How CISOs can manage multiprovider cybersecurity portfolios

Effectively coordinating and managing multiprovider cybersecurity portfolios require a distinct skill set.
Let's examine the following challenges of the multiprovider cybersecurity model, as well as strategies for dealing with them.
A cybersecurity program that uses multiple service providers often has tools that don't seamlessly integrate with each other.
Consider deploying a security orchestration, automation and response tool, which can help analyze data and automate workflows across multiple security products, bridging gaps and creating a more cohesive security posture.
When managing products and services from multiple vendors, the risk grows that cybersecurity tools' functionality overlaps.
Review and audit the multiprovider cybersecurity portfolio on a regular basis, identifying areas of overlap and considering tool consolidation where possible.
When investing in new tools, aim to select those that either offer broad cybersecurity capabilities or that integrate well with the existing portfolio.
Invest in a centralized management platform that offers a unified view of the environment and control across multiple tools.
Establish clear security policies that dictate software update timelines and standard configurations, ensuring teams maintain consistency across tools.
Consider consolidating network and security operations to reduce complexity, but be aware that doing so may result in further tool overlap.
This increases the chance that a new tool interoperates with others in a multiprovider cybersecurity environment.
A multiprovider cybersecurity approach requires enterprise security teams to be proficient in using each product or service.
As you hire, look for professionals with certifications or experience in specific tools currently in use in the portfolio.
When multiple tools are responsible for managing security events, assessing the performance and ROI of a specific cybersecurity tool can be daunting.
When weighing a new cybersecurity product or service, consider first and primarily how well it meets the security program's requirements - rather than comparing it to its competitors.
For each existing tool in a multivendor cybersecurity portfolio, establish clear performance metrics and KPIs that are based on the organization's needs, not the vendor's capabilities.
Use integrated dashboards to track performance and ensure every tool is delivering value.
Keep in mind that, if the organization decides to integrate network and security operations, these metrics will not necessarily be the exclusive domain of security.
The challenges of managing a multiprovider cybersecurity portfolio are daunting, but with planning and a little creativity, CISOs can successfully tackle them.
The key is to remember that, while diversifying your tools can strengthen your defense, it's equally essential to ensure these tools work in concert with the entire trained IT staff and environment.


This Cyber News was published on www.techtarget.com. Publication date: Fri, 15 Dec 2023 21:13:05 +0000


Cyber News related to How CISOs can manage multiprovider cybersecurity portfolios

