EXPERT
OPINION
– but it is exceptionally important
when trying to create appropriate
enforcement policies and controls as
part of a Zero Trust strategy. Ultimately,
businesses need to know who – and
what – is trying to access what before
they can create the correct parameters
and controls.
Are there any emerging trends
in this area that CISOs should be
planning for?
Maintaining close control of their
networks and device ecosystem
continues to become more difficult as
IoT and OT devices increase. In order to
achieve effective security, the full context
of connected devices must be available
to regain both visibility and control.
Grappling with the growing number of
attack vectors while meeting more and
more compliance directives, CISOs
have their hands full. The advancements
in network segmentation have been
designed to allow businesses to
automate threat detection and isolation
without impacting operations.
Through limiting risks, maximising
control and assuring controls are
effectively implemented across a
network, enterprises can more effectively
prepare and manage the inevitable next
wave of cyberthreats. u
Gaining full visibility
over devices,
whether they be
permanent or BYOD,
IT or OT is a strong
foundation for
any cybersecurity
practice.
www.intelligentciso.com | Issue 26
43