Five Ways Executives Can Optimize Cyber Security Spending

In 2021, ransomware attacks cost the world over $20 billion. With cyber attacks and ransom pay-outs at a record high, CEOs are losing sleep as they struggle to find worthwhile investments that will keep their operations secure. 

Cyber security should be a top priority for any C-suite looking to avoid crippling fines for data breaches and reputational damage. However, mindlessly pouring more money into cybersecurity does not automatically result in increased preparedness. 90% of CIOs acknowledge that their companies spend millions on inefficient security solutions.

Most organizations do not have a methodology to validate and operationalize cyber security, and this is why they ultimately end up paying out attackers. But those that have cyber security best practice at the heart of their culture, will be better placed to make business savvy investments that protect their network.

When strategizing about how to operationalize their security infrastructure, organizations should concentrate on:

The Right Team - In today's hypercompetitive cyber skills market, providing expert  training has proven to be the best tool to retain the best talent .Staff thus feel valued and invested in by their employers, driving them to perform operationally effective security.

Live-Fire Security Exercises - Every professional sports team and special forces military squad has one thing in common: they train first for individual skills, then they train as a team under hyper-realist conditions to validate whether they are ready to accomplish their missions. Cybersecurity teams should follow the same process to validate whether they are ready to protect, prevent and perform operational cybersecurity best practices.

Trust, but Verify  - Verifying how businesses behave under attack, being able to separate the significant signals from the noise and knowing they have the right configurations is often the difference between being secure or being compromised.

Security is Everyone’s Problem - No matter how state-of-the-art your technology is, 85% of breaches are in fact due to human errors. Being able to emulate users' traffic, mistakes and behaviors is the real key to building cybersecurity confidence.

Executive Commitment - It takes executive commitment to be a secure organization and operation. Leaders have to talk about how security impacts brand, customers, social responsibility, and demonstrate that it is a mandatory practice for everyone.  

Test Your Security Stack

Before and after every update to a stack, whether it’s a purchase and integration or a deletion from inventory, CISOs must test their security stacks. Red team exercises allow organizations to do this while simultaneously upleveling staff. In these exercises, red teamers will act as hackers and throw everything they can think of at the company’s network.

Old and new attack tactics, techniques and procedures (TTPs) will be deployed to see what cracks and what stands strong.

CISOs and their teams should keep detailed logs of the effects of these simulated attacks on their network before and after adjustments to the security stack, so they know for the future which tools lock doors and which burst them wide open. Businesses have to ensure that both consolidation and expansion don’t lead to vulnerabilities, and that potential threats inherent within the stack itself are minimal.

Validate Your Team & Processes

Cyber training experts swear by tabletop exercises, but they’re only as good as the table they’re on if you don’t actually practice a response. CISOs need to evaluate their team’s incident response skills and make sure they have hired people who have the capabilities to identify threats and respond to them quickly and effectively.

One way to do this is through purple teaming – when red teams (acting as offense) and blue teams (acting as defense) work together to share knowledge. Purple teaming enables team members to collaborate with one another, and identify personal strengths and weaknesses. This way, staffers can significantly improve efficiency by distributing workloads appropriately to ensure their incident response procedures are coordinated. 

Following the exercise, teams should hold a post-mortem to identify if any training programs need to be developed to boost employees’ abilities. A problem addressed should always be coupled with a solution. CISOs are responsible for providing team members the tools they need to be better at their jobs and for working with them to figure out where else they may best perform on the team. 

Instill Confidence in Tech and Personnel 

After testing both the stack and personnel, CISOs should ensure every member of the team is acquainted with each tool in their stack and involve their team in the decision-making process when making adjustments. They should let their teams conduct trials with different tools before making a decision about which ones to invest in. 
 
Despite common misconceptions, CISOs aren’t just responsible for making sure their company isn’t hacked. They’re responsible for making sure their tools and people are working as a united front to keep the bad guys out and ensure that other business divisions are able to operate without disruption. Identifying gaps doesn’t just mean finding the holes in the technology or the team, but figuring out how they can be more effective together. 

CISOs may already have the tools they need to succeed in their backyard. They may also have holes in their staff or stack that are sucking in money and time and producing zero return on investment. The businesses that invest in resources that build confidence in the personnel-tech relationship will be best placed to protect their network and their bottom line.

Lee Rossey is CTO and Co-Founder of SimSpace

You Might Also Read: 

Employee Cyber Security Training Is Vital To Reduce Cyber Attacks:

 

« Navigating The Evolving Threat Landscape
Hidden In Plain Sight »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

JLT Specialty

JLT Specialty

JLT Specialty is a leading specialist insurance broker. Services offered include Cyber Risks insurance.

AirCUVE

AirCUVE

AirCUVE provide authentication and access control solutions for networks and mobile security.

Cyber Security National Lab (CINI)

Cyber Security National Lab (CINI)

The Cyber Security National Lab brings together Italian academic excellence in Cyber Security research.

Second Nature Security (2NS)

Second Nature Security (2NS)

2NS provide vulnerability assessment, penetration testing, security audit, application and network security and secure software development processes.

Sqreen

Sqreen

Sqreen is a web application security monitoring and protection solution helping companies protect their apps and users from attacks.

Infortec

Infortec

Infortec provide consultancy and solutions for the protection of digital information and the management of computer resources.

Blockchains LLC

Blockchains LLC

Blockchains is committed to changing the world for the better. Using blockchain and other innovative technologies, we’ll build new systems, new security, and new interactions.

Hong Kong Broadband Network (HKBN)

Hong Kong Broadband Network (HKBN)

HKBN are a leading integrated telecom and technology solutions provider that offers a comprehensive range of premier ICT services to both the enterprise and residential markets.

Cyber Skyline

Cyber Skyline

Cyber Skyline is a revolutionary cloud platform to practice, develop, and measure your team's technical cybersecurity skills.

ImpactQA

ImpactQA

ImpactQA is a global leading software testing & QA consulting company. Ten years of excellence. Delivering unmatched services & digital transformation to SMEs & Fortune 500 companies.

Hackuity

Hackuity

Hackuity is a breakthrough technology solution that rethinks the way of managing IT vulnerabilities in enterprises.

DC Two

DC Two

DC Two are a locally operated and supported Australian data centre, offering a suite of vertically integrated services covering every part of the data centre and cloud technology stack.

Hawk AI

Hawk AI

Hawk AI’s mission is to help financial institutions detect financial crime more effectively and efficiently using AI to enhance rules and find anomalies.

Falconfeeds

Falconfeeds

Falconfeeds empowers businesses and security professionals with immediate access to the latest and historical threat intelligence data.

TIM Enterprise

TIM Enterprise

TIM Enterprise offers innovative, sustainable and secure 360-degree digital solutions to companies and public administrations.