Enterprise Security? No Easy Talk By Yogendra Singh, Head-IT, Barista

Enterprise Security? No Easy Talk

Yogendra Singh, Head-IT, Barista | Thursday, 03 February 2022, 14:00 IST

  •  No Image

When we supplement People, Process and Technology together. Enterprise Security includes the strategies, techniques, and process to Secure digital assets, Data and confidentiality.

integrity is also a major Risk Factor for enterprise Security. The combination of Threat and Vulnerability is known obsolete Risk.

ES comprises the strategies and techniques that companies undertake to reduce the risk of unauthorized access to data, IT systems, and information. The activities in enterprise security include the institutionalization, advancements change and evaluation of a firm's enterprise risk management (ERM)and security methods. To reduce and eliminate the risk of unauthorized access to information technology systems and data, you need to have a comprehensive strategy that secures all entry and end points.

Mobile security has always been an issue with enterprise security and will remain so in 2020 as well. Especially when everybody working from home and using untrusted Connectivity in pandemic situation. Too many employees have a careless attitude towards workplace security, which makes the job of an attacker easy. The threat is likely to come from the network (compromising a single Wi-Fi connection) or phishing.

It is not difficult for criminals to gain access to both corporate data as well as personal data from an easy-to-breach mobile device. Mobile device management tools and remote wiping, basic security precautions, are put in place only by 50 percent. 

"IT security deals primarily with the confidentiality, integrity, and availability of information and provides mechanisms to protect these aspects"

Enterprise Security architecture is key factor in the practice of applying a comprehensive and rigorous method for describing a current and/or future structure and behaviour for an organization's security processes, information security systems, personnel so that they align with the organization's core goals and strategic direction. Al though often associated strictly with enterprise Security, it relates more broadly to the security practice of business optimization in that it addresses business security architecture, performance management, and security process architecture as well.

Securing the enterprise is no easy task. When we talk about Enterprise Security, everybody thinking about, how to enhance Cybersecurity measures for enterprise?  and How to keep attackers out?

Key Points to be remember-

1. Security Concept, Solution and Strategy alignment with your Business.
2.Manage and Review your Security Parameters and Policies against Growing Threats.
3.Prioritize and Modernize your security Solutions.
4.Security Solutions should be aligned to Protect Users Data and digital assets.
5.strong network required with industries cyber Security Leaders and knowledge Sharing.
6. Believe in zero trust policy.

IT security deals primarily with the confidentiality, integrity, and availability of information and provides mechanisms to protect these aspects. When information is compromised, the result is a change in state of one of these aspects.

1.Confidentiality: ensures that privileged or sensitive information is accessible only to those individuals with a valid requirement to view and access the information. It is particularly important when concerning personal information, intellectual property, and classified or sensitive information in a government context.

2.Integrity: refers to a lack of corruption in data or overall consistency. When integrity of information is compromised, it creates a lack of trust wherein data may have been manipulated, changed or deleted.

3. Availability: relates to having access to authorized information when it is required. Should information be affected so it cannot be accessed when needed and authorized, then availability has been compromised.

Security architecture to Establishing the Business Context and should consider the following key questions: APPPTT
1. Assets-what are you trying to protect at each layer?
2. Purpose-why are you protecting these assets?
3. Process-How will you achieve your objective?
4.People-who is involved in applying security?
5.Target-where are you applying security?
6.Time- when are you applying security?


Hide and Seek pattern
1. It's hard to predict risks and attacks.
2.When they get in. it's hard to find them.
3. When we find them, it's hard to get out.

What can we do?
1.Understand the threat or attack.
2.Do research and discus with Security Leaders.
3.Find out root and be Agile.
4.be Resilient and adopt approaches for continued operations during cyber attacks.

5.Prepare incident Report for future references.

every employee is virtually part of the security equation and having a security culture that includes education, collaboration between IT operations and security teams and security tools is essential.

Lack of security awareness still plagues the organization, as employees and IT staff often make mistakes that leave the company vulnerable. Those include: weak passwords bad email practices, out-of-date policies and tools, no monitoring, and no knowledge of where data resides. Still organizations want to live in their comfort zone and not following best practices and result is they are  facing cyber attacks.

Organizations need to defence in depth. Use the lifecycle of InfoSec tools of firewall, filtering, DLP, IOT security, encryption, IDS/IPS, DNS security, pen tests, container security, WAF, DDoS mitigation, cloud security, and last but not least, don't forget  physical security.          

CIO Viewpoint

From VPNs to Zero Trust: The Transition to a...

By Shankar Venkatesan, Senior IT Leader, Avalon Technologies

The Cyber Security Spar in Integrating IT and...

By Vimal Goel, CIO, HPCL-Mittal Energy

Towards Cyber Resilience: A Data-Centric...

By Puneet Gupta, Vice President & Managing Director, NetApp India/SAARC

CXO Insights

Emerging Trends, Challenges & Future Prospects...

By Sujoy Brahmachari, CIO & CISO, Rosmerta Technologies

Exploring Data-First Security and Automation in...

By Maheswaran S, Country Manager - S.Asia, Varonis Systems

Securing IT-OT Converged Infrastructure

By Saurabh Sharma, SMIEEE, FIE, CEH, Chief Manager (BIS) & CISO, Petronet LNG Ltd.