Recommended Product
Network Security Audit Software
Network Security Audit Software and Computer Security Tools
  Learn More
 
 
  Network Security Software
Network Bandwidth Monitor

Network Bandwidth Monitor
NBMonitor displays real-time details about your network connections & bandwidth usage.

   
Network Access Monitoring

Network Access Monitoring
ShareAlarmPro monitors network access to shared folders and resources.

   
Product Key Finder
Product Key Finder

Product Key Explorer retrieves over 800 software product keys from network computers.
   
Network Shares Monitoring

Network Share Watcher
Monitors network folders permissions and identify shares which are violating company data access policy.

 
 

Network Security News

Forrester's 2011 security strategy recommendations

January 25 2011

Every New Year brings an opportunity to review existing security plans and adjust strategies for the next year. And, as I participate in these conversations for 2011, a lot of similar themes have popped up. Most CISOs are struggling with the same issues, ranging from dealing with the changing threat landscape to properly supporting the rising adoption of social technologies, employee-owned mobile devices, and cloud services. In fact, Forrester's research shows that a majority of challenges for security professionals all relate to business orientation and alignment. For example, many senior business and IT leaders are asking CISOs to better support and align with the business and IT objectives, requesting regular interactions and updates from security teams.

Given security leaders' pain points and focus areas for 2011, Forrester has identified recommendations for security strategies that address the broad security trends in the current market. Our recommendations fall into three major themes: 1) better governance structures; 2) more mature security processes; and 3) improved analytics and reporting capabilities.

Develop Governance Strategies To Support An Empowered Organization

Social, mobile, and cloud technologies are part of a groundswell movement that has taken hold of organizations, propelling waves of innovation and business transformations. Security can no longer block or impede this momentum; rather it's time for security leaders to mitigate risk to a level that is acceptable to the business. This means security leaders need to:

* Prepare for social technology adoption. As one CISO put it, social media adoption is like a freight train coming; if we don't prepare ourselves for it, we'll get hit pretty hard. Forrester surveys show a dramatic increase in the number of people accessing social media Web sites every day--the numbers have jumped from about 11% in 2008 to 30% in 2010. Social media technology increases the risk of malware infections and data leaks (both intentional and unintentional). Social media policies will have a wide variation, but it's important to have a governance strategy and specific policies in addition to the technical controls, process checks, and people awareness to mitigate this risk.

* Help the business devise a strategy to leverage cloud services. The cloud is here to stay, so while security leaders should raise concerns about data security and regulatory risks, they should also be recommending ways to mitigate these risks of data disclosure or a data breach.

* Actively support mobility in the post-PC era. As devices such as tablets, eReaders, and smartphones eclipse PC devices like desktops, laptops, and netbooks, security and risk professionals must aim to bring a measure of control to an increasingly chaotic environment, while maintaining employee flexibility and innovation.

Mature Existing Processes To Enhance Data Protection Capabilities

A major theme emerging for CISOs in 2011 is the desire to understand and measure the maturity of organizational processes. With the changing threat landscape, many security professionals have found existing processes to be inadequate or inefficient. Many CISOs I talked to are developing more consistency and rigor to validate regulatory compliance requirements as well as adherence to standards such as NIST, ITIL and ISO 27001. Although better maturity is required across all security processes--here are the especially important moves to consider:

* From reactive tools to proactive focus on integrating tools and processes. During a recent conversation, a security system integrator claimed that 95% of their clients chose to deploy IPS rather than IDS. Although this statement was not shocking, it does highlight a general trend: the realization by security professionals that an ounce of prevention is worth a pound of cure. Organizations are moving away from blindly deploying reactive technologies to deploying preventive processes and technologies or by enabling the preventive features on their existing technologies.

* From identity management to information and access management. As companies focus on securing their data, security professionals need to recognize that's it's not just about managing identities, but that access control and information management are key components of data security. The proper management and control of user accounts, access permissions, and privileges is one of the most effective avenues to ensuring data doesn't walk out the door.

* From ineffective incident planning to robust breach response. Having a comprehensive and well-tested breach response plan could be the difference between a contained incident and a front-page fiasco. And with the increased sophistication and targeted nature of threats, coupled with their increasing frequency, sooner or later there will be a security incident to handle. Security professionals should be prepared.

Build A Competency In Analytics For Improved Visibility, Metrics, And Decision-Making

Many CISOs admit that finding relevant information from the constant data stream is like finding a needle in a haystack. CISOs need to ensure that metrics and reporting efforts focus on three levels of decision-making: operational, risk, and business-centric. [Editor's note: See Security metrics: Critical issues.] And each level requires a different type of data to fulfill their job. Once security professionals start measuring in their own environment, it may be appropriate to look at industry benchmarks for comparison:

* Educate and equip risk owners with relevant information for decision-making. Avoid being one of the many security organizations that don't use any kind of formal risk management discipline to objectively identify, analyze, and assess risk. This will help reduce any underestimates, or exaggerations of risk. Remember, it's the CISO's job to enumerate the risks of the business, but it's up to the business to make the final decision on the acceptable level of risk.

* Demonstrate the value of security with business and financial metrics. It's important to note that C-level execs and board members most likely don't care about the security team's operational metrics. They're far more concerned with the organization's overall risk posture. In fact, many are savvy enough to understand that there's no real ROI for some security investments; so they're looking instead for maturity models and risk frameworks to understand how the investments are changing their risk posture.

* Enhance operational measures through validation and correlation. Implementing a security technology is the easy part. Ensuring that it's continuously and consistently working is much more difficult. One company that was sending most of its alerts and events into its SIEM tool was hacked because one of the rules on the SIEM was misconfigured. The tool didn't even peep as the hackers breached the environment. Many CISOs complain that the sheer volume of information they need to sift though is overwhelming, and they're turning to correlation capabilities of SIEM tools. However, unless you're testing and validating these controls, even the best security technology in the world is useless.

Khalid Kark is VP and Research Director at Forrester Research. His research primarily contributes to Forrester's offerings for the Security & Risk professional. He is a leading expert in information security program governance; security services; strategy; and governance, risk, and compliance (GRC) initiatives.

Sours From

View more news

 
  Most Popular
 
 
  Popular Searches
network security magazine network security auditor network security news network security software corporate network security network security systems home network security product key finder password recovery software Network Bandwidth Monitor Network Access Monitoring data access policy monitoring remote shutdown Network File Search key recovery Network Monitoring Computer Security Ethical Hacking
 

 

Sponsored Links
Network Security Auditor
Nsauditor is a complete networking utilities package that includes more than 45 network tools and utilities for network auditing, scanning,network connections monitoring and more. For more information, please visit:
www.nsauditor.com


Password Recovery Software
SpotAuditor is All-in-one password recovery program that offers administrators and users a comprehensive solution for recovering passwords and other critical business information saved in users' computers. For more information, please visit:
www.password-recovery-software.com

BlueAuditor - Monitor YourBluetooth Network
BlueAuditor detects and monitors Bluetooth devices in a wireless network and allows network administrators to audit wireless networks against security vulnerabilities associated with the use of Bluetooth devices. For more information, please visit:
nsauditor.com/bluetooth_network_scanner.html