• Skip to main content
  • Skip to secondary menu
  • Skip to primary sidebar
  • Home
  • Contact Us

iHash

News and How to's

  • Passwarden PW Manager Lifetime Subscription for $79

    Passwarden PW Manager Lifetime Subscription for $79
  • VPN Unlimited: Lifetime Subscription for $69

    VPN Unlimited: Lifetime Subscription for $69
  • Zerrio: The Ultimate All-In-One Business Management Toolkit (Lifetime Subscription) for $49

    Zerrio: The Ultimate All-In-One Business Management Toolkit (Lifetime Subscription) for $49
  • Anker PowerExtend USB 2 mini Black / 5ft for $19

    Anker PowerExtend USB 2 mini Black / 5ft for $19
  • The Essential 2023 Soft Skills Master Class Bundle for $29

    The Essential 2023 Soft Skills Master Class Bundle for $29
  • News
    • Rumor
    • Design
    • Concept
    • WWDC
    • Security
    • BigData
  • Apps
    • Free Apps
    • OS X
    • iOS
    • iTunes
      • Music
      • Movie
      • Books
  • How to
    • OS X
      • OS X Mavericks
      • OS X Yosemite
      • Where Download OS X 10.9 Mavericks
    • iOS
      • iOS 7
      • iOS 8
      • iPhone Firmware
      • iPad Firmware
      • iPod touch
      • AppleTV Firmware
      • Where Download iOS 7 Beta
      • Jailbreak News
      • iOS 8 Beta/GM Download Links (mega links) and How to Upgrade
      • iPhone Recovery Mode
      • iPhone DFU Mode
      • How to Upgrade iOS 6 to iOS 7
      • How To Downgrade From iOS 7 Beta to iOS 6
    • Other
      • Disable Apple Remote Control
      • Pair Apple Remote Control
      • Unpair Apple Remote Control
  • Special Offers
  • Contact us

2021 Security Outcomes Study: Stress Relief for CISOs

Feb 20, 2021 by iHash Leave a Comment


We have heard countless times that, during the COVID-19 pandemic, digital transformation has advanced three years in three months. It is difficult to actually measure this, but the feeling is definitely there. Activities with questionable results in the virtual environment, such as telemedicine and distance learning, which both suffered from socio-economic biases, became an integral part of our daily routine, with no contest. It was this or nothing.

This intensification of our digital life, with shopping, work, leisure, and several other activities that we were able to take into the networks, just shed more light on a confrontation that needs to be collective and global – the fight against cyber threats and crimes.  This affected all levels of the cybersecurity landscape, and it has had a particularly broad impact for those in the C-Suite, specifically, the Chief Information Security Officer (CISO).

The history of human behavior has taught us that progress, especially when developed in times of crisis, tends to last, and digitization is the latest example to support this idea. It is also time to recognize that, sooner or later, one of the threats to this new realm will be able to overcome the numerous barriers that we have already raised. So, what is an already over-stressed CISO to do? To simply anticipate the worst, and seek solutions later is not the most strategic alternative in this time of expanding digital business.

Building a Cybersecurity Platform for the Future

The present moment shows us that we need different and innovative approaches to cybersecurity. But wait, this does not mean that, once again, it will be necessary to replace your entire base of equipment and systems. Cisco’s Security Outcomes Study points the way towards observing and actions that can be used to build the cybersecurity platform of the future.

The Study is an analysis of the crossing of information collected in interviews with 4,800 cybersecurity executives from 25 countries. A step-by-step guide that generates positive results is available, so you may build strategies on globally implemented foundations.

A CISO’s job is not to serve merely as a figurehead, but to offer vison and a path forward.  Instead of looking to the past, pointing out the threats of a period to indicate future trends, the study examines current practices, and the possible percentages of improved efficacy when adopting some of these suggestions. In other words, through recognizing that we cannot use old medicines to face current and future maladies, the study shows us that we also need to innovate in the approach to cybersecurity.

And, as this is not a one-off or isolated challenge, what could be better than using the global insights delivered by cybersecurity professionals to decide where to focus your efforts?  Their insights about the most efficient practices, and ways to better manage risks, can enable your cybersecurity practice to operate more efficiently.

