Ausnahme gefangen: SSL certificate problem: certificate is not yet valid ๐Ÿ“Œ Whatโ€™s Missing in Most CISOโ€™s Security Risk Management Strategies

๐Ÿ  Team IT Security News

TSecurity.de ist eine Online-Plattform, die sich auf die Bereitstellung von Informationen,alle 15 Minuten neuste Nachrichten, Bildungsressourcen und Dienstleistungen rund um das Thema IT-Sicherheit spezialisiert hat.
Ob es sich um aktuelle Nachrichten, Fachartikel, Blogbeitrรคge, Webinare, Tutorials, oder Tipps & Tricks handelt, TSecurity.de bietet seinen Nutzern einen umfassenden รœberblick รผber die wichtigsten Aspekte der IT-Sicherheit in einer sich stรคndig verรคndernden digitalen Welt.

16.12.2023 - TIP: Wer den Cookie Consent Banner akzeptiert, kann z.B. von Englisch nach Deutsch รผbersetzen, erst Englisch auswรคhlen dann wieder Deutsch!

Google Android Playstore Download Button fรผr Team IT Security



๐Ÿ“š Whatโ€™s Missing in Most CISOโ€™s Security Risk Management Strategies


๐Ÿ’ก Newskategorie: IT Security Nachrichten
๐Ÿ”— Quelle: cio.com

By Dr. May Wang, CTO of IoT Security at Palo Alto Networks and the Co-founder, Chief Technology Officer (CTO), and board member of Zingbox

At the foundation of cybersecurity is the need to understand your risks and how to minimize them. Individuals and organizations often think about risk in terms of what theyโ€™re trying to protect. When talking about risk in the IT world, we mainly talk about data, with terms like data privacy, data leakage and data loss. But there is more to cybersecurity risk than just protecting data. So, what should our security risk management strategies consider? Protecting data and blocking known vulnerabilities are good tactics for cybersecurity, but those activities are not the only components of what CISOs should be considering and doing. Whatโ€™s often missing is a comprehensive approach to risk management and a strategy that considers more than just data.

The modern IT enterprise certainly consumes and generates data, but it also has myriad devices, including IoT devices, which are often not under the direct supervision or control of central IT operations. While data loss is a risk, so too are service interruptions, especially as IoT and OT devices continue to play critical roles across society. For a healthcare operation for example, a failure of a medical device could lead to life or death consequences.

Challenges of Security Risk Management

Attacks are changing all the time, and device configurations can often be in flux. Just like IT itself is always in motion, itโ€™s important to emphasize that risk management is not static.

In fact, risk management is a very dynamic thing, so thinking about risk as a point-in-time exercise is missing the mark. There is a need to consider multiple dimensions of the IT and IoT landscape when evaluating risk. There are different users, applications, deployment locations and usage patterns that organizations need to manage risk for, and those things can and will change often and regularly.

There are a number of challenges with security risk management, not the least of which is sheer size and complexity of the IT and IoT estate. CISOs today can easily be overwhelmed by information and by data, coming from an increasing volume of devices. Alongside the volume is a large variety of different types of devices, each with its own particular attack surface. Awareness of all IT and IoT assets and the particular risk each one can represent is not an easy thing for a human to accurately document. The complexity of managing a diverse array of policies, devices and access controls across a distributed enterprise, in an approach that minimizes risk, is not a trivial task.

A Better Strategy to Manage Security Risks

Security risk management is not a single task, or a single tool. Itโ€™s a strategy that involves several key components that can help CISOs to eliminate gaps and better set the groundwork for positive outcomes.

Establishing visibility. To eliminate gaps, organizations need to first know what they have. IT and IoT asset management isnโ€™t just about knowing what managed devices are present, but also knowing unmanaged IoT devices and understanding what operating systems and application versions are present at all times.

Ensuring continuous monitoring. Risk is not static, and monitoring shouldnโ€™t be either. Continuous monitoring of all the changes, including who is accessing the network, where devices are connecting and what applications are doing, is critical to managing risk.

Focusing on network segmentation. Reducing risk in the event of a potential security incident can often be achieved by reducing the โ€œblast radiusโ€ of a threat. With network segmentation, where different services and devices only run on specific segments of a network, the attack surface can be minimized and we can avoid unseen and unmanaged IoT devices as springboards for attacks for other areas of the network. So, instead of an exploit in one system impacting an entire organization, the impact can be limited to just the network segment that was attacked.

Prioritizing threat prevention. Threat prevention technologies such as endpoint and network protection are also foundational components of an effective security risk management strategy. Equally important for threat prevention is having the right policy configuration and least-privileged access in place on endpoints including IoT devices and network protection technologies to prevent potential attacks from happening.

Executing the strategic components above at scale can be optimally achieved with machine learning and automation. With the growing volume of data, network traffic and devices, itโ€™s just not possible for any one human, or even group of humans to keep up. By making use of machine learning-based automation, itโ€™s possible to rapidly identify all IT, IoT, OT and BYOD devices to improve visibility, correlate activity in continuous monitoring, recommend the right policies for least-privileged access, suggest optimized configuration for network segmentation and add an additional layer of security with proactive threat prevention.

About Dr. May Wang:

Dr. May Wang is the CTO of IoT Security at Palo Alto Networks and the Co-founder, Chief Technology Officer (CTO), and board member of Zingbox, which was acquired by Palo Alto Networks in 2019 for its security solutions to Internet of Things (IoT).

