How CISOs approach technologies and hiring decisions will go a long way in determining how their security posture evolves this year and beyond. There’s an important balance to strike between the two, and you can’t determine the right mix without taking a step back to understand the business itself.
Many security teams are still playing catch up on the risks introduced by technologies that were rapidly implemented and poorly vetted during the pandemic, while also being forced to stretch resources to counter increasingly frequent sophisticated attacks. As we edge closer to the reality of hybrid work, it’s critical that security teams begin rigorously preparing.
How do we protect against this changing enterprise application landscape? Organizations across the world need to lead the adoption of Zero Trust Architecture (ZTA) for cybersecurity as their first principle of implementation.
Hackers are entrepreneurs. After legitimate developers built software-as-a-service (SaaS) businesses by renting access to productivity software, cybercriminals seeking new revenue streams created malware-as-a-service (MaaS) as a dangerous alternative.
Eric Biernat, Corporate Security Manager West Bend Mutual Insurance, has always employed intercom solutions as part of his security strategy, including video surveillance, access control solutions and more. Last year, before the COVID-19 pandemic reached U.S. borders, he decided to replace his intercom solution with intelligent communication systems.
By staying on top of open source trends, scanning frequently and working with security counterparts to get the information needed, developers can fix more third-party library flaws faster to develop more secure applications in the future.
Overcome human nature with a security mindset that uses what humans are best at: complex reasoning. Remember to trust your human nature – the intuition that you need to double-check “locking the doors” or other security steps.
A CISOs first 90 days on the job provide a window of opportunity for establishing their credibility and earning a vote of confidence from leadership. This requires, among other things, thoroughly assessing a corporation’s organization, technology, governance and the processes it embraces.