01.03.2022 Views

Cyber Defense eMagazine March Edition for 2022

The view from the Publisher’s desk is very encouraging, based on celebrating 10 years of growth and success at Cyber Defense Magazine! When our tiny team began our journey at Cyber Defense Media Group (CDMG) together in January 2012, we were happy to help smaller, lesser-known innovators of infosec, get their message out there and Rise Above the noise. Now, after 10 years, we’re even helping multi-billion-dollar companies and governments around the globe with our offices in DC, London, FL, NY and other locations in play, as we continue to scale, thanks to you – our readers, listeners, viewers and media partners. Beyond the magazine, in response to the demands of our markets, the scope of CDMG’s activities has grown into many media endeavors. They now include Cyber Defense Awards; Cyber Defense Conferences; Cyber Defense Professionals (job postings site being revamped); Cyber Defense TV, Radio, and Webinars; and Cyber Defense Ventures (partnering with investors). Please check them out and see how much more CDMG has to offer! Very respectfully and with much appreciation, Gary Miliefsky, Publisher

The view from the Publisher’s desk is very encouraging, based on celebrating 10 years of growth and success at Cyber Defense Magazine! When our tiny team began our journey at Cyber Defense Media Group (CDMG) together in January 2012, we were happy to help smaller, lesser-known innovators of infosec, get their message out there and Rise Above the noise. Now, after 10 years, we’re even helping multi-billion-dollar companies and governments around the globe with our offices in DC, London, FL, NY and other locations in play, as we continue to scale, thanks to you – our readers, listeners, viewers and media partners. Beyond the magazine, in response to the demands of our markets, the scope of CDMG’s activities has grown into many media endeavors. They now include Cyber Defense Awards; Cyber Defense Conferences; Cyber Defense Professionals (job postings site being revamped); Cyber Defense TV, Radio, and Webinars; and Cyber Defense Ventures (partnering with investors).
Please check them out and see how much more CDMG has to offer!

Very respectfully and with much appreciation,
Gary Miliefsky, Publisher

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

into the mix. The COVID-19 pandemic ravaged families, business communities, and economies around<br />

the globe. Those enterprises that moved decisively, migrated to the cloud almost overnight and instantly<br />

expanded the attack surface.<br />

The problems came from several different directions. First, employees working from home were using<br />

unvetted personal devices that potentially contained a smorgasbord of vulnerabilities. These devices<br />

used private and third-party networks to connect to the cloud-based environments required <strong>for</strong> remote<br />

work. And corporate data, sensitive or not, was crossing unknown boundaries on its journey between the<br />

WFH employee and the corporate environment. Penetration testing became unreliable because the<br />

architecture being probed was half in and half out of an organization’s jurisdiction.<br />

Second, DevOps teams – desperately trying to trans<strong>for</strong>m massive chunks of their employers’ business<br />

models to adapt to the new normal – were releasing new digital experiences at the speed of demand.<br />

These releases could, depending on circumstances, contain any number of security holes picked up from<br />

new PaaS environments.<br />

Rethink your digital dogma<br />

As has been said at many points throughout cybersecurity history, what we were doing two years ago no<br />

longer works. Threat actors have proved themselves capable of using every trend, every market shift,<br />

every consumer habit, and every employee error to their advantage. Responses from organizations have<br />

not been as swift. While cybersecurity professionals can never quite recall a “quiet past”, the “stormy<br />

present” of <strong>2022</strong> requires a rethink of our digital dogmas if we are to ensure that employees can stay<br />

safe but remain productive.<br />

The starting point: know yourself. Line of business will always have a handle on financial plans,<br />

operations, market conditions, and a range of other touchpoints. For IT and security teams to be<br />

successful, they must compile a comprehensive asset inventory – from the machines in the office to the<br />

devices in employees’ homes, from the tools on laptops to the inner workings of containerized apps in<br />

the cloud.<br />

Next comes triage. Identifying vulnerabilities is trivial next to the task of managing action. Some<br />

vulnerabilities will be common but may not represent great damage if they were to be exploited. Others<br />

may be rare but represent considerable business risk. The general rule of thumb is that if a vulnerability<br />

can cause significant damage and is relatively easy to exploit by an attacker, it should be high on the<br />

patching list. Anything that is high-risk and not readily addressable should be on a watch list.<br />

Free to innovate<br />

All of this, from the compilation of the asset inventory to the patching actions, should be automated where<br />

possible. Several tools today are capable of automatic asset discovery and policy-based patching.<br />

Overworked CISOs and their embattled teams represent the most overlooked security issue in the post-<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>March</strong> <strong>2022</strong> <strong>Edition</strong> 40<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!