Cyber Defense eMagazine December 2019
Cyber Defense eMagazine January Edition for 2020 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group with Pierluigi Paganini, Yan Ross as International and US Editors-in-Chief and many more hard working amazing contributors!
Cyber Defense eMagazine January Edition for 2020 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group with Pierluigi Paganini, Yan Ross as International and US Editors-in-Chief and many more hard working amazing contributors!
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
102<br />
Empower Other Teams<br />
Network and security teams are often assigned tasks that originate from other teams in IT. In some cases,<br />
these tasks can be offloaded into the broader IT group, especially with the right tools in place. Gartner<br />
fellow and research vice president Tom Scholtz states, “Many routine security functions can be<br />
performed as well by other IT or business functions.” Tom recommends that organizations identify<br />
functions or capabilities (such as user awareness communication) that can be handled elsewhere in the<br />
business or IT department.<br />
One example is provisioning network access for new servers or decommissioning access for outdated<br />
servers. The server team can be tasked with these changes as long as they have appropriate guidelines<br />
and guardrails to ensure they do not introduce new risks. An automated process for cloning the access<br />
policy from one server to another (or to a group of servers) can repeatedly save valuable time for the<br />
network team. Another automated process for decommissioning server access can complement the task<br />
and tighten network security.<br />
In addition, with automation, these tasks can be automatically integrated into the work of other teams and<br />
be completed without needing additional assets from the scarce cybersecurity resources. In this way,<br />
teams can decommission servers in the firewalls as part of the actual server decommissioning process<br />
that is happening elsewhere in IT, or clone its firewall rules as part of setting it up. This is also the case<br />
with risk analysis. In the manual days, every change request had to be manually checked for risks using<br />
resources that are in short supply. With change automation, risk analysis can happen as part of the<br />
automated change process, and only in cases where there is an actual risk, it will be forwarded to the<br />
risk officers for further analysis.<br />
Another example is managing application connectivity. Network teams have to enable connectivity for<br />
application teams in order to support the business. The language barrier between application owners and<br />
network engineers doesn’t make the task any easier. Application-driven automation for establishing and<br />
troubleshooting connectivity empowers the application teams to initiate requests and analyze<br />
disconnects, ensures security policy controls are baked into the process, and leads to tight cooperation<br />
between the teams.<br />
With analyst firm ESG’s annual global IT survey finding that the cybersecurity skills shortage has been<br />
increasing steadily – with 53 percent of organizations bemoaning a lack of necessary talent – it’s difficult<br />
to overstate the need to approach this problem in an inventive way.<br />
Organizations need to look for fresh ways to manage complexity and improve operational efficiency,<br />
which in turn will improve security. Security policy management and automation can enable organizations<br />
to better meet the demands of the modern era without being derailed by the cybersecurity skills shortage.