01.03.2022 Views

Cyber Defense eMagazine March Edition for 2022

The view from the Publisher’s desk is very encouraging, based on celebrating 10 years of growth and success at Cyber Defense Magazine! When our tiny team began our journey at Cyber Defense Media Group (CDMG) together in January 2012, we were happy to help smaller, lesser-known innovators of infosec, get their message out there and Rise Above the noise. Now, after 10 years, we’re even helping multi-billion-dollar companies and governments around the globe with our offices in DC, London, FL, NY and other locations in play, as we continue to scale, thanks to you – our readers, listeners, viewers and media partners. Beyond the magazine, in response to the demands of our markets, the scope of CDMG’s activities has grown into many media endeavors. They now include Cyber Defense Awards; Cyber Defense Conferences; Cyber Defense Professionals (job postings site being revamped); Cyber Defense TV, Radio, and Webinars; and Cyber Defense Ventures (partnering with investors). Please check them out and see how much more CDMG has to offer! Very respectfully and with much appreciation, Gary Miliefsky, Publisher

The view from the Publisher’s desk is very encouraging, based on celebrating 10 years of growth and success at Cyber Defense Magazine! When our tiny team began our journey at Cyber Defense Media Group (CDMG) together in January 2012, we were happy to help smaller, lesser-known innovators of infosec, get their message out there and Rise Above the noise. Now, after 10 years, we’re even helping multi-billion-dollar companies and governments around the globe with our offices in DC, London, FL, NY and other locations in play, as we continue to scale, thanks to you – our readers, listeners, viewers and media partners. Beyond the magazine, in response to the demands of our markets, the scope of CDMG’s activities has grown into many media endeavors. They now include Cyber Defense Awards; Cyber Defense Conferences; Cyber Defense Professionals (job postings site being revamped); Cyber Defense TV, Radio, and Webinars; and Cyber Defense Ventures (partnering with investors).
Please check them out and see how much more CDMG has to offer!

Very respectfully and with much appreciation,
Gary Miliefsky, Publisher

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

egarding the use (or not) of various cybersecurity measures against their cost, and most have chosen<br />

to implement at least some protective measures. So, yes, the corporate world has learned that not taking<br />

measures to safeguard their networks would likely negatively impact their bottom lines at some point;<br />

however, I would again say no to whether they generally do enough or to whether they’re generally using<br />

the appropriate tools.<br />

Also, why do we still need to tell a story about cybersecurity to change corporate culture and get serious<br />

funding <strong>for</strong> security? Just walk around your organization, and everyone is on the network. Without it, little<br />

work gets done and productivity drops significantly. If this tool is so important, why do we not treat it as<br />

such? If Gartner’s data is accurate, lessons are coming slowly to many corporations:<br />

• By 2025 ONLY 40% of boards of directors will have a dedicated cybersecurity committee<br />

• By 2025, ONLY 70% of CEOs will mandate a culture of organizational resilience to combat threats<br />

Another lesson still being taught: Do most corporations know they should be en<strong>for</strong>cing updates <strong>for</strong> known<br />

security vulnerabilities that have been documented and announced by respective cyber communities to<br />

keep us all safe? The answer is yes, but do most of them do enough or do it effectively? That answer is<br />

no. Otherwise, consistently updating computers and keeping them current with the latest patches/security<br />

fixes across the enterprise would stop 99% of vulnerabilities exploited to date.<br />

Inconsistent system updates greatly expand cyber vulnerabilities and risks. If this is known and<br />

understood, then why is it seemingly so difficult to succeed at attaining effective cybersecurity? It’s<br />

because many companies don’t effectively cultivate three critical components of their cybersecurity<br />

processes: 1) people, 2) culture and 3) technology. We must have people who follow the security<br />

processes, a corporate cyber culture that supports its people and the processes, and the technology to<br />

implement the processes, when necessary.<br />

If we agree these are three critical components of effective cybersecurity processes, then we must<br />

remember that people are trainable; the culture can be fixed with training and leadership from senior<br />

management; and technology is constantly adapting with the use of artificial intelligence and machine<br />

learning. Strengthening cybersecurity processes through people, culture, and technology costs<br />

corporations valuable time and money, so it’s wise to use these three resources in the most practical and<br />

beneficial ways possible. This often means that the latest and greatest technologies or programs aren’t<br />

actually necessary to achieve effective cybersecurity.<br />

As an example, look at zero trust. It is an architecture and not a technology, but the cybersecurity industry<br />

very often wants customers to buy all new equipment to implement zero trust. This ends up helping the<br />

bottom lines of the said cybersecurity companies, but are organizations any safer? That is often arguable,<br />

but even newer tools have no better chance of succeeding than in the past unless the people using them<br />

use them appropriately, born out of a culture that teaches and supports such use.<br />

Aside from malicious actors themselves, if we believe people, or network users, are one of the biggest<br />

threats in the cybersecurity realm, an immediate and cost-effective fix is to engender a culture of<br />

cybersecurity professionalism in our everyday users. Train the users to not only prioritize necessary<br />

updates on their systems but to follow other cyber hygiene measures regarding the use of email, the<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>March</strong> <strong>2022</strong> <strong>Edition</strong> 44<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!