Source |
AlienVault Blog |
Identifiant |
1770248 |
Date de publication |
2020-06-18 11:00:00 (vue: 2020-06-23 06:15:42) |
Titre |
Why right now is the best time to assess your cyber response to COVID-19 |
Texte |
The initial response to the COVID-19 pandemic put cybersecurity programs to the test. While organizations quickly rolled out business continuity plans to transition workers from the office to the home and to migrate business online to keep customers and supply chains moving, cybersecurity leaders have worked to help keep the business protected from an onslaught of cyber threats designed to prey on the disruption and uncertainty caused by COVID-19.
For cybersecurity leaders, this event presented a rare real-world test of how well their cybersecurity programs—their people, processes, and technology—can withstand and flex during a severely disruptive business event. And, while many are already looking ahead to what happens next and contemplating what enduring effects COVID-19 will have on the business, it’s critical for cybersecurity teams to take time now to pause and reflect on what just happened.
Right now is the best time to assess your cyber response to COVID-19, to identify any gaps or failures in process or controls, and to take stock of any urgent changes that were made to your network or IT environment. While it’s not a simple task, taking time to conduct a thorough assessment can help you to understand where your cyber risk posture stands today and make incremental improvements towards a more resilient one.
If you haven’t yet conducted an assessment or retrospective in light of this event, here are some tips to consider in doing so:
Don’t put it off.
Having led a few retrospectives myself, I know how difficult (and sometimes, uncomfortable) it can be to pause and reflect on performance while the dust is still settling, more so if that performance was anything less than stellar. It can be tempting to immediately move to the next task, especially considering how much planned and routine work gets put on hold to deal with an event like COVID-19.
Don’t let the temptation to “get back to normal” eclipse the opportunity to learn from such a seismic event. Right now, while the experience is still fresh in the minds of your team, take the opportunity to evaluate the performance of your systems, policies, and processes, identify and document all of the inefficiencies and gotchas, and make a plan for improvement. Doing so now can help you work towards a more prepared and resilient “new normal.”
Start by identifying what went well.
(Borrowing this one from a retrospective format popular with the agile crowd,) it’s a good idea to start any review or assessment with the question of what worked well. Not only does this kick off your discussion with a positive vibe and an acknowledgement of the people involved, but also it can help you to identify areas of your cybersecurity program that are already performing well today and can withstand a business disruption event.
Make sure to communicate this information beyond the cybersecurity organization. Take the opportunity to let the rest of the business know how the prior investments made in your cybersecurity program—whether in technology, people, or services—have paid off by helping to keep the business protected and operational during a such a turbulent time.
Use a cyber risk framework as a yardstick.
It can be a big undertaking to conduct a review of your cybersecurity program. Rather than starting with a blank page and asking, “what isn’t working well?” or “where do we need to improve?” consider using an established cybersecurity framework such as the NIST Cybersecurity Framework (CSF) as a guide for your assessment. This can help you to conduct a holistic and thorough review of your program rather than focusing on only the most acute pain points. In particular, NIST CSF has some nice features and free resources that make it easy to ad |
Notes |
|
Envoyé |
Oui |
Condensat |
“a “get “new “run “what “where for able about accrued acknowledgement action actionable actions active acute adapt additionally adopted advantages advisor after agile ahead aligned all alone along already also any anything appetite are areas asking assess assessment assessment: assessments assessor at&t attempts attention audit avoid awareness back before benchmark best between beyond bias big bit blame blank borrowing bring business but bypass can caused chains change changes check commitment communicate compliance concludes conduct conducted conducting consider considering constitute consultants contact contemplating context continuity controls could covid create creating critical crowd csf cumbersome customers cyber cybersecurity deal deep defenses designed did difficult diligence discerning discussion disruption disruptive document documentation does doesn’t doing don’t drive dss due during dust easy eclipse effects efficiency effort employee enduring engaging enlisting environment especially established evaluate event example exercise experience expert expertise external faces failure failures faster features flex focus focusing follow followed following format framework frameworks free fresh from gains gaps get gets goals good gotchas guide happened happens has have haven’t having help helping here hipaa hold holistic home how hygiene idea identify identifying immediately impact important improve improvement improvements incidents incremental industry inefficiencies information infrastructure initial instead internal investment investments involved isn’t it’s its just keep kick kind know lead leaders leadership learn least led less let light like looking made maintain make making managed management many maturity may might migrate minds minimal mitigation more most mountains move moving much myself near necessarily need network neutral next nice nist normal normal” normally not now objectivity off offer office offloading one online only onslaught operational opportunity organization organizations other out over page paid pain pandemic part participant particular party pause pci peers penetration people performance performing phishing place plan planned plans point points policies popular positive posture postures potentially preparation prepared presented prey prior prioritize prioritized process processes program program—whether programs programs—their protected protocols provide provided put quarterly question quickly rare rather real recommendations recover red reflect regulatory reinforce relative remote repeats report reporting representative require required requirements resilient resources response rest retroactive retrospective retrospectives review reviewing right rigor risk rolled routine save scans security see seems seismic self sense services services—have settling severely shifts shore should significant simple size small so: some sometimes specializes specifies stakeholders stand stands start started starting stellar steps stock strategic successes such sudden supply sure sustainable systems take taking task team teams technical technology technology—can temptation tempting term test testing than then third thorough threats through thus time tips today tool towards training transition transitioned trusted turbulent uncertainty uncomfortable underscore understand undertaking unintended unplanned urgency urgent use using validate validation varying vibe vulnerability want well went what where who why widely widespread will withstand work worked workers workforces working world worry; worst would yardstick years yet you’ll your |
Tags |
Vulnerability
Guideline
|
Stories |
|
Move |
|