DARKReading: Beyond Patch Management: Next-Generation Approaches to Finding and Fixing Vulnerable Code (Dec. 7th)
IT - Security

Benefits and ROI of IT Security Compliance
Security Boulevard, November 15th, 2021
IT and regulatory compliance is necessary to ensure your organization meets the standards for data privacy and security that apply to your industry, location, and business functions

"But how do you measure the return on investment (ROI) of your compliance program?

Executives may view compliance as a cost center and only want to invest in solutions that reach the bare minimum requirements. This perception can lead to a lack of support and funding to grow and maintain a healthy security program that yields higher results. If this point hits close to home, you're certainly not alone. Many cybersecurity professionals have trouble quantifying or telling a story around how their compliance operations enable the business and saves money in the long run..."


Analysts Explore How Security Leaders Can Increase Their Executive Impact at the Gartner Security & Risk Management

To respond to an ever-changing threat landscape and increase impact among executive leadership, security and risk leaders should take a three-step approach to shift from a defensive to an offensive leadership position, according to Gartner, Inc.

'This is a time of extraordinarily high visibility for security leadership,' said Tina Nunno, distinguished research vice president and Gartner Fellow. 'By embracing an offensive mindset, security leaders have an opportunity to permanently shift their role from a service provider to a coach who provides critical strategy and guidance to support business value creation.'


"Treating cybersecurity as a business function was a recurring theme throughout Gartner's Security and Risk Management Summit this week. Security leaders focusing on innovation, forward-looking strategy, and the role of security in supporting digital transformation efforts will be viewed as critical business partners supporting business value creation, said Tina Nunno, distinguished research vice president and Gartner Fellow. As security leaders establish closer working relationships with stakeholders across the enterprise, including executive leaders as well as line-of-business leaders, they will be viewed as partners and not treated as service providers within the organization..."

Even with the most sophisticated email scanning and phishing detection system available, phishing emails are still a very common intrusion vector for cybercriminals to use to introduce malware, including ransomware, to a business' network. That's because 1) increasingly, legitimate systems are used; and 2) phishing emails can also be effective even when employees are highly educated and are good at spotting and reporting them.

Fortunately, there are tactics to protect your network even when the emails can't be stopped outright.


Infosec expert Tarah Wheeler said increasing international conflicts are posing new compliance and regulatory standards, but adapting the changes may be difficult for enterprises

As enterprises become increasingly entangled in nation-state conflicts, they need to bolster defenses as well as navigate the growing number of international rules and regulations.

Tarah Wheeler, infosec expert and fellow at government think tank New America, discussed the future of cyberwar and how companies can defend themselves in the expansive threat landscape during her keynote at the Gartner Security and Risk Management Summit on Thursday. While examining the "global system of interactivity," Wheeler proposed several questions, such as: Where do the international rules for cyberconflicts come from, and how can enterprises contribute?


How Will We Stop Security Breaches?
Business 2 Community, November 17th, 2021
Despite being around since the 1980s, security, or data, breaches have become increasingly more common at an alarming rate.

'We are seeing a shift with the increase in data breaches in 2021 compared to 2020, primarily because of the growing number of phishing attacks, ransomware attacks and supply chain attacks,' said Eva Velasquez, president and CEO of the Identity Theft Resource Center. 'While it is discouraging to see the number of compromises up, it is encouraging that we could see the fewest number of people impacted in seven years. Criminals continue to exploit organizations of all sizes through single points-of-attack, making good cyber-hygiene practices more important than ever.'

SASE has emerged as an effective way to address the shifting enterprise network perimeter by merging network and security services in one

"It's no surprise, but the security threat landscape is rapidly becoming more sophisticated, as evidenced by the Colonial Pipeline, Kaseya, and SolarWinds attacks earlier this year. Considering the pace of digital transformation in today's business, a single cyberattack can bring a company's operations to a standstill. In June, FBI Christopher Wray commented that the cyber threat is increasing 'almost exponentially' and the FBI was looking into more than 100 different ransomware variants, a three-fold increase from the previous year..."

Theresa Payton's Cybersecurity Tips And Predictions
Security Boulevard, November 20th, 2021
The repercussions and liability of cybercrime continuously threaten organizations

"With so much at stake, business leaders and security professionals must initiate meaningful change to overcome present-day challenges in the cybersecurity industry. A recent study by Stanford University has shown that at least 88 percent of breaches in the past 12-24 months were a result of human error. With this statistic in mind, former White House CIO Theresa Payton highlights the ways organizations can strengthen their cybersecurity strategy and tactics by 'designing for the human.'..."

When Cybersecurity Becomes Terrifying
HelpNet Security, November 15th, 2021
Some cybersecurity horror stories are not your typical horror stories: there's no danger from a chainsaw-wielding maniac hiding behind a server rack, the Candyman won't appear if you say his name three times while staring at your 4K monitor, and it's not like a vampire or werewolf can bite into a firewall.

Instead, the cybersecurity horror stories recounted here are tales that result in. (dramatic pause) .bad customer experiences.

The names of the actors have been removed to protect the innocent, but the horror. yes, the horror was very real. Fortunately, these tales serve as a learning experience for the rest of us.


Implementing Best Practices For Data Loss Prevention
IT Business Edge, November 19th, 2021
Every organization, regardless of size or industry, needs a data loss prevention (DLP) plan.

This includes all of the strategic tools and processes that will help a business avoid having their data lost, mishandled, or accessed by someone who shouldn't have access.

Whether your goal is to protect customer data, intellectual property, or corporate data, your DLP policy should be crafted and implemented with great care. Failure to do so could result in catastrophe.


Top Challenges To Managing Insider Threats
Security Boulevard, November 16th, 2021
In a recent blog post, we shared some insightful highlights from a panel discussion we had the opportunity to moderate at the SANS Institute Insider Risk Solutions Forum in September

During this conversation, top security executives from Gilead Sciences, Eaton Corporation, and NBN Australia shared their expert knowledge around insider risk management solutions.

Our previous post touched on some of the ways organizations can determine what to protect and who to protect it from. In today's post, we're going to explore the biggest challenges to managing insider risk-let's dive into the good stuff.


Security leaders can be treated as partners supporting the business and share accountability by establishing relationships with business stakeholders

"Treating cybersecurity as a business function was a recurring theme throughout Gartner's Security and Risk Management Summit this week.

Security leaders focusing on innovation, forward-looking strategy, and the role of security in supporting digital transformation efforts will be viewed as critical business partners supporting business value creation, said Tina Nunno, distinguished research vice president and Gartner Fellow. As security leaders establish closer working relationships with stakeholders across the enterprise, including executive leaders as well as line-of-business leaders, they will be viewed as partners and not treated as service providers within the organization..."


Termination Gap: A Major Insider Threat
Security Boulevard, November 18th, 2021
The termination gap can cause all kinds of trouble

That length of time between an employee leaving their role and their user access being de-provisioned is when dangerous activities can occur - including a malicious breach by that internal user - and the truth is organizations aren't worrying enough about it.

What is the termination gap?

The termination gap is exactly what it sounds like: an insider threat caused by the gap of time between an employee's termination (or a change in their job role and function), and a de-provisioning of their role-based access credentials to critical access points and assets. According to the Ponemon Institute 2020 Cost of Insider Threats: Global Study, there were 4,716 insider incidents recorded across the globe. In addition, criminal insiders made up 14% of insider breaches last year with a price tag of over $4 million-this caused by improper user access provisioning.

See all Archived IT - Security articles See all articles from this issue