March 29, 2016 By Kevin Beaver 2 min read

Now that we’re well into 2016, you likely have various information security initiatives underway. The specifics you’re working on are, no doubt, priorities given your unique needs, budget and so on. But are you focusing on the right things? Are the things you’re doing really minimizing your business risks and addressing the right security trends?

It’s easy to get distracted and do what time management experts call majoring in minors — spending time, effort and money on areas of security that, in the grand scheme of things, might not provide much value to the business. You’re spinning your wheels and going through the motions rather than resolving what’s urgent and important. It’s classic 80/20 rule: Focus on the 20 percent of the initiatives that will provide 80 percent of the value for the investment.

Security Trends Come to Light

There are various trends impacting information security today that you need to stay on top of — many of which came out of the 2016 RSA Conference. This includes the Internet of Things (IoT) and data protection in the cloud, as well as the encryption and privacy of customer and corporate information. In a day and age when I’m still seeing people spend large sums of money on technologies such as network access control (NAC) and traditional antivirus solutions while data breaches are as prevalent as ever, it seems that something needs to change.

Instead of security teams focusing on more recent technologies such as cloud access security broker (CASB), advanced malware protection and the like, it’s as if they’re stuck in a vacuum; they’re bound and determined to fix what was important five to 10 years ago. As a result, they may be overlooking areas of risk and technologies that can help solve problems in newer, better ways.

What’s the state of security in your business? You’re likely experiencing modern challenges like most others. But are you paying close enough attention to see the details? A great exercise is to do what’s called zero-based thinking. Ask yourself: Knowing what we know today, what would we do more or less of? What should we now be focusing our efforts on given the current threats to our environment?

Transform Your Security Program

If you ask these questions, and answer them honestly along with your peers and management, you can truly transform where your security program is today. Look at what’s going on with the latest threats and technologies because that’s where we’ll likely be focusing our efforts in five years. You might just see your priorities change and be in a better position down the road by focusing on what’s important today.

I also recommend you take some time over the next few weeks to review the publicly accessible resources that came out of the RSA Conference and other recent industry events. There are keynote highlights on YouTube and considerably more videos on the RSA Conference website. Such resources are great for helping you build out or improve your information security initiatives, including security architecture, threat intelligence, policies and governance, and awareness and training.

All of this being said, you don’t want get too far off into the weeds addressing the latest and greatest information security trends if you haven’t yet fixed the basics. These fundamental flaws are on your network right now, and discipline is the only solution — not hype and short-term motivation from security conferences or media headlines, which will soon fade away.

Keep in touch with the latest happenings, but master the fundamentals. That’s the only true way to resolve your security issues over the long haul.

More from CISO

Why security orchestration, automation and response (SOAR) is fundamental to a security platform

3 min read - Security teams today are facing increased challenges due to the remote and hybrid workforce expansion in the wake of COVID-19. Teams that were already struggling with too many tools and too much data are finding it even more difficult to collaborate and communicate as employees have moved to a virtual security operations center (SOC) model while addressing an increasing number of threats.  Disconnected teams accelerate the need for an open and connected platform approach to security . Adopting this type of…

The evolution of a CISO: How the role has changed

3 min read - In many organizations, the Chief Information Security Officer (CISO) focuses mainly — and sometimes exclusively — on cybersecurity. However, with today’s sophisticated threats and evolving threat landscape, businesses are shifting many roles’ responsibilities, and expanding the CISO’s role is at the forefront of those changes. According to Gartner, regulatory pressure and attack surface expansion will result in 45% of CISOs’ remits expanding beyond cybersecurity by 2027.With the scope of a CISO’s responsibilities changing so quickly, how will the role adapt…

X-Force Threat Intelligence Index 2024 reveals stolen credentials as top risk, with AI attacks on the horizon

4 min read - Every year, IBM X-Force analysts assess the data collected across all our security disciplines to create the IBM X-Force Threat Intelligence Index, our annual report that plots changes in the cyber threat landscape to reveal trends and help clients proactively put security measures in place. Among the many noteworthy findings in the 2024 edition of the X-Force report, three major trends stand out that we’re advising security professionals and CISOs to observe: A sharp increase in abuse of valid accounts…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today