Intelligent CIO Middle East Issue 55 | Page 53

///////////////////////// TRENDING ed use-cases we hunting capabilities rowing threat of s. use built-in onse policies (such Petya, Samsam, etc) o customise their own ompromises within the it for nsure a high level ot compromising ncy? d operational top priorities for out introduced Automation – which own existing security our customers reduce o risks. ers across the Gulf anual tasks, whether cess control or for use-cases) or on the assessment and autowhile orchestrating third-party systems. e approach should re a robust curity policy? y framework that e idea that no entity tomatic access to a ch one must verify anted the privilege. ation that both e of a network can bersecurity, it replaces tion methods and asingly fragmented . ero Trust model, ations have a of every connected the data they’re . ndation of any security fter all, visibility is the but it is exceptionally “ GRAPPLING WITH THE GROWING NUMBER OF ATTACK VECTORS WHILE MEETING MORE AND MORE COMPLIANCE DIRECTIVES, CISOS HAVE THEIR HANDS FULL. important when trying to create appropriate enforcement policies and controls as part of a Zero Trust strategy. Ultimately, businesses need to know who – and what – is trying to access what before they can create the correct parameters and controls. Are there any emerging trends in this area that CISOs should be planning for? Maintaining close control of their networks and device ecosystem continues to become more difficult as IoT and OT devices increase. In order to achieve effective security, the full context of connected devices must be available to regain both visibility and control. Grappling with the growing number of attack vectors while meeting more and more compliance directives, CISOs have their hands full. The advancements in network segmentation have been designed to allow businesses to automate threat detection and isolation without impacting operations. Through limiting risks, maximising control and assuring controls are effectively implemented across a network, enterprises can more effectively prepare and manage the inevitable next wave of cyberthreats. • INTELLIGENTCIO 27