thailand’s Most Spectacular Water Festival // Proton Enhances Drive and Docs Services Amid Linux User Anticipation // Trump’s Sweeping Tariffs Set to Reshape Global Trade Dynamics // Checkout.com and Tabby Collaborate to Enhance BNPL Services in UAE and Saudi Arabia // PolyU establishes Otto Poon Research Institute for Climate-Resilient Infrastructure with support from Otto Poon Charitable Foundation // Decisive factors: Octa carried out a global survey about brokers’ red flags // Shenglong Electric showcases two AI-powered products in OFC 2025 to redefine smart electricity use // Bayo Ojulari Appointed as NNPC’s New Group CEO // American Bitcoin to Navigate Public Offering Amid Growing Market Interest // BlackRock Secures FCA Approval to Operate as Crypto Asset Firm in UK // US Tariffs Threaten India’s Gems and Jewellery Exports // Parkin Declares AED 280.9 Million Dividend Amid Upcoming Parking Tariff Adjustments // e& PPF Telecom Group Completes €825 Million Acquisition of Serbia Broadband //

IT security: Taking control in a changing world


Sean Mason… changing world of IT security professionals

IT security: Taking control in a changing world

DUBAI, 1 days ago

Not too long ago, most security professionals were content to have time to play with some logs, install a new Intrusion Prevention System, or get a sample of malware and try their hand at reversing.

Generally though, most security professionals were relegated to a world of firewall administration, user authentication, and compliance.

ADVERTISEMENT

“As we’ve continued to see, times have changed and chief information security officers (CISOs) and their teams are expected to do considerably more now. The reality is that if you are CISO in today’s world, you are on point to fight foreign military units and organised criminal enterprises,” said Sean Mason, vice president of Global Customer Success, Resolution1 Security.

Major information security themes for this year:

1. Quit Wasting Time

Hackers do not work according to your schedule. There is no such thing as “end of year” or “holiday weekend”, and there hasn’t been for some time in the cyber realm. Making plans to “get started” after a holiday or a weekend is exactly what adversaries expect you to do and is why they will continue to exploit companies with that mentality. Spending months doing POC’s on technology, putting off hiring or budget requests, waiting to deploy technology and other approaches that introduce unneeded delays are tactics proven to fail. Accelerate everything now.

2. Focus on Security, not Compliance

Compliance has failed us. Prevention has failed us. How many attacks need to be reported by the largest companies in the world for CIO’s & CISO’s to rethink their approach? The companies that are successful in information security understand that the only proven means of mitigating damage by attackers is to spend resources on detecting and responding to attacks- identifying them and shutting them down as quickly as possible before they escalate. Would you rather be out of compliance and pay a fine, or deal with a crippling Sony-like attack which will end up costing your company hundreds of millions of dollars?

3. Be Proactive Defending your Network

Even if you have an internal Service Organization Controls (SOC) & Incident Response Team (IRT), or an external Managed Security Service Provider (MSSP), you still need to proactively look for threats on your network outside of the normal day-to-day operations. Either leverage your internal teams to hunt for anomalies that signal compromise on your network, or hire an outside firm to do it for you. Incidentally, penetration testing is not hunting.

4. Invest in & Hire New College Graduates

Last, but not least, it is common knowledge that there are not enough Information Security professionals in the world. Don’t waste months hoping and trying to find the right candidate or worse- throw your hands in the air and claim you simply can’t find anyone. Take the time to open headcount dedicated to hiring information technology graduates from your local college and put them into information security roles. You’ll be surprised how quickly they grasp the concepts and add value to the organization.

“What you don’t see in these resolutions are items related to Intel, Mobile, or Cloud; those are simply realities we have to live with. What these resolutions represent is a mind shift and ultimately adjusting the way organizations operate,” said Mason.

“They won’t be easy, and in many cases will be considerably hard to execute on. However, a new way of thinking and conducting ourselves as Information Security Professionals is required, to have any chance of being successful and taking back control over our networks,” he concluded. – TradeArabia News Service

Recommended article: Chomsky: We Are All – Fill in the Blank.
This entry passed through the Full-Text RSS service – if this is your content and you’re reading it on someone else’s site, please read the FAQ at fivefilters.org/content-only/faq.php#publishers.


Notice an issue?

Arabian Post strives to deliver the most accurate and reliable information to its readers. If you believe you have identified an error or inconsistency in this article, please don't hesitate to contact our editorial team at editor[at]thearabianpost[dot]com. We are committed to promptly addressing any concerns and ensuring the highest level of journalistic integrity.


ADVERTISEMENT
Just in:
Checkout.com and Tabby Collaborate to Enhance BNPL Services in UAE and Saudi Arabia // Dubai Advances Autonomous Taxi Services with Global Tech Partnerships // Eric Trump Ventures into Bitcoin Mining Following Bank Account Closures // Majority of CIOs Overspend on Cloud Budgets, Survey Reveals // American Bitcoin to Navigate Public Offering Amid Growing Market Interest // Galaxy Macau™ Presents: ANDREA BOCELLI Live in Concert – A Soul-Stirring Spectacle // Parkin Declares AED 280.9 Million Dividend Amid Upcoming Parking Tariff Adjustments // Trump’s Sweeping Tariffs Set to Reshape Global Trade Dynamics // Proton Enhances Drive and Docs Services Amid Linux User Anticipation // PolyU establishes Otto Poon Research Institute for Climate-Resilient Infrastructure with support from Otto Poon Charitable Foundation // Galaxy Macau Presents Luxurious Celebration of Renewal at Banyan Tree Macau with Michelin-starred Chef and Bartender from Asia’s 50 Best Bars // ChatGPT Reaches 1 Million Users in an Hour Amid New AI Image Feature // Damac’s Edgnex Data Centers Acquires Finland’s Hyperco to Expand Nordic Presence // US Tariffs Threaten India’s Gems and Jewellery Exports // CPI General Secretary D Raja Underlines Principled Unity Of All Communists To Fight RSS-BJP // The Henderson Art Garden Is Now Open to Public // BlackRock Secures FCA Approval to Operate as Crypto Asset Firm in UK // Absa Group to Establish Dubai Office Amid Strengthening Africa-Gulf Investment Ties // Tasks.org: The Open-Source Solution to Proprietary Reminder Apps // Shenglong Electric showcases two AI-powered products in OFC 2025 to redefine smart electricity use //