Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

3 Tips for Identifying Your Organization’s Cyber Exposure Gaps

In part two of our six-part blog series on improving your cybersecurity strategy, we discuss the need for a holistic approach and provide three tips to help you answer the question “where are we exposed?”

Piecemeal security efforts often result in overlapping alarms and gaping security holes. Taking a holistic approach to a security strategy is a far more successful way of covering the entirety of your company’s attack surface.

In part 1 of our six-part series, we explained the four key questions that must be addressed for any security strategy to be truly holistic. The first of those questions is “where are we exposed?” It is the crucial question, and the most challenging to answer, as vulnerabilities are often hidden and hard to find.

Finding where the danger lies

Networks are continuously expanding in terms of numbers and types of internet-connected things and devices. The challenges in securing and monitoring the entire network are also growing at unprecedented speed. However, IoT devices are not the only hidden corners that provide opportunities for attackers. Cloud services and cloud environments, containers, industrial control devices, points of sale, HVAC, and anything not typically handled by the IT/SecOps teams contain significant openings for increasingly sophisticated threats to exploit.

According to our recent Vulnerability Intelligence Report, published vulnerabilities grew by 53% in 2017 over the year before, from 9,837 in 2016 to 15,038. Fortunately, only 7% of them had publicly available exploits. Less than 1% of them pose a significant threat, of course, but knowing where to focus efforts and resources generally delivers better outcomes than trying to blanket all vulnerabilities with equal vigor.

With 2018 on track to close with 18,000-19,000 new vulnerabilities, the smart action to take is to find your total attack surface, so you can identify the individual risks your organization faces. Mapping and finding your cyber exposure gaps is a much bigger challenge than many realize. It requires a deep understanding of the precise nature of the risk for each vulnerability. Having the right tools to make such detailed assessments is essential.

Conversely, simply knowing everything is vulnerable can be overwhelming when there is no clear way to stem the tide. That can lead to desperate measures and false assumptions.

However, getting and maintaining a handle on where the highest risks are is necessary to protecting your company’s brand and assets. It’s also vital to mitigating liability. Ultimately, liability rests with your company as even when a third-party cloud provider says you're not liable, the judge will invariably say that you are.

Three tips for understanding the full attack surface

We have three tips to help you answer the question “where are we exposed” in your own organization:

  1. Check all devices and services not typically handled by IT/SecOps teams. This includes BYOD (personal, bring your own devices) and BYOC (bring your own cloud). It also includes any device connected to the internet, such as printers, smart environmental control systems, industrial control devices, breakroom televisions and aquarium control systems.
  2. Trust but verify. Ask all providers, including cloud services, for the results of third-party tests and other proof of the security they offer. Then verify those findings. Also, deliberately look for the security holes you can find and layer security measures to address them.
  3. Map your total exposures and update regularly. Odds are that your total exposure map will be expansive, especially if your organization is large. Use visualizations to make this data more easily understandable. Only by knowing exactly where your exposures are can you begin to mitigate your total risks.

In part one of our six-part blog series on improving your cybersecurity strategy, we explored Four Cybersecurity Questions Every CISO Should Be Ready to Answer. In part three we’ll explore in more detail how to prepare your organization to answer the question “What should we prioritize?”

詳細情報:

Tenableブログを購読する

購読する
無料でお試し 今すぐ購入

Tenable.io を試す

60 日間無料

最新のクラウドベースの脆弱性管理プラットフォームに完全にアクセスし、比類のない正確さですべての資産を表示および追跡することができます。 今すぐご登録ください。60秒以内の最初のスキャンを実行できます。

Tenable.io を購入

最新のクラウドベースの脆弱性管理プラットフォームに完全にアクセスし、比類のない正確さですべての資産を表示および追跡できます。 年間サブスクリプションを今日お求めください。

65 資産

$2,190.00

今すぐ購入

無料でお試し 今すぐ購入

Nessus Professionalを無料で試す

7日間無料

Nessus®は、今日の市場で最も包括的な脆弱性スキャナです。Nessus Professional は脆弱性のスキャンプロセスを自動化し、コンプライアンスサイクルの時間を短縮化するため、ITチームに専念できます。

Nessus Professional を購入する

Nessus®は、今日の市場で最も包括的な脆弱性スキャナです。Nessus Professional は脆弱性のスキャンプロセスを自動化し、コンプライアンスサイクルの時間を短縮化するため、ITチームに専念できます。

複数年ライセンスを購入して節約しましょう

無料でお試し 今すぐ購入

Tenable.io Web Application Scanningをお試しください

60 日間無料

Tenable.ioプラットフォームの一部として、最新のアプリケーション用に設計された最新のWebアプリケーションスキャンサービスに完全にアクセスできます。手作業による手間や重大なWebアプリケーションの中断をせずに、脆弱性のオンラインポートフォリオを安全に高精度で安全にスキャンします。 今すぐお申し込み、60秒以内の最初のスキャンを実行します。

Tenable.io Web Application Scanningを購入する

最新のクラウドベースの脆弱性管理プラットフォームに完全にアクセスし、比類のない正確さですべての資産を表示および追跡できます。 年間サブスクリプションを今日お求めください。

5 FQDNs

$3,578.00

今すぐ購入

無料でお試しください セールスにご連絡ください

Tenable.io Container Securityを試す

60 日間無料

脆弱性管理プラットフォームに統合された唯一のコンテナセキュリティ製品への完全なアクセスをお楽しみください。コンテナイメージの脆弱性、マルウェア、ポリシー違反を監視する。DevOpsプラクティスをサポートし、セキュリティを強化し、エンタープライズポリシーコンプライアンスをサポートするために、継続的な統合と継続的な展開(CI / CD)システムを統合する

Tenable.io Container Securityを購入する

Tenable.ioのContainer Securityは、ビルドプロセスと統合することにより、コンテナイメージのセキュリティ(脆弱性、マルウェア、ポリシー違反など)を可視化し、シームレスかつ安全なDevOpsプロセスを実現します。

Industrial Securityについて