Trust: A Cyber Team’s Most Effective Tool for Proactive Security

Man Pointing to Computer Screen

Share This Post

The best tool for proactive security that a cybersecurity leader will ever deploy in the defense of an enterprise is trust. It is taking the time to build relationships outside your immediate team.

If the most recent WannaCrypt malware reminds our industry of anything I hope it is this:

  1. Focus on first principles — great cyber hygiene will beat out almost any “Advanced Cyber Tool” any day of the week (patch!)
  2. Focus on inter-team relationships — It is the relationship you build in the offseason that will get you the support you need at 2am.

The unsung heroes of this most recent ransomware campaign that took down hospitals and government buildings across the world are the IT Operations teams, the ones tasked with deploying thousands of MS17–010 patches across most enterprises. Most cyber teams are set up to perform investigations and take precise protective action, but solving the actual root of the issue, installing the patch, sits with ITOps.

ITOps, A Vital Tool for Proactive Security

As a leader in cybersecurity, take a moment to reflect on what worked and what did not over this past weekend. You may find it is not more technology, but better relationships with your ITOps teams that would be the greatest benefit to the enterprise.

Maybe the next tool you invest in is not “machine learning, x-gen av, or threat intel magic” but a simpler and more effective patching platform that removes the crushing burden of patching from your ITOps teams.

As you do your root cause analysis this week, think what you could have done differently to better protect the firm and empower the teams to be better and faster.

Having a highly effective ITOps team that works with and trusts the cyber team is not an unachievable feat. It is real. I know it exists because it happened to me recently.

Originally published and and has been republished with permission

Read More

Engineering Corner

The Importance of Monitoring

Unknowingly Joining the UIA Everyone can picture the iconic image of a village mob grabbing their pitchforks and torches to fight off some threat to

Cybersecurity Should be an Advantage, not a Cost Center. Let’s Get to Work.