CIOApplications
static-image
  • Home
  • Applications
      • Auction Software
      • Audit Management
      • Bioinformatics
      • Business Continuity
      • Business Intelligence
      • Chatbot
      • Club Management
      • Collaboration
      • CPQ
      • Custom Software Development
      • CRM
      • Data Platform
      • Digital Experience
      • e-Discovery
      • E-Signature
      • Employee Engagement
      • EAM
      • Enterprise Communications
      • Enterprise Mobility
      • Enterprise Reporting Software
      • Enterprise Search
      • Forestry
      • GIS
      • GRC
      • Human Resource
      • Indoor Positioning
      • Innovation Management
      • InsurTech
      • Intellectual Property
      • IT Infrastructure
      • IT Operations Management
      • IT Service Management
      • License Management
      • Low Code Platform
      • Maintenance Management
      • Managed IT Services
      • MarTech
      • Master Data Management
      • Order Management
      • Parking Management
      • Personalization
      • Portal Software
      • Procurement Tech
      • Publishing Software
      • Quality Management System
      • Remote Monitoring
      • Remote Support
      • RFID
      • Sales Tech
      • Software Asset Management
      • Software Testing
      • Task Management
      • Unified Communications
      • Visitor Management
      • Voice Recognition
      • Web Design and Development
      • Workflow
      • Workplace Management
  • Verticals
      • Automotive
      • Banking
      • BioTechnology
      • Casino
      • Construction
      • CPG
      • Contact Center
      • Education
      • Energy
      • Field Service
      • Fintech
      • Food and Beverages
      • Government
      • Healthcare
      • Legal
      • Life Sciences
      • Logistics
      • Manufacturing
      • Media and Entertainment
      • Retail
      • Travel and Hospitality
      • Utilities
  • Technologies
      • 3D Scanning
      • Agile
      • API
      • Artificial Intelligence
      • Augmented Reality
      • Blockchain
      • CAD/CAM
      • Cloud
      • Container Management
      • Cyber Security
      • Data Analytics
      • Data Center
      • DevOps
      • Drone
      • Graphics
      • Hyper Converged Infrastructure
      • Image Recognition
      • IoT
      • Lidar
      • Machine Learning
      • Machine Vision and Imaging
      • Nano Tech
      • Networking
      • Predictive Analytics
      • PropTech
      • RF and Microwave
      • Robotic Process Automation
      • Robotics
      • Security
      • Simulation
      • Smart Labelling
      • Space Tech
      • Telematics
      • Virtual Assistant
  • Company Eco System
      • Adobe
      • Amazon
      • Avaya
      • ESRI
      • Google
      • IBM
      • Infor
      • Microsoft
      • Mitel Partners
      • National Instruments
      • NetSuite
      • Oracle
      • Progress
      • Qlik Partner
      • Riverbed
      • Salesforce
      • SAP
      • ServiceNow
      • SiteCore
      • Splunk Partner
      • VMware
  • News
  • conferences
  • Newsletter
  • Whitepaper
  • About us
  • Specials

  • Menu
      • Amazon
      • Artificial Intelligence
      • Auction Software
      • Blockchain
      • CAD/CAM
      • Club Management
      • CPQ
      • Digital Experience
      • E-Signature
      • Education
      • Energy
      • Enterprise Mobility
      • Food and Beverages
      • GRC
      • Healthcare
      • Image Recognition
      • Indoor Positioning
      • Infor
      • Intellectual Property
      • IoT
      • Legal
      • Lidar
      • Logistics
      • NetSuite
      • Personalization
      • Predictive Analytics
      • Quality Management System
      • Remote Monitoring
      • Retail
      • RF and Microwave
      • Riverbed
      • Simulation
      • Task Management
      • Utilities
      • VMware
      • Workflow
  • VMware
  • Amazon
  • Artificial Intelligence
  • Auction Software
  • Blockchain
  • CAD/CAM
  • Club Management
  • CPQ
Specials
  • Specials

  • Amazon
  • Artificial Intelligence
  • Auction Software
  • Blockchain
  • CAD/CAM
  • Club Management
  • CPQ
  • Digital Experience
  • E-Signature
  • Education
  • Energy
  • Enterprise Mobility
  • Food and Beverages
  • GRC
  • Healthcare
  • Image Recognition
  • Indoor Positioning
  • Infor
  • Intellectual Property
  • IoT
  • Legal
  • Lidar
  • Logistics
  • NetSuite
  • Personalization
  • Predictive Analytics
  • Quality Management System
  • Remote Monitoring
  • Retail
  • RF and Microwave
  • Riverbed
  • Simulation
  • Task Management
  • Utilities
  • VMware
  • Workflow
×
#

CIO Applications Weekly Brief

Be first to read the latest tech news, Industry Leader's Insights, and CIO interviews of medium and large enterprises exclusively from CIO Applications