How CISOs can manage multiprovider cybersecurity portfolios - Effectively coordinating and managing multiprovider cybersecurity portfolios require a distinct skill set. Let's examine the following challenges of the multiprovider cybersecurity model, as well as strategies for dealing with them. A cybersecurity ...
10 months ago Techtarget.com
Proofpoint's CISO 2024 Report: Top Challenges Include Human Error & Risk - In Proofpoint's 2024 Voice of the CISO report, the cybersecurity company found that CISOs are dealing with people-centric threats more than ever. Plus, cybersecurity budgets often don't change, and AI can help and hurt CISOs' efforts. Regarding the ...
5 months ago Techrepublic.com
Human error still perceived as the Achilles' heel of cybersecurity - While fears of cyber attacks continue to rise, CISOs demonstrate increasing confidence in their ability to defend against these threats, reflecting a significant shift in the cybersecurity landscape, according to Proofpoint. CISOs' confidence is ...
5 months ago Helpnetsecurity.com
How the Evolving Role of the CISO Impacts Cybersecurity Startups - It helps startups striving to meet the ever-evolving needs of CISOs, who are simultaneously seeking the elusive but paramount buy-in from business users and executives. The CISO role has evolved dramatically in the past few years in response to ...
11 months ago Darkreading.com
Navigating the New Age of Cybersecurity Enforcement - Many equate this move as akin to a bomb going off for people working in the CISO role. CISOs are now faced with unprecedented potential liability risks, prompting the need for a proactive approach to legal exposure for security executives. To shed ...
10 months ago Darkreading.com
Cybersecurity for Art and Design Schools - In the digital age, art and design schools face unique cybersecurity challenges. This article aims to shed light on the importance of cybersecurity in art and design schools and provide insights into safeguarding digital portfolios and ensuring ...
10 months ago Securityzap.com
Security tools fail to translate risks for executives - Organizations are struggling with internal communication barriers, which hinder their ability to address cybersecurity threats, according to Dynatrace. The results indicate that CISOs encounter challenges in aligning security teams with the C-suite, ...
5 months ago Helpnetsecurity.com
Soft Skills Every CISO Needs to Inspire Better Boardroom Relationships - In a recent survey of CISOs, 86% of respondents said the role has changed so much that it's almost become a different job altogether from what it once was. In addition to their traditional responsibility of defending organizations from an ...
10 months ago Darkreading.com
The New CISO: Rethinking the Role - Dating back to the 1990s, the role of CISO was more technical and IT-focused. CISOs face more risks than can be resolved, are expected to balance security with operational capability, and must convince leaders to invest in protection. Today, CISOs ...
7 months ago Darkreading.com
CISOs Reconsider Their Roles in Response to GenAI Integration - Chief information security officers face mounting pressure as cyberattacks surge and complexities surrounding the implementation of GenAI and AI technologies emerge. The vast majority - 92% - of the 500 CISOs surveyed by Trellix admitted they are ...
5 months ago Securityboulevard.com
Overtaxed State CISOs Struggle with Budgeting, Staffing - Though the number of scarily understaffed offices has dropped — just two respondents reported having one to five full-time employees, down from six in 2022 — more than half of state CISOs report that their staff lack the competencies necessary to ...
1 month ago Darkreading.com
How CISOs Can Secure High-Level Executives: Keys to Consider - Securing high-level executives is a difficult task for CISOs for a number of reasons. Executives often have access to a large amount of sensitive data and play a critical role in an organization’s success, so protecting them from cyber threats is ...
1 year ago Csoonline.com
Fewer cybersecurity professionals losing their jobs in breach 'blame' game - Cybersecurity job loss after a major incident is becoming less likely as organizations drop the "Blame" game for more practical approaches to breach prevention, a survey of 500 CISOs shows. More than 95% of CISOs reported their teams received greater ...
11 months ago Scmagazine.com
What CISOs Need to Know About Data Privacy in 2024 - While consumers continue to demand stronger personal data protections, companies are scrambling to keep track of an ever-evolving patchwork of applicable laws and regulations. In this environment, cybersecurity professionals need to understand the ...
9 months ago Cybersecurity-insiders.com
What do CISOs need to know about API security in 2024? - According to Postman's 2023 State of the API Report, roughly 66% of participants indicated that their APIs contribute to generating revenue. A recent ESG survey on API security showed that 92% of organisations using APIs have experienced a breach in ...
10 months ago Cybersecurity-insiders.com
Fortinet Contributes to World Economic Forum's Strategic Cybersecurity Talent Framework - Shining a light on the cybersecurity workforce challenge, the World Economic Forum recently published its Strategic Cybersecurity Talent Framework, which is intended to serve as a reference for public and private decision-makers concerned by the ...
5 months ago Feeds.fortinet.com
Why CISOs and CIOs Should Work Together More Closely - Although there are overlaps in the goals and responsibilities of the CIO and the CISO, there are also challenges that get in the way of a more cohesive relationship, including reporting lines, organizational structures, budgets, and risk appetites. A ...
10 months ago Feedpress.me
Student Cybersecurity Clubs: Fostering Online Safety - Student cybersecurity clubs are playing a crucial role in promoting online safety among students. Student cybersecurity clubs play a vital role in this regard, as they provide a platform for students to learn about the latest threats, share best ...
10 months ago Securityzap.com
What Do CISOs Have to Do to Meet New SEC Regulations? - Ilona Cohen, Chief Legal and Policy Officer, HackerOne: It is never an easy time to be a chief information security officer, but the past few months have felt particularly challenging. The recent charges from the US Security and Exchange Commission ...
10 months ago Darkreading.com
CISO Corner: Deep Dive Into SecOps, Insurance, & CISOs' Evolving Role - Welcome to CISO Corner, Dark Reading's weekly digest of articles tailored specifically to security operations readers and security leaders. We're committed to bringing you a diverse set of perspectives to support the job of operationalizing ...
9 months ago Darkreading.com
The CISO Role Is Changing. Can CISOs Themselves Keep Up? - The role of chief information security officer has expanded in the past decade thanks to rapid digital transformation. Now CISOs have to be far more business-oriented, wear many more hats, and communicate effectively with board members, employees, ...
7 months ago Darkreading.com
Top 3 Priorities for CISOs in 2024 - As the new year begins, CISOs gather with their security teams and corporate management to scope out top priorities for 2024 and how to address these issues. This year - with a multitude of new privacy laws, Securities and Exchange Commission ...
9 months ago Darkreading.com
Change From Within: 3 Cybersecurity Transformation Traps for CISOs to Avoid - Whether they're earned or not, there are certain stigmas associated with chief information security officers: They work in isolation, with only a vague sense of how various departments contribute to the organization's greater good. Does this describe ...
11 months ago Darkreading.com
How to become a cybersecurity architect - Cybersecurity architects implement and maintain a comprehensive cybersecurity framework to protect their company's digital assets. The cybersecurity architect position is a fundamental role that all organizations need, said Lester Nichols, director ...
4 months ago Techtarget.com
Growing threats outpace cybersecurity workforce - The cybersecurity skills shortage threatens the well-being and even survival of numerous businesses as cybersecurity threats grow more numerous, sophisticated, and dangerous to the point that cybersecurity groups have vowed not to pay ransom demands. ...
9 months ago Legal.thomsonreuters.com

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)