Enterprise security in 2020: it takes a village of experts
Over the last few years, the enterprise security landscape has drastically changed
When you purchase through links on our site, we may earn an affiliate commission.Here’s how it works.
Over the last few years, the enterprise security landscape has drastically changed. In 2019 alone more than half of British businesses fell victim tomalwareand cyber-attacks - an increase of 40% when compared to the previous year – with average losses soaring from $229,000 (£176,000) to $369,000 (roughly £283,519).
The rapid adoption of digital technologies and the vast amount of data that is gathered by them means that every corner of a business needs constant monitoring and protection. Managing this task is even more challenging due to regulatory mandates such as theEU General Data Protection Regulation (GDPR), the California Consumer Privacy Act (CCPA) and the Payment Card Industry Data Security Standard (PCI DSS).
Hope Swancy-Haslam, Sr. Director, OpenText.
The second major problem facing security teams today is a lack of budget and staff. Recent research from Databarracks discovered that over half of UK businesses have seen theircybersecuritybudgets either stay the same or decrease over the last twelve months. On top of all this is the growing shortage of skilled, knowledgeable information security professionals.
The convergence of these issues for the enterprise will make the challenge of responding to the thousands upon thousands of security alerts every day a significant one – especially when you consider that automated attacks are becoming more sophisticated and frequent.
To be prepared for every eventuality, key members of the security,privacyand compliance teams must join forces to plan, manage and monitor protection efforts. These groups increasingly care about and track the same KPIs, anyway. By working together to share more information, these teams can set the organisation’s governance plan in place and then ensure that both security and privacy policies are in line with the regulatory requirements for their industry.
This is especially important for heavily regulated industries such as financial services, healthcare and the public sector to greatly reduce the likelihood of a damaging breach.
The information advantage
The biggest advantage an organisation can give itself when defending against cyber threats is to better understand its sensitive data and where that data resides. To gain this understanding,collaborationbetween these groups in answering the following questions is required:
Are you a pro? Subscribe to our newsletter
Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!
Such an approach can lead to a more effective process of managing andmonitoring employeesecurity, privacy and compliance policies. By removing silos and working more closely together, a better understanding of data locations, security posture, and access is also achieved which creates a baseline to operate from when managing both security and risk.
With this information advantage, security and privacy teams can then purposefully and aggressively control their data. Most organisations have adopted a “Defense-in-depth” strategy which incorporates layers of defense that analyse the perimeter, network streams, and most importantly, takessecurity endpointsand devices into account. Given recent incidences of ineffective perimeter defense technologies against targeted attacks, endpoint visibility and control is proving to be a successful method to discover and mitigate the impact of active and ongoing breaches.
Faced with a shortage of resources and skills in the industry, enterprises are increasingly looking to endpoint detection and response solutions which use variousdata analyticstechniques to detect suspicious system behavior, provide contextual information, block malicious activity, and provide remediation suggestions to restore affected systems. To meet the breach discovery and investigation mandates common in most regulation frameworks, this ability to continuously collect and analyse endpoint data will be vital to identify incidents as they occur and before damage can be done.
What’s next?
Looking ahead, security, privacy and compliance teams must foster a more interconnected way of working to navigate the complexities of information governance and data security today. Yet these teams are continuously being tasked to do more with less.
Against a backdrop where attackers are increasingly skilled at compromising endpoints, stringent regulatory frameworks are in play, and businesses are collecting more data than ever before, technology needs to make up the difference with real-time continuous endpoint monitoring and fearless response capabilities.
This convergence of security, risk and privacy teams coupled with endpoint and response solutions can become a force-multiplier for success as organisations look to reduce risk and address benign threats before they escalate into a data breach.
Hope Swancy-Haslam is the Sr. Director at OpenText.
She has over 20 years of experience creating best practices for legal technology management, marketing, and vendor sourcing initiatives in the Security, AI/ML, information governance and eDiscovery industries. Hope demonstrated ability to assess data management processes and create strategies for improving their effectiveness to manage risk/costs. She empowers direct reports and related contributors to identify emerging opportunities and enables them to act on these opportunities effectively. Hope also possesses a unique and highly-valuable ability to identify strategic opportunities in relevant technologies and to act on these observations effectively.
Rising AI threats are making firms turn back to human intelligence
Thousands of employees could be falling victim to obvious phishing scams every month
Alien: Romulus gets a Hulu release date but there’s still no word on when it’s coming to Disney Plus