• Skip to content
  • Skip to primary sidebar
  • Skip to footer
  • Gaming
  • Computing
  • Internet
  • Phone and communications
  • Software
  • Mobile computing

The source for tech buying advice

The latest technology news and reviews, covering computing, home entertainment systems, gadgets and more.

What security concerns should your CIO be worried about?

April 24, 2018 By discountbonus_sd3n3h


Today’s modern CIOs face a set of expectations, opportunities, and challenges that have grown tremendously over the last decade. This fundamentally revolves around one question “How can IT provide value for the business?” 

In conjunction with emerging technologies are the challenges of managing people, process and compliance. Wrapped around all of this is the concept of security. What “security” means for an organisation has changed dramatically over the last several years.

  • Check out our list of the best internet security suites 2018

Historically, security was viewed as an operational task. Companies had a firewall, anti-virus software, and maybe an IPS (Intrusion Prevention System). Things have changed tremendously since then. The role of the CSO (Chief Security Officer) or CISO (Chief Information Security Officer) has been created specifically to tackle these challenges. This role was responsible for protecting the organisation from the ever-increasing cyber threats and/or data breaches.

In addition to the many other responsibilities of CIOs, they also need to be part CSO. In the same way the CIO is responsible for their budget to the CFO, they must also learn and embrace mature security postures. While the CSO and security team are the experts in emerging threats, CIOs must now structure a general degree of awareness and competence across the organisation.

The threats businesses face today are unique in that they are fluid and ever-changing. Every week there is a new story of a data breach or compromise, and we know what is publicly disclosed is just the tip of the iceberg.

Every business vertical has data that would be financially damaging if made public. Whether this is intellectual property for chemical manufacturing, to patient person information in healthcare, to client financial information in banking, to stolen credit card information in retail, security has become a board room conversation because of how it impacts the bottom line.

Enforcing the basics

Modern CIOs have an important role in ensuring the private business data remains private. This happens in conjunction with the CSO/CISO and audit/compliance. Too many of today’s compromises happen opportunistically because basics are not enforced.

  • Ensure systems are patched in a timely manner. Too much malware exists for known and patched exploits.
  • Proper identity management, no shared accounts, use good passwords.
  • Ensure firewalls are truly least privilege. Don’t have Windows systems with RDP open from the Internet and lock down outgoing connections.
  • Encrypt all endpoints, its free, use it. Too many data breaches have come from lost hard drives or devices.

While these seem like fundamentals, they can go a long way towards improving your organisation’s security posture.

The next level is generally driven more from the security team’s guidance, but requires a significant amount of operational support and integration. This is where things get much more interesting strictly from a technologist perspective.

  • How do we deploy IPS (Intrusion Prevention System), WAF (Web Application Firewall), and other layer 7 type security in a way that is effective?
  • How do I do this in a world where most traffic is encrypted?
  • How do we put in place a SIEM (Security Information and Event Management) solution that will aggregate logs from every point of technology and be able to run real time threat intelligence and machine learning on this data?
  • How do I enable two-factor authentications on every piece of my environment?
  • I must assume that I am either already breached, or will be in the future. How do I lower my mean time to detection of a breach?
  • If a malware was sending out stolen data hidden in DNS queries, would I know?

The challenge is two-fold. First, while technology exists to solve all the problems above, it also comes with a significant price tag. Second, if you have the resources to procure this technology, the operational human time to both deploy and manage all this technology can be overwhelming.

Today’s modern CIO have a plethora of new challenges to face around security, while still advancing business capabilities to generate revenue. Modern agile development cycles in conjunction with best of breed security. CIOs can make a big impact driving and enforcing security basics around patching, good firewall management, and training. 

Today’s security expectations require a strong relationship between CSOs and CIOs. In many cases, a professional service provider adds a significant amount of value in an organisation’s ability to deploy and get value from new technology that is continuously developed and released.

In summary, focus on the basics and do not be afraid to leverage experts for utilising emerging technologies.

Sean Donaldson is CTO at Secure-24. He has a strong technological background from over 15 years of developing world-class infrastructure solutions and critical application management. 

  • Check out our list of the best antivirus software of 2018



Source link

Filed Under: Computing

Disclaimer: All the links on this page are ‘affiliate links’. This means we will earn commission from every customer we refer from this website. Our reviews are honest, we wouldn’t waste your time or put our reputation on the line by recommending anything we didn’t fully believe in.

Primary Sidebar

Disclaimer: All the links on this page are ‘affiliate links’. This means we will earn commission from every customer we refer from this website. Our reviews are honest, we wouldn’t waste your time or put our reputation on the line by recommending anything we didn’t fully believe in.

Recent Posts

IBM abandons all facial recognition work over potential for misuse

IBM abandons all facial recognition work over potential for misuse

In a letter delivered to the United States Congress, IBM CEO Arvind Krishna has … [Read More...] about IBM abandons all facial recognition work over potential for misuse

  • The next BioShock is going open-world
  • Telstra flash sale knocks AU$150 off the iPhone 12 and 12 mini
  • Samsung's next-gen Odyssey G9 might just be the best HDR monitor yet

Follow Us Online

  • Facebook
  • Google+
  • LinkedIn
  • Pinterest
  • Twitter

Footer

Menus

  • Contact
  • Terms of Service
  • Privacy Policy

Most Posts

  • Oculus announces its first VR gaming showcase
  • Gaming
  • Computing
  • Internet
  • Phone and communications
  • Software
  • Mobile computing

Newsletter

Copyright © 2021 · WordPress · Log in