
Ushering a New Era in Enterprise Security

As the enterprise security landscape continues to witness numerous technological advances and undergo massive digital transformation, organizations realize the value of blending the foundational security principles with the latest technological developments. As such, it is imperative for organizations to keep pace with the recent advancements while not losing sight of the core foundational principles when it comes to enterprise security.
HOW DO YOU THINK BUSINESSES SHOULD PROGRESS IN TERMS OF SECURITY AND ENSURE THAT THEY HAVE THE FOUNDATIONAL COMPONENTS REQUIRED TO SOLVE THE BASIC SECURITY CHALLENGES?
In this ever-changing IT and security arena, professionals need to be business enablers and not inhibitors to ascertain that business can move at the pace that it needs to. As organizations increasingly transition to the cloud, the importance of interoperability among different systems and technologies continue to rise with time. From a security perspective, enterprises must focus on the topmost critical security controls and deploy them to check important boxes, be it running a vulnerability management scan, establishing a secure configuration, or ensuring that the right people have access to critical data. For instance, The Center for Internet Security (CIS) Critical Security Controls is particularly convenient in this respect; there are 20 essential security controls that are easy to work with. Further, it is important that this process enables business leaders to make informed decisions and move forward when they have met the minimum grading requirement to stay ahead of the pack.
Security is all about communicating, creating visibility and transparency, while adopting a risk-based approach and creating acceptable risk tolerance to propel organizations into the next phase of evolution.
Security is not merely a cybersecurity or IT problem; it is a business problem as well. To create guard rails for businesses against potential threats, organizations must take a risk-based approach to ensure a solid security framework. Depending on the sensitivity of the data contained in an application or system, it is vital to deploy the right security controls. For specific applications, it might be as simple as ensuring the right people are accessing the data and implementing them securely, while when it comes to critical systems holding important information, such as CRM systems, it is crucial to invest ample time in reviewing the vital components such as high volume data transmission and storage, as well as privacy, in security projects.
WHAT ARE SOME OF THE CHALLENGES AND TRENDS THAT YOU ARE CURRENTLY SEEING IN THE MARKETPLACE?
One of the most significant opportunities I think in our industry today is orchestration. The challenge is, even though there are multiple providers ready to assist with automating workflows, businesses either do not have the time nor resources required to implement automation. However, some of the best-in-class organizations are taking the necessary time, maybe a month or eight weeks depending on their size, out of their core project planning process to automate their workflows, in turn, saving their time two-folds and beyond in terms of orchestration. Amongst these different orchestrations, including service task and network orchestration, the one I am cautiously optimistic about is API orchestration. Imagine the time and resources security teams can save if they are not required to do a risk assessment on every API integration implementation and rather outsource it to an organization that specializes in it.
In my opinion, API orchestration has immense potential to free up enterprise resources and enable security leaders to focus on being better business advisors.
WHEN IT COMES TO THE FUTURE, WHAT ARE THE OTHER DISRUPTIONS OR ADVANCEMENTS THAT YOU SEE EMERGING IN THE ENTERPRISE SECURITY LANDSCAPE?
The biggest buzzword today is “digital transformation,” and consequently, IT and security organizations now have to become more efficient and automated to be able to scale swiftly. Digital transformation goes hand-in-hand with the culture shift because oftentimes, it is not the technology that fails us, but our business processes. To stay abreast of the current changes, security teams must be able to adopt the right mindset to innovate quickly, make good decisions, and streamline their business processes. Besides, with cloud migration gaining steam, scaling up the business while reacting to the changing market conditions rapidly has become easier than ever, even for small groups that do not have considerable funding at their disposal. Enterprises that fail to adapt to this digital revolution and make the transition to hosted platforms are at a greater risk of becoming obsolete in the next five years.
WHAT ACCORDING TO YOU, IS THE RIGHT APPROACH TO IDENTIFY THE RIGHT PARTNERS AND SOLUTION PROVIDERS FOR A PARTICULAR BUSINESS?
