Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity

    Common Security Pain Points for IT Admins and How to Solve Them

    By
    Chris Preimesberger
    -
    July 15, 2016
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      PrevNext

      1Common Security Pain Points for IT Admins and How to Solve Them

      1 - Common Security Pain Points for IT Admins and How to Solve Them

      The role of IT security administrators increasingly is changing as threats evolve. Here are some ways companies can help make their jobs a bit easier.

      2Pain Point: Blind Spots

      2 - Pain Point: Blind Spots

      Security executives only know a part of what’s going on in their environment. Systems, data and business units are extremely siloed within large companies. Each group manages its own systems and applications. Picture an office building with security executives managing a team of security guards at the front desk. They make sure only those who should be accessing the building get access; however, once individuals are inside, the guards cannot see what all of them are doing. They cannot see if a visitor went into an office and opened a file cabinet that contained sensitive information.

      3Pain Point: Broken Reporting Methods

      3 - Pain Point: Broken Reporting Methods

      In Bay Dynamics’ recent study, “Reporting to the Board: Where CISOs and the Board Are Missing the Mark,” 81 percent of IT and security executives admitted they employ manually compiled spreadsheets to report data to the board. The manual process creates a few pain points. Security teams spend hours collecting spreadsheets from the various business units and stitching them together into one coherent data document the CISO uses to report to the board. The data often is inaccurate because manual processes enable data massaging that inherently introduces bias into the data. Measuring cyber-risk becomes an almost impossible task if security executives, other C-levels and the board are not looking at accurate data.

      4Pain Point: Inefficient Security Response

      4 - Pain Point: Inefficient Security Response

      Endless notifications coming from security controls that aren’t prioritized based on the value of the asset at risk and the impact of an event, coupled with limited resources, mean security executives struggle with cutting through the noise. They have invested in many security tools, yet have trouble making sense of the information coming from those tools. They view each piece of information as one pixel of a picture. Since they cannot see how all of the pixels fit together into one picture, they don’t know where to start. For example, they may focus their attention on a lower-priority vulnerability while a higher-risk vulnerability is overlooked.

      5Pain Point: Ineffective Communication of Cyber-Risk

      5 - Pain Point: Ineffective Communication of Cyber-Risk

      Security executives struggle with communicating cyber-risk information to the board in a traceable, understandable, contextualized way. According to the recent study, “How Boards of Directors Really Feel about Cyber Security Reports,” more than half (54 percent) of board members agree or strongly agree that the data presented by security executives is too technical.

      6Pain Point: Engaging Line-of-Business Leaders

      6 - Pain Point: Engaging Line-of-Business Leaders

      Security executives often have difficulties engaging line-of-business application owners, who govern the company’s most sensitive assets but are not on the security team. Line-of-business application owners have the best understanding of the assets they govern and therefore can add the required context when something unusual is detected. Security executives must get them involved in the cyber-risk management process so they can add contextual information to notifications and alerts.

      To solve these pain points, security executives should do the following (see next four slides):

      7Solution: Identify Where the Most Valuable Assets Live

      7 - Solution: Identify Where the Most Valuable Assets Live

      Before solving any of the previous pain points, security executives must identify their most-valued assets that, if compromised, could cause the most damage to the company. Once they figure out what those assets are, where they live and who governs them, security executives should devote the vast majority of their efforts to protecting them. That includes uncovering threats and associated vulnerabilities related to those assets and the probability of an attack. They should then apply security resources accordingly.

      8Solution: Make It Easy for Line-of-Business Leaders to Participate

      8 - Solution: Make It Easy for Line-of-Business Leaders to Participate

      Line-of-business application owners should receive a prioritized view of the top threats and vulnerabilities to the valued assets under their governance. That way they know exactly what action must be taken to protect their assets. They also should receive automated alerts if security tools flag unusual access to assets under their control. They then can notify incident responders whether they authorized the access or it is suspicious and needs immediate investigation.

      9Solution: Data Collection Must Be Automated

      9 - Solution: Data Collection Must Be Automated

      It’s time to get rid of the spreadsheets. Security executives should implement an automated process for collecting cyber-risk data so that all stakeholders—line-of-business application owners, IT leaders, boards of directors, executives and the security team—are looking at the same cyber-risk information generated automatically. That way security executives can efficiently produce cyber-risk reports that are unbiased, traceable and actionable so that the board of directors can make informed decisions.

      10Solution: Speak the Language of Risk

      10 - Solution: Speak the Language of Risk

      Boards understand risk; security executives also must understand it. Security executives are no longer viewed as the “techies” who only manage cyber-security technology. They increasingly are viewed as risk professionals in the same light as other operational risk leaders (i.e., legal, financial, etc.). Due to this shift, security executives must change their approach. Instead of reporting about patches, misconfigurations and other technology-focused information, they should report about threats, associated vulnerabilities pertaining to their most-valued assets and the probability of those two meeting, then apply security resources accordingly. That’s the language the board understands.

      PrevNext

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×