BeyondTrust

Security In Context

Bringing you news and commentary on solutions and strategies for protecting your critical IT infrastructure.

5 Things That Keep a CISO up at Night

Post by Sarah Lieber January 20, 2012

Recently I had the unique experience to attend a presentation given by the CISO of a major entertainment network which took place at eEye’s annual sales and marketing kickoff.  It was an excellent presentation, where he shared things like his past experiences, how he and his team select security products and which metrics matter most to him.

One of the most interesting parts of his presentation was titled “5 Things That Keep Me Up at Night”. Amazingly, that Top 5 didn’t include the almost 300,000 patches his company deploys each month – yes, each month.  In today’s dynamic enterprise, this Top 5 list is probably nothing like a CISO’s Top 5 from even just a few years ago.

Want to know what CISOs are thinking about late at night? Here’s a list that may surprise you. Once you’re finished reading, use the comments section to provide your insights, we’d love to hear them.

  1. The Cloud

    It isn’t “The Cloud” that scares CISOs but it’s the notion that people and company assets are moving to the cloud without them even knowing it. As people, machines, and assets become more geographically dispersed in the enterprise, how do you keep track of company assets on the network and in the cloud? As a CISO you need to stay on top of where your company assets are living (on and off the network) and making sure you’re 100% secure in the cloud.

  2. Moving Data + Regulatory Compliance

    Safeguarding the security and integrity of data is extremely important to any CISO. As technology evolves regulatory compliance standards, users and threats are becoming even more sophisticated. It is a huge responsibility for any person in IT to make sure that regulatory compliance is in line and all data remains secure.  Interesting factoid: This particular entertainment company must also comply with HIPAA regulations, as some of their facilities have medical stations onsite.

  3. Hacktivism

    With all of the recent media attention from ‘hacktivist’ groups, this isn’t a big surprise as being something that would keep a CISO up at night.

  4. Mobility and the Consumerization of IT

    The proliferation of smartphones and mobile devices in the enterprise could easily overwhelm any CISO and his/her team. Mobile devices have helped to broaden our system access, increase productivity and quicken our jobs, but you have to also consider that these same devices are fertile ground for account information, passwords and other sensitive data. As more and more employees bring in their own smartphones, laptops and tablets (each installed with even more apps, social tools, data, etc.) onto the enterprise network you have to be prepared with a mobile security strategy. The consumerization of IT is not going to go away. And you will need to learn to embrace it. What’s your mobile security strategy in 2012?

  5. Social Media

    Even the savviest of social media gurus can fall victim and allow unauthorized access to corporate social media accounts. If your profile is big enough, these accounts can be a big megaphone to create panic, move markets or even ruin your own brand. In addition, web applications are increasing end-user exposure to everything on the web – from viruses, malware and other vulnerabilities – and with a single click a user can expose themselves to some pretty big risks.

So there it is, the top 5 things that keep this particular CISO up at night. What do you think? Do you agree with the list? I’d love to hear your thoughts. Perhaps a Top 10 list is in order if we get enough feedback.

Here’s to a good night’s sleep.

Tags:
, , , , , , , , , ,

Leave a Reply

Additional articles

smart rules manager for vulnerabilities

Staying on Top of the Latest Vulnerabilities with BeyondInsight v5.1

It’s no secret that dozens of new OS and application vulnerabilities are revealed every day. Staying on top of these new exposures normally requires paying for services or subscribing to multiple RSS feeds. BeyondInsight 5.1 provides customers with another option: a built-in, customizable vulnerability alerting system that delivers up-to-date information on the latest vulnerabilities in…

Post by Morey Haber April 21, 2014
Tags:
, , , , , ,
BI-Qualys-Connector-IMG1

Getting More Value from QualysGuard Vulnerability Data with BeyondInsight v5.1

If your vulnerability assessment scans can’t produce meaningful and actionable reports, performing a scan does no good for anyone. If you’ve read my other blog posts, you know I have no qualms about stating that BeyondTrust provides the best vulnerability reporting in the industry. Ask your favorite analyst and they’ll tend to agree. Of course,…

Post by Morey Haber April 18, 2014
Tags:
, , , , , , , ,
insider-threat-fed

Mitigating Inside Threats to U.S. Federal IT Environments

Recent high-profile cases have increased the perceived risks that go along with disclosure and usage of confidential information. One of the most difficult security threats to mitigate is an attack from the inside. When an over-privileged user, such as an unhappy current or former employee, contractor, or consultant, begins navigating your network, how will you…

Post by BeyondTrust Software April 17, 2014
Tags:
, , , , ,