31.07.2023 Views

The Cyber Defense eMagazine August Edition for 2023

Cyber Defense eMagazine August Edition for 2023 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

Cyber Defense eMagazine August Edition for 2023 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Leadership and Policy Implementation<br />

Leadership's role in policy implementation is often underestimated. Management sets the tone <strong>for</strong> policy<br />

adherence, creating an environment of compliance and respect <strong>for</strong> cybersecurity rules. Leaders must not<br />

only follow these rules but hold regular discussions about security, address breaches promptly, reward<br />

compliance and encourage continual learning. Moreover, leaders should ensure that policies keep pace<br />

with the rapidly evolving cyber security landscape. This involves regular reviews and updates, reflecting<br />

the latest threats and best practices.<br />

Technology Follows Policy<br />

Teams all too often let technology dictate their strategy, essentially outsourcing their thinking to the<br />

vendor’s protect managers. Why turn on MFA? <strong>The</strong> wrong answer is because your provider suddenly<br />

offers it. <strong>The</strong> right answer is because your policy requires it, stemming from an analysis of the regulatory<br />

environment and your threat profile. Monitoring, encryption and patching all follow a similar path.<br />

Technology should serve to enable and en<strong>for</strong>ce policy rather than drive it. Post-implementation, analytics<br />

tools can monitor compliance trends and exceptions, indicating the need <strong>for</strong> additional training or stronger<br />

controls.<br />

<strong>The</strong> Unseen Champion: Policies<br />

In conclusion, good cyber security isn’t only about state-of-the-art technology. It’s centered on people –<br />

their understanding, their decisions and their actions. Guiding all these elements are your policies: the<br />

unseen champion of your cybersecurity defenses. More than a list of rules, they shape behavior, in<strong>for</strong>m<br />

decisions and <strong>for</strong>tify defenses. In this evolving digital era, people are a constant. As you sit through a<br />

demo of the newest cyber security gadget, remember the silent sentinel – policies – and make the smarter<br />

investment.<br />

About the Author<br />

Craig Burland is CISO of Inversion6. Craig brings decades of pertinent industry<br />

experience to Inversion6, including his most recent role leading in<strong>for</strong>mation security<br />

operations <strong>for</strong> a Fortune 200 Company. He is also a <strong>for</strong>mer Technical Co-Chair of<br />

the Northeast Ohio <strong>Cyber</strong> Consortium and a <strong>for</strong>mer Customer Advisory Board<br />

Member <strong>for</strong> Solutionary MSSP, NTT Globhttp://www.inversion6.comal Security, and<br />

Oracle Web Center. Craig can be reached online at LinkedIn and at our company<br />

website http://www.inversion6.com.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2023</strong> <strong>Edition</strong> 26<br />

Copyright © <strong>2023</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!