Intelligent CISO Issue 26 | Page 43

EXPERT OPINION – but it is exceptionally important when trying to create appropriate enforcement policies and controls as part of a Zero Trust strategy. Ultimately, businesses need to know who – and what – is trying to access what before they can create the correct parameters and controls. Are there any emerging trends in this area that CISOs should be planning for? Maintaining close control of their networks and device ecosystem continues to become more difficult as IoT and OT devices increase. In order to achieve effective security, the full context of connected devices must be available to regain both visibility and control. Grappling with the growing number of attack vectors while meeting more and more compliance directives, CISOs have their hands full. The advancements in network segmentation have been designed to allow businesses to automate threat detection and isolation without impacting operations. Through limiting risks, maximising control and assuring controls are effectively implemented across a network, enterprises can more effectively prepare and manage the inevitable next wave of cyberthreats. u Gaining full visibility over devices, whether they be permanent or BYOD, IT or OT is a strong foundation for any cybersecurity practice. www.intelligentciso.com | Issue 26 43