6.1 C
Canberra
Friday, October 24, 2025

Roger Grimes on Prioritizing Cybersecurity Recommendation


Roger Grimes on Prioritizing Cybersecurity Recommendation

It is a good level:

A part of the issue is that we’re continually handed lists…checklist of required controls…checklist of issues we’re being requested to repair or enhance…lists of recent initiatives…lists of threats, and so forth, that aren’t ranked for dangers. For instance, we are sometimes given a cybersecurity guideline (e.g., PCI-DSS, HIPAA, SOX, NIST, and many others.) with a whole lot of suggestions. They’re all nice suggestions, which if adopted, will cut back threat in your surroundings.

What they don’t let you know is which of the beneficial issues could have essentially the most influence on greatest lowering threat in your surroundings. They don’t let you know that one, two or three of this stuff…among the many a whole lot which have been given to you, will cut back extra threat than all of the others.

[…]

The answer?

Right here is one large one: Don’t use or depend on un-risk-ranked lists. Require any checklist of controls, threats, defenses, options to be risk-ranked in line with how a lot precise threat they are going to cut back within the present surroundings if carried out.

[…]

This particular CISA doc has no less than 21 foremost suggestions, lots of which result in two or extra different extra particular suggestions. General, it has a number of dozen suggestions, every of which individually will doubtless take weeks to months to satisfy in any surroundings if not already completed. Any particular person following this doc is…rightly…going to be anticipated to judge and implement all these suggestions. And doing so will completely cut back threat.

The catch is: There are two suggestions that WILL DO MORE THAN ALL THE REST ADDED TOGETHER TO REDUCE CYBERSECURITY RISK most effectively: patching and utilizing multifactor authentication (MFA). Patching is listed third. MFA is listed eighth. And there may be nothing to point their capability to considerably cut back cybersecurity threat as in comparison with the opposite suggestions. Two of this stuff are usually not like the opposite, however how is anybody studying the doc purported to know that patching and utilizing MFA actually matter greater than all the remainder?

Posted on October 31, 2024 at 11:43 AM
11 Feedback

Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

[td_block_social_counter facebook="tagdiv" twitter="tagdivofficial" youtube="tagdiv" style="style8 td-social-boxed td-social-font-icons" tdc_css="eyJhbGwiOnsibWFyZ2luLWJvdHRvbSI6IjM4IiwiZGlzcGxheSI6IiJ9LCJwb3J0cmFpdCI6eyJtYXJnaW4tYm90dG9tIjoiMzAiLCJkaXNwbGF5IjoiIn0sInBvcnRyYWl0X21heF93aWR0aCI6MTAxOCwicG9ydHJhaXRfbWluX3dpZHRoIjo3Njh9" custom_title="Stay Connected" block_template_id="td_block_template_8" f_header_font_family="712" f_header_font_transform="uppercase" f_header_font_weight="500" f_header_font_size="17" border_color="#dd3333"]
- Advertisement -spot_img

Latest Articles