E10: These 5 Collaboration approaches Can Help You Strengthen Cyber Security

Security leaders run their teams and operations from the front of any organization.

Security is the key and is central to any enterprise business strategy.

However, there are unique issues to address as Security teams pivot to open culture and enable innovation.

  1. The Core security team is relatively small
  2. Security teams cant cater to the entire organization in the old-fashioned ways.
  3. The pace of change is faster than ever before.
  4. Threats are more sophisticated than ever before.
  5. Security leaders can not be part of every strategic and tactical decision.

I submit -collaboration will drive the future of enterprise security.

A decentralized model with shared responsibility will be the future.

Security leaders will join hands with BU heads who will become security torchbearers in their areas.

No alt text provided for this image

Where are the challenges?

Some data points:

  1. You are just a credit card and a free trial away from trying a new tool on the internet.
  2. Organizations want to provide a self-serve environment of experimentation to team members. Applications, tools, data are being experimented with at an unprecedented rate.
  3. An enterprise with a complete set of security tools(detect, triage, analyze) takes an average of 8 days to complete a Security Investigation.
  4. An average of 6 to 15 tools are used for incident resolution.
  5. Threats are mounting at an unprecedented rate.
  6. Collaboration is the #2 or #3 item on any survey of what security pros are looking for, behind Investments in detection and prevention tools.

What is collaboration important?

Complexity and elapsed time challenge

The complete cycle from prevention -> detection -> triage -> analysis -> containment -> remediation can be tedious and needs a lot of work across tools and skillset.

At any given time, 8- 10 different roles may be involved with some degree of overlap in the prevention to remediation cycle.

  1. Security Architects
  2. SOC analysts
  3. Security engineers
  4. Incident responders
  5. CISO/Security chief
  6. Endpoint administrators
  7. Corporate departments and teams from the impacted application.
8-10 days to investigate an incident from end to end
the end to end cycle from Prevention to detection to triage to analysis to containment to remediation is complex and cuts across many different roles.

Problem of Scale

It is not humanly possible for the security team to be part of every strategic and tactical decision around architecture, applications & data. hence,

So the decentralized model of security will essentially depend on cyber security teams leading with the key processes, controls, tools, methods that keep the organization safe and make them resilient and hands-on of those practices, processes, and best practices to these collaborators across the organization at various levels.

No alt text provided for this image

#1 approach to establishing collaboration

Creating an organizational model for security is the way to go. An organizational security collaboration can be split at three levels within the organization:

  1. Core strategy, Decisions, Frameworks, Compliance, Automation, Audits are Managed and laid by the CISO office. Consider it it central hub.
  2. Application or BU level decisions, architecture are Managed jointly among the technical teams and intertwined security engineers. this enables them to set guard rails around sensitive data, applications, services, IAM, and specific roles which would be required.
  3. Granular scenarios within the perimeters of the guard rails are led by champions/collaborators within those BUs. Any exceptions here should still be caught by the automation toolset.
No alt text provided for this image

Other means to enable collaboration

#2: Centralized environment -> Access, assess, and act by role.

#3: Information sharing among various teams on a real-time basis

#4: Levels of trust among the teams

#5: Going away from typing information, manually feeding across various systems and teams leads to errors. Automation is the key

In the end

The collaboration will contribute to real-time visibility—connecting people, processes, and technology across events, data, and systems. Those who are setting up the means to collaborate- automation, centralized environments, information sharing, and Trust are already seeing benefits of collaboration in business velocity increase.

What has been your experience?

Subscribe to iSaurabhMittal

Don’t miss out on the latest issues. Sign up now to get access to the library of members-only issues.