Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Risk Management

Wading Through Tool Overload and Redundancy?

A False Sense of Security is Worse Than a Real Sense of Vulnerability

A False Sense of Security is Worse Than a Real Sense of Vulnerability

After walking the RSA Conference’s show floor this year, you may be asking, “What is the right set of technologies to protect our enterprises?” While most of us know effective cyber security requires a well-coordinated set of people, processes and technology, the conference at its core is focused on cyber security technology.  With new vendors sprouting by the dozen, the challenge of finding the right technology grows every year.  

The starting point for any home renovation is sketching out the existing layout, from which you can start to nip, tuck and enhance for the greatest effect. Finding the right cyber security technology is no different. The starting point for any conversation needs to be a comprehensive understanding of the existing environment and architecture. Most large enterprises are running countless tools, often overlapping, either purchased organically or inherited via mergers and acquisitions. For one reason or another, legacy tools are often only implemented partially or are configured less than optimally. Buying more tools, without understanding the existing landscape, and how the new tools fit or how they are to be implemented, only adds to the problem.  

The first step is to inventory your cyber security tools and information assets, including documenting technical details like software versions and underlying platforms, security functional areas, coverage and the business value of assets.  By understanding your tool coverage and the business value of assets, you can better understand the actual value each tool is providing and drive a risk-based approach for filling in the gaps.  In other words, prioritizing protection of your most critical assets, those that if compromised, would impact the business the most.  

The results of inventories are often surprising. One of the important outcomes of implementing security/user and entity behavioral analytics is that it provides visibility into the coverage and effectiveness of the tools that feed it data.  The process of identifying, integrating and reporting on all of that security and business data in a consistent and comprehensive way provides an understanding of where the skeletons lie and where the organization should be focused to reduce risk the most.  

Based on my experience working with some of the largest, global enterprises in the world, typical findings include tools implemented through only part of the organization, the use of multiple vendors in the same category with each only partially deployed, configurations detuned to reduce the number of alerts, and worst of all, crowned jewels that are exposed to the elements.

With an inventory in hand, the next step is identifying gaps and redundancies in coverage and/or functionality.  The result of rationalizing security tools and their coverage will be a clear list of actions and needs, often with neutral or positive budget impact.  It is not uncommon for companies to pay for enterprise licenses for tools that only get deployed across half the organization.  That money can be recovered or utilized by completing the deployment with no additional license cost.  Reducing vendor and tool redundancy can reduce support costs and drive better deals with the winning vendor. 

Companies that are not new to cyber security, typically have some semblance of traditional tools, including firewalls, data loss prevention, endpoint protection, vulnerability and configuration scanners, SIEMs, cloud access security brokers and the such.  Notwithstanding any shiny new toys that struck your fancy, these tools are still a great foundation on top of which to build your architecture.  Don’t automatically discount your existing platforms before you understand how well they have been deployed and the value they are providing.  Finally, prioritizing your actions and acquisitions based on the value of the assets being protected will speed the burn down of your cyber risk exposure.

Advertisement. Scroll to continue reading.

With an inventory and action plan in hand, you can start to execute and understand how you may benefit from any new tools or technology.  Execution should be risk driven, starting with protecting your highest value assets.  New tools should be evaluated based on how they fill a gap or up your data protection game to the next level.  If the prospective tool is not part of an entirely new category, it is important to assess where it fits and where it overlaps, with the goal of minimizing functional and budgetary redundancy.  Having your architectural ducks in a row will also enable you more freedom to be an early adopter to pilot and assess new technologies that may not yet be ready for enterprise deployment but provide the promise of future benefit.

Documenting and rationalizing an enterprise’s security architecture is not a trivial process. It requires a dedicated effort to complete. While the process is focused on tools and technologies, it cannot be completed without looking at policy, people and process as well. Tools don’t operate in a vacuum; they operate in living, breathing organizations that need to be able to conduct business while also protecting their operations. However, without an understanding of where you stand today, new tools will result in more redundancy and gaps in protection. A false sense of security is worse than a real sense of vulnerability.

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Bill Dunnion has joined telecommunications giant Mitel as Chief Information Security Officer.

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

More People On The Move

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

Cybersecurity Funding

2022 Cybersecurity Year in Review: Top news headlines and trends that impacted the security ecosystem

Endpoint Security

Today, on January 10, 2023, Windows 7 Extended Security Updates (ESU) and Windows 8.1 have reached their end of support dates.

Email Security

Many Fortune 500, FTSE 100 and ASX 100 companies have failed to properly implement the DMARC standard, exposing their customers and partners to phishing...

Artificial Intelligence

Two of humanity’s greatest drivers, greed and curiosity, will push AI development forward. Our only hope is that we can control it.

CISO Strategy

Cybersecurity-related risk is a top concern, so boards need to know they have the proper oversight in place. Even as first-timers, successful CISOs make...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...