Building Effective Security Programs Requires Strategy, Patience, and Clear Vision
TechTarget and Informa Tech’s Digital Business Combine.TechTarget and InformaTechTarget and Informa Tech’s Digital Business Combine.Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.Building Effective Security Programs Requires Strategy, Patience, and Clear VisionBuilding Effective Security Programs Requires Strategy, Patience, and Clear VisionCapital One executives share insights on how organizations should design their security programs, implement passwordless technologies, and reduce their attack surface.Dark Reading, Staff & ContributorsMay 15, 20251 Min ReadNatee Jindakum via ShutterstockCISOs are facing a growing array of threats, including ransomware, business email compromise, identity-based attacks, phishing attacks, and data breaches. Patience and adaptability are required to build, implement, and maintain an effective security program that addresses the gamut of these risks.Many technologies and security measures are available to tackle the various problems organizations face, but they take time and resources to implement properly. One way to do so is to treat the organization's security program as a product, said Capital One cybersecurity CTO Mike Benjamin at last month's RSAC Conference in San Francisco. Like products, security programs have customers, meet a need, deliver something of value, and can be purchased, he said. Some may argue that security programs are not like products but more like a cost center because they are required or have unclear deliverables."People who voted no, a security program is not a product, in everything we see are things we would all argue is a security program that needs help," Benjamin said. "The company only does it because it's required. Does anyone want their program to be thought of in that way? We all strive for it to be something that the company values, to be a core component of how it operates, not a thing that just has to be done."Strong programs balance technology with internal work and overall risk management. Striking an effective balance can be difficult, especially when it comes to application security programs. Security teams must ensure there are no vulnerabilities without slowing down business operations.Read the Full Article on Dark ReadingAbout the AuthorDark ReadingStaff & ContributorsDark Reading: Connecting The Information Security CommunityLong one of the most widely-read cybersecurity news sites on the Web, Dark Reading is also the most trusted online community for security professionals. Our community members include thought-leading security researchers, CISOs, and technology specialists, along with thousands of other security professionals.See more from Dark ReadingWebinarsMore WebinarsReportsMore ReportsNever Miss a Beat: Get a snapshot of the issues affecting the IT industry straight to your inbox.SIGN-UPYou May Also Like
#building #effective #security #programs #requires
Building Effective Security Programs Requires Strategy, Patience, and Clear Vision
TechTarget and Informa Tech’s Digital Business Combine.TechTarget and InformaTechTarget and Informa Tech’s Digital Business Combine.Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.Building Effective Security Programs Requires Strategy, Patience, and Clear VisionBuilding Effective Security Programs Requires Strategy, Patience, and Clear VisionCapital One executives share insights on how organizations should design their security programs, implement passwordless technologies, and reduce their attack surface.Dark Reading, Staff & ContributorsMay 15, 20251 Min ReadNatee Jindakum via ShutterstockCISOs are facing a growing array of threats, including ransomware, business email compromise, identity-based attacks, phishing attacks, and data breaches. Patience and adaptability are required to build, implement, and maintain an effective security program that addresses the gamut of these risks.Many technologies and security measures are available to tackle the various problems organizations face, but they take time and resources to implement properly. One way to do so is to treat the organization's security program as a product, said Capital One cybersecurity CTO Mike Benjamin at last month's RSAC Conference in San Francisco. Like products, security programs have customers, meet a need, deliver something of value, and can be purchased, he said. Some may argue that security programs are not like products but more like a cost center because they are required or have unclear deliverables."People who voted no, a security program is not a product, in everything we see are things we would all argue is a security program that needs help," Benjamin said. "The company only does it because it's required. Does anyone want their program to be thought of in that way? We all strive for it to be something that the company values, to be a core component of how it operates, not a thing that just has to be done."Strong programs balance technology with internal work and overall risk management. Striking an effective balance can be difficult, especially when it comes to application security programs. Security teams must ensure there are no vulnerabilities without slowing down business operations.Read the Full Article on Dark ReadingAbout the AuthorDark ReadingStaff & ContributorsDark Reading: Connecting The Information Security CommunityLong one of the most widely-read cybersecurity news sites on the Web, Dark Reading is also the most trusted online community for security professionals. Our community members include thought-leading security researchers, CISOs, and technology specialists, along with thousands of other security professionals.See more from Dark ReadingWebinarsMore WebinarsReportsMore ReportsNever Miss a Beat: Get a snapshot of the issues affecting the IT industry straight to your inbox.SIGN-UPYou May Also Like
#building #effective #security #programs #requires
·33 Views