Intelligent CISO Issue 07 | Page 74

preventative security measures are in place to defend their business using network modelling technology. How do we segregate security teams? In addition to the IT network, the security teams responsible for keeping the attack surface protected must also be split. The challenge of this is two-fold: First, with fewer members on each new team there will inevitably be the creation of a knowledge gap in both organisations and, second, there will be fewer people to deal with a similar number of attacks on the networks. To counteract these challenges, organisations need to get all employees up to speed with risks in both entities 74 Only by employing a solution that provides visibility of the entire network can the businesses identify where the new network perimeter is situated. to ensure attacks don’t slip through the cracks and it’s likely they need to hire additional staff to fill the resource void. Security solutions are also available which can highlight the highest priority risks using automated data correlation and recommend the defences and controls that should be put in place to mitigate the risks of shared services and networks. This way, security teams are able to prioritise where to focus their efforts and make better use of human resources. Are we at risk of non-compliance? A huge concern for the CFO of an organisation on the brink of divestment is the potential regulatory impact, so this must be clearly understood. As a new network perimeter is planned and introduced, the security teams need to Issue 07 | www.intelligentciso.com