preventative security measures are in
place to defend their business using
network modelling technology.
How do we segregate
security teams?
In addition to the IT network, the security
teams responsible for keeping the attack
surface protected must also be split.
The challenge of this is two-fold: First,
with fewer members on each new team
there will inevitably be the creation of
a knowledge gap in both organisations
and, second, there will be fewer people
to deal with a similar number of attacks
on the networks.
To counteract these challenges,
organisations need to get all employees
up to speed with risks in both entities
74
Only by employing a
solution that provides
visibility of the entire
network can the
businesses identify
where the new
network perimeter
is situated.
to ensure attacks don’t slip through the
cracks and it’s likely they need to hire
additional staff to fill the resource void.
Security solutions are also available
which can highlight the highest priority
risks using automated data correlation
and recommend the defences and
controls that should be put in place to
mitigate the risks of shared services
and networks.
This way, security teams are able to
prioritise where to focus their efforts and
make better use of human resources.
Are we at risk of
non-compliance?
A huge concern for the CFO of an
organisation on the brink of divestment
is the potential regulatory impact, so
this must be clearly understood. As a
new network perimeter is planned and
introduced, the security teams need to
Issue 07
|
www.intelligentciso.com