/////////////////////////
TRENDING
ed use-cases we
hunting capabilities
rowing threat of
s.
use built-in
onse policies (such
Petya, Samsam, etc)
o customise their own
ompromises within the
it for
nsure a high level
ot compromising
ncy?
d operational
top priorities for
out introduced
Automation – which
own existing security
our customers reduce
o risks.
ers across the Gulf
anual tasks, whether
cess control or for
use-cases) or on the
assessment and autowhile
orchestrating
third-party systems.
e approach should
re a robust
curity policy?
y framework that
e idea that no entity
tomatic access to a
ch one must verify
anted the privilege.
ation that both
e of a network can
bersecurity, it replaces
tion methods and
asingly fragmented
.
ero Trust model,
ations have a
of every connected
the data they’re
.
ndation of any security
fter all, visibility is the
but it is exceptionally
“
GRAPPLING WITH
THE GROWING
NUMBER OF
ATTACK VECTORS
WHILE MEETING
MORE AND MORE
COMPLIANCE
DIRECTIVES,
CISOS HAVE THEIR
HANDS FULL.
important when trying to create appropriate
enforcement policies and controls as part of
a Zero Trust strategy.
Ultimately, businesses need to know who –
and what – is trying to access what before
they can create the correct parameters
and controls.
Are there any emerging trends in
this area that CISOs should be
planning for?
Maintaining close control of their
networks and device ecosystem continues
to become more difficult as IoT and OT
devices increase.
In order to achieve effective security, the
full context of connected devices must be
available to regain both visibility and control.
Grappling with the growing number
of attack vectors while meeting more
and more compliance directives, CISOs
have their hands full. The advancements
in network segmentation have been
designed to allow businesses to automate
threat detection and isolation without
impacting operations.
Through limiting risks, maximising control
and assuring controls are effectively
implemented across a network, enterprises
can more effectively prepare and manage
the inevitable next wave of cyberthreats. •
INTELLIGENTCIO
27