A Layered Approach to Cybersecurity: People, Processes, and Technology- Explored & Explained.

A Layered Approach to Cybersecurity: People, Processes, and Technology- Explored & Explained.

Security threats are constantly evolving and organisation security measures need to be adjusted accordingly. In this increasingly complex and chaotic environment, it is necessary to build a stronger framework for cyber defence . Organizations adopting best practices are focus on three key elements: People, Processes, and Technology.

In this Article, We will discuss about?A Layered Approach to Cybersecurity: People, Processes, and Technology and “How to achieve 360° Cybersecurity Approach by covering these three domains i.e. people, processes and technology” Finally, how the right approach to cybersecurity can accelerate organization transformation.

PEOPLE -

No alt text provided for this image

Now a days, cyber attackers use highly sophisticated methods of targeting front-line employees and even CEOs. That is why most of security breaches are blamed on human error, proving people to be the weakest link in cybersecurity. However with right processes & training programs they can be turn into HUMAN FIREWALL which will Immensely help us in tackling cyber security threats. " Also don’t forget, you can buy the best technology but if you implement it badly, or can’t manage it effectively, it’s useless. So we should understand that people are very critical pillar in any organization.?Everyone in the business needs to be aware of their role in preventing and reducing cyber threats, Cyber security is a business issue and everyone has a role to play. I have mentioned below some important points with regards to people when it's come to cybersecurity :

  • Cyber savvy board of directors.
  • Cybersecurity officer with team having sound technical knowledge of risk management, compliance, incident response, IAM specialist, security monitoring and analyst, vulnerability?and patch management, Security Architecture, audit.
  • ?Data protection /security officer.
  • People skill management program & Process to identify cybersecurity knowledge
  • Cybersecurity operation embedded program for employees.
  • Cybersecurity awareness & training for employees.
  • Strategy on whether outsourcing of security professional or developing in house expertise, Also dependency on vendor till what extend, Need to define ??
  • ?IT /Security People should be business enabler, It has been seen people unable to perform business function due to tight security control ?

Remarks-

  • User compliance to security policies & best practices backed by organisation vision, security culture and commitment of top management.Consistency, uniform policy enforcement to all employees without being partial to seniors in hierarchy.
  • Swift corrective action against policy violators, punishment commensurate with gravity of violations.
  • Peer behaviour, positive reinforcement of good security behaviours with rewards, influence compliant security behaviours by staff.

“People are the greatest risk but with the right processes, they don’t have to be”

PROCESS -

No alt text provided for this image

Processes are key to the implementation of an effective cyber security strategy. this should be defined, repeatable, and improvable steps you document and train on to perform a function. This pillar of cybersecurity ensures that their cybersecurity have strategies in place to proactively prevent and to respond quickly and effectively in the event of a cybersecurity incident. there are many processes & programs in cybersecurity, I have mentioned below some important point with regard to process-

  • Cybersecurity strategy planning.
  • Information security management program.
  • Cybersecurity posture assessment & gap analysis.?
  • Cybersecurity risk assessments?Strategy
  • Cybersecurity Policy and Procedure Framework.
  • Design & Implementation of business continuity management system.
  • Security Architect Design & Secure Network Architecture Review.
  • Cyberthreat intelligence & Threat modelling.
  • IT security governance model.
  • Cyber Crisis & Release management Process.
  • Cybersecurity Assessment program & Audits.
  • Cybersecurity Assurance & compliance management Program.
  • Vulnerability Threat Risk Framework.
  • Vulnerability Assessment and Penetration Testing.
  • Identity of People & Assets, Secure Access & Authorization policies.
  • Privacy & data protection policies & procedure.
  • Data Management & Data recovery processes.
  • Policy for Utilisation & Maintaining Security Appliances & Security software.
  • Incident Response & Management process.
  • Continuous monitoring and assessment process.
  • Active vulnerability scanning and threat detection from a 24-hour operation
  • Baseline your assets with CIS benchmark.
  • Information security metrics framework.
  • Third party risk management & Mitigation program.
  • Cybersecurity awareness training program.
  • Cyber resilience Strategy.
  • Cyber Insurance policy program
  • Implementing continuous process improvements.

?Remarks-

  • ?Agility and adaptability to changing threatscape and align cyber security program to tackle evolving threats is key, Also security incident management needs to be super agile, cutting down unnecessary bureaucratic processes, hierarchy, documentation, etc.
  • In Risk Assessments, the velocity (speed) with which cyberattacks happen should be factored in along with the conventional likelihood & impact factors. ?
  • Adopt relevant industry standard (like NIST CSF, PCI-DSS, ISO 27001, etc) for running Cyber Security Program, this gives structure (method to the madness) to the program.


TECHNOLOGY -

No alt text provided for this image

This pillars in cybersecurity involves putting the right systems in place to automate processes and make them smarter and more effective. There are a host of technologies that security teams can implement in order to layer their defenses. To achieve robust & secure info-structure, organizations should build a technology selection framework that aligns with the enterprise technology and security architecture. Below I have mentioned complete technology stack of cybersecurity from Perimeter to Data-Security. Also I have mentioned some technology beyond perimeter as Cloud & others advance technologies.