IT Leadership, Security
...



๐Ÿ“Œ Whatโ€™s Missing in Most CISOโ€™s Security Risk Management Strategies


๐Ÿ“ˆ 54.03 Punkte

๐Ÿ“Œ CISO MindMap 2022, Top CISO Strategies, & The Missing Link in Cybersecurity - BSW #263


๐Ÿ“ˆ 44.7 Punkte

๐Ÿ“Œ Cyber Risk = Business Risk. Time for the Business-Aligned CISO


๐Ÿ“ˆ 26.25 Punkte

๐Ÿ“Œ The CISO Report: Emerging Trends, Threats, and Strategies for Security Leaders


๐Ÿ“ˆ 25.63 Punkte

๐Ÿ“Œ Chief Security Information Officer (CISO): Der CISO - Aufklรคrer, Polizist und Bergfรผhrer in Personalunion


๐Ÿ“ˆ 24.69 Punkte

๐Ÿ“Œ Chief Security Information Officer (CISO): Der CISO - Aufklรคrer, Polizist und Bergfรผhrer in Personalunion


๐Ÿ“ˆ 24.69 Punkte

๐Ÿ“Œ CISO Conversations: Intel, Cisco Security Chiefs Discuss the Making of a Great CISO


๐Ÿ“ˆ 24.69 Punkte

๐Ÿ“Œ Cyber Risk Management Strategies from Arjo CIO


๐Ÿ“ˆ 23.95 Punkte

๐Ÿ“Œ Cyber risk management: Attribution strategies


๐Ÿ“ˆ 23.95 Punkte

๐Ÿ“Œ Understanding and Applying Risk Management Strategies for CMMC Certification


๐Ÿ“ˆ 23.95 Punkte

๐Ÿ“Œ Release Management Risk Mitigation Strategies in Data Warehouse Deployments


๐Ÿ“ˆ 23.95 Punkte

๐Ÿ“Œ Data-driven Strategies for Effective Application Risk Management in 2024


๐Ÿ“ˆ 23.95 Punkte

๐Ÿ“Œ Webinar Today: CISO Strategies for Boardroom Success


๐Ÿ“ˆ 23.71 Punkte

๐Ÿ“Œ Supply Chain Risk Management and Third-Party Risk Management: Whatโ€™s the Difference?


๐Ÿ“ˆ 23.25 Punkte

๐Ÿ“Œ Third-Party Risk Management vs Vendor Risk Management | UpGuard


๐Ÿ“ˆ 23.25 Punkte

๐Ÿ“Œ CISOโ€™s guide to automating third-party cyber risk management


๐Ÿ“ˆ 23.01 Punkte

๐Ÿ“Œ CISO Interview: Role of the CISO, Why Do You Need a vCISO? - Carlos Becerra - BSW #186


๐Ÿ“ˆ 22.77 Punkte

๐Ÿ“Œ CISO Reporting Structure, 5 CISO Traps, and Communicating Cybersecurity Best Practice - BSW #293


๐Ÿ“ˆ 22.77 Punkte

๐Ÿ“Œ Liability Fears Damaging CISO Role, Says Former Uber CISO


๐Ÿ“ˆ 22.77 Punkte

๐Ÿ“Œ CISO Interview Series: The challenges of being the CISO for the University of Oxford.


๐Ÿ“ˆ 22.77 Punkte

๐Ÿ“Œ CISO Interview Series: The thinking of a CISO at the front end of the cyber threat landscape.


๐Ÿ“ˆ 22.77 Punkte

๐Ÿ“Œ Do You Need a CISO, & Employee Contract May Keep CISO Out of Jail - BSW #307


๐Ÿ“ˆ 22.77 Punkte

๐Ÿ“Œ Top 3 CISO Priorities #infosecnews #podcast #CISO #podcastclips #infosec


๐Ÿ“ˆ 22.77 Punkte

๐Ÿ“Œ CISO Soul Searching: Navigating the Evolving Role of the CISO - Harold Rivas - BSW #344


๐Ÿ“ˆ 22.77 Punkte

๐Ÿ“Œ Risk Mitigation Strategies to Close the XIoT Security Gap


๐Ÿ“ˆ 21.67 Punkte

๐Ÿ“Œ Security Strategies: Generational Risk in a Connected Era


๐Ÿ“ˆ 21.67 Punkte

๐Ÿ“Œ A Risk-Driven Approach to Security, From Check Boxes to Risk Management Frameworks


๐Ÿ“ˆ 20.98 Punkte

๐Ÿ“Œ A Risk-Driven Approach to Security, From Check Boxes to Risk Management Frameworks


๐Ÿ“ˆ 20.98 Punkte

๐Ÿ“Œ Reciprocity ZenGRC Risk Management helps manage risk posture and increase overall security


๐Ÿ“ˆ 20.98 Punkte

๐Ÿ“Œ SEC Charges SolarWinds, CISO with Fraud over Security Risk Disclosures


๐Ÿ“ˆ 20.74 Punkte

๐Ÿ“Œ Webinar Tomorrow: OT Cybersecurity Risk Mitigation Strategies


๐Ÿ“ˆ 19.76 Punkte

๐Ÿ“Œ Risk Strategies and CyberCube deliver Broking Manager, a cyber risks analytics platform


๐Ÿ“ˆ 19.76 Punkte











matomo