Skip to main content
Articles

[Gartner Security and Risk Management Summit] Top 10 Security Projects for 2018

By June 15, 2018#!28Thu, 28 Feb 2019 10:40:21 -0300p2128#28Thu, 28 Feb 2019 10:40:21 -0300p-10America/Sao_Paulo2828America/Sao_Paulox28 28am28am-28Thu, 28 Feb 2019 10:40:21 -0300p10America/Sao_Paulo2828America/Sao_Paulox282019Thu, 28 Feb 2019 10:40:21 -03004010402amThursday=904#!28Thu, 28 Feb 2019 10:40:21 -0300pAmerica/Sao_Paulo2#February 28th, 2019#!28Thu, 28 Feb 2019 10:40:21 -0300p2128#/28Thu, 28 Feb 2019 10:40:21 -0300p-10America/Sao_Paulo2828America/Sao_Paulox28#!28Thu, 28 Feb 2019 10:40:21 -0300pAmerica/Sao_Paulo2#No Comments

@umbertorosti

On August 14-15, Safeway will again be sponsoring the Gartner Security and Risk Management Summit and we are already preparing to discuss with our customers some important safety and risk management topics.

Gartner Vice President and Analyst Neil MacDonald at the Gartner Security and Risk Management Summit 2018 in National Harbor, MD. released a survey outlining the key projects that CISOs should focus on, and advised, "Focus on projects that reduce the most risk and have the greatest business impact."

We realize that some themes are new projects for most CISOs, but we see that this is not just for our reality: worldwide statistics are also under 50% for business adoption.

In our current experience, it is not surprising that privileged account management is number 1 in this report. We have been meeting the real market need for this topic and are already implementing new consulting projects with some technology solutions that we currently work on.

Below the Top 10:

1. Privileged Account Management

This project aims to make it difficult for attackers to gain access to privileged accounts and allow security teams to monitor behavior for unusual access. At a minimum, CISOs must institute mandatory multifactor authentication (MFA) for all administrators. It is also recommended that CISOs use MFA for third party access as contractors.

Tip: Stage in using a risk-based approach system (high value, high risk) first. Monitor behaviors.

2. Vulnerability Management

Inspired by the risk assessment and adaptive confidence approach (continuous adaptive risk and trust assessment (LETTER approach) From Gartner, this project is a great way to address vulnerability management and has significant risk mitigation potential. Consider exploring when the remediation process is broken and IT operations cannot keep up with the number of vulnerabilities. You can't fix everything, but you can significantly reduce risk by prioritizing risk management efforts.

Tip: Require your virtual assistant vendor / virtual machine to provide this and consider mitigating controls in your analysis such as firewalls.

3. Active Anti-Phishing

Intended for organizations that continue to have successful phishing attacks against their employees. This requires a three-pronged strategy: technical controls, end user controls, and process redesign. Use technical controls to block as many phishing attacks as possible. But make users an active part of the defense strategy.

Tips: Don't select groups or individuals to do the wrong thing. Highlight those that exhibit the correct behaviors. Ask your email security provider if they can carry out this project. If not, why?

4. Application Control on Server Workloads

Organizations seeking a default deny or zero trust posture for server workloads should consider this option. This project uses application control to block most malware because most malware is not whitelisted. #8220; This is a very powerful security posture & #8221; said MacDonald. Proved to be successful against Specter and Meltdown.

Tip: Combine with comprehensive memory protection. It's a great project for the Internet of Things (IoT) and systems that are no longer supported by vendors.

5. Micro Segmentation and Flow Visibility

This project is suitable for organizations with flat network topologies & #8211; on-site and as an infrastructure service (IaaS) & #8211; who want visibility and control of data center traffic flows. The goal is to prevent the lateral spread of data center attacks. “If and when the bad guys get in, they can't move without obstacles,” MacDonald explained.

Tip: Make visibility the starting point for targeting, but don't target too much. Start with critical applications and require your vendors to support native targeting.

6. Detection and Response

This project is for organizations that know that compromise is inevitable and are looking for user, network, or terminal-based approaches to advanced threat detection, investigation, and responsiveness.

There are three variants to choose from:

  • Terminal Protection Platforms (EPP) + Enhanced Data Rate (EDR)
  • User and Entity Behavior Analysis (UEBA)
  • Deception

The latter is a small but emerging market, ideal for organizations seeking deep ways to strengthen their threat detection mechanisms with high fidelity events.

Tip: Push EPP providers to provide EDR and Security Information and Event Management (SIEM) providers to provide UEBA capabilities. Demand a rich portfolio of targets of disappointment. Consider “light” MDR services directly from the vendor.

7. Cloud Security Posture Management (CSPM)

This should be considered by organizations for a comprehensive and automated assessment of the IaaS cloud security posture / platform as a service (PaaS) to identify areas of excessive risk. Organizations can choose from multiple vendors, including cloud access security brokers (CASBs).

Tip: If you have a single IaaS, look first for Amazon and Microsoft. Make this a requirement for your CASB supplier.

8. Automated Security Check

This project is for organizations that want to integrate security controls into DevOps-style workflows. Start with an open source software composition analysis and integrate testing as an uninterrupted part of DevSecOps workflows, including containers.

Tip: Don't make programmers change tools. Requires activation of the full application programming interface (API) for automation.

9. Cloud Access Security Agent (CASB)

This project is for organizations with a mobile workforce looking for a control point for visibility and policy-based management of cloud-based services from various companies.

Tip: Start with discovery to justify the project. Detection and monitoring of weight sensitive data as a critical use case for 2018 and 2019.

10. Software Defined Perimeter

This project is intended for organizations that want to reduce the surface area of attacks by limiting exposure of digital systems and information to named sets of external partners, remote workers, and contractors.

Tip: Reassess the risk of legacy virtual private network (VPN) -based access. Piloting a 2018 deployment using a partner-linked digital business service as a use case.

More information about security and risk management is also available in the Gartner Special: “The Premium Resilience of Digital Business: A Gartner Trend Insight Report.”
Text based on Gartner content: https://www.gartner.com/smarterwithgartner/gartner-top-10-security-projects-for-2018/

* Umberto Rosti is CEO of Safeway.

About [SAFEWAY]

THE [SAFEWAY] is a widely recognized company as a provider of premium information security and cybersecurity solutions. From its extensive portfolio, we highlight several solutions, including those based on platforms:

● Archer da RSA Security, considered by the institutes Gartner and Forrester and by the market itself, the most complete process integration solution for Governance, Risk Management, Compliance and Business Continuity Management;

● [SAFEWAY] Security Tower, supported by IBM Qradar (Watson technology), tailored to each organization in its security and cyber defense management needs.

● And others, involving technologies ImpervaThalesBeyondTrust  and WatchGuard Technologies.