Building a Cyber Security Program Pt. 7

With my last article overviewing a cyber security team with structure and function, for this article I wanted to touch on baseline controls that can provide good defenses for new organizations looking for a starting point. My top few areas of starting points are: IAM (How to users and non-human identities access your technology, MFA, Least privilege access, and central management to ensure controls are in place), Logging and monitoring (centralize logging for a SIEM, know where your technology is and what it is doing, threat intel and governance), Policy (guard rails and essential for compliance, cyber insurance, and other logistical areas), Endpoint detection and response tool (anti virus on steroids and very effective for response capabilities), Disaster recovery and business continuity (are you prepared if your main systems go offline?), and encryption where it is important based on your organization (at rest, in motion and in use). These are just a few starting points and will vary based off risk appetite, regulatory requirements and more. There are foundational level controls to start with, then adding in more as maturity evolves. Cyber defense is a culture shift for an entire organization and is not just a cyber team that stops hackers. Partner, collaborate, educate, and bring in the business in all roles to understand what the vision and mission are. Show them how cyber enables a business and partner to create a cyber defense culture. Share this article if it helped you or provided value. Thank you for reading and stay tuned for more. Have a great day!

要查看或添加评论,请登录

Conan Sandberg的更多文章

  • Compliance: Enable your Business Series - How HITRUST can enable your healthcare organization to grow!

    Compliance: Enable your Business Series - How HITRUST can enable your healthcare organization to grow!

    When it comes to compliance certifications, selecting one to pursue can vary based off your target market and industry.…

  • Building a Cyber Security Program Pt. 6

    Building a Cyber Security Program Pt. 6

    For this article I'm going to overview core functions and structures within a cyber security organization. The core…

    4 条评论
  • Leadership Series Pt. 7

    Leadership Series Pt. 7

    Time is invaluable. How we spend our time is where our energy goes.

  • Lifestyle Nutrition Pt. 2

    Lifestyle Nutrition Pt. 2

    What are calories? What makes up calories? Why are they important? For this article I wanted to break down calories…

  • Building a Cyber Security Program Pt. 5

    Building a Cyber Security Program Pt. 5

    The most important part of a cyber security program is the people. With my first part in the series covering culture;…

  • Building a Cyber Security Program Pt.4

    Building a Cyber Security Program Pt.4

    Building off my last article on Building a Cyber Security Program, for this article I am going to hit on ways that have…

  • Building a Cyber Security Program Pt. 3

    Building a Cyber Security Program Pt. 3

    For this article I wanted to dive into some core areas to cover when it comes to "cyber defenses". Some of the core…

  • Leadership Series Pt. 6

    Leadership Series Pt. 6

    This next article in my leadership series, the focus area is going to be standards. Standards connect to some of the…

  • Lifestyle Nutrition - Pt. 1

    Lifestyle Nutrition - Pt. 1

    Health is a huge aspect of our lives with a lot of information out there, experiences tried and frustrations along the…

    2 条评论
  • Building a Cyber Security Program Pt. 2

    Building a Cyber Security Program Pt. 2

    With the first part of this article series based around the culture and people aspect, next I wanted to tackle another…