//////////////////////////
“
ONLY BY
EMPLOYING
A SOLUTION
THAT PROVIDES
VISIBILITY OF
THE ENTIRE
NETWORK CAN
THE BUSINESSES
IDENTIFY
WHERE THE
NEW NETWORK
PERIMETER IS
SITUATED.
perimeter between the two organisations
can help alleviate this problem and minimise
the chance of a cyberattack.
Where are the risks?
The CFO’s priority is to save money and
deliver quality returns to investors; they
must recognise that cybersecurity is critical
in order to reach this goal. So, to enable an
efficient and smooth divestment process,
what are the strategic security questions that
CFOs, CISOs and the broader executive team
should be asking themselves?
How do we have visibility over who
owns which assets?
During divestment, it is important to
understand which assets need to be
separated and which should remain shared
to limit operational disruption. It is not just
the ownership of the asset that matters but
ownership of the liability of the risk of that
asset. If there is any ambiguity around who
is providing and maintaining the security
of a particular part of the network, then
the risk of a security breach is dramatically
increased. Being able to model the
provisioning of access across a new network
www.intelligentcio.com
Enterprise IT networks can be vast. So, as
networks get divided, it can be extremely
problematic to understand where the new
network perimeters exist. This challenge
is compounded by the fact that access
points between the two entities are still
likely to exist beyond the divestment
process. Only by employing a solution that
provides visibility of the entire network
can the businesses identify where the new
network perimeter is situated, where or
how connectivity should be removed and
what levels of security and connectivity are
needed or not.
There is also a possibility that a breach could
cross over from one organisation to the other.
The solution to this is to enable security teams
to fully understand the expected impact and
path of an attack and whether the most
appropriate preventative security measures
are in place to defend their business using
network modelling technology.
INTELLIGENTCIO
43