Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Management & Strategy

Four Things Every CIO Should Do as Habit

There are some things that the best CIOs and IT managers can’t prevent entirely as they depend on other people. An example of this is the employee who leaves a laptop open in a coffee shop and walks away “just for a few minutes.” There are some things which every CIO has control over, however. When these are overlooked, and a breach occurs, I have to shake my head at how easy it would have been to prevent. Here are four things I wish every CIO would make into a habit.

Centralized Log Monitoring

There are some things that the best CIOs and IT managers can’t prevent entirely as they depend on other people. An example of this is the employee who leaves a laptop open in a coffee shop and walks away “just for a few minutes.” There are some things which every CIO has control over, however. When these are overlooked, and a breach occurs, I have to shake my head at how easy it would have been to prevent. Here are four things I wish every CIO would make into a habit.

Centralized Log Monitoring

Four Things Every CIO Should Do on SecurityCentralized log monitoring consists of a log collector or centralized server on which all logs are sent to and archived. Each client or server that sends logs to the collector is configured in such a way that it maintains local logs but also forwards a copy to the centralized collector. In most instances, this doesn’t even require a client installed on the server. This provides a few key benefits that can make a huge difference in the company’s security.

1. Log monitoring and review becomes efficient. Centralized log collection provides an efficient way to spot network-wide security anomalies by being able to quickly review logs from multiple sources. Some log monitoring suites allow you to write alert criteria for certain events, or even certain number of events. For instance, a system administrator could quickly be alerted to multiple failed logins on a system, or multiple systems with proper alerts setup.

2. Correlation becomes possible. By collecting all your logs in a central location, a security analyst is now able to quickly correlate events over multiple systems to either detect an attack, or reconstruct one. Some log monitoring suites or SIEMs can automatically correlate this data for you on predefined or custom rules providing a great deal of insight into your organization’s network.

3. Log integrity is preserved. In the event of a breach or security incident, any attacker worth their salt will at least take a few moments to try and cover their tracks. The most trivial of which can be modifying logs. With centralized log monitoring, logs are forwarded in parallel and the attackers tracks are “immortalized” on the log collector. Without proper log management, this can become a forensic nightmare.

Heed Industry-Wide Security Best Practices or Guidelines

Organizations like The National Institute of Standards and Technology (NIST) and The Center for Internet Security (CIS) have developed security baselines for various operating systems. No organization large or small is above these standards. Companies should use these as a baseline or develop their own baselines and adapt them for their unique environments, and they should be reviewed and updated. Unfortunately security is not stagnant, neither are attacker’s methods. As new types of attacks and attack vectors are introduced, system security configuration baselines should be modified to take these into account.

Work to Instill Security as A Culture

Advertisement. Scroll to continue reading.

Security should be a culture. Leaving security in the hands of a few individuals will always fail. As with most other business decisions, security has to be approached from a top down mentality – without executive and managerial buy-in, a good security program cannot exist. It needs to be part of the company culture and every employee’s responsibility. (More on this in my last column of the year.)

Empower the IT Staff

A trap that companies often fall into, is putting their trust into software instead of the IT staff that deploys and maintains it. This leads to stagnant security programs and management oversight issues. Your IT team is the easiest place to start in reducing errors because that is their focus and skill set. Empower them with monitoring, on staying on top of updates, and task them with keeping up with new solutions and solutions in the evolving area of security technology. Happily provide continual education including certifications, and consider peer challenges to keep them at the top of their game. Remember, technology can fail too. What will act as backup when that happens? Humans.

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Bill Dunnion has joined telecommunications giant Mitel as Chief Information Security Officer.

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

More People On The Move

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...

CISO Conversations

Joanna Burkey, CISO at HP, and Kevin Cross, CISO at Dell, discuss how the role of a CISO is different for a multinational corporation...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

CISO Conversations

In this issue of CISO Conversations we talk to two CISOs about solving the CISO/CIO conflict by combining the roles under one person.

CISO Strategy

Security professionals understand the need for resilience in their company’s security posture, but often fail to build their own psychological resilience to stress.

Malware & Threats

The NSA and FBI warn that a Chinese state-sponsored APT called BlackTech is hacking into network edge devices and using firmware implants to silently...