Trust: A Cyber Team’s Most Effective Tool for Proactive Security

Share This Post

Share on facebook
Share on linkedin
Share on twitter
Share on email

The best tool for proactive security that a cybersecurity leader will ever deploy in the defense of an enterprise is trust. It is taking the time to build relationships outside your immediate team.

If the most recent WannaCrypt malware reminds our industry of anything I hope it is this:

  1. Focus on first principles — great cyber hygiene will beat out almost any “Advanced Cyber Tool” any day of the week (patch!)
  2. Focus on inter-team relationships — It is the relationship you build in the offseason that will get you the support you need at 2am.

The unsung heroes of this most recent ransomware campaign that took down hospitals and government buildings across the world are the IT Operations teams, the ones tasked with deploying thousands of MS17–010 patches across most enterprises. Most cyber teams are set up to perform investigations and take precise protective action, but solving the actual root of the issue, installing the patch, sits with ITOps.

ITOps, A Vital Tool for Proactive Security

As a leader in cybersecurity, take a moment to reflect on what worked and what did not over this past weekend. You may find it is not more technology, but better relationships with your ITOps teams that would be the greatest benefit to the enterprise.

Maybe the next tool you invest in is not “machine learning, x-gen av, or threat intel magic” but a simpler and more effective patching platform that removes the crushing burden of patching from your ITOps teams.

As you do your root cause analysis this week, think what you could have done differently to better protect the firm and empower the teams to be better and faster.

Having a highly effective ITOps team that works with and trusts the cyber team is not an unachievable feat. It is real. I know it exists because it happened to me recently.

Originally published www.medium.com and www.conorsherman.com and has been republished with permission

Read More

Cyber Security Articles

The Hacker Mentality We Hold

As a cybersecurity company, we often find our adversaries to be hackers – individuals and collected groups who use computers, networking, and other skills to

Cybersecurity Should be an Advantage, not a Cost Center. Let’s Get to Work.