Why Your Cybersecurity Process is the Problem

For those who don’t know, we have three P’s in cybersecurity; people, platform, and process. Invariably, the first step companies take towards securing their organization is by investing in platform (technology): anti-virus, usually followed by a firewall. Then, once they grow to a size where they “feel like” they have something “worth protecting” they come to a juncture – do we hire a dedicated security person and give the IT folks some relief to return to their focus on delivering business outcomes? Do we invest in an intrusion prevention system? A SIEM? Breach insurance?

What many decision makers fail to realize is the necessity of rigorous processes, whatever “solution” they choose. Given the direction of the industry (towards detection and response), and the uptick we have seen in the adoption of our service, I think that this is changing; forward-thinking companies are finally realizing that the problem is lack of process. And not the lack of disclosure process or writing things on paper and locking them in file cabinets only to pull them out when someone asks if there was a process. I’m talking about the routine: what are your IT security processes every day? What are you monitoring and how does that prevent or discover breaches?

Let me push you along the adoption curve by dispelling the fallacies about security and defining and prescribing a process-centric approach.

The Technology Trap

This doesn’t just happen in small to medium-sized enterprises, where familiarity with threats/attacks can be low – big consulting firms will implement plans for enterprise clients that involve hiring teams of people and buying a bunch of point solutions. When it comes to process, you’re left to figure it out on your own.

We would all love to “just buy a solution” or “just hire a person” to solve (Read more...)

*** This is a Security Bloggers Network syndicated blog from IntelliGO MDR Blog authored by Adam Mansour. Read the original post at: https://www.intelligonetworks.com/blog/why-your-cybersecurity-process-is-the-problem