Just in:
CapBridge Shares Insights on the Recent Launch of Digital Asset ETFs in Hong Kong // World Intellectual Property Day: OPPO Maintains Top 10 Global IP Ranking for Fifth Consecutive Year // Etihad Airways Announces Paris Service with A380 // Oman Seeks Growth Through Strategic Economic Alliances // Ministry of Agriculture Supports Taiwanese Tea’s Entry into Singapore Market to Boost Global Presence // DIFC Courts Cement Role as Top English Dispute Resolution Choice // Emirates to Embrace Electric Seaglider Travel // PolyU forms global partnership with ZEISS Vision Care to expand impact and accelerate market penetration of patented myopia control technology // Dubai Gears Up for Second FinTech Summit as Funding Surges // Telecom Giant Du Eyes Crypto Integration for FinTech Platform // Abu Dhabi Unveils Online Portal to Strengthen Healthcare Workforce // Galaxy Macau’s Sakura Cultural Festival Kicked off in Splendor // GE Jun, Chairman and CEO of TOJOY, Delivers an Inspiring Speech: “Leaping Ahead Again” // TPBank and Backbase Clinch ‘Best Omni-Channel Digital CX Solution’ at the Digital CX Awards 2024 // Lee Chong Wei Shows Up On Chinese Hot cultural Talk Show “SHEDE Wisdom Talents”, Talking About “Crossing The Hill” // UAE President, Spanish Prime Minister Hold Phone Talks // NetApp’s 2024 Cloud Complexity Report Reveals AI Disrupt or Die Era Unfolding Globally // Liverpool FC continues international growth with first official retail partnership in South Korea // Downpours in Oman and UAE Likely Amplified by Warming Planet // Supreme Court dismisses pleas for 100% VVPAT verification //

IT security: Taking control in a changing world


Sean Mason… changing world of IT security professionals

IT security: Taking control in a changing world

DUBAI, 1 days ago

Not too long ago, most security professionals were content to have time to play with some logs, install a new Intrusion Prevention System, or get a sample of malware and try their hand at reversing.

Generally though, most security professionals were relegated to a world of firewall administration, user authentication, and compliance.

ADVERTISEMENT

“As we’ve continued to see, times have changed and chief information security officers (CISOs) and their teams are expected to do considerably more now. The reality is that if you are CISO in today’s world, you are on point to fight foreign military units and organised criminal enterprises,” said Sean Mason, vice president of Global Customer Success, Resolution1 Security.

Major information security themes for this year:

1. Quit Wasting Time

Hackers do not work according to your schedule. There is no such thing as “end of year” or “holiday weekend”, and there hasn’t been for some time in the cyber realm. Making plans to “get started” after a holiday or a weekend is exactly what adversaries expect you to do and is why they will continue to exploit companies with that mentality. Spending months doing POC’s on technology, putting off hiring or budget requests, waiting to deploy technology and other approaches that introduce unneeded delays are tactics proven to fail. Accelerate everything now.

2. Focus on Security, not Compliance

Compliance has failed us. Prevention has failed us. How many attacks need to be reported by the largest companies in the world for CIO’s & CISO’s to rethink their approach? The companies that are successful in information security understand that the only proven means of mitigating damage by attackers is to spend resources on detecting and responding to attacks- identifying them and shutting them down as quickly as possible before they escalate. Would you rather be out of compliance and pay a fine, or deal with a crippling Sony-like attack which will end up costing your company hundreds of millions of dollars?

3. Be Proactive Defending your Network

Even if you have an internal Service Organization Controls (SOC) & Incident Response Team (IRT), or an external Managed Security Service Provider (MSSP), you still need to proactively look for threats on your network outside of the normal day-to-day operations. Either leverage your internal teams to hunt for anomalies that signal compromise on your network, or hire an outside firm to do it for you. Incidentally, penetration testing is not hunting.

4. Invest in & Hire New College Graduates

Last, but not least, it is common knowledge that there are not enough Information Security professionals in the world. Don’t waste months hoping and trying to find the right candidate or worse- throw your hands in the air and claim you simply can’t find anyone. Take the time to open headcount dedicated to hiring information technology graduates from your local college and put them into information security roles. You’ll be surprised how quickly they grasp the concepts and add value to the organization.

“What you don’t see in these resolutions are items related to Intel, Mobile, or Cloud; those are simply realities we have to live with. What these resolutions represent is a mind shift and ultimately adjusting the way organizations operate,” said Mason.

“They won’t be easy, and in many cases will be considerably hard to execute on. However, a new way of thinking and conducting ourselves as Information Security Professionals is required, to have any chance of being successful and taking back control over our networks,” he concluded. – TradeArabia News Service

Recommended article: Chomsky: We Are All – Fill in the Blank.
This entry passed through the Full-Text RSS service – if this is your content and you’re reading it on someone else’s site, please read the FAQ at fivefilters.org/content-only/faq.php#publishers.

ADVERTISEMENT

ADVERTISEMENT