How to mature your cybersecurity programme - TechCentral

How to mature your cybersecurity programme

Security leaders have long wanted to tackle their most pervasive issues. These include exponential growth of the attack surface and cyber risks as well as diminishing control of a rapidly changing technology landscape — all against the backdrop of a severe talent shortage.

Skybox’s new report, Vulnerability and threat trends 2021: Cybersecurity comes of age, demonstrates that there is a need for greater maturity. It brings focus to just how energised threat actors have become over the pandemic: Extraordinarily, new malware samples almost doubled over 2020. It highlights how operational technology (OT) environments are increasingly exposed to attack: The number of vulnerabilities within industrial Internet of things (IIoT) devices increased by 308% over the last year. And it reinforces the scale of the task now facing teams dealing with cyber-risk management: There were 18 341 new vulnerabilities over 2020, adding to the exposure from prior years’ discoveries.

What has become clear over the last year is that what was once considered “good enough” will no longer suffice. Long-held practices relying primarily on detection and response don’t hold water anymore — if we are honest with ourselves, they were never “good enough”.

Managing security posture has become a critical necessity for reducing the risk of cyberattacks. By improving security posture, it’s possible to eliminate the exploitation of known attack vectors. Further, by focusing on a much smaller attack surface, detection and response programmes can shine again.

But security posture management is not an easy task. Organisations have a complex security stack and use many technologies. As a result, they are discovering that their muscle to manage security posture is, at best, underdeveloped. They need to adopt a transformation mindset. To achieve this, organizations need to mature their security programmes:

Gidi Cohen

Develop a roadmap to maturity

Developing a well-rounded and resilient cybersecurity programme isn’t something that can happen overnight. It’s a journey that demands iterative change. The first step of this journey is understanding your organisation’s current maturity level. It could be that you are addressing security on an ad hoc basis, or you may have defined security processes, or you may be at a stage where you can manage your programme and are able to drive strategic change. By understanding what the next level of maturity looks like, you can develop a road map that will improve your security posture.

Ad hoc

This stage represents the most remedial cybersecurity programmes. These can be found in organisations that don’t have consistent processes or policies. An “ad hoc” programme is one without systems or tools in place. As a result, there are functional and technological silos; the programme is reactive and piecemeal; blind decisions are made that are based on a patchwork of data inputs; and remediation and patching are typically news-driven and happen sporadically.

Developing

One step above ad hoc security, this stage is where you will find organisations that have an active cybersecurity programme but lack defined processes. For example, they may have a vulnerability scanner but they aren’t using it systematically. Security is something that’s dealt with inconsistently, with periodic clean-ups of rules and objects, hardening of configurations, and patching to eliminate vulnerabilities. Additionally, compliance is handled with manual checking and recertification.

Defined

Some organisations are at the stage where they have a defined programme. They know who is responsible for each task and are clear about processes. However, they still don’t know what’s happening every day. They may have policies in place, but they don’t have any ongoing tools to manage them properly. And they may have a defined vulnerability management programme, but they cannot automate remediation and have inconsistent oversight of operational performance and risk level.

Managed

Organisations with well-established and mature cybersecurity programmes sit here. They have dashboards that enable them to manage their programme, they can see whether they’re making improvements, and they have insight that enables them to make strategic changes to their programmes. And they will be automating change management as well as the discovery, prioritisation and remediation of vulnerabilities.

Optimising

Very few organizations are currently at this stage – in many ways, this is an aspiration for most organisations. But getting to the stage where you can focus on optimising processes and delivering ongoing, continuous improvement for the organisation is achievable. This is when organisations have holistic visibility of the attack surface and can visualise, analyse, and narrow it down on an ongoing basis. They have tight integration with the security and IT management ecosystem. They have a common platform and data sets for all teams dealing with security posture management and incident response. And they can leverage context of their environment to zero in on what matters and remediate their most exposed vulnerabilities first.

Zero in on what matters

By maturing cybersecurity programmes beyond traditional defence tactics, the chief information security officer will be able to gain the insight needed to improve security posture. By understanding the context of the infrastructure and its security controls — on-prem, private cloud and public cloud, and achieving full visibility of their attack surface, they will be able to better quantify cyber risks, prioritise remediation and zero in on what matters.

Skybox’s new report highlights the biggest challenges facing CISOs and their teams today. But it also explains why this is a pivotal moment for cybersecurity. We are at the beginning of an exciting new era. This is the moment when cybersecurity comes of age to help security teams zero in on what matters and overcome some of their largest and most enduring challenges.

Read the report now

Additional resources

  • Vulnerability and threat trends 2021: Cybersecurity comes of age
  • E-book: Risk-based vulnerability management

About Gidi Cohen
Gidi Cohen co-founded Skybox in 2002 and has guided the company’s vision and development as the leader in cybersecurity analytics. A respected innovator in the security analytics space, he is a popular speaker at industry conferences worldwide, demonstrating how sophisticated analytics, modelling and simulation, as well as unprecedented network visibility, are used to reduce an enterprise’s attack surface. For more than 10 years he has been committed to empowering security leaders to quickly and accurately prioritise and address vulnerabilities and threats with cutting-edge Skybox solutions.

About Skybox Security
Over 500 of the largest and most security-conscious enterprises in the world rely on Skybox for the insights and assurance required to stay ahead of dynamically changing attack surfaces. Our Security Posture Management Platform delivers complete visibility, analytics and automation to quickly map, prioritise and remediate vulnerabilities across your organisation. The vendor-agnostic solution intelligently optimises security policies, actions and change processes across all corporate networks and cloud environments. With Skybox, security teams can now focus on the most strategic business initiatives while ensuring enterprises remain protected. Visit www.skyboxsecurity.com for more information.

  • Check out all the recent Skybox Security content on hub.techcentral.co.za/skybox
  • This promoted content was paid for by the party concerned

Comments are closed.

© 2009 – 2021 NewsCentral Media