Close Menu
5gantennas.org5gantennas.org
  • Home
  • 5G
    • 5G Technology
  • 6G
  • AI
  • Data
    • Global 5G
  • Internet
  • WIFI
  • 5G Antennas
  • Legacy

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

What's Hot

4 Best Wi-Fi Mesh Networking Systems in 2024

September 6, 2024

India is on the brink of a new revolution in telecommunications and can lead the world with 6G: Jyotiraditya Scindia

August 29, 2024

Speaker Pelosi slams California AI bill headed to Governor Newsom as ‘ignorant’

August 29, 2024
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram
5gantennas.org5gantennas.org
  • Home
  • 5G
    1. 5G Technology
    2. View All

    Deutsche Telekom to operate 12,500 5G antennas over 3.6 GHz band

    August 28, 2024

    URCA Releases Draft “Roadmap” for 5G Rollout in the Bahamas – Eye Witness News

    August 23, 2024

    Smart Launches Smart ZTE Blade A75 5G » YugaTech

    August 22, 2024

    5G Drone Integration Denmark – DRONELIFE

    August 21, 2024

    Hughes praises successful private 5G demo for U.S. Navy

    August 29, 2024

    GSA survey reveals 5G FWA has become “mainstream”

    August 29, 2024

    China Mobile expands 5G Advanced, Chunghwa Telecom enters Europe

    August 29, 2024

    Ateme and ORS Boost 5G Broadcast Capacity with “World’s First Trial of IP-Based Statmux over 5G Broadcast” | TV Tech

    August 29, 2024
  • 6G

    India is on the brink of a new revolution in telecommunications and can lead the world with 6G: Jyotiraditya Scindia

    August 29, 2024

    Vodafonewatch Weekly: Rural 4G, Industrial 5G, 6G Patents | Weekly Briefing

    August 29, 2024

    Southeast Asia steps up efforts to build 6G standards

    August 29, 2024

    Energy efficiency as an inherent attribute of 6G networks

    August 29, 2024

    Finnish working group launches push for 6G technology

    August 28, 2024
  • AI

    Speaker Pelosi slams California AI bill headed to Governor Newsom as ‘ignorant’

    August 29, 2024

    Why Honeywell is betting big on Gen AI

    August 29, 2024

    Ethically questionable or creative genius? How artists are engaging with AI in their work | Art and Design

    August 29, 2024

    “Elon Musk and Trump” arrested for burglary in disturbing AI video

    August 29, 2024

    Nvidia CFO says ‘enterprise AI wave’ has begun and Fortune 100 companies are leading the way

    August 29, 2024
  • Data
    1. Global 5G
    2. View All

    Global 5G Enterprise Market is expected to be valued at USD 34.4 Billion by 2032

    August 12, 2024

    Counterpoint predicts 5G will dominate the smartphone market in early 2024

    August 5, 2024

    Qualcomm’s new chipsets will power affordable 5G smartphones

    July 31, 2024

    Best Super Fast Download Companies — TradingView

    July 31, 2024

    Crypto Markets Rise on Strong US Economic Data

    August 29, 2024

    Microsoft approves construction of third section of Mount Pleasant data center campus

    August 29, 2024

    China has invested $6.1 billion in state-run data center projects over two years, with the “East Data, West Computing” initiative aimed at capitalizing on the country’s untapped land.

    August 29, 2024

    What is the size of the clinical data analysis solutions market?

    August 29, 2024
  • Internet

    NATO believes Russia poses a threat to Western internet and GPS services

    August 29, 2024

    Mpeppe grows fast, building traction among Internet computer owners

    August 29, 2024

    Internet Computer Whale Buys Mpeppe (MPEPE) at 340x ROI

    August 29, 2024

    Long-term internet computer investor adds PEPE rival to holdings

    August 29, 2024

    Biden-Harris Administration Approves Initial Internet for All Proposals in Mississippi and South Dakota

    August 29, 2024
  • WIFI

    4 Best Wi-Fi Mesh Networking Systems in 2024

    September 6, 2024

    Best WiFi deal: Save $200 on the Starlink Standard Kit AX

    August 29, 2024

    Sonos Roam 2 review | Good Housekeeping UK

    August 29, 2024

    Popular WiFi extender that eliminates dead zones in your home costs just $12

    August 29, 2024

    North American WiFi 6 Mesh Router Market Size, Share, Forecast, [2030] – அக்னி செய்திகள்

