Intelligent CIO Europe Issue 12 | Page 43

////////////////////////// “ ONLY BY EMPLOYING A SOLUTION THAT PROVIDES VISIBILITY OF THE ENTIRE NETWORK CAN THE BUSINESSES IDENTIFY WHERE THE NEW NETWORK PERIMETER IS SITUATED. perimeter between the two organisations can help alleviate this problem and minimise the chance of a cyberattack. Where are the risks? The CFO’s priority is to save money and deliver quality returns to investors; they must recognise that cybersecurity is critical in order to reach this goal. So, to enable an efficient and smooth divestment process, what are the strategic security questions that CFOs, CISOs and the broader executive team should be asking themselves? How do we have visibility over who owns which assets? During divestment, it is important to understand which assets need to be separated and which should remain shared to limit operational disruption. It is not just the ownership of the asset that matters but ownership of the liability of the risk of that asset. If there is any ambiguity around who is providing and maintaining the security of a particular part of the network, then the risk of a security breach is dramatically increased. Being able to model the provisioning of access across a new network www.intelligentcio.com Enterprise IT networks can be vast. So, as networks get divided, it can be extremely problematic to understand where the new network perimeters exist. This challenge is compounded by the fact that access points between the two entities are still likely to exist beyond the divestment process. Only by employing a solution that provides visibility of the entire network can the businesses identify where the new network perimeter is situated, where or how connectivity should be removed and what levels of security and connectivity are needed or not. There is also a possibility that a breach could cross over from one organisation to the other. The solution to this is to enable security teams to fully understand the expected impact and path of an attack and whether the most appropriate preventative security measures are in place to defend their business using network modelling technology. INTELLIGENTCIO 43