5 Best Practices to Align with Your Next-Gen Security Strategy

5 Best Practices to Align with Your Next-Gen Security Strategy

With the explosion of new technologies and IT solutions of all kinds, it’s sometimes hard to see the wood for the trees. Nevertheless, every organization must make sure that its next generation security strategy is underpinned by relevant principles and not just a laundry list of tactics and actions.

  1. Think About Risk, Not Just Expense

Time, effort and money are what you have to spend to protect your IT. Yet it would be shortsighted to calculate such expenses for security simply as fixed amounts. Even though security surveys and benchmark figures offer interesting industry comparisons, what really counts in the equation is your risk. An IT security breach could mean the loss of data, loss of a good reputation, loss of compliance and at its worst, put organizations, employees and citizens at risk. All these threats should be evaluated in terms of probability and business impact, showing you where to spend the most first (on high probability/high impact risks).

  1. Process, Process and Process

You know the saying that the three most important things in real estate are location, location and location? In IT security, you might say that they are process, process and process. Sound processes to implement security are often more effective than technology. Suppose your IT department develops its own code or business applications. The wrong process is to develop and deploy the app, then tell the security team afterward. The right process is to bring the security team in at the start, then develop and deploy the app. In your enthusiasm to use DevOps, a microservices architecture, or the latest role-based access technology, remember to use robust processes that also ensure security is considered and implemented in a timely way.

  1. Automation

Whether you already use automation or not, you’re likely to need even more of it with your next generation security strategy. There’s simply too much to check to leave it in the hands of human beings, however capable. If your process (see above) is sound, your automation should then make a good thing even better. Some tasks and activities are better candidates than others for automation. Criteria for automating include the value you derive and the ease of automating. However, don’t automate to the complete exclusion of human intervention either. IT security staff working together with IT security applications and automation is still the best combination.

  1. User Information Security Awareness

Your next generation security strategy will have to admit what many CIOs would rather not –that some users are now doing their own IT and bypassing the IT department completely. Can you blame users? With a credit card, they can buy cloud services today, stop them tomorrow and avoid waiting weeks or months for internal IT teams to deliver. This “shadow IT” will be further accentuated in the future. So, give every user proper information security training. That way, your overall IT security has a better chance of functioning effectively.

  1. Keep Using What You Have Today, as Well

Conventional firewalls, intrusion prevention/detection systems and antivirus software may no longer be able to handle all the new threats, but they still represent considerable security value. Most attacks perpetrated today are still ones that these tools can effectively block. For the foreseeable future, they are still likely to be needed by most organizations, even those that are “born on the web.” They then need to be augmented by new technologies and tools capable of handling the additional, new threats.

And Now?

Now it’s time to put that next generation security strategy into action. And as you do so, keep these five best practices in mind to help you and your enterprise fend off the wolves while you wend your way through the wood.


要查看或添加评论,请登录

Michael Biddick的更多文章

  • CONTINUING IOT UNDERCURRENTS

    CONTINUING IOT UNDERCURRENTS

    IT departments would be well advised to stay in touch with IoT news across industry domains. IoT technologies often…

    1 条评论
  • FITARA – Encouraging Agility & Cost Management in Federal IT Acquisitions

    FITARA – Encouraging Agility & Cost Management in Federal IT Acquisitions

    Statistics show the Federal Government continues to spend more than $80 billion each year on general purpose…

    2 条评论
  • Next-Gen Security Strategy: Federal CIO Focus for 2017 and Beyond

    Next-Gen Security Strategy: Federal CIO Focus for 2017 and Beyond

    Hackers and IT security vendors have never had it so good. High-profile data breaches such as those of Anthem and…

  • CMDB Tools & Strategies

    CMDB Tools & Strategies

    Over the last decade, vendors of configuration management database (CMDB) solutions have come, gone, morphed and…

    2 条评论
  • Why Cloud Demands Devops

    Why Cloud Demands Devops

    For some, the words “software development" evoke fear, loathing and flashbacks to failed or costly (or both) projects…

    1 条评论
  • Cloud Wars - AWS and Azure

    Cloud Wars - AWS and Azure

    Earlier this year, Synergy Research Group reported that across six key cloud services and infrastructure market…

    2 条评论
  • 5 Activities to Build a Culture of Innovation

    5 Activities to Build a Culture of Innovation

    According to Merriam-Webster, innovation means the introduction of something new or a new idea, method or device. In…

    3 条评论
  • A Three-Phased Approach for Application Migration to the AWS Cloud

    A Three-Phased Approach for Application Migration to the AWS Cloud

    As more federal CIOs push their organizations into the cloud, many IT and business managers still struggle with the…

    1 条评论
  • Fusion PPT @ the CGI Winter Meeting

    Fusion PPT @ the CGI Winter Meeting

    Last Thursday, Fusion PPT had the opportunity to participate in the 2016 Clinton Global Initiative (CGI) Winter…

    2 条评论
  • Cloud Computing in a World without Connectivity

    Cloud Computing in a World without Connectivity

    The potential of cloud computing applications to significantly reduce costs and place more power in the hands of the…

社区洞察

其他会员也浏览了