Page 15 - Information Security Edition Dec 2021
P. 15
Md Yusrin Hadi of the UNN- an Key Business Priorities & MDM solution does not come
Challenges
organization wholly owned by cheap, and when it does, it is with
Our priorities revolve around:
His Majesty's Government of limitations. As a result, you need
Protecting company data,
Brunei Darussalam and serves t o i n v e s t i n e n d p o i n t
networks, and users.
its digital telecommunications management suites, firewalls,
A s s e s s i n g c u s t o m e r anti-DDOS, Intrusion prevention,
requirements, shares how
cybersecurity situation. V P N l i c e n s e s , e n d p o i n t
cybersecurity has gained
Identifying what is needed to protection, cloud protection
relevance. Hadi also talks about
prepare for the battle against suites, user management, and
how UNN has increased its focus
the ever-expanding security the list goes on. Yet this may not
on safeguarding company
risk. be enough, and one is required
data, users, and networks. to invest in human capital. Your
Our challenges are trying to
Info Security Operational Trends remain ahead of the risk, s e c u r i t y o p e r a t i o n t e a m
Cybersecurity initiatives have foreseeing possible dangers, m e m b e r s n e e d e x p o s u r e ,
gained plenty of traction in and getting stakeholders to k n o w l e d g e u p g r a d e , a n d
recent years, driven by cloud begin investing in cybersecurity. experience. They need time to be
infrastructure, remote working, Measures for de-risking of developed and acquire the
and ransomware. The move investments necessary skill to be a proficient
from on-prem to cloud has built and reliable network guardian.
As a CISO, you have to choose to
t h e n e e d t o e x t e n d Prediction for 2022 & beyond
be pro-active or reactive. Either
cybersecurity's reach from you accept the risk, pray nothing There will be a constant flow of
internal networks towards the happens and save money, or challenges coming our way in
cloud infrastructure. Cloud and face the consequences of 2 0 2 2 ( f o r b o t h C 1 9 a n d
security providers are leveraging getting victimized by a phishing r a n s o m w a r e ) , a n d e a r l y
the demand to provide security attack. adopters of cybersecurity will
and monitoring tools as a Addressing people-centric start seeing their investment
service. Security companies are challenges post WFH ripe. As bad as it may sound,
constantly on the lookout to Covid-19 undeniably has made Covid19 could be one of the most
identify the latest exploits to things harder for operation undesirable catalysts we ever
prepare and protect their teams, end-user computing, as n e e d e d f o r d i g i t a l
customers against Zero-day well as cybersecurity. Controlling transformation.
attacks. the endpoints beyond your
border has proven to be a
greater challenge. -
December 2021