Home Interview Build on-going security program to ensure alignment with new threats

Build on-going security program to ensure alignment with new threats

by CIOAXIS Bureau

In a quickfire chat with Shimon Becker, Co-founder & VP Product; and Kaustubh Aradhye, Sales Director – South Asia & Africa, Cyber Observer; point out their views on cybersecurity challenges during the testing times of pandemic.

Q1. In future, what are the high priority security areas that you would identify in the security Industry?
Integrating security into hybrid environment like on-premise and in-cloud, developing and deploying advanced security tools, working on limiting budget, and reducing the manpower are some of the high priority security areas. In addition, maintaining compliance with standards, preparing a critical security presentation to the board and management, managing the ever changing cyber infrastructure, building on-going security program are also high priority security areas that will remain a challenge to the InfoSec leaders.

Q2. What are the key strategic security pratices that you would recommend for the Work From Home (WFH) workspace?
Implementing continuous security best practices to protect remote access Growing Attack Surface and create remote management capabilities by implementing continuous end-to-end cyber visibility are some of the strategic security pratices for the WFH space.

Q3. What are the competitive advantages of your products that are unique in terms of cutting-edge technology?
• Continuous indicators to cybersecurity tools that are misconfigured, malfunctioning, or lacking,
• Continuous security gaps that exist, alongside recommendations for steps to improve,
• Continuous compliance with standards, ISO, NIST, others,
• Continuous reporting,
• Continuous analytics provide alerts on deviation from normal behavior,
• Building on-going security program to ensure alignment with new threats.

Q4. In brief, could you explain how Cyber Observer using the Continuous Controls Monitoring (CCM) solution reduces the business losses and audit costs for the end-users?
All the information you need is available in one click from the main screen. The Cyber Observer view page is equipped with an “Enriched view” capability, one click access to all the necessary information: Instantly see what tool has an error, View security coverage by domain, Top critical alerts, Security trends and more without ever leaving the home screen.

Organizations need to continuously report to board members, C-level management, auditors, risk officers, and other stakeholders about their cybersecurity status and posture. It takes significant coordination, effort, and time to prepare these reports. Save time and gain continuous results by using Cyber Observer’s built-in reporting module that automates up to the minute reports about the organization’s cybersecurity tools status, cyber posture views as well as the ability to compare and verify improvement. Customize the reports with filters, schedule customized reports for delivery to specific email addresses and download the reports to your computer in PDF and CSV formats.

Cyber Observer delivers comprehensive management and awareness capabilities regarding organizational compliance with international standards such as NIST, ISO 27001, PCI-DSS, and more by continuously retrieving technical configuration and security data from the various security tools already deployed in an enterprise network. Out-of-the-box self-assessment templates provide an additional layer of ongoing audit and compliance management that saves time and effort, and most importantly, provides organizations with an unprecedented, continuous view of their compliance status. This revolutionary single-pane-of-glass view enables risk officers, CISOs, and other relevant stakeholders to keep real-time track of their organizations’ regulatory compliance statuses and be prepared for timely audits.

Q5. How do you see the future of IT Security industry in terms of innovation and sales when there is a slowdown due to global financial crisis?
• Do more with less by implementing best practice and make the most from existing technologies you choose to implement based on the organization budget and risk appetite.
• Excellence in daily management: Technology-People-Processes.

Recommended for You

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Close Read More

See Ads