Trust: A Cyber Team’s Most Effective Tool

Share on facebook
Share on google
Share on twitter
Share on linkedin
tool for proactive security
April 14, 2020

Trust: A Cyber Team’s Most Effective Tool for Proactive Security

The best tool for proactive security that a cybersecurity leader will ever deploy in the defense of an enterprise is trust. It is taking the time to build relationships outside your immediate team.

If the most recent WannaCrypt malware reminds our industry of anything I hope it is this:

  1. Focus on first principles — great cyber hygiene will beat out almost any “Advanced Cyber Tool” any day of the week (patch!)
  2. Focus on inter-team relationships — It is the relationship you build in the offseason that will get you the support you need at 2am.

The unsung heroes of this most recent ransomware campaign that took down hospitals and government buildings across the world are the IT Operations teams, the ones tasked with deploying thousands of MS17–010 patches across most enterprises. Most cyber teams are set up to perform investigations and take precise protective action, but solving the actual root of the issue, installing the patch, sits with ITOps.

ITOps, A Vital Tool for Proactive Security

As a leader in cybersecurity, take a moment to reflect on what worked and what did not over this past weekend. You may find it is not more technology, but better relationships with your ITOps teams that would be the greatest benefit to the enterprise.

Maybe the next tool you invest in is not “machine learning, x-gen av, or threat intel magic” but a simpler and more effective patching platform that removes the crushing burden of patching from your ITOps teams.

As you do your root cause analysis this week, think what you could have done differently to better protect the firm and empower the teams to be better and faster.

Having a highly effective ITOps team that works with and trusts the cyber team is not an unachievable feat. It is real. I know it exists because it happened to me recently.

Originally published www.medium.com and www.conorsherman.com and has been republished with permission

lou@cdg.io

lou@cdg.io

Incident Response

If you think you have been the victim of a cyber attack, contact us right now.

  • Determining the extent of a breach
  • Performing a full-scope response from Identification to Recovery
  • Incident Response retainer services, including IR preparation for your team

Contact CDG

We mobilize and launch a complete investigation of any suspected incident within 24 hours.

  • Determining the extent of a breach
  • Performing a full-scope response from Identification to Recovery
  • Incident Response retainer services, including IR preparation for your team