02.12.2019 Views

Cyber Defense eMagazine December 2019

Cyber Defense eMagazine January Edition for 2020 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group with Pierluigi Paganini, Yan Ross as International and US Editors-in-Chief and many more hard working amazing contributors!

Cyber Defense eMagazine January Edition for 2020 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group with Pierluigi Paganini, Yan Ross as International and US Editors-in-Chief and many more hard working amazing contributors!

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

102<br />

Empower Other Teams<br />

Network and security teams are often assigned tasks that originate from other teams in IT. In some cases,<br />

these tasks can be offloaded into the broader IT group, especially with the right tools in place. Gartner<br />

fellow and research vice president Tom Scholtz states, “Many routine security functions can be<br />

performed as well by other IT or business functions.” Tom recommends that organizations identify<br />

functions or capabilities (such as user awareness communication) that can be handled elsewhere in the<br />

business or IT department.<br />

One example is provisioning network access for new servers or decommissioning access for outdated<br />

servers. The server team can be tasked with these changes as long as they have appropriate guidelines<br />

and guardrails to ensure they do not introduce new risks. An automated process for cloning the access<br />

policy from one server to another (or to a group of servers) can repeatedly save valuable time for the<br />

network team. Another automated process for decommissioning server access can complement the task<br />

and tighten network security.<br />

In addition, with automation, these tasks can be automatically integrated into the work of other teams and<br />

be completed without needing additional assets from the scarce cybersecurity resources. In this way,<br />

teams can decommission servers in the firewalls as part of the actual server decommissioning process<br />

that is happening elsewhere in IT, or clone its firewall rules as part of setting it up. This is also the case<br />

with risk analysis. In the manual days, every change request had to be manually checked for risks using<br />

resources that are in short supply. With change automation, risk analysis can happen as part of the<br />

automated change process, and only in cases where there is an actual risk, it will be forwarded to the<br />

risk officers for further analysis.<br />

Another example is managing application connectivity. Network teams have to enable connectivity for<br />

application teams in order to support the business. The language barrier between application owners and<br />

network engineers doesn’t make the task any easier. Application-driven automation for establishing and<br />

troubleshooting connectivity empowers the application teams to initiate requests and analyze<br />

disconnects, ensures security policy controls are baked into the process, and leads to tight cooperation<br />

between the teams.<br />

With analyst firm ESG’s annual global IT survey finding that the cybersecurity skills shortage has been<br />

increasing steadily – with 53 percent of organizations bemoaning a lack of necessary talent – it’s difficult<br />

to overstate the need to approach this problem in an inventive way.<br />

Organizations need to look for fresh ways to manage complexity and improve operational efficiency,<br />

which in turn will improve security. Security policy management and automation can enable organizations<br />

to better meet the demands of the modern era without being derailed by the cybersecurity skills shortage.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!