Practices with strong success Impact

  1. Technological update
  2. Technological integration
  3. Cybersecurity strategy
  4. Incident response time
  5. Metric performance program
  6. Clear responses to events
  7. Integration of IT and Cybersecurity teams

The research reveals, for example, that change is a major factor in the success of cybersecurity. On average, programs that include a proactive cutting-edge technology-upgrade strategy are 12.7% more likely to have security success – the highest rate of any practice. Unfortunately, not all organizations have the budget or experience to make this happen. A strategy to migrate to cloud and SaaS solutions can help close that gap. Subscription solutions are affordable, easy to implement and integrate, while automatic updates ensure that technology is continually modernized without additional cost or effort.  The case for many strategic decisions at the C-Level are often won when cost-reductions are conscientiously coupled with organizational efficiencies.  Stated another way, the successful CISO can show the other C-Suite colleagues that effective security need not be excessively costly.

Building a Positive Security Culture Using Integrations

Well-integrated technology is the second most important factor in the success of cybersecurity. It has a positive impact on almost all the results evaluated, increasing the probability of overall success by an average of 10.5%. Interestingly, integrations also benefit the recruitment and retention of talent, as security teams want to work with the best technology, and avoid burnout.

Integration is also the most significant factor in establishing a security culture that the entire organization embraces. Investment in flexible, frictionless technology, as opposed to traditional security awareness training programs, resulted in a more positive security culture.  This is especially important, as the “tone at the top” can be one that is influenced by technology integration, rather than the old-fashioned, somewhat draconian methods of which we are all too familiar.

One of the most surprising findings in the report is that, as a stand-alone practice, simply knowing potential cyber risks seems to correlate less with overall success. It points to the importance of a comprehensive threat intelligence and incident management program with the ability to mitigate and remediate. In fact, practices such as rapid incident response and accurate threat detection correlate much strongly with overall security success.

We are rapidly approaching a global market of 50 billion connected devices, which leads us to understand that there will be at least 50 billion security holes. 5G is also coming, which will affect us in nearly unpredictable ways.  For example, the Internet of Things (IoT) will grow to include the entire agricultural industry.

This whole scenario, added to the fact that companies are moving up to 70% of their structures to cloud computing, imposes a difficult challenge to overcome in isolation. In a completely different universe from what we have seen so far, this new analysis, based on the crossing of facts, strategies and results, shows us that investing in barriers is still a good strategy.  However, the more proactive defense is to identify more quickly what affects your organization, and, how and when to respond. The new “best practices” approach leads with keeping networks and IT systems up to date. It moves on to accurate detection, and timely response, and is crowned with building a positive security culture as a collateral result.  The findings in the Security Outcomes Study can assist a CISO in managing rapidly shifting and emerging challenges by providing steps that are critical for the current, and future environments.

Share:



Source link

Share this:

  • Facebook
  • Twitter
  • Pinterest
  • LinkedIn

Filed Under: Security Tagged With: CISOs, Outcomes, Relief, security, stress, study

Special Offers

  • Passwarden PW Manager Lifetime Subscription for $79

    Passwarden PW Manager Lifetime Subscription for $79
  • VPN Unlimited: Lifetime Subscription for $69

    VPN Unlimited: Lifetime Subscription for $69
  • Zerrio: The Ultimate All-In-One Business Management Toolkit (Lifetime Subscription) for $49

    Zerrio: The Ultimate All-In-One Business Management Toolkit (Lifetime Subscription) for $49
  • Anker PowerExtend USB 2 mini Black / 5ft for $19

    Anker PowerExtend USB 2 mini Black / 5ft for $19
  • The Essential 2023 Soft Skills Master Class Bundle for $29

    The Essential 2023 Soft Skills Master Class Bundle for $29

Reader Interactions

Leave a ReplyCancel reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Primary Sidebar

  • Facebook
  • GitHub
  • Instagram
  • Pinterest
  • Twitter
  • YouTube

More to See

VPN Unlimited: Lifetime Subscription for $69

Dec 9, 2023 By iHash

Is macOS as secure as its users think?

Is macOS as secure as its users think?

