{"id":17402,"date":"2021-12-07T05:47:53","date_gmt":"2021-12-07T05:47:53","guid":{"rendered":"https:\/\/web3unplugged.io\/blog\/?p=17402"},"modified":"2021-12-07T05:48:00","modified_gmt":"2021-12-07T05:48:00","slug":"7-strategies-for-cso-cybersecurity-survival","status":"publish","type":"post","link":"https:\/\/web3unplugged.io\/blog\/7-strategies-for-cso-cybersecurity-survival\/","title":{"rendered":"7 Strategies For CSO Cybersecurity Survival"},"content":{"rendered":"\n<p><strong><em>By: <\/em><\/strong><strong>Amr Alashaal, Regional Vice President &#8211; Middle East at A10 Networks<\/strong><\/p>\n\n\n\n<p>CSOs, CIOs and CISOs have never had it so tough. Alongside their traditional responsibilities of safeguarding the corporation\u2019s physical assets on a day-to-day basis and preparing crisis management strategies, they must now face a cybersecurity&nbsp;threat environment that is growing exponentially.<\/p>\n\n\n\n<p>Today,&nbsp;ransomware&nbsp;has become one of the greatest network security threats organisations have to deal with. Increasingly sophisticated and distributed at a high speed via the internet and private networks using military-grade encryption, today\u2019s ransomware attacks demand multimillion-dollar ransoms.<\/p>\n\n\n\n<p>But ransomware is only one of the many threats organisations have to deal with. There are also&nbsp;distributed denial of service (DDoS) attacks,Man in the Middle (MitM) attacks, social engineering, insider threats, malware, and advanced persistent threats (APTs) to contend with \u2013 and those are just the most common&nbsp;network security threats.<\/p>\n\n\n\n<p>Below are seven strategies to make cybersecurity professionals\u2019 organisations safer from the countless network security threats they\u2019ll be facing in the near future:<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li><strong>Create a \u201cSecurity-first\u201d Culture<\/strong><\/li><\/ol>\n\n\n\n<p>The&nbsp;problem for CSOs&nbsp;is that, while most employees have some basic knowledge of cybersecurity best practices, that is pretty much all they have. Without ongoing training, knowledge testing and awareness, staff behaviour is one of the biggest cybersecurity risks that organisations face.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.accenture.com\/us-en\/insights\/security\/securing-future-enterprise-today\">A study by Accenture<\/a>&nbsp;revealed that less than half of new employees receive cybersecurity training and regular updates throughout their career. Just four in ten respondents said insider threat programs were a high priority.<\/p>\n\n\n\n<p>Organisations must look to create a robust and distributed digital immune system with a radical re-engineering of staff behaviour. Business leaders need to have&nbsp;accountability for cybersecurity; security teams need to collaborate with business leaders to create and implement policies that will actually work, and those policies need to be routinely re-evaluated and tested.<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"2\"><li><strong>Create a Continuous Security Education Program<\/strong><\/li><\/ol>\n\n\n\n<p>A \u201csecurity-first\u201d culture requires that all members of the culture appreciate the concept of network security threats. For this to actually have an impact on culture, however, staff must be trained routinely to ensure that their knowledge is current.<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"3\"><li><strong>Implement a Zero-Trust Model Throughout the Business<\/strong><\/li><\/ol>\n\n\n\n<p>Well-trained staff and a monitored environment are crucial to the successful protection of any organisation but without a foundational&nbsp;Zero Trust environment, defences will be intrinsically weak.<\/p>\n\n\n\n<p>The&nbsp;Zero Trust model&nbsp;is a strategy for preventing network security threats that all enterprises and governments should be using to defend their networks. It consists of four components:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Network traffic control:<\/strong>&nbsp;Engineering networks to have micro-segments and micro-perimeters ensures that network traffic flow is restricted and limits the impact of overly broad user privileges and access. The goal is to allow only as much network access to services as is needed to get the job done. Anything beyond the minimum is a potential threat.