When it comes to enterprise security, first and foremost, it is crucial for an individual to have a thorough understanding of the business as a whole along with their core mission and objectives.
For budding entrepreneurs embarking on a new venture, I would say, it is essential to get a good handle on business processes, identifying if there is a lag or delay and how it can be improved. You must be aware of what is it that you are trying to fix before actually fixing it. Also, creating an effective strategy for leveraging the right security partners goes a long way in improving efficiency in this fast-evolving digital landscape. This includes identifying capabilities you will keep in house versus leveraging partners with capabilities not core to your business. Security is all about communicating, creating visibility and transparency, while adopting a risk-based approach and creating acceptable risk tolerance to propel organizations into the next phase of evolution.
ON THE DECK
Featured Vendors
THETA432: Performance, Precision, Efficiency, Visibility - The Key to Incident Response and Answer to the Talent Shortage
EveryCloud Technologies: Delivering Powerful Email Filtering Services" title="Graham O'Reilly, CEO & Co-Founder" style="float:left; margin-right:10px; margin-bottom:20px;" width="60px" height="50px">
EveryCloud Technologies: Delivering Powerful Email Filtering Services
Onepath: A Responsive Info-Security Management Framework – the easier way to dramatically improve your overall info-security posture
Covenant Security Solutions, Inc.: Revolutionary Solutions to Mitigate Security and Compliance Risks
EDITOR'S PICK
Essential Technology Elements Necessary To Enable...
By Leni Kaufman, VP & CIO, Newport News Shipbuilding
Comparative Data Among Physician Peers
By George Evans, CIO, Singing River Health System
Monitoring Technologies Without Human Intervention
By John Kamin, EVP and CIO, Old National Bancorp
Unlocking the Value of Connected Cars
By Elliot Garbus, VP-IoT Solutions Group & GM-Automotive...
Digital Innovation Giving Rise to New Capabilities
By Gregory Morrison, SVP & CIO, Cox Enterprises
Staying Connected to Organizational Priorities is Vital...
By Alberto Ruocco, CIO, American Electric Power
Comprehensible Distribution of Training and Information...
By Sam Lamonica, CIO & VP Information Systems, Rosendin...
The Current Focus is On Comprehensive Solutions
By Sergey Cherkasov, CIO, PhosAgro
Big Data Analytics and Its Impact on the Supply Chain
By Pascal Becotte, MD-Global Supply Chain Practice for the...
Technology's Impact on Field Services
By Stephen Caulfield, Executive Director, Global Field...
Carmax, the Automobile Business with IT at the Core
By Shamim Mohammad, SVP & CIO, CarMax
The CIO's role in rethinking the scope of EPM for...
By Ronald Seymore, Managing Director, Enterprise Performance...
Driving Insurance Agent Productivity with Mobile and Big...
By Brad Bodell, SVP and CIO, CNO Financial Group, Inc.
Transformative Impact On The IT Landscape
By Jim Whitehurst, CEO, Red Hat
Get Ready for an IT Renaissance: Brought to You by Big...
By Clark Golestani, EVP and CIO, Merck
Four Initiatives Driving ECM Innovation
By Scott Craig, Vice President of Product Marketing, Lexmark...
Technology to Leverage and Enable
By Dave Kipe, SVP, Global Operations, Scholastic Inc.
By Meerah Rajavel, CIO, Forcepoint
AI is the New UI-AI + UX + DesignOps
By Amit Bahree, Executive, Global Technology and Innovation,...
Evolving Role of the CIO - Enabling Business Execution...
By Greg Tacchetti, CIO, State Auto Insurance
Read Also
DISRUPTING IoT CONSUMER CENTRIC SOLUTIONS
METAVERSES AND IOT: EVOLUTION OR SYMBIOTIC RELATIONSHIP?
The Sustainable Side Of The Internet Of Things
Embracing Technological Advancements And Innovation Through Diverse...
The Evolution Of Commercial Office Developments Through Digital Twin
How AI can help save us from the fallout of the Great Resignation