  • Perimeter Security : Perimeter firewall, IDS/IPS, Application Gateway firewall, physical security, Deception, Mail security, DNS Security, Secure DMZs.
  • Network Security : Network firewall, UTM, Secure remote access,NAC, Inline Patching, Wireless access control , VOIP security.
  • End Point Security : EDR, AMP/Anti-virus/Anti-Malware , Browser Isolation, End Point Encryption, Endpoint DLP, Sandboxing/APT, Mobile device security.
  • Application Security : Devsecops : SAST,DAST,RASP, IAST, SCA, WAF,API Security, D-DOS Services, CDN security, Bot Management, Database security.Application Encryption, Application shielding. Application security testing, Secure coding practices.
  • Data Security : Data discovery, Data classification, Data Encryption, Data Masking/Tokenization, IAM,PAM, Key Management, DLP, FIM, EDRM,FIM,SFTP, (Data Backup & recovery).
  • Security operation : SIEM,XDR, SOAR, Log management, UBA.
  • Cloud Security : CSPM,CWPP,CASB,CIEM, Docker Container Security.

Remarks

  • "Vulnerability management tool, Configuration management tool, Patch management tool, Systems & Network hardening, Micro-segmentation, Physical security"
  • "Threat intelligence, Deep-web/dark-web Monitoring,Brand monitoring/Takedown services"
  • Advance Technologies : OT Security/ IOT Security /Blockchain Security/AI & ML Security/ ZTNA/SASE/ RPA Security/BAS/ Payment transaction security/Advance Threat protection Technologies.

These three pillars of cyber security—people, processes, and technology—should all work together to build a sturdy defense network. However, when an organization effectively balances people, process, and technology, it is possible to establish a synergistic framework that fully supports cybersecurity."I always believe that heart of this pillar should be People"

How to achieve 360° Cybersecurity Approach by covering these three domains i.e. people, processes and technology-

Security threats are constantly evolving and your security measures need to adjust accordingly. You should have strong mechanism to protect your ogragnization with help of People, Process & Technology.

There should be a comprehensive framework to help you & evaluate your current cybersecurity landscape and ensure you have proper protection.?

360° Cybersecurity approach : This Approach covers the three main domains of people, process and technology & these three steps-

Step 1 is to identify and assess your current level of threat, risks and protection.

Identify –>?Threat----> Risk ----> Strategy ---->?Security review.

Step 2 is to take corrective action where gaps are identified.

Protect –> People ---->Process ----> Technology.??

Step 3 is to monitor the system, respond to threats and incidents and allow you to report to your board and regulators"?

Monitor –> Real Time ---->Scheduled---->Unscheduled ----> Security Review.

(These steps explained in below infographics)

No alt text provided for this image

Cybersecurity (People + Process + Technology) =?Successful Organization Transformation.

No alt text provided for this image

The right approach to cybersecurity can accelerate organization transformation by striking a balance between risk and innovation.

"?Some data and facts & infographic has been taken from different sources."

"Special thanks to some Senior Cybersecurity leader, I appreciate your consideration/guidance/help/time."

If you enjoyed this post, hit the like and share buttons above so others can benefit from it as well. Please comment to share your thoughts and your perspectives.?

#informationsecurity ?#datasecurity ?#cyber ?#datacompliance ?#infosec ?#dataprivacy ?#privacy ?#security ?#cyberattack ?#dataprotection ?#people ?#technology ?#process ?#securityawareness ?#cybersecurityawareness ?#securityculture ?#identify ?#protect ?#monitors ?#informationsecurityawareness ?#infosecurity ?#informationsecuritytraining ?#informationsecuritymanagement ?#ciso ?#cisos ?#cios ?#cros ?#ctos ?#cdos #creativity ?#networking ?#linkedin ?#learning #cloudsecurity ?#cybersecurity ?#technology ?

Anwer Yusoff

Digital Strategy Consultant

2 年

Excellent article Praveen. I like the way you explain people, process and technology with clear examples and implementation approach. Request your kind permission to use this material in my presentations to management.

Great article Praveen keep it up.

回复
Dipesh Prajapati

Managing Director & CEO at BeyonData Solutions | Oracle Partner | Odoo Partner

3 年

Cybersecurity is a topic that can never be talked about enough. Informative article, Praveen. ??

回复
Alpeshkumar Patel

Leading - Enterprise Software & Services, Information Systems, Technology, Automation, Cyber Security, Audits, Governance, Risk Management, Data Privacy, and Compliance

3 年

Very well explained and useful for managing effective isms.

Sudhakar Tiwari

CCISO | CEH | CCSK | CND | ITILv3 | Providing Leadership with a focus on fundamentals, security, and innovation

3 年

Very useful for practitioners

要查看或添加评论,请登录

社区洞察

其他会员也浏览了