<\/li><li><strong>Instrumentation:<\/strong>&nbsp;The ability to monitor network traffic in-depth along with comprehensive analytics and response automation provides fast and effective incident detection.<\/li><li><strong>Multi-vendor network integration:<\/strong>&nbsp;Real networks aren\u2019t limited to a single vendor. Even if they could be, additional tools are still needed to provide the features that a single vendor won\u2019t provide. The goal is to getallof the multi-vendor network components working together as seamlessly as possible to enable compliance and unified cybersecurity. This is a very difficult and complex project but keeping this strategic goal in mind as the network evolves will create a far more effective cybersecurity posture.<\/li><li><strong>Monitoring:<\/strong>&nbsp;Ensure comprehensive and centralised visibility into users, devices, data, the network, and workflows. This also includes visibility into all encrypted channels.<\/li><\/ul>\n\n\n\n<p>At its core, the&nbsp;Zero Trust model&nbsp;is based on not trusting anyone or anything on the company. This means that network access is never granted without the network knowing exactly who or what is gaining access.<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"4\"><li><strong>Implement SSL Visibility \u2013 \u201cBreak and Inspect\u201d<\/strong><\/li><\/ol>\n\n\n\n<p>TLS\/SSL inspection solutions&nbsp;that decrypt and analyse encrypted network traffic are key to ensuring policy compliance and privacy standards in the Zero Trust model.<\/p>\n\n\n\n<p>Also called \u201cbreak and inspect\u201d,TLS\/SSL inspectionbolsters Zero Trust in three major ways. It allows for the detection and removal of malware payloads and suspicious network communications, prevents the exfiltration of sensitive data, and enables the Zero Trust model to do what it\u2019s supposed to do \u2013 provide in-depth and rigorous protection for networks from internal and external threats.<\/p>\n\n\n\n<p>For any organisation that hasn\u2019t adopted a&nbsp;Zero Trust strategy combined with deep TLS\/SSL traffic inspection, now is the time to start rethinking their cybersecurity posture.<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"5\"><li><strong>Review and Test DDoS Defences Regularly<\/strong><\/li><\/ol>\n\n\n\n<p>Routine testing against a checklist of expected configurations and performance standards, as well as random tests of security integrity,is crucial to detecting a distributed denial of service attack.<\/p>\n\n\n\n<p>Network performance testing should be executed daily because a&nbsp;distributed denial of service attack&nbsp;isn\u2019t always a full-bore assault.It can also be a low-volume attack designed to reduce, but not remove, connectivity.<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"6\"><li><strong>Secure all Inbound and Outbound Network Traffic Using SSL\/TLS Encryption<\/strong><\/li><\/ol>\n\n\n\n<p>When users\u2019 computers connect to resources over the internet,&nbsp;SSL\/TLS&nbsp;creates a secure channel using&nbsp;encryption, authentication, and integrity verification.&nbsp;Encryption hides data communications&nbsp;from third parties trying to eavesdrop, while authentication ensures the parties exchanging information are who they claim to be. The combination ensures the data has not been compromised.<\/p>\n\n\n\n<p>Any un-secured traffic must be constrained to specific secured network segments and monitored closely.<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"7\"><li><strong>Establish and Test Disaster Recovery Plans<\/strong><\/li><\/ol>\n\n\n\n<p>A key part of a disaster recovery plan involves backups. However, it is surprising how often restoring from backup systems in real-world situations doesn\u2019t perform as expected. It\u2019s important to know which digital assets are and are not included in backups and how long it will take to restore content.<\/p>\n\n\n\n<p>CSOs should plan the order in which backed-up resources will be recovered, know what the start-up window will be, and test backups as a routine task with specific validation checks to ensure that a recovery is possible.<\/p>\n\n\n\n<p><strong><u>Staying Secure<\/u><\/strong><\/p>\n\n\n\n<p>The CSO\u2019s job isn\u2019t getting any easier, but solid planning using the seven strategies will help ensure an organisation\u2019s digital safety. In addition, partnering with top-level enterprise cybersecurity vendors will ensure that critical security technology and best practices are central to the organisation\u2019s cybersecurity strategy.