Intelligent CISO Issue 07 | Page 73

to model the provisioning of access across a new network perimeter between the two organisations can help alleviate this problem and minimise the chance of a cyberattack. Where are the risks? Enterprise IT networks can be vast. So, as networks get divided, it can be extremely problematic to understand where the new network perimeters exist. This challenge is compounded by the fact that access points between the two entities are still likely to exist www.intelligentciso.com | Issue 07 In addition to the IT network, the security teams responsible for keeping the attack surface protected must also be split. beyond the divestment process. Only by employing a solution that provides visibility of the entire network can the businesses identify where the new network perimeter is situated, where or how connectivity should be removed and what levels of security and connectivity are needed or not. There is also a possibility that a breach could cross over from one organisation to the other. The solution to this is to enable security teams to fully understand the expected impact and path of an attack and whether the most appropriate 73