    August 29, 2024
  • 5G Antennas

    Nokia and Claro bring 5G to Argentina

    August 27, 2024

    Nokia expands FWA portfolio with new 5G devices – SatNews

    July 25, 2024

    Deutsche Telekom to operate 12,150 5G antennas over 3.6 GHz band

    July 24, 2024

    Vodafone and Ericsson develop a compact 5G antenna in Germany

    July 12, 2024

    Vodafone and Ericsson unveil new small antennas to power Germany’s 5G network

    July 11, 2024
  • Legacy
5gantennas.org5gantennas.org
Home»Data»4 data-driven strategies CISOs can take now to stay on budget
Data

4 data-driven strategies CISOs can take now to stay on budget

5gantennas.orgBy 5gantennas.orgMarch 3, 2024No Comments6 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
Share
Facebook Twitter LinkedIn Pinterest WhatsApp Email


Enterprise organizations collectively spend billions of dollars each year on security tools and systems to protect them from the evolving threat landscape. However, despite the huge investments made each year, the number of data breaches continues to rise.

For the past decade, IT security budgets have been considered untouchable items in budgets, largely shielded from the cuts imposed on other departments due to the existential threat that large-scale data breaches represent.

However, the fear and uncertainty of an impending global recession is forcing business leaders to carefully consider every line item in their operating budgets. The company’s CISO can no longer assume that his company’s budget will be exempt from cost-cutting measures. Instead, you should be prepared to answer pointed questions about the overall cost-effectiveness of your security program.

In other words, businesses understand the need to invest in robust security tools and experts, but the question is: How much is enough? How can you adjust your security spending to maintain an acceptable level of risk exposure?

VB event

AI Impact Tour – New York

We’re partnering with Microsoft to be in New York on February 29th to discuss how to balance the risks and benefits of AI applications. Request an invitation to an exclusive event below.

request an invitation

If security leaders are to have any chance of protecting or increasing their budgets in the coming years, they need to be armed with empirical data and able to clearly communicate the business value of security investments to those holding the company’s purse strings. There will be. .

Quantifying security calculations

More than 20 years ago, prominent technology commentator Bruce Schneier coined the term “security theater” to describe the practice of implementing security measures that feel like they improve security but actually do little to achieve that security. I made up a word.

These days, many boards of directors are wondering whether the accumulation of all these security tools and systems is providing a financial return on investment, or is it just a kabuki play designed to make them feel like their valuable corporate assets are safe? I’m starting to wonder if it’s just a type of. Be well protected.

CISOs are similarly faced with the fact that there is no standardized approach to measuring information security effectiveness. What exactly should security leaders measure? How do they quantify risk based on metrics that businesses actually understand? Do more tools actually mean better protection? Or will it just add to the headaches of management and complexity?

These are just some of the questions a CISO must be able to answer when presenting and rationalizing an operating budget to the executive committee.

Key strategies to justify your security budget

By leveraging access to data on past security incidents, threat intelligence, and the potential impact of security breaches, enterprise CISOs can better understand the resources needed to effectively defend against potential attacks. make informed decisions.

Consider these four data-driven strategies as a starting point for defining and communicating the value of cybersecurity to business leaders.

1: Define meaningful metrics

Security metrics are notoriously difficult to capture and communicate in a way that is consistent with other generally accepted business metrics and KPIs. His ROI for products and services that directly generate revenue is very easy to calculate, but it becomes even more opaque when trying to quantify his ROI for security tools that are primarily focused on preventing financial losses. Become.

While ROI is a metric that other companies can easily understand, it may not be the most meaningful one for communicating the value of IT security. Similarly, a report on metrics related to the number of attacks detected and thwarted may sound impressive, but has no bearing on what business leaders actually care about.

What ultimately makes sense is that metrics can be aligned to key business functions and priorities. This means that if your organization’s primary goal is to reduce the impact of possible interruptions on your operations, this can be tracked and monitored over time.

2: Quantify operational risk

To demonstrate the value security teams provide to an organization, they must first quantify the risk and then demonstrate how effective security management can reduce that risk. Determining your organization’s risk tolerance by defining clear thresholds for acceptable risk levels ensures that identified risks are addressed in a timely manner before they become too large or unmanageable. It will be. Other practical ways to measure and quantify operational risk include:

  • Probability: The likelihood that a particular security risk will occur. It can be measured using historical data, expert opinion, and third-party research such as Verizon’s annual Data Breach Incident Report (DBIR).
  • Impact: The potential impact of a security breach includes financial loss, reputational damage, and legal/compliance liability.
  • Management: Identify what measures are in place to prevent, detect, or minimize risks. This may include technical controls (such as firewalls and antivirus software) as well as organizational controls (such as policies and procedures).