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>By: Amr Alashaal, Regional Vice President &#8211; Middle East at A10 Networks CSOs, CIOs and CISOs have never had it so tough. Alongside their traditional responsibilities of safeguarding the corporation\u2019s physical assets on a day-to-day basis and preparing crisis management strategies, they must now face a cybersecurity&nbsp;threat environment that is growing exponentially. Today,&nbsp;ransomware&nbsp;has become one [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":17404,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_seopress_robots_primary_cat":"none","_seopress_titles_title":"","_seopress_titles_desc":"","_seopress_robots_index":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-17402","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"rttpg_featured_image_url":{"full":["https:\/\/web3unplugged.io\/blog\/wp-content\/uploads\/2021\/12\/Amr-Alashaal-Regional-Vice-President-Middle-East-at-A10-Networks.jpg",900,1352,false],"landscape":["https:\/\/web3unplugged.io\/blog\/wp-content\/uploads\/2021\/12\/Amr-Alashaal-Regional-Vice-President-Middle-East-at-A10-Networks.jpg",900,1352,false],"portraits":["https:\/\/web3unplugged.io\/blog\/wp-content\/uploads\/2021\/12\/Amr-Alashaal-Regional-Vice-President-Middle-East-at-A10-Networks.jpg",900,1352,false],"thumbnail":["https:\/\/web3unplugged.io\/blog\/wp-content\/uploads\/2021\/12\/Amr-Alashaal-Regional-Vice-President-Middle-East-at-A10-Networks-150x150.jpg",150,150,true],"medium":["https:\/\/web3unplugged.io\/blog\/wp-content\/uploads\/2021\/12\/Amr-Alashaal-Regional-Vice-President-Middle-East-at-A10-Networks-200x300.jpg",200,300,true],"large":["https:\/\/web3unplugged.io\/blog\/wp-content\/uploads\/2021\/12\/Amr-Alashaal-Regional-Vice-President-Middle-East-at-A10-Networks-682x1024.jpg",682,1024,true],"1536x1536":["https:\/\/web3unplugged.io\/blog\/wp-content\/uploads\/2021\/12\/Amr-Alashaal-Regional-Vice-President-Middle-East-at-A10-Networks.jpg",900,1352,false],"2048x2048":["https:\/\/web3unplugged.io\/blog\/wp-content\/uploads\/2021\/12\/Amr-Alashaal-Regional-Vice-President-Middle-East-at-A10-Networks.jpg",900,1352,false],"post-thumbnail":["https:\/\/web3unplugged.io\/blog\/wp-content\/uploads\/2021\/12\/Amr-Alashaal-Regional-Vice-President-Middle-East-at-A10-Networks.jpg",280,420,false],"graptor-sq-xs":["https:\/\/web3unplugged.io\/blog\/wp-content\/uploads\/2021\/12\/Amr-Alashaal-Regional-Vice-President-Middle-East-at-A10-Networks.jpg",67,100,false]},"rttpg_author":{"display_name":"admin","author_link":"https:\/\/web3unplugged.io\/blog\/author\/admin\/"},"rttpg_comment":0,"rttpg_category":"<a href=\"https:\/\/web3unplugged.io\/blog\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>","rttpg_excerpt":"By: Amr Alashaal, Regional Vice President &#8211; Middle East at A10 Networks CSOs, CIOs and CISOs have never had it so tough. Alongside their traditional responsibilities of safeguarding the corporation\u2019s physical assets on a day-to-day basis and preparing crisis management strategies, they must now face a cybersecurity&nbsp;threat environment that is growing exponentially. Today,&nbsp;ransomware&nbsp;has become one&hellip;","_links":{"self":[{"href":"https:\/\/web3unplugged.io\/blog\/wp-json\/wp\/v2\/posts\/17402","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/web3unplugged.io\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/web3unplugged.io\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/web3unplugged.io\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/web3unplugged.io\/blog\/wp-json\/wp\/v2\/comments?post=17402"}],"version-history":[{"count":1,"href":"https:\/\/web3unplugged.io\/blog\/wp-json\/wp\/v2\/posts\/17402\/revisions"}],"predecessor-version":[{"id":17405,"href":"https:\/\/web3unplugged.io\/blog\/wp-json\/wp\/v2\/posts\/17402\/revisions\/17405"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/web3unplugged.io\/blog\/wp-json\/wp\/v2\/media\/17404"}],"wp:attachment":[{"href":"https:\/\/web3unplugged.io\/blog\/wp-json\/wp\/v2\/media?parent=17402"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/web3unplugged.io\/blog\/wp-json\/wp\/v2\/categories?post=17402"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/web3unplugged.io\/blog\/wp-json\/wp\/v2\/tags?post=17402"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}