Historically investment in security meant securing the single egress/ingress points into an organisation, however with organisations now more porous than ever, due to extended connectivity to support outsourcing, EDI, BYOD, Apps, etc. this is becoming more difficult.Many organisations are presuming they have sufficient controls in place. But what is also coming to the fore is a realisation that they don’t have enough visibility around what is going on in their environment to be able to answer that with confidence. An understanding of what is ‘normal’ activity within an organisation is key to understanding what is appropriate for their specific needs.
So first of all, a customer needs to understand their IT environment, everything from ensuring their permission structure is a least-permissive model, understanding where sensitive data resides across the organisations data sets, be they in-house or not, having an audit trail of activity, not only on the data but across the whole environment, to remediate known deficiencies but also having access to analytics around what is ‘normal’ activity to identify quickly and automate the response to a breach.
Organisations need to move from a prevention-based approach to a focus on people, the flow of data and on transactions. Once we have an understanding of these within the context of our own organisations then we can move to a monitor — and respond — based approach, which will significantly reduce risk and our responses to a breach.
As organisations move to third generation platforms, i.e. the connecting of many more users with significantly more apps, the automation based on policies, the filtering and highlighting of significant issues ahead of less significant, and the need to do secure significantly more information with the same or less staff will be the significant challenges that Irish organisations will need to address.
|
Subscribers 0
Fans 0
Followers 0
Followers