What is the best way to do a security assessment to ensure the system or network is secure or properly setup? Would you outsource external consultants or setup internal team?

5.5k viewscircle icon16 Comments
Sort by:
Director of IT in Energy and Utilitiesa year ago

You need an independent assessment periodically.  Say annually.  Between those, do things that apply to your organization based on all the different factors that your organization finds important and applicable

Director of ITa year ago

IT is extremely important to define the security posture for the enterprise which must includes all the applicable domains Perimeter, Identity & Access, Data, Network, Endpoint, Cloud, Application, Mobile, Industrial Security along with , DR and BCP. Looking at each domain will help to ensure the coverage of all the domain areas. Identify the Gaps in security policies, appropriate tools in place and Threat notification mechanism is in place. 
It is recommended to bring the external party to assess the security assessment of the enterprise, however define the scope with open eyes and mind,  be open to share all kind of data and information required. Keep the governance in your hand.
in summary, it has to be hybrid team of internal and external experts. Hope this helps.

CIOa year ago

In my opinion, the most effective way to address security issues is aways use an internal team. However, those professionals are rare, asking high salaries and hard/expensive to retain.

So, hiring a consultant company, which has a reputable knowledge at this point, has a talented team and a commitment to continuously enhancing their skills in such complex area, could be an alternative that must be considered.

Board Member in Healthcare and Biotecha year ago

A bit of both - internal and external

External to conduct the initial and post mediation assessment, and then at predefined milestones like an upgrade/major change, or period say annual.

Internal to own the remediation and manage business impact and expectations

Finally as the IT leader, communicate why, what and end game to not just the impacted stakeholders, but across the company to strengthen the perceptions of security.

Senior Vice President - Advanced Engineering & Data Analytics in Manufacturinga year ago

The best and foolproof way of security assessment is through Penetration testing and that will surface the vulnerabilities across the enterprise. Further security monitoring and threat detection through log aggregation and analytics helps continuously identify the anomality and remediation can secure the enterprise. Further regular audits will help in ensure configurations and upgrades/ patches. This can be outsourced to external firms and can be better managed through specialists.    

Content you might like

Authentication47%

Authorization44%

Identity Governance and Administration (IGA)7%

Other (comment below)

View Results

LAN45%

WAN35%

LAN and WAN are equally secure18%

Other (explain in the comments)

View Results