Subscribe

loading
  • Home
  • Cyber Security
Editor's Pick (1 - 4 of 8)
left
Augmenting Cybersecurity in Healthcare Industry

Augmenting Cybersecurity in Healthcare Industry
Robert Napoli, CIO, Planned Parenthood of the Great Northwest and the Hawaiian Islands

The Tao of Cyber Security in today's reality

The Tao of Cyber Security in today's reality
Marc DeNarie, CIO, NaturEner USA & Canada

Preventing Cyber-Attacks in Universities with Operational Collaboration

Preventing Cyber-Attacks in Universities with Operational...
Michael Corn, Deputy CIO & CISO, Brandeis University

Addressing Cyber Security Strategically

Addressing Cyber Security Strategically
David L Stevens, CIO, Maricopa County

Ever-Changing Cyber Security of Business Community

Ever-Changing Cyber Security of Business Community
Jim Sills, CIO/Cabinet Secretary, State of Delaware

IT- A Game-changer in Cybersecurity

IT- A Game-changer in Cybersecurity
Tammy Moskites, CIO and CISO, Venafi

The Realities of Cybersecurity

The Realities of Cybersecurity
Doug Mullarkey, CIO, First Choice Loan Services Inc.

A Framework for Cultivating a Culture of Cybersecurity

A Framework for Cultivating a Culture of Cybersecurity
Steven I Cooper, CIO, U.S. Department of Commerce and Michael Maraya, Manager-Cybersecurity Operation

right

Thank you for Subscribing to CIO Applications Weekly Brief

Security Solutions for Cyber Risk Mitigation

By Colin Black, CIO, Crowd Strike

Tweet
content-imageColin Black, CIO, Crowd Strike

Cybersecurity remains one of the biggest challenges technology leaders face today. The saying used to be that modern businesses rely on people, processes, and technology. In 2016 and beyond, it will take people, process, technology, and intelligence to protect your business, IP, and tradecraft. Global economic developments and geopolitical events are a growing force behind today’s cyber attacks. Just because something is happening thousands of miles away, don’t think that it won’t wash up at your doorstep in the form of some kind of cyber attack. Having actionable intelligence about WHY someone might be targeting your business is critical for helping CIOs making more informed decisions about resource allocation to protect their networks.

Security breaches have become the new normal across industries and organizations of all sizes. Cyber risk mitigation starts with anticipating and detecting potential threats, and being prepared to defend against new tactics, techniques, and procedures (TTPs). Emerging intrusion trends require a new approach to proactive defense that includes active real-time hunting and detection, prevention, and investigation capabilities that are geared to defend against increasingly stealthy attacks. These technical capabilities and solutions are critical for making today’s enterprise successful.

Business and technology leaders who do not prepare their organizations will lose ground to competitors as they will constantly be in reactive mode to remediate network incursions, have their trade secrets siphoned through cyber espionage, and lose customer trust.

Essential Components for Effective Cybersecurity

The dramatically increased persistence and sophistication of attackers call for a radical shift in how businesses protect themselves. Endpoints are usually at the frontline of cyber intrusions on enterprise networks making everyone a cyber security practitioner, whether you are in IT, HR, Marketing, Finance, Legal, etc. Everyone in a company is at the endpoint. The recent trends of remote work, bring-your-own-device (BYOD), and Internet of Things (IoT) create an environment in which endpoints are even more challenging to protect than before. Unfortunately, the first line of defense used on laptops, workstations, and servers is typically outdated solutions that are, by design, one step behind constantly evolving adversary tactics.

There are two main vectors of success when it comes to competitive security solutions: The first one is stopping known ‘bads’ and the second is identifying and thwarting unknown threats.

Security solutions that offer real-time visibility into adversary activity on every endpoint device to detect and prevent intrusions before real damage occurs are going to be the future of the industry. The components that make up that type of technology solution are complex, and often involve pretty innovative approaches like machine learning and graph-based technologies. As a result, having a cloud-based model to deliver security is critical for giving businesses the flexibility they need for deploying and updating security solutions on a pace and scale that can keep up with today’s cyber attacks.

Cyber risk mitigation starts with anticipating and detecting potential threats, and being prepared to defend against new tactics, techniques , and procedures (TTPs)


Lastly, regardless of how comprehensive the endpoint protection solution is, no single technology can prevent 100 percent of breaches. A motivated and sophisticated adversary will eventually get it. This is why having a strong detection capability and augmenting it with a team of professional hunters—either in-house or third party—can help prevent silent failure.

Proactive Approach to Security Challenges

As a CIO, my role is to continually challenge our team to build a better, faster, and smarter technology portfolio to meet the evolving needs of the business. Being in the security industry and operating at a global level, I help the company move in lockstep with evolving local and international legal and regulatory laws. These types of challenges keep me up at night but they also invigorate me.