3: Integrate tools and vendors

Over the past decade, enterprise security teams have been shopping around for security tools. According to research from Ponemon, the typical enterprise deploys an average of 45 cybersecurity tools to protect and ensure resiliency of their networks.

One of the main factors driving the adoption of new tools is the constantly evolving threat landscape itself, which has given rise to a cottage industry of startups addressing specific attack vectors. This has led organizations to acquire various niche point solutions to address and fill the gap. Not only do you have to consider the cost of licensing many of these interconnected and overlapping tools, but there are also ancillary costs to managing them.

By taking a platform approach with shared data and a control plane, CISOs can unify security tools, streamline operations, and reduce gaps and vulnerabilities between traditional silos.

4: Prioritize visibility

You can’t effectively manage what you can’t see. Because of this, it’s important to prioritize investing in tools and processes that provide broad network visibility so you know what’s in your environment and where the greatest risks lie. Other ways to improve your security posture:

  • Agentless: This makes it easier to cover cloud workloads. You don’t need to ensure proper permissions, just enter your AWS credentials and configure the API to scan your environment within an hour.
  • Endpoint visibility: Most attacks start with individual endpoint devices, providing an easy route for attackers to escalate their privileges, so visibility is critical, especially if employees continue to log in from remote locations. Very important.

Over the past decade, security leaders have fought hard to win seats in boardrooms. If you want to stay there, you need to build a culture of accountability based on empirical data so you can best communicate and streamline the value of cybersecurity.

Kevin Durkin is Uptycs’ CFO.

data decision maker

Welcome to the VentureBeat community!

DataDecisionMakers is a place where experts, including technologists who work with data, can share data-related insights and innovations.

If you want to read about cutting-edge ideas, updates, best practices, and the future of data and data technology, join DataDecisionMakers.

You may also consider contributing your own article.

Read more about DataDecisionMakers



Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleCathie Wood’s Ark Investments sells NVIDIA stock and buys this artificial intelligence (AI) stock
Next Article Internet Computer Airdrop Alert: 50 Million Tokens for Adopters | By DavisChainDynamo | March 2024
5gantennas.org
  • Website

Related Posts

Crypto Markets Rise on Strong US Economic Data

August 29, 2024

Microsoft approves construction of third section of Mount Pleasant data center campus

August 29, 2024

China has invested $6.1 billion in state-run data center projects over two years, with the “East Data, West Computing” initiative aimed at capitalizing on the country’s untapped land.

August 29, 2024
Leave A Reply Cancel Reply

You must be logged in to post a comment.

Latest Posts

4 Best Wi-Fi Mesh Networking Systems in 2024

September 6, 2024

India is on the brink of a new revolution in telecommunications and can lead the world with 6G: Jyotiraditya Scindia

August 29, 2024

Speaker Pelosi slams California AI bill headed to Governor Newsom as ‘ignorant’

August 29, 2024

Crypto Markets Rise on Strong US Economic Data

August 29, 2024
Don't Miss

Apple focuses on 6G for future iPhones

By 5gantennas.orgDecember 11, 2023

iPhone 15 Pro and Pro MaxWith Apple’s recent listing of cellular platform architects to work…

All connectivity technologies will be integrated in the 6G era, says Abhay Karandikar, DST Secretary, ET Telecom

January 31, 2024

5G-Advanced and 6G networks require additional spectrum

January 24, 2024

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

About Us
About Us

Welcome to 5GAntennas.org, your reliable source for comprehensive information on 5G technology, artificial intelligence (AI), and data-related advancements. We are passionate about staying at the forefront of these cutting-edge fields and bringing you the latest insights, trends, and developments.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

4 Best Wi-Fi Mesh Networking Systems in 2024

September 6, 2024

India is on the brink of a new revolution in telecommunications and can lead the world with 6G: Jyotiraditya Scindia

August 29, 2024

Speaker Pelosi slams California AI bill headed to Governor Newsom as ‘ignorant’

August 29, 2024
Most Popular

Will 5G make 2024 the most connected year in the industry?

December 1, 2023

The current state of 5G in the US and how it can improve

September 28, 2023

How 5G technology will transform gaming on the go

January 31, 2024
© 2025 5gantennas. Designed by 5gantennas.
  • Home
  • About us
  • Contact us
  • DMCA
  • Privacy Policy
  • About Creator

Type above and press Enter to search. Press Esc to cancel.