What can you do to maintain security in a large enterprise when your cyber budget is shrinking?
Director of Information Security in Manufacturing, 1,001 - 5,000 employees
I realize that this may not be the same for everybody, but in my experience we are really happy to collect a large number of 'best in class' tools and platforms. Several of those tools have evolved and now overlap with other tools, sometimes with quite acceptable results. A critical review of the tool landscape can really help weed out some of those. As a nice by-product we found a tool that was simply not worth the money we have been paying and decided to terminate the license. The vendor countered with a much more aggressive quote. Pretty much like your cellphone or your insurance bill, if you don't ask for a lower price you will certainly not get it!Chief Technology Officer in Software, 51 - 200 employees
1. Use Layered Security Processes/TechnologiesEvery business needs to have a layered security approach to thwart cyber attackers and hackers. The importance of patch management cannot be overstated—confirmation of updated operating systems and applications is paramount. It’s important to install antivirus, spam detection, and filtering software on each computer, while also protecting the network via proper firewall configuration.
2. Download the Data Security Guide: Learn how to prevent, detect, and contain a data security incident.
Consider Data Encryption Software
Encryption algorithms and keys play a critical role in preventing hackers from getting sensitive business information. This can be useful for data both at rest and in transit, as well as for portable media and device access.
3. Protect Mobile Devices
Every business is operating in the age of mobility where their workforce is often operating remotely. Consequently, mobile device management (MDM) and security are vital part of IT security. Some of the ways to implement MDM are through the use of sign-on passwords, data encryption, and wireless connection encryption when using public networks.
4. Next-Generation Firewalls
Next-generation firewalls are a foundational element of preventing outside attacks to the network. Today, integrated firewall/VPN client solutions can automatically enforce fine-tuned security across a business’s network, as well as remote offices and on an individual user level. The many features of VPNs and next-generation firewalls enable administrators to:
Centrally manage security policies
Implement rule-based access controls
Define policies for different user groups
VP of IT Audit in Services (non-Government), 10,001+ employees
Ensure the basics are maintained....user training/awareness, access rights, multi-layered approach, ensure patches and upgrades are applied, appropriate configurations.Chief Data Officer in Services (non-Government), 51 - 200 employees
Crucially, know your environment and how to prioritize. I remember an incident years ago when a third party ran a vulnerability scanning tool on our website and reported a SQL injection vulnerability. Kept repeating that it was number 1 on the OWASP list and kept insisting that we had to fix it immediately. I had to shut them down as our website was basically informational and did not have a database behind it.Secure Facilities Information Technology Manager in Manufacturing, Self-employed
Maintain a well thought out cyber security training program for the employees that can be used over again with minimal revisions, as well as ensure that your core cyber security group understands the responsibilities of managing your network given the current budget concerns. Director in Healthcare and Biotech, 201 - 500 employees
Maintaining security for large or any enterprise where security is important can be quite difficult. Having competent, flexible staff willing to dive into new tech is critical. Many "new" approaches to cyber security that include AI take the work off of your plate to a degree and and very effective, however we know they are extremely expensive. Your employees must have a concrete working knowledgebase of your environment, be up to date on infrastructure design and protocol. Additional software tools that may be labor intensive are available at reasonable price are available if you have the staff to champion the deployment and upkeep necessary to maintain an acceptable level of security. These processes and technologies are ever advancing, so imo the best/cheapest tools at your disposal are your human resources when it comes to protection. Information Security Manager in Software, 201 - 500 employees
The problem occurs in every company, but you have to do what you have to do so in my opinion:1. Have at least WAF or NGFW.
2. There are a lot of open-source tools that you can use for security ( SIEM, FIM, etc.) if the policy requirements are not strict about open-source tools.
3. Use open-source vulnerability scanners to check perimeters.
4. Segregate your network.
5. Use port security.
6. etc.
P.S. A lot of things can be done when it comes to securing the enterprise but the most important is, you have to convince the enterprise that it is important to at least keep the budget the same if they are looking for paid solutions.
Director, Strategic Security Initiatives in Software, 10,001+ employees
Go above and Beyond, Hire and retain best Security talent, get the budget you need to secure the company, etc.Director of IT in Finance (non-banking), 51 - 200 employees
As others have mentioned, it's really about consolidating and reviewing controls. It might be about breaking things down and removing a lot of the complexity that we've given ourselves over the years but with that might come a loss of functionality. If you want to take something away, you can either get creative or be prepared that you might lose something when those budgetary dollars disappear.Chief Architect in Telecommunication, 10,001+ employees
User training is one of the most valuable activity that you can perform. This can be performed for little investment.Content you might like
Cyber insurance with ransomware coverage44%
Law enforcement contact(s)44%
Ransomware response plan60%
Ransomware task force/team39%
Bitcoin account for ransomware payments14%
Disaster recovery site33%
Other (comment below)1%
573 PARTICIPANTS
Fraud mitigation19%
Protection of reputation and brand56%
Protection of consumer data19%
Regulatory or compliance requirements6%
172 PARTICIPANTS
CTO in Software, 201 - 500 employees
Without a doubt - Technical Debt! It's a ball and chain that creates an ever increasing drag on any organization, stifles innovation, and prevents transformation.ISSO and Director of the IRU in Healthcare and Biotech, 10,001+ employees
I would definitely suggest this based of how you categorize your types of data/systems and information being stored in certain parts of your data center. I think it’s really dependent on the size of your organization and ...read moreDirector Global Network / Security Architecture and Automation in Finance (non-banking), 10,001+ employees
Nothing ever dies in Enterprise. Why did Broadcom Software buy Symantec and VMWare, why did SDX Central post a story today about MPLS and how it lives on. Why is the hot news about cloud repatriation becuase a terrible app ...read more