Zero trust architecture
which assumes that threats can originate both outside and inside the network. It emphasises continuous verification of user identity and device integrity, minimising access to only what is necessary
AI and machine learning ML
re increasingly used for threat detection and response. These technologies can analyse large volumes of data to identify patterns and predict potential security breaches.
Ransomware evolution
as attacks are becoming more sophisticated, with attackers often using double extortion tactics, where they not only encrypt data but also threaten to publish it if the ransom is not paid.
Cloud security
is about ensuring the security of cloud environments as cloud adoption has grown almost exponentially. This includes securing data, applications and workloads across public, private and hybrid clouds
Supply chain attacks
Supply chain attacks are on the rise with attackers targeting the software supply chain by compromising legitimate software updates or vendor systems to distribute malware
IoT
Internet of Things (IoT) security has become a requirement with the proliferation of IoT devices introducing new vulnerabilities. Securing these devices against potential threats is a growing area of concern.
Extended detection and response (XDR)
Extended detection and response (XDR) solutions provide a holistic approach to threat detection and response by integrating multiple security products together, improving visibility and response times.
Regulatory compliance and data privacy
Regulatory compliance and data privacy have come more into focus; due to stricter regulations such as GDPR and the Digital Operational Resilience Act (DORA), organisations are focusing more on compliance and protecting personal data to avoid hefty fines and reputational damage.
Quantum computing
Quantum computing poses a potential threat to current encryption standards. Organisations are beginning to explore quantum-resistant algorithms to prepare for future security challenges.
chief information security officer (CISO)
is a senior executive who defines the security posture and oversees all IT infrastructures. They establish the vision for the organisation’s security programme and direct the implementation of cybersecurity operations. CISOs do not normally sit on the board, but are part of the senior management team and support organisation strategy with secure, responsible growth
CIO
The chief information officer (CIO) is the highest position within an organisation that focuses on information. The CIO provides guidance and leadership to specialists and managers within their department by creating regulations for security procedures. The CIO also considers how data is used and processed, making sure it aligns the company’s technical strategy with its overall go
information security manager
The information security manager is a leader who oversees information security measures within the organisation. They focus on ensuring the security strategy is implemented and supports the organisation. They will make recommendations to senior management and support the writing of policy and procedure. They also assure the organisation is compliant, from an information security aspect, with any regulation.
information security analyst
An information security analyst gathers and assesses data to learn more about the organisation’s security profile. They can also work with other security and IT technology professionals to implement security measures and assess their performance. They can help support the selection and implementation of controls, including monitoring.
cyber engineer
A cyber engineer is a technical employee with an in-depth understanding of computer networking and operating systems including security. They focus on implementing important security measures across the organisation, and may test and implement new security measures. They will work with incident response during and after events to help avoid further incidents.
security architect
A security architect is an experienced cybersecurity individual who has knowledge across security domains. They maintain the security of an organisation’s IT and information security, working across cyber engineering, information security and IT. They can check designs provided by a solution architect to ensure it meets security requirements, and study existing implementations to identify vulnerabilities and create procedures to manage threats.
Pentester
Pentesters undertake security checks on systems by exploiting any vulnerabilities they find. They essentially hack with permission from the organisation they have been contracted to undertake the pentest (penetration testing) for. They can test physical, system and web security. In addition to technical skills, pentesters need good written and verbal communication skills.
SOC analyst
SOC analysts undertake reviewing incidents from phishing through to system breaches within a security operation centre (SOC). They analyse data from security systems and then undertake further investigation as required. They can be tiered depending on their skill level, such as levels 1, 2 and 3. They can work directly for the organisation or be part of a third-party SOC that supports several organisations. A SOC analyst is part of cyber defence often known as the blue team.
several recognised standard
There are several recognised standards that provide guidance on how to manage assurance arrangements and responsibilities within an enterprise, such as the ISO/IEC 27000 series and the Information Security Forum (ISF) Standard of Good Practice for Information Security (securityforum.org/solutions-and-insights/standard-of-good-practice-for-information-security/). These standards can be adapted to fit individual enterprise requirements.
SHOULD BE someone responsibility for the day-to-day management of IA issues.
This is to ensure that good IA practice is applied properly and effectively across the enterprise and for co-ordinating all assurance activities. This function should be a full-time role in larger organisations
MANAGER of this function = head of information assurance, the information security manager or the CISO
The information security manager needs to understand….
The information security risks that the enterprise may face, what controls are in place and where the enterprise may be vulnerable. This information must be communicated effectively to senior management (who have ultimate responsibility for IA).
The main activities of the information security manager are:
*co-ordinating IA activities across the enterprise, including those delegated outside the team;
*co-ordinating the production of the security policy;
*communicating with users so they understand their IA responsibilities and are aware of potential threats to the enterprise;
*understanding the enterprise’s risk appetite and profile and how it may be evolving;
*monitoring the effectiveness of the enterprise’s assurance arrangements;
reporting on the effectiveness of the assurance arrangements to senior management and suggesting improvements;
*providing expert advice on IA matters to the enterprise;
*creating a culture of good information exchange and assurance practices.
Managing assurance responsibilities legal?
There are a number of recognised standards that provide guidance on how to manage assurance arrangements and responsibilities within an enterprise, such as the ISO/IEC 27000 series and the ISF Standard of Good Practice for Information Security. These standards can be adapted to fit individual enterprise requirements.
Where should IA function be placed in the enterprise structure?
depends on culture/structure
IA might be in corporate compliance area; IT group; central facilities group
IA function in corporate compliance area
in some enterprises, the IA function is located within the corporate compliance area. This is common in enterprises or industries that have a strong compliance culture, such as banking or manufacturing.