Intelligent CISO Issue 33 | Page 53

In our industry , the most common method of cyberattack is the method of impersonation .
CISOs need to be sure to choose technology that supports and enables their team and streamlines processes .
COVER STORY

In our industry , the most common method of cyberattack is the method of impersonation .

employees from potential attacks with comprehensive protections and controls , outside of the usual business perimeters .
In addition , today ’ s cybercriminal is not just someone in a room on a computer . We are seeing a rise in the likes of advanced threats and organised crime organisations . These guys do research before they launch an attack – they get to know your organisation , your social presence , your colleagues and employees . They get to know who your partners are and who your customers are . They take the time to understand how your business works before launching an attack .
How does the Proofpoint solution mean you can operate with a strong cybersecurity posture ?
The solution provides in-depth preventative protection which helps us detect malicious activity . Not only does it provide an incredible SOC which tracks threats at the mail filter level , but it also provides a fantastic response capability to detect and remove threats from mailboxes . This advanced technology also provides reports that gives us the ability to demonstrate ROI to stakeholders , which is key .
What are some of the specific cyber incidents you face in your industry and how can these be combatted ? victim . Over email , a hacker could pretend to be a potential customer , a partner agency , or even someone from a trusted organisation like a bank or government institution .
A key way we combat this is awareness training with our employees , as they are our company ’ s first line of defence and it ’ s crucial they stay vigilant to these types of attacks . This educational component needs to be backed by quality incidence response technology , as humans are fallible , and we need to ensure there is technology in place that protects them and the company ’ s data .
How is FirstPort placed in terms of dealing with evolving future cyberthreats ?
As a business that continues to grow , we keep an eye on the evolving security landscape and continually measure our security posture against the current climate to ensure we stay protected .
The rise in remote working means that employees are outside of the usual business perimeter , meaning that cloud security is more important than ever . Security teams need the visibility of how and when their employees are being targeted remotely .
How has Proofpoint ’ s solution contributed to this preparedness ?
Proofpoint has empowered us as a business to ensure that we are always on the front foot when it comes to battling security threats . It provides us with ample information so we can make well-informed decisions based on realtime insights and it gives our team the capacity to plan ahead .
What advice would you offer to other CISOs navigating the current technology landscape ?
I would recommend CISOs focus on business impact assessment . They need to identify their assets and perform quantitative risk assessments to truly understand what it would cost the business should these assets be comprised , vs . the cost of buying the technology to protect these assets .
CISOs need to be sure to choose technology that supports and enables their team and streamlines processes . They should look for automated response technology that can reduce any time dedicated to manual repetitive tasks . This ensures the solution can adapt to changing business scale and allows security teams to focus their efforts on tackling potential threats . u

CISOs need to be sure to choose technology that supports and enables their team and streamlines processes .

In our industry , the most common method of cyberattack is the method of impersonation . These types of attacks are particularly tricky as they can be used in myriad ways to trick the intended
www . intelligentciso . com
53