01.11.2023 Views

The Cyber Defense eMagazine November Edition for 2023

Cyber Defense eMagazine November Edition for 2023 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! 196 page November Edition fully packed with some of our best content. Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

Cyber Defense eMagazine November Edition for 2023 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! 196 page November Edition fully packed with some of our best content. Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

In terms of prioritization, out of eight items, cybersecurity was ranked fifth overall. All participants<br />

mentioned their companies prioritized other goals over cybersecurity, such as client satisfaction and<br />

business growth. However, most participants agreed cybersecurity should be a higher priority because<br />

of its potential to affect core business operations.<br />

For most participants, cyber attacks are handled internally until external resources are needed. When<br />

determining whether to bring in an external vendor, IT considered expertise and certifications, while<br />

communications focused on confidentiality. Smaller companies who may not have the right expertise inhouse<br />

are more likely to hire an external vendor.<br />

It’s often unclear what steps a company can take to persuade leadership on the importance of<br />

cybersecurity and effectively build and communicate a plan. Following the survey, three key solutions<br />

emerged on how to bridge the cybersecurity gap between IT and communications departments.<br />

Build a cyber-aware culture:<br />

Oftentimes, leadership can’t visualize how cybersecurity can impact the bottom-line or think cybersecurity<br />

insurance is enough to cover damages. <strong>The</strong>re<strong>for</strong>e, they don’t prioritize or put funding towards it.<br />

Companies can appoint a Chief In<strong>for</strong>mation Security Officer to oversee cybersecurity initiatives and<br />

ensure it’s integrated and communicated throughout an organization. <strong>The</strong> Hahn team undergoes<br />

quarterly cybersecurity reviews with Silent Quadrant to ensure proper security controls are in place and<br />

operating effectively. Our team acts as a human firewall by training monthly on how to recognize and<br />

respond to threats.<br />

Build a joint cyber rapid response plan with regular updating and testing:<br />

<strong>Cyber</strong>security is an ongoing investment and requires time and funds <strong>for</strong> regular updates and<br />

maintenance. However, the cost outweighs potential risks, affecting jobs, operations, reputations and<br />

client trust. Many companies believe the chances <strong>for</strong> a data breach are low or their current security<br />

measures are sufficient. Un<strong>for</strong>tunately, as we saw with the disastrous Colonial Pipeline hack, even just<br />

one attack can come with severe effects. Hahn’s in<strong>for</strong>mation security program is built upon the Silent<br />

Quadrant <strong>Cyber</strong>security Framework, which exceeds National Institute of Standards and Technology<br />

standards. With the help of a cybersecurity experts and rapid response workshops, companies can build<br />

a functional plan and continually assess one’s current security posture by testing <strong>for</strong> vulnerabilities.<br />

Build an effective method to communicate the plan:<br />

For a cyber rapid response plan, remove any technical jargon which could be misinterpreted or lead to<br />

confusion. Make sure everyone fully understands the procedure, roles and responsibilities. Hahn, with<br />

Silent Quadrant’s support, teaches clients to make security best practices instinctual by inviting internal<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2023</strong> <strong>Edition</strong> 171<br />

Copyright © <strong>2023</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!