Digital transformation through effective cybersecurity
  • Digital Transformation
  • Corporate Cybersecurity
  • Security / IT Primer
  • Advisory Services
  • Contact

Effective Cybersecurity Strategy

  • "Secure IT" and IT are the same thing
  • IT & cybersecurity strategy is a continuous process
    • Not a quarterly or annual compliance assessment
    • Not a checklist-style approach to compliance
  • No IT strategy results in..
    • a false sense of security
    • an inappropriate allocation of resources
  • Cybersecurity strategy = comprehensive, holistic, risk-based approach

 

Effective cybersecurity strategy =
Successful digital transformation strategy

 

No digital transformation project should ever start
without understanding its security implications

 

 

Security teams (today)...

... are seen as slowing down (blocker of) digital transformation 

... are seen as the "Office of No"

... work independent

... have to transform as well

 

Security teams need to...

... become agile, flexible, quick and an enabler of digital transformation

... change to "Let's see how we can do this as fast and safely as possible"

... make security everyone's responsibility

... integrate security at the speed of digital transformation

... be involved in digital transformation projects from the beginning

Multicolored icons on a pallet with a padlock on it. Icons are a house, Databases, laptop, computer screen, play button, watch, water tap, lightbulb, Hard disk array, electrical cord, camera, mobile phone, antenna


There is NO 100% Cybersecurity

 

Organizations cannot eliminate 

all cyber vulnerabilities or risks

 

The Reality

 

People make mistakes
Machines break
Accidents happen 


Failure is normal - There will be an incident

Assume breach

 

The Goal

 

Need to focus on
prevention, detection, containment and response

but... 

 

Resilience

is the main goal


four Arrows on a signpost with the words "Evolve", "Adapt",  "Change", and "Survive".

Adapt Strategy to Evolving Threats

 

Expanding cyber attack surface,
increasing complexity, high payoff,
low probability of getting caught and minimal penalties


= Favorable calculus for threat actors

 

Blue right pointing arrow with the words "Shifting Cybersecurity Posture".

Passive

  • Encryption
  • Application whitelisting
  • Identity & access management
  • UEBA systems
  • Education and training
    (should already be doing)

Active

  • Monitoring
  • Attribution
  • Disruption of ongoing attacks
  • Threat intelligence

 

Offensive

  • Stealing data back
  • Reverse DDoS
  • White hacker malware


Active Defense

 

Proactive monitoring, dynamic, intrusion detection and incident response 

  • Static, network-based security perimeter is no longer sufficient
  • Anticipate attacks before they happen
  • Detect and respond to attacks in real time
  • Establish traps and alarms to contain attacks

Utilize threat intelligence and security analytics

  • Attribution
  • Know what “normal” looks like

Puts organization on a proactive (preventative) rather than reactive posture

  • "Hunted" to hunter
  • Penetration (PEN), Fuzz (Fuzzing) testing and table-top exercises (TTX)

Use ring architectures to protect critical asset

  • Leverage defense-in-depth to leverage “attack lifecycle” / “kill chain”
  • Balanced “Zero-trust” security

Let us help you develop an effective cybersecurity strategy

Cybersecurity Strategy
  • Cybersecurity Today
  • Corporations
  • Executives
  • Compliance
  • Benefits
  • Strategy
  • Security by Design
Tweets by intecur
About | Privacy Policy | Cookie Policy | Sitemap
Intecur, Inc. Copyright © 2020 All Rights Reserved.
Log in Log out | Edit
  • Digital Transformation
    • Digital Transformation - Definition
    • The Reality
    • The New Global "M's"
    • Global Trends
    • COVID-19
    • Issues & Challenges
    • Strategy
    • What Stage is Your Organization?
  • Corporate Cybersecurity
    • Cybersecurity Today
    • Corporations
    • Executives
    • Compliance
    • Benefits
    • Strategy
    • Security by Design
  • Security / IT Primer
    • General Security Concepts
    • Aspects of Cybersecurity
    • People and Cybersecurity
    • Defender vs. Attacker
    • Complexity vs. Security
    • Resilience vs. Reliability
    • Cyber Hygiene
    • Testing
    • Threats Modeling
    • Traditional vs. IT Domains
    • Traditional vs. IT / Security Engineering
    • What is PCI DSS?
      • PCI Levels
      • PCI Compliance
    • Cyber Insurance
      • Coverage
      • Qualities
    • 5G
    • Aviation
      • Aviation Systems
      • Aviation Networks
  • Advisory Services
    • CISO-as-a-Service
    • Experience
    • Acronym Glossary
  • Contact
    • About Us
    • Partner Login
  • Scroll to top
Close