Intelligent CIO APAC Issue 05 | Page 19

LATEST INTELLIGENCE
PRESENTED BY
Download whitepaper here

PROTECTING THE END USER

A PEOPLE-CENTRIC APPROACH TO MANAGING VULNERABILITY , ATTACKS AND PRIVILEGE

tTODAY ’ S ATTACKS TARGET PEOPLE , NOT INFRASTRUCTURE

Organisations are spending more than ever on cybersecurity and getting less value from it . Attacks keep getting through . Sensitive information keeps falling into the wrong hands . And data breaches keep making headlines .
It ’ s time for a fundamental rethink . Traditional cybersecurity models were built for an earlier era – when the prevailing security model was to lock down the perimeter and deal with threats after they got through . The approach barely worked then ; it ’ s hopelessly broken now .
That ’ s because people , not technology , are attackers ’ biggest target – and your biggest risk . This change in the threat landscape requires a fresh mindset and new strategy , one that focuses on protecting people rather than the old perimeter .
But what does this new approach look like in practice ? This guide explores that question by outlining the foundational elements of security in the modern era . It describes the factors that play into end-user risk . It explains how to mitigate these factors . And it recommends concrete steps you can take to build a people-centric defence .
WHY PROTECTION STARTS WITH PEOPLE
It ’ s clear that the usual defend-the-perimeter model of cybersecurity isn ’ t working – and hasn ’ t worked for years . More than two thirds of IT security professionals polled in a recent Ponemon study expect cyber attacks to “ seriously diminish their organisation ’ s shareholder value .” And more than believe their cybersecurity posture is leveling off or even declining .
1 Blame two converging trends : the perimeter is dissolving , and attackers are shifting their focus away from technology and towards people . • www . intelligentcio . com INTELLIGENTCIO
19