Successful CISOs Use This Tool Sparingly

Successful CISOs Use This Essential Tool Sparingly

CISO Panels

If you think looking for a needle in a hay stack would be tough, imagine looking for a needle in a needle stack. Not just any needle, but a very specific needle that could stop a cyber attack or prevent a data breach. In the Information Age, every organization is saddled with needle stacks, or more specifically, copious amounts of data. Businesses must collect, analyze, and learn from data if they wish to compete. Data is also critical for CISOs. Logs provide CISOs a critical view into the thousands or even hundreds of thousands of daily activities occurring on their networks: a badge scan, a downloaded file, a failed attempt to access the network, and so on. The problem begins when you have to isolate one of these logs. CISOs learn quickly that there is such a thing as “too much data.” So, what data should CISOs collect? The answer is liberating in its simplicity: collect only the data needed to do the job effectively. If CISOs are uncertain of which data they need, they better develop an affinity for needle hunting.

CISO Street moderated a panel in Chicago last year and asked CISOs about their perspectives on the CISO role, including challenges and opportunities. In this video, two panelists discuss the burden of extensive data collection.

RELATED POSTS

Measuring a Cyber Awareness Culture

Measuring a Cyber Awareness Culture

Until recently, cyber awareness metrics have been treated by many as a tick-box exercise driven by regulations. The regulator requires x number of hours of cyber awareness training per employee per year, and once that is done, the organisation ticks a box and waits...

Good Enough Isn’t Good Enough Anymore

Good Enough Isn’t Good Enough Anymore

The cyber risks we face today are more than we faced previously but also fundamentally different in several respects. Our adversaries are more adept and their tools and tactics more protean in capability.  In light of these increasing challenges, our cyber defenses...

Stagehand: Episode 3

Stagehand: Episode 3

Cyprus ~ 2006 Ali Hassan was a low-level operative in Hezbollah, but we had it on solid authority that he knew where three high-level leaders of the terrorist organization were hiding. Keith arrived fifty-seven hours into Hassan’s interrogation and by the looks of it,...

Cyber Trends and Predictions for 2021
Share This