That said, you can have all the technology in the world, but if you don’t have the right people in place, if people aren’t trained and using the appropriate cyber security procedures, you’re still going to have problems. And I’m not just talking about your IT personnel. Everyone in the company is at the endpoint— marketing, finance, sales, HR, etc. As such, everyone needs to be trained and mindful of proper security behavior. So don’t put all your eggs into the technology basket alone. It’s still a person who, unfortunately, is going to click on that link in an email from someone they thought they knew, or open up that attachment that provides access for a hacker.

Most cybersecurity technologies today rely on Indicators of Compromise (IoCs) to block “known bads.” The challenge is that IoCs go stale fast, which is largely why we have a problem of silent failure in the industry. At CrowdStrike, our solution is fully cloud-based, and instead of IOCs, we focus on Indicators of Attack (IOA) so that you can take a more proactive approach to security and not be so reactive. IOAs mean you are looking for patterns or the effects of what an adversary is looking to accomplish. There are incredible advantages that the cloud drives for endpoint security, including the ability to keep tabs on and learn from attackers as they test attack strategies, crowdsource threat intelligence, and provide seamless upgrades.

Role of IT in Driving Digital Transformations

Technology should not only be a business enabler but also a force multiplier, driving effectiveness, better communication and collaboration. At its core, CrowdStrike’s business is about real-time exchange of information, analysis, and alerts. We need our IT backbone and future strategy to reflect that.

Today, most businesses depend on the CIO to drive digital transformations that enable the organization to do things faster and better through technology. Coming into Crowd Strike, I was fortunate because I was a customer of the Crowd Strike Falcon platform before I joined the company. This enabled me to witness first-hand the value of the technology and how it solves real-world problems. As a result, many of our customers and prospects want to hear from me directly as they consider doing business with us.

What’s unique about the cybersecurity industry is that many CIOs have to educate Boards of Directors (BoDs) or C-level business leaders about the organization’s security challenges and risks. This is a relatively new paradigm shift in the field, which I believe will elevate the role of the CIO even further. At the same time, CIOs need to understand the value and work on their communication skills for translating technology issues into business issues that BoDs can easily grasp and understand.

Future of Cyber security and Emerging Technologies

CIOs will continue to play an important role in security decisions. Many of my peers are actively engaged in re-architecting their technology strategy to incorporate a security vision that breaks down siloes, protects data seamlessly, and blocks epidemic threats lurking within networks, endpoints, or devices. CIOs working collaboratively with the CSO or CISO can help more effectively prepare all facets of their operations for better security hygiene—processes, technology, and people—to limit exposure to cyber threats.

Don’t be afraid to embrace emerging technologies and take chances on innovative approaches. This will help you push your company ahead of the competition and adapt more easily to next-generation trends. And again, emphasize the ability to speak in business terms to execs and BoDs.

tag

HR

real-time visibility

BYOD

cyber attack

Legal

IoT

Read Also

Ever-Changing Cyber Security of Business Community

Ever-Changing Cyber Security of Business Community

Jim Sills, CIO/Cabinet Secretary, State of Delaware
IT- A Game-changer in Cybersecurity

IT- A Game-changer in Cybersecurity

Tammy Moskites, CIO and CISO, Venafi
The Realities of Cybersecurity

The Realities of Cybersecurity

Doug Mullarkey, CIO, First Choice Loan Services Inc.
A Framework for Cultivating a Culture of Cybersecurity

A Framework for Cultivating a Culture of Cybersecurity

Steven I Cooper, CIO, U.S. Department of Commerce and Michael Maraya, Manager-Cybersecurity Operation

Weekly Brief

loading
ON THE DECK

Cyber Security 2019

Top Vendors

Cyber Security 2018

Top Vendors

Cyber Security 2017

Top Vendors

Previous Next

Featured Vendors

  • INTEGRITY Security Services: Embedded Iot Security and Management
    INTEGRITY Security Services: Embedded Iot Security and Management
  • 3i International: Ingenious Cyber Security Solutions
    3i International: Ingenious Cyber Security Solutions
  • Absolute: Self-healing Endpoint Security
    Absolute: Self-healing Endpoint Security
  • Axiad IDS: Preventing Cybersecurity Threats with Axiad ID Cloud
    Axiad IDS: Preventing Cybersecurity Threats with Axiad ID Cloud

Copyright © 2019 CIOApplications. All rights reserved. Registration on or use of this site constitutes acceptance of our Terms of Use and Privacy Policy |  Sitemap  |  Subscribe

follow on linkedin follow on twitter follow on rss
This content is copyright protected close

However, if you would like to share the information in this article, you may use the link below:

https://cyber-security.cioapplications.com/cioviewpoint/security-solutions-for-cyber-risk-mitigation-nid-265.html?utm_source=google&utm_campaign=cioapplications_topslider