Type to SearchView Tags
Next-Gen Enterprise | Cybersecurity

Blog Category Listing

Data Loss Protection
24

Nov 30, 2020

Measuring Success: Data Loss Protection (DLP) Program Maturity - Part Two

Aaron Smith Information Protection Practice Lead; Director, Symantec Global Consulting

DLP program maturity levels may need to change to meet your organizational needs – but how can you adapt them to your enterprise, your needs, and your evolving cybersecurity challenges? Putting real-world parameters around the numerical system for...
Leave Security Vulnerable?
106
The unfathomable spirit of the human race to cope up with any situation has changed the course of history multiple times. Be it the invention of fire or the wheel, mankind has always retaliated to situations with the appropriate response over...
Cybersecurity Architecture
18
COVID-19 has been a Zero-Day Attack on our lives, impacting the established law of presence. Pandemic progression has imposed unforeseen challenges in digital adoption and brought cybersecurity to the center. It required radical changes in the ways...
 IT Integration in M&A
65

Nov 25, 2020

Critical Success Factors for IT Integration in M&A

Fatih Bezirganoglu Director - Strategic Engagements, Europe

In-house IT teams can sometimes be parochial and too closely associated with the internal processes, systems, and it can be an arduous task to analyze the IT needs of the merged entity and most of the times organizations need an outside-in point of...
Quantum Cryptography
40
Across all the sectors there are few common trends such as increased digitization, the proliferation of IoT, and increased device connectivity. Such trends bring increased risks, threats and vulnerabilities to data, devices, and systems. Scientists...
Drowning in Security Alerts
96

Nov 18, 2020

Drowning in Security Alerts? UEBA and Automation Can Throw You a Lifeline

Darren Prager Director, Analytics Practice Lead, HCL Technologies

Techniques to optimize and simplify the security remediation process can put a company several steps closer to Zero Trust. In fact, the glues that hold the fundamental pillars together in the Zero Trust Extended Maturity Model are denoted by...
Reimaging Enterprise Security
92
Twitter has over 350 million monthly active users and 145 million daily active users. Twitter was once again breached, that too less than a month after it had updated its enterprise customers that the systems have been compromised! How? The breach...
Data Loss Prevention
146

Oct 15, 2020

Understanding Data Loss Prevention (DLP) Program Maturity

Aaron Smith Information Protection Practice Lead; Director, Symantec Global Consulting

As workers move further away from shared office spaces - perhaps forever - and processes become more cloud-centric, security practitioners have baked security into network changes and application implementations that have unfolded at breakneck speed...
How Hybrid Zero Trust Security Model Saves the Day
260
How can you move closer to a Zero Trust security model, or isolate the network for all of your critical assets? A recent concept, “browser isolation,” is designed to meet these needs, and has become a great tool to help organizations move closer to...
Leave Security Vulnerable?
106
The unfathomable spirit of the human race to cope up with any situation has changed the course of history multiple times. Be it the invention of fire or the wheel, mankind has always retaliated to situations with the appropriate response over...
 IT Integration in M&A
65

Nov 25, 2020

Critical Success Factors for IT Integration in M&A

Fatih Bezirganoglu Director - Strategic Engagements, Europe

In-house IT teams can sometimes be parochial and too closely associated with the internal processes, systems, and it can be an arduous task to analyze the IT needs of the merged entity and most of the times organizations need an outside-in point of...
Reimaging Enterprise Security
92
Twitter has over 350 million monthly active users and 145 million daily active users. Twitter was once again breached, that too less than a month after it had updated its enterprise customers that the systems have been compromised! How? The breach...
Drowning in Security Alerts
96

Nov 18, 2020

Drowning in Security Alerts? UEBA and Automation Can Throw You a Lifeline

Darren Prager Director, Analytics Practice Lead, HCL Technologies

Techniques to optimize and simplify the security remediation process can put a company several steps closer to Zero Trust. In fact, the glues that hold the fundamental pillars together in the Zero Trust Extended Maturity Model are denoted by...
first global pandemic
3,413

Mar 27, 2020

As “WFH-20” goes viral, how do you fend off new cyber security threats?

Maninder Singh Corporate Vice President, CyberSecurity & GRC

With the breakout of the first Global Pandemic in a hundred years we will see many ideas of 21st century which society has been toying with for over two decades bubble to the top. These will include a greater emphasis on dietary changes, lowering...
Data Loss Prevention
146

Oct 15, 2020

Understanding Data Loss Prevention (DLP) Program Maturity

Aaron Smith Information Protection Practice Lead; Director, Symantec Global Consulting

As workers move further away from shared office spaces - perhaps forever - and processes become more cloud-centric, security practitioners have baked security into network changes and application implementations that have unfolded at breakneck speed...
Data Loss Protection
24

Nov 30, 2020

Measuring Success: Data Loss Protection (DLP) Program Maturity - Part Two

Aaron Smith Information Protection Practice Lead; Director, Symantec Global Consulting

DLP program maturity levels may need to change to meet your organizational needs – but how can you adapt them to your enterprise, your needs, and your evolving cybersecurity challenges? Putting real-world parameters around the numerical system for...
How Hybrid Zero Trust Security Model Saves the Day
260
How can you move closer to a Zero Trust security model, or isolate the network for all of your critical assets? A recent concept, “browser isolation,” is designed to meet these needs, and has become a great tool to help organizations move closer to...
Cybersecurity Architecture
18
COVID-19 has been a Zero-Day Attack on our lives, impacting the established law of presence. Pandemic progression has imposed unforeseen challenges in digital adoption and brought cybersecurity to the center. It required radical changes in the ways...

Measuring Success: Data Loss Protection (DLP) Program Maturity - Part Two
Aaron Smith - Information Protection Practice Lead; Director, Symantec Global Consulting | November 30, 2020
24 Views

DLP program maturity levels may need to change to meet your organizational needs – but how can you adapt them to your enterprise, your needs, and your evolving cybersecurity challenges? Putting real-world parameters around the numerical system for measuring maturity is always one of the first tasks for any process maturity assessment.

Clearly defining the metrics measurement tool avoids common issues, where measuring maturity can devolve into capturing an arbitrary number that represents an organization’s “feeling” about its process maturity rather than providing a defendable metric that has a firm and clear definition. Unclear definitions can damage an assessment’s value and accuracy, turning it into an easily disputed point of contention rather than a valuable and concrete tool for strategic cybersecurity decision making and operational planning.

We often need to meticulously adapt and customize measurement ideas and tools and simplify communication so that they can be of real value. Learn how tuning a common process measurement base can be tuned to your needs when measuring DLP programs.

In this series, our goal is to develop a unified lexicon for communicating about and measuring success, maturity, processes, and objectives for DLP programs.


Does the Shift to Work-From-Home Leave Security Vulnerable?
Abhisek Das - Senior Project Manager | November 30, 2020
106 Views

The unfathomable spirit of the human race to cope up with any situation has changed the course of history multiple times. Be it the invention of fire or the wheel, mankind has always retaliated to situations with the appropriate response over centuries. When COVID-19 first appeared, businesses were not prepared for such an unprecedented situation. But over time, people learned to live with it and strive for excellence in the transformed world. While enterprises decided to isolate their workforce and let them work from home, other challenges came into the picture.


Cybersecurity Architecture for the New Normal
Saurabh Singh - Group Manager | November 30, 2020
18 Views

COVID-19 has been a Zero-Day Attack on our lives, impacting the established law of presence. Pandemic progression has imposed unforeseen challenges in digital adoption and brought cybersecurity to the center. It required radical changes in the ways of working and compelled organizations to embrace new operating practices