FIVE RESOLUTIONS FOR CISOs HEADING INTO 2020

By Boaz Gorodissky Co-founder and Chief Technology Officer, XM Cyber Engineering

ARTICLES

BOAZ GORODISSKY is a 30-year veteran of the Israeli Intelligence Community, most recently serving as Head of the Technology. In this role, he re-organized and headed technology divisions, overseeing thousands of engineers and a large-scale budget. Mr. Gorodissky began his career as a software engineer and then founded the first offensive cyber department. Mr. Gorodissky holds a B.Sc. in mathematics and computer science and an M.Sc. in computer science from the university of Tel-Aviv.

Attackers are evolving just as fast as (if not faster than) security teams can adapt their defenses. Couple that with the fact that networks are becoming increasingly huge, complex and dynamic, and it’s clear that the old techniques for warding off attackers are no longer adequate. Let’s look at five resolutions that CISOs should consider in order to stay ahead of the game in 2020.

ENLIST THE HELP OF A MANAGED SECURITY SERVICE PROVIDER (MSSP)

In today’s complex world, handling cybersecurity with your own resources is often a losing strategy. Most organizations need to shift the responsibility of defending their critical assets to an MSSP. As attack surfaces expand, it’s imperative to understand the weak points within your security posture. This is a complex and comprehensive task often best left to external experts.

REMEMBER THIS MANTRA: CLOUD, CLOUD, CLOUD

Real estate agents often repeat the mantra “location, location, location.” In a nutshell, the phrase emphasizes the importance of location when considering the value of a property. Expect big players who still rely on onprem to develop their own mantra: “Cloud, cloud, cloud.” As large organizations migrate in greater numbers and reap the benefits of cloud, they’ll need to do a better job of understanding how one small misconfiguration error can jeopardize an organization’s most valuable assets.

AUTOMATION: DO MORE, WITH LESS

Historically, penetration testing has been conducted by security experts — ethical “white hat hackers” who apply their knowledge of how to breach defenses to the task of penetrating an organization’s networks.

Breach and attack simulation (BAS) tools automate the testing process by performing the cycle of scan, exploit and repeat while providing insight on security gaps and reducing the manual effort needed to test. BAS tools also offer another edge: They provide a dynamic window into an organization’s defenses through continuous testing, rather than taking a single snapshot of a moment in time.

Because the standard vulnerability tools are not good enough, CISOs will need to shift to a smarter and more concrete prioritization. Choose tools that know how to digest all your problems and malfunctions. At the same time, pick the ones that look for vulnerabilities and tell you how to remediate them.

Vulnerability management (VM) is a recommended best practice to protect your organization and data. VM refers to an ongoing, comprehensive process or program that aims at managing an organization’s vulnerabilities in a holistic and continuous manner.

Automation has unlocked extraordinary efficiency gains across virtually every industry, especially in developed countries where the technology is more mature. The security realm is no exception. When you don’t have a large enough team — and there are thousands of products to evaluate within IT security — efficiency is an absolute mandate.

PRIORITIZE BETTER THAN THE ATTACKERS

There is no more room for tools that give you long lists with endless things to remediate. The CISO needs to clearly understand what the most critical problems are and what to do in advance. In short, the CISO needs to be prepared and ready to know how to prioritize concrete things. In 2020, this will be the most cost-effective way to defend your critical assets.

Just like CISOs, hackers have their constraints and will need to prioritize in order to find easier targets with the least resistant points. Your duty is to keep your organization from becoming a potential target. Your house should look safe and be more protected than your neighbor’s house.

Hackers will make full use of automated tools to try to infiltrate your systems and cause extraordinary damage to your most critical assets. If you don’t leverage the power of automated tools to the same degree, you’ll be at a significant disadvantage. Spreading a few simulators around the network isn’t a viable solution. The critical tools needed to detect, investigate and respond to targeted attacks require a holistic view of the attack lifecycle and a real-world understanding of the attacker’s intent.

In short, automated tools are the only way that we can ensure that we’re always one step ahead of the attacker. A smart CISO in 2020 will have BAS and second-generation VM as priorities, in order to find the most critical vulnerabilities and prioritize remediation.

IT HYGIENE: DON’T WORRY, BE HEALTHY

Many cyberattacks are surprisingly unsophisticated – so simple, in fact, that most of them could be prevented just by incorporating some basic best practices. Hackers no longer need to put in the time-consuming effort necessary to create elaborate new attacks, because they know they can sneak through companies’ defenses just by taking advantage of poor IT hygiene.

In order to keep the best security posture, keep your IT hygiene in good shape in 2020. How? Look for security tools that can continuously understand your IT hygiene problems, pinpoint the most critical IT problems to be fixed, and provide guidance for how to correct them. A system is like a human body: It needs to be clean and healthy. As we head into a new decade, it’s important for CISOs to reassess the strengths and weaknesses of both their network security and the analysts employed to keep things secure. Every enterprise has its own, unique threat landscape, and it’s necessary for CISOs to identify the solutions that fit their specific needs.

Additional Resources

315x185 support 124

ARTICLE: Why IT Hygiene Is Important

Bad guys no longer need to waste time constructing elaborate new attacks because they know they can sneak through companies’ defenses.

Read Now

computer 1000 forward 6

DEMO: Watch in 3 Minutes

Watch this quick demo to see what the next generation of breach and attack software can do for your organization.

Watch Now

315x185 support 66

DATA SHEET: AWS Use Cases

Now you can truly see your cyber risk in relation to your most critical assets. And proactively act to remediate.

Download Here

THINK LIKE A HACKER