Page 15 - Information Security Edition Dec 2021
P. 15

Md Yusrin Hadi of the UNN- an           Key Business Priorities &               MDM  solution  does  not  come
                                            Challenges
    organization  wholly  owned  by                                                 cheap, and when it does, it is with
                                            Our priorities revolve around:
    His  Majesty's  Government  of                                                  limitations. As a result, you need
                                               Protecting  company  data,
    Brunei Darussalam and serves                                                    t o   i n v e s t   i n   e n d p o i n t
                                               networks, and users.
    its  digital  telecommunications                                                management  suites,  firewalls,
                                               A s s e s s i n g   c u s t o m e r   anti-DDOS, Intrusion prevention,
    requirements,  shares  how
                                               cybersecurity situation.             V P N   l i c e n s e s ,   e n d p o i n t
    cybersecurity  has  gained
                                               Identifying what is needed to        protection,  cloud  protection
    relevance. Hadi also talks about
                                               prepare for the battle against       suites,  user  management,  and
    how UNN has increased its focus
                                               the  ever-expanding  security        the list goes on. Yet this may not
    on  safeguarding  company
                                               risk.                                be enough, and one is required
    data, users, and networks.                                                      to invest in human capital. Your
                                            Our  challenges  are  trying  to
    Info Security Operational Trends        remain  ahead  of  the  risk,           s e c u r i t y   o p e r a t i o n   t e a m

    Cybersecurity  initiatives  have        foreseeing  possible  dangers,          m e m b e r s   n e e d   e x p o s u r e ,

    gained  plenty  of  traction  in        and  getting  stakeholders  to          k n o w l e d g e   u p g r a d e ,   a n d
    recent  years,  driven  by  cloud       begin investing in cybersecurity.       experience. They need time to be
    infrastructure,  remote  working,       Measures for de-risking of              developed  and  acquire  the

    and  ransomware.  The  move             investments                             necessary skill to be a proficient

    from on-prem to cloud has built                                                 and reliable network guardian.
                                            As a CISO, you have to choose to
    t h e   n e e d   t o   e x t e n d                                             Prediction for 2022 & beyond
                                            be pro-active or reactive. Either
    cybersecurity's  reach  from            you accept the risk, pray nothing       There will be a constant flow of

    internal  networks  towards  the        happens  and  save  money,  or          challenges  coming  our  way  in
    cloud  infrastructure.  Cloud  and      face  the  consequences  of             2 0 2 2   ( f o r   b o t h   C 1 9   a n d

    security providers are leveraging       getting victimized by a phishing        r a n s o m w a r e ) ,   a n d   e a r l y
    the demand to provide security          attack.                                 adopters  of  cybersecurity  will

    and  monitoring  tools  as  a           Addressing people-centric               start  seeing  their  investment
    service. Security companies are         challenges post WFH                     ripe.  As  bad  as  it  may  sound,

    constantly  on  the  lookout  to        Covid-19  undeniably  has  made         Covid19 could be one of the most
    identify  the  latest  exploits  to     things  harder  for  operation          undesirable  catalysts  we  ever

    prepare  and  protect  their            teams, end-user computing, as           n e e d e d   f o r   d i g i t a l
    customers  against  Zero-day            well as cybersecurity. Controlling      transformation.

    attacks.                                the  endpoints  beyond  your
                                            border  has  proven  to  be  a

                                            greater challenge. -


                     December 2021
   10   11   12   13   14   15   16   17   18   19   20