2022 CHAMPIONS - THE BEST OF 2022 AST 2022 CHAMPIONS EDITION FINAL | Page 56

likelihood of a cyber intrusion begins with a proactive securi- ty posture and cyber hygiene measures that prevent access in the first place .

www . AmericanSecurityToday . com 2022 CHAMPIONS - Edition 66

It s important that organiza- tions validate all remote access points to their networks along with enabling multi-factor au- thentication . Software should be frequently updated to ad- dress known exploits and vul- nerabilities .

Hardware asset and software ap- plication inventories must be accurate . Recent OpenSSL and Log4J vulnerabilities high- light the importance of continuously updating your organiza- tion s software bill of materials ( SBOM ) to ensure all of your software and its dependencies are known and updated imme- diately , rather than in days or weeks . SBOMs are analogous to the ingredients list on a food label . It is common for current applications ( a food ) to integrate software libraries ( ingredients ) from other developers ( reduc- ing developer engineering using normalized blocks of functional code ).

Real-time , accurate visibility of every organizational endpoint is critical because you can t protect what you can t see . This means a converged strategy that brings together tools , work- flows , and teams to achieve visi- bility , control , and remediation at scale , in real-time . And base- line your normal configuration so anomalies readily surface .

Big data platform analytics help to highlight historical trends and analyze attacker vectors , but their use must be balanced against their high data storage and transport costs .

56