In this paper, RiskVision® is providing insight into the essential building blocks to create a sound cyber security strategy. These best practices are based on the company’s engagement with Global 2000 companies, government agencies, fellow security vendors, industry analysts, and security consultants; as well as market research it conducts on a regular basis.
The data breaches at Target, Home Depot, Staples, Michaels, Kmart, eBay, Anthem, Sony Pictures Entertainment, and the U.S. Office of Personnel Management, were just the tip of the iceberg. Despite increased investments in preventive security measures, many organizations are losing the war against cyber criminals. New methodologies developed by the National Institute of Standards and Technology (NIST) and other industry standards bodies (e.g., the Payment Card Industry) are being implemented by many organizations, but best practices for addressing cyber security threats remain vague. At the same time, board members are demanding quantitative risk data that spans all business operations, while business units need to neutralize the impact of cyber-attacks. So what can be done to minimize cyber security threats?
It’s clear that the dynamics of the threat landscape have changed, and that organizations need to respond accordingly. An effective starting point is to focus on the essential building blocks of any cyber threat defense strategy, namely: Data Integrity, Continuous Monitoring, Cyber Risk Visualization, Risk-Based Prioritization, and Closed-Loop Remediation.