Enterprise Services, Enterprise Decision Maker
By Camille Mendler 20 Feb 2020
The boring truth about private networks is this: most private networks are local area networks, and enterprises desperately need someone else to manage them.
Cyber-readiness is the ability of an organization to prevent, detect, and respond to cyberattacks in line with its risk appetite. The more "ready" an organization is, the better able it is to defend the enterprise from security incidents and breaches. Yet clearly not all organizations are cyber-ready, with barely a day going by without another headline letting us know of defenses being breached and information and systems being compromised.
Naturally, the primary objective of cyber-readiness is to prevent cyberattacks. However, recognizing that some attacks will not be prevented, the next objective is to detect potential attacks before compromise. Furthermore, not all attacks will be detected, so the organization must then be ready to respond to an in-progress cyberattack.
Security software and services to prevent, detect, and respond to attacks are a key component of cyber-readiness. These technological security controls are combined with process- and people-focused controls to deliver cyber-readiness for the enterprise.
In deciding which security controls to apply, an organization will usually have performed a range of risk assessments on a set of information (for an information-based risk assessment) or a system. Controls are selected based on the mitigation of identified risks in line with the organization’s risk appetite. The risk appetite of some organizations might be high, where taking risks is part of the business, but in many organizations, risk appetite is low, especially where there is a lot of regulation and legislation to comply with.
However, risk mitigation itself isn’t a one-time operation. Organizations should perform frequent exercises to test the robustness of the security controls applied to deal with identified security risks. To address consistency, these tests should be performed against a security scorecard. The outcome of these tests will be reports where the controls can be improved, which can involve reducing them if they’re overly protective, or tightening them if the outcome isn’t in line with the organization’s risk appetite.
The frequency with which cyberattacks are happening indicates that many organizations are not testing security controls adequately. Cyber-readiness is a constant position, requiring a consistent, structured, and tested approach to security across the organization.
Straight Talk is a weekly briefing from the desk of the Chief Research Officer. To receive this newsletter by email, please contact us.
Enterprise Decision Maker
By Eric Parizo 19 Feb 2020
Check Point has accelerated its pace of acquisitions to offer more security solutions for and from the cloud, but it remains hindered by the perception that its technology and market messaging are still too complex.
Europe, Middle East & Africa team: +44 7771 980316
Asia-Pacific team: +61 (0)3 960 16700
US team: +1 212-652-5335
Already an Ovum client? Login to the Knowledge Center now