Dec 8, 2023 By iHash

Tags

* Apple attacks Cisco computer security cyber attacks cyber crime cyber news cybersecurity Cyber Security cyber security news cyber security news today cyber security updates cyber threats cyber updates data data breach data breaches google hacker hacker news Hackers hacking hacking news how to hack incident response information security iOS 7 iOS 8 iPhone Malware microsoft network security ransomware ransomware malware risk management security security breaches security vulnerabilities software vulnerability the hacker news Threat update video web applications

Latest

Passwarden PW Manager Lifetime Subscription for $79

Expires June 04, 2024 23:59 PST Buy now and get 60% off KEY FEATURES Safe password manager for those who value security! Passwarden is a secure password manager that simplifies and strengthens your digital life by securely storing and managing all your passwords in one place. It utilizes strong AES-256 encryption algorithms to protect your […]

Introducing App 360

Introducing App 360: APM Redefined by Logz.io

Years before founding Logz.io, I was a software engineer, working with various tools to ensure my products and services performed correctly. There were few tools I dreaded using more than application performance management (APM), and I know that I’m not alone. I hated traditional APM. It’s heavy. It’s hard to implement. It’s expensive. It takes […]

Zerrio: The Ultimate All-In-One Business Management Toolkit (Lifetime Subscription) for $49

Expires June 06, 2123 23:59 PST Buy now and get 94% off KEY FEATURES Zerrio is more than just a business management tool — it’s a partner that supports your success every step of the way! With over 60+ business tools, Zerrio is your one-stop business management hub. For one low lifetime fee, you can […]

The Essential 2023 Soft Skills Master Class Bundle for $29

Expires June 07, 2024 23:59 PST Buy now and get 66% off Improve Your Influence & Negotiation Skills KEY FEATURES To communicate effectively, facilitate improving performance, and negotiate positive outcomes with colleagues, customers, and suppliers, we need to influence others. Influencing is something we do every day and is particularly important in our professional lives […]

Education Cloud PLUS by Squirrly: 40+ SEO & Digital Marketing Lifetime Courses for $39

Expires December 08, 2123 07:59 PST Buy now and get 89% off KEY FEATURES Elevate your marketing game with Education Cloud PLUS! Unleash over 40 expert-led courses and 504 learning materials, covering SEO, social media, business strategies, and more. This platform, by Squirrly, provides a seamless alternative to LinkedIn Learning. Discover top courses recommended by […]

Report: 2.6 billion records compromised by data breaches in past two years

December 7, 2023 UPDATE Report: 2.6 billion personal records compromised by data breaches in past two years — underscoring need for end‑to‑end encryption An Apple-commissioned study shows that threats to consumer data stored in the cloud have grown dramatically since the last report was published in December 2022 Today Apple published an independent study conducted […]

Jailbreak

Pangu Releases Updated Jailbreak of iOS 9 Pangu9 v1.2.0

Pangu has updated its jailbreak utility for iOS 9.0 to 9.0.2 with a fix for the manage storage bug and the latest version of Cydia. Change log V1.2.0 (2015-10-27) 1. Bundle latest Cydia with new Patcyh which fixed failure to open url scheme in MobileSafari 2. Fixed the bug that “preferences -> Storage&iCloud Usage -> […]

Apple Blocks Pangu Jailbreak Exploits With Release of iOS 9.1

Apple has blocked exploits used by the Pangu Jailbreak with the release of iOS 9.1. Pangu was able to jailbreak iOS 9.0 to 9.0.2; however, in Apple’s document on the security content of iOS 9.1, PanguTeam is credited with discovering two vulnerabilities that have been patched.

Pangu Releases Updated Jailbreak of iOS 9 Pangu9 v1.1.0

  Pangu has released an update to its jailbreak utility for iOS 9 that improves its reliability and success rate.   Change log V1.1.0 (2015-10-21) 1. Improve the success rate and reliability of jailbreak program for 64bit devices 2. Optimize backup process and improve jailbreak speed, and fix an issue that leads to fail to […]

Activator 1.9.6 Released With Support for iOS 9, 3D Touch

  Ryan Petrich has released Activator 1.9.6, an update to the centralized gesture, button, and shortcut manager, that brings support for iOS 9 and 3D Touch.

Copyright iHash.eu © 2023
We use cookies on this website. By using this site, you agree that we may store and access cookies on your device. Accept Read More
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT