Social Network For Security Executives: Network, Learn & Collaborate
We have developed the myth that technology can be an effective fortress – We can have security.
Traditional focus on:
Myths:
The Internet is fundamentally open:
Facts:
(Read more: Top 5 things a CISO should evaluate to benchmark an IAM solution)
What Can We Do?
Network MUST be:
Another Approach - Awareness
Good awareness program for enlightening your staff to the dangers of Spear Phishing
(Read more: Bring out the "Thought Leader in You" ! Become our guest author)
Emphasis
You can predict the future based on the past. The enemy can't change all his techniques, and once you've learned about your adversary, you can deal better with the oncoming waves of attacks.
As attacks have migrated from targeting systems via exploits to targeting people, security breaches are growing in number and sophistication. Therefore, it is no longer acceptable to rely exclusively on preventative measures . . .
New Technology Gadgets are also under Threat
Many users of the Mac OS X platform still view it as absolutely safe, primarily because Apple has assured them for many years that the system is more secure than PCs. However, recent analysis has challenged that assertion. There are significant numbers of Mac users. Botnet (as Trojan-Downloader.OSX.Flashfake) to have attracted the attention of experts in Q1 was the zombie network built of Mac OS X computers. In March 2012, Flashback infected about 7,00,000 computers across the globe.
CISO Team needs to wear different shoes, meaning wear the shoes of his/her customer and participate in building requirements then (s)he may be able to deliver better shoe
-By Sharat Airani
More: Want to share your insights? Click here to write an article at CISO Platform
Thanks Bikash. Yes, I agree about Application level too. Now with mobility in place (mostly) apps are available on different devices. It is also one of the biggest concern and it may run into different aspect..!!
Sharat, very nicely written article. Btw, what's your thoughts on application level threats?
Personally, I think CISO should keep this on the RADAR. Educating will help.
Hi Sharat,
Truely the IT Security landscape is changing very fast and it is difficult to keep pace with it.I absolutely agree on "It’s MUCH easier to gain entry through tricking an employee to click on a link than finesse your way through a firewall." So educating your staff is very essential,but do you think a CISO should take this more seriously and allocate budget for such education?
Started by Maheshkumar Vagadiya Jul 30, 2020. 0 Replies 0 Likes
Share the instances where you were able to convince the Executive management /board that CISO function is enabler rather then a hindrance.Thanks youMaheshContinue
Started by CISO Platform. Last reply by Yogesh Nov 19, 2020. 2 Replies 0 Likes
(question posted on behalf of a CISO member)Has anyone evaluated digital signature (like Docusign), any specific risk/ security areas to be looked into while finalising a vendor? Any and all inputs will be very much appreciated.Continue
Started by CISO Platform. Last reply by ANAND SHRIMALI May 20, 2020. 4 Replies 0 Likes
(question posted on behalf of a CISO member)What are your strategies for using Zoom in your organization after recent vulnerabilities in news about Zoom platform?Related Question: …Continue
Started by CISO Platform. Last reply by Bhushan Deo Mar 20, 2020. 12 Replies 0 Likes
(question posted on behalf of a CISO member)Due to CORONA virus most of the organizations are allowing their employees to work form home.Has any one issued security advisory for work from home ?Continue
Tags: #COVID19
# Manageengine Adaudit Plus -vs- Netwrix Auditor
# Rapid7 Nexpose -vs- Tenable Network Security Nessus
# Algosec Firewall Analyzer -vs- Tufin Orchestration Suite
# Hp Arcsight Siem Solutionarcsight Express -vs- Splunk Enterprise Splunk Cloud Splunk Light
# Cisco Meraki Mx Appliances -vs- Fortinet Fortigate
# Cloud Access Security Broker
# Distributed Denial of Service
# Network Advanced Threat Protection
Follow us
© 2021 Created by CISO Platform.
Powered by
Badges | Report an Issue | Privacy Policy | Terms of Service
You need to be a member of CISO Platform to join the discussion!
Join CISO Platform