01.03.2022 Views

Cyber Defense eMagazine March Edition for 2022

The view from the Publisher’s desk is very encouraging, based on celebrating 10 years of growth and success at Cyber Defense Magazine! When our tiny team began our journey at Cyber Defense Media Group (CDMG) together in January 2012, we were happy to help smaller, lesser-known innovators of infosec, get their message out there and Rise Above the noise. Now, after 10 years, we’re even helping multi-billion-dollar companies and governments around the globe with our offices in DC, London, FL, NY and other locations in play, as we continue to scale, thanks to you – our readers, listeners, viewers and media partners. Beyond the magazine, in response to the demands of our markets, the scope of CDMG’s activities has grown into many media endeavors. They now include Cyber Defense Awards; Cyber Defense Conferences; Cyber Defense Professionals (job postings site being revamped); Cyber Defense TV, Radio, and Webinars; and Cyber Defense Ventures (partnering with investors). Please check them out and see how much more CDMG has to offer! Very respectfully and with much appreciation, Gary Miliefsky, Publisher

The view from the Publisher’s desk is very encouraging, based on celebrating 10 years of growth and success at Cyber Defense Magazine! When our tiny team began our journey at Cyber Defense Media Group (CDMG) together in January 2012, we were happy to help smaller, lesser-known innovators of infosec, get their message out there and Rise Above the noise. Now, after 10 years, we’re even helping multi-billion-dollar companies and governments around the globe with our offices in DC, London, FL, NY and other locations in play, as we continue to scale, thanks to you – our readers, listeners, viewers and media partners. Beyond the magazine, in response to the demands of our markets, the scope of CDMG’s activities has grown into many media endeavors. They now include Cyber Defense Awards; Cyber Defense Conferences; Cyber Defense Professionals (job postings site being revamped); Cyber Defense TV, Radio, and Webinars; and Cyber Defense Ventures (partnering with investors).
Please check them out and see how much more CDMG has to offer!

Very respectfully and with much appreciation,
Gary Miliefsky, Publisher

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

pandemic era. By empowering professionals with the tools needed to automate the mundane, we free<br />

them to become more effective threat hunters.<br />

Once the basics are in place, organizations will be better placed to meet regulation and compliance<br />

obligations. Policies alone will not allow you to prepare the reports required by auditors. And good<br />

intentions will not satisfy the strict requirements of standards such as PCI-DSS. The good news is cloudservice<br />

providers and other vendors are beginning to provide controls such as MFA and DNS security,<br />

and are even offering training sessions <strong>for</strong> end users to prepare them <strong>for</strong> the hybrid-work future.<br />

But chasing the regulators in a constantly reactive mode makes <strong>for</strong> poor security strategy. There is no<br />

substitute <strong>for</strong> gaining a deep and broad understanding of your organization’s environment and selecting<br />

the visualization and automation tools that best fit your circumstances, your architecture, and your<br />

business goals. Getting the basics in place – asset inventory, vulnerability management, and user<br />

awareness – will give you a strong foundation to secure your digital estate.<br />

What next?<br />

Once you have mastered your environment, you can turn your attention to some of the latest policies and<br />

tools that are being deployed against cybercriminals. Many of the headline-grabbing incidents that we<br />

have seen would not have occurred but <strong>for</strong> a lapse in the management of privileged credentials.<br />

SolarWinds’ Orion, <strong>for</strong> example, uses privileged access to connect to other systems, which is how<br />

attackers were able to compromise so many other organizations. Privileged access management (PAM)<br />

is an emerging technique that allows CISOs and their teams to stipulate how accounts connect to<br />

environments, using policies such as session monitoring, password rotation, least privilege, just-in-time<br />

provisioning, and the elimination of shared accounts to keep estates safe while avoiding hits on employee<br />

productivity.<br />

Other practices include Zero Trust, which has become something of a hot topic. Allowing everything in,<br />

and assuming all processes to be suspect until they can prove themselves otherwise, is an approach that<br />

shows how far removed we are from the recent past. Here, we not only assume we are going to be<br />

attacked; we assume we already have been. It is a grim yet justifiable assumption that accurately reflects<br />

the world in which we now live.<br />

Do not dismay, however. The headlines of horror may imply an inevitability in becoming a cyber-victim,<br />

but their postmortems also show a path to risk remediation. There are tools you can procure, policies you<br />

can enact, and action you can take that will ensure that your organization’s name is not the next to be<br />

splashed across media pages.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>March</strong> <strong>2022</strong> <strong>Edition</strong> 41<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!