Intelligent CISO Issue 14 | Page 75

practices implemented are in line with industry standards to reduce the chance of unintentionally opening the enterprise to new risks. Security awareness training for the workforce is the final vital step, ensuring that staff are able to identify and avoid cyberthreats like phishing, malware and scams. Utilising security tools to scan emails, manage communications and quarantine any malicious threats that make it through the enterprise’s security perimeter should also be in place. Many organisations are eliminating the risks posed by the vulnerabilities of the www.intelligentciso.com | Issue 14 traditional browser by disconnecting it from local IT and moving it to the cloud to create an additional layer of security. Finally, when it comes to the transfer of personal or sensitive data between a supplier and vendor, compliance tools can help find data leaks before hackers do. Understand supply chain dependencies Modelling and analysing the supply chain – including identifying the operational impact of a critical supplier’s facility being out of commission – will help uncover any hidden or overlooked Taking a holistic approach to data security is a must – and there are a number of steps organisations can take to mitigate their supply chain risk. 75