The human element in cyber hygiene

0 19
When a panel made up of experts from the MEA community got together to talk abo...

When a panel made up of experts from the MEA community got together to talk about cyber hygiene, Rasha Abu Alsaud (EVP and CISO at Saudi National Bank) pointed out that we can’t overlook the human element.

The panellists – who also included Zaki Abbas (CISO at Brookfield Asset Management), Richard Archdeacon (Advisory CISO at Cisco), and Fal Ghancha (CISO at DSP Investments) – agreed that good cyber hygiene has to start with the basics.

The human element in cyber hygiene

“I speak to a lot of CISOs,” Archdeacon said, “and they look at the risk an organisation may face and what might happen; and what I see is the fundamentals not being addressed that might cause issues for them.”

“We’re now hearing CISOs talking about getting the basics right. Doing brilliant basics. Because that’s the best way to manage the risk.”

Brilliant basics means doing your homework

Abbas agreed that “Cyber hygiene is not just an IT or security problem. It’s a business problem. It’s a matter of going back to basics.”

And from a tooling perspective, that means understanding exactly what kinds of controls are needed to protect critical resources – and then developing processes to ensure that those tools are accessed by the right people, and used correctly.

CISOs need to be clear on why each tool is needed. For Archdeacon, this comes down to clarifying what CISOs are worried about, and assessing the effectiveness of tools to mitigate those concerns. “A friend of mine said to me years ago, ‘security is easy – all you have to do is make sure the right person is using the right tools,’” he joked.

But while that might not actually be easy, it is true. There’s no point in having cutting edge tooling if you aren’t absolutely certain why each tool is there, what it’s for, and who should be able to access it. And from there, you’ve got to ensure that only those people have access – and that they know how to use and maintain the tool effectively.

But when it comes to tooling, humans are key

Alsaud said:

“I think it’s important that in addition to the reliance on technology, manual validation needs to be practised as well, to check the effectiveness of the controls in place.”

She agreed that CISOs need to go back to basics. But pointed out that the basics in question here are all configured on technology – but if you rely solely on technology to report on its own effectiveness, it might not give you the right basic results.

So good cyber hygiene is also about challenging the reports provided by technology. You have to add a human element to the controls – ensuring not only that the basics are implemented correctly, but that they’re also being reported accurately. Essentially, security teams need to engage in a continuous process of assessment of technological effectiveness.

“Yes, technology is very important,” Alsaud added, “and a complete set of technologies; from identity to network protection; the zoning of networks, isolating your critical assets…all of these are excellent. But at the same time it’s important that we don’t rely on these technologies to protect the environment.”

“Human intervention is required to validate the effectiveness of the technology.”

It’s not uncommon to hear organisations blaming tech for a breach; complaining that they suffered a compromise ‘even though’ they were using a certain piece of technology. But Alsaud argued that the issue isn’t with the tech – it’s in how you’re using it, validating it, and ensuring it’s always up to date and functioning at its best.

你可能想看:

In today's rapidly developing digital economy, data has become an important engine driving social progress and enterprise development. From being initially regarded as part of intangible assets to now

b) It should have a login failure handling function, and should configure and enable measures such as ending the session, limiting the number of illegal login attempts, and automatically logging out w

2021-Digital China Innovation Competition-Huifu Cybersecurity Track-Final-Web-hatenum and source code analysis and payload script analysis

Follow the Cybersecurity Medicine Water Brother to fight the target field (emergency response)

b) It should have the login failure handling function, and should configure and enable measures such as ending the session, limiting the number of illegal logins, and automatically exiting when the lo

Emerging from a black hole with human-centred security

Data security can be said to be a hot topic in recent years, especially with the rapid development of information security technologies such as big data and artificial intelligence, the situation of d

d) Adopt identification technologies such as passwords, password technologies, biometric technologies, and combinations of two or more to identify users, and at least one identification technology sho

Article 2 of the Cryptography Law clearly defines the term 'cryptography', which does not include commonly known terms such as 'bank card password', 'login password', as well as facial recognition, fi

Enterprises have insufficient response capabilities, and the cybersecurity of the manufacturing industry faces severe challenges

最后修改时间:
admin
上一篇 2025年03月22日 23:14
下一篇 2025年03月22日 23:37

评论已关闭