In a recent article on TechRepublic, researchers at the University of Arizona’s Artificial Intelligence Laboratory described their ongoing study into the operations, interactions and communications of the hacker community. Specifically, researchers noted how organized they are, how tight-knit their community is and how they “always have and always will change things up.” Sound familiar?

Cybercriminals do not necessarily have a formally written framework under which they operate, but it may be surprising to learn that they are organized around some modus operandi. This is deeply cultural, social and unstructured, and it is effective in achieving their objectives.

Establishing a Modus Operandi for Security

As an IT or security leader with strong governance policies and increasing pressures thanks to compliance, business innovations and workforce behaviors, you cannot rely on fixed technology responses to navigate the security minefield. Simply throwing more security technology at a growing problem is like reaching for a simple ibuprofen for a migraine headache: It only provides temporary relief and doesn’t cure the underlying cause. In security, it is important to understand the context and critical interdependencies that put your organization at risk and then set your priorities and guiding principles accordingly.

Thinking about security from the perspective of modus operandi and working with a framework that delivers the guidance and principles behind decision-making helps leaders. Everyone in the organization is better equipped to navigate through the toughest of changes, growing business needs and, most of all, cyber dangers.

At IBM, we work with clients to adopt a framework called 10 Essential Security Practices in which we assess security capabilities, readiness and maturity. Then we develop a profile for security governance and processes, helping clients to establish long-term programs.

Essential Security Practices to Consider

The 10 essential security practices are designed to be the modus operandi for security and IT leaders. The framework encourages professionals to assess and develop appropriate strategies based on:

  1. A risk-aware culture;
  2. The establishment of intelligent security operations and rapid threat response;
  3. Secure collaboration in the social and mobile workplace;
  4. The development of security-rich products and applications by design;
  5. A hygienic approach to securing systems and infrastructure;
  6. The creation of a security-rich and resilient network;
  7. Best practices for addressing security complexities in the cloud and virtualization technologies;
  8. The careful management of third-party security compliance;
  9. Assuring data security and privacy; and
  10. How to manage the digital identity life cycle.

Conclusion

To operate cybersecurity as a true enterprise function, organizations need a framework within which to establish their security program, understand the context and critical interdependencies of initiatives and set priorities accordingly. Such a framework can also be used to identify gaps, monitor progress and achieve other strategic security objectives. This is all done while ensuring security programs are fully coordinated with an organization’s core business objectives and initiatives.

Are you ready to adopt a framework and prioritize a long-term plan for your security capabilities, readiness and maturity? Watch this video series about the 10 essential security practices to learn more.

More from CISO

Who Carries the Weight of a Cyberattack?

Almost immediately after a company discovers a data breach, the finger-pointing begins. Who is to blame? Most often, it is the chief information security officer (CISO) or chief security officer (CSO) because protecting the network infrastructure is their job. Heck, it is even in their job title: they are the security officer. Security is their responsibility. But is that fair – or even right? After all, the most common sources of data breaches and other cyber incidents are situations caused…

Transitioning to Quantum-Safe Encryption

With their vast increase in computing power, quantum computers promise to revolutionize many fields. Artificial intelligence, medicine and space exploration all benefit from this technological leap — but that power is also a double-edged sword. The risk is that threat actors could abuse quantum computers to break the key cryptographic algorithms we depend upon for the safety of our digital world. This poses a threat to a wide range of critical areas. Fortunately, alternate cryptographic algorithms that are safe against…

How Do You Plan to Celebrate National Computer Security Day?

In October 2022, the world marked the 19th Cybersecurity Awareness Month. October might be over, but employers can still talk about awareness of digital threats. We all have another chance before then: National Computer Security Day. The History of National Computer Security Day The origins of National Computer Security Day trace back to 1988 and the Washington, D.C. chapter of the Association for Computing Machinery’s Special Interest Group on Security, Audit and Control. As noted by National Today, those in…

Emotional Blowback: Dealing With Post-Incident Stress

Cyberattacks are on the rise as adversaries find new ways of creating chaos and increasing profits. Attacks evolve constantly and often involve real-world consequences. The growing criminal Software-as-a-Service enterprise puts ready-made tools in the hands of threat actors who can use them against the software supply chain and other critical systems. And then there's the threat of nation-state attacks, with major incidents reported every month and no sign of them slowing. Amidst these growing concerns, cybersecurity professionals continue to report…