Intelligent CISO Issue 35 | Page 52

BT is on the receiving end of an average of around 6,500 attacks every day , so we have to use all the tools at our disposal to protect our operations , people and customers .
COVER STORY
but also their patching status ) and then putting in place clear protections based on this knowledge , is crucial for successful security .
We also recognise the importance of ensuring all of BT ’ s circa 100,000 employees understand the behaviours they need to adopt to protect BT , as you ’ re only ever as secure as your weakest link . That ’ s why we run a comprehensive programme to ensure they all have the tools and understandings that ensure they ’ re acting as securely as possible .
Can you highlight any recent examples of when you have overseen a technology implementation / worked with a vendor to enable an enhanced cybersecurity posture ?
As COVID-19 hit last year , BT Security had to rapidly scale up its security capabilities around remote working . As part of this , we worked with CrowdStrike to employ enhanced Endpoint Detection and Response ( EDR ) across BT to help secure our devices , cloud systems and the network as a whole .
We didn ’ t expect to be able to deploy CrowdStrike ’ s technology at the scale and pace that we did during this period . We went from zero servers to tens of thousands covered in days and weeks , rather than the months expected , breaking all rollout records . We also worked closely with the CrowdStrike team to ensure secure connectivity out to the cloud was achieved without taking local resources like CPU cycles and bandwidth away from users .
More generally , we use CrowdStrike as a key part of our response and investigation into security incidents . The company helps to give us real-time intelligence and context of the threat environment and

BT is on the receiving end of an average of around 6,500 attacks every day , so we have to use all the tools at our disposal to protect our operations , people and customers .

allow us to rapidly investigate breaches within the ‘ golden ’ first hour so that we can quickly stop and eject malicious attackers .
52 www . intelligentciso . com