Intelligent CIO APAC Issue 14 | Page 46

CIO OPINION hours later . In an intelligent , adaptive cybersecurity framework , such an event should raise a red flag until such a time as the reasons for the outage can be determined .
Aside from IoT devices and cloud applications ’ redefinition as endpoints that need cybersecurity consideration , 2020 and 2021 have writ large the issue of bring your own device or BYOD . Or perhaps that should be bring your own disaster or even , soon , bring your own office !
Introducing Endpoint Privilege Management
Many millions of words have been written about the different ways in which organizations can help their users demarcate between work and personal applications and / or workloads on their laptops , smartphones and other devices . However , the new normal demands a more finely tuned approach , something we call Endpoint Privilege Management .
Users now need a multitude of credentials and authentication methods to be able to access applications .
To access my work email , it might be perfectly fine to authenticate with a username , password and multifactor authentication . But if I want to access customer data , that level of security control is not satisfactory . I can ’ t just move across and use the same security controls to access sensitive data . We refer to that as ‘ leveling up ’, in the sense that you must satisfy more stringent security controls .
ABOUT THE AUTHOR data integrity . Today many thousands of devices connect through a network : the Internet of Things ( IoT ) exists to a greater degree than many people imagine . Ensuring that machine security and identity is part of the risk assessment is now a critical part of cybersecurity practice .
Take , for example , an IoT network in which one device might drop off the radar then reappear a few
Joseph Carson is the Chief is the author of Privileged Account Security Scientist and Advisory Management for Dummies and CISO for ThycoticCentrify , a leading Cybersecurity for Dummies , and is a provider of cloud identity security cybersecurity professional solutions formed by the merger of and ethical hacker . He is a privileged access management cybersecurity advisor to several ( PAM ) leaders Thycotic and governments and the critical Centrify . Carson has over 25 years ’ infrastructure , financial and experience in enterprise security , transportation industries .
These additional security controls can be quite granular and context specific . For example , when I tried to access sensitive company information on a business trip in another country – you may remember those – I got a notification from my team . That ’ s because our automated systems had flagged my behavior as anomalous against the company ’ s policies .
Even though the technology used in situations like this is extremely sophisticated under the hood , for the user simplicity is vital . One of my mentors told me many years ago that security should be like a light bulb or electricity . You hit the switch , and you don ’ t need to know the complexity in the background , it just works for you . p
46 INTELLIGENTCIO APAC www . intelligentcio . com