Cybersecurity & Networking

  • Women in Cybersecurity: Helen Patton

    In this episode of Women in Cybersecurity, I was delighted to interview Helen Patton, an experienced CISO who literally wrote the book on Navigating the Cybersecurity Career Path and is currently CISO for the Cisco Security Business Group. I’m also a longtime follower of hers on twitter where she shares information and resources for security leaders. 

    Like many of us, her path to cybersecurity wasn’t exactly direct or planned; she says, it was “a series of accidents and unexpected opportunities,” where she moved from IT support, to disaster recovery, to cybersecurity. As someone who is passionate about her role and helping others, she is generous in sharing information and advice for other CISOs, as well as bringing more people into our field and helping them thrive. 

    Don’t miss her video below.

    Helen described her background in the early ’90s with the rise of PCs, working for a consulting company installing accounting software for small businesses. She also held roles supporting infrastructure, ran a help desk and ran desktop support, network support, and basic data center support. The late ’90s came with computing worms and viruses, such as the ILOVEYOU virus, and Y2K issues. While running an infrastructure team for a software development company, she moved into creating disaster recovery (DR) and business continuity plans. Then, she moved back into consulting with JP Morgan doing DR and business continuity, and when there was an opportunity to take a job running the security team, she made the move into cybersecurity.

    She said she was always a working adult, doing school part time and taking 15 years to get her undergrad degree in business administration. When she became CISO at Ohio State University (OSU), she had the opportunity to get her master’s degree in public policy, with a focus on technology policy as part of her employee benefits, and this has influenced her approach as a CISO.

    As a CISO, I tend to lean more on governance risk and compliance functions more than, say, software development, although (I have a) background in tech. I geek out on security policy a lot, so I spend my hobby time keeping track of regulations, policy changes that are happening around the globe, so my education has been very influential in my career.

    Helen spent 8 years at OSU, where she helped them build out their security team to support their cloud transformation. Her role included evaluating what they had and what they needed, building out the team and adding security functionality. She noted that a few years into the job, they had to get rid of some technologies she introduced years before because they had to evolve as things changed.

    In higher ed, you play in many spaces, technologies, and you’re subject to regulations because we have hospitals, we’re regulated like a bank, we have PCI, so I got to play in a lot of areas.

    In 2021, she joined Cisco as an advisory CISO. Moving to a security vendor gave her a new respect for how much technical expertise is needed to determine what goes into a security product. Her role at Cisco gives her the opportunity to have a global footprint, understanding industry trends across the globe and applying her experience, while helping customers.

    Her advice

    When you feel like you’re on top of a mountain of information, it’s easy to get overwhelmed. It’s important to
    1) take time intentionally to learn something new, with self-based learning;
    2) find mentors and a network as part of a security community to help you with learning or training, to have resources who can set your mind at ease that you don’t have to learn everything, or to have someone who can validate how you’re thinking; and 3) know when to say “no” to things so you can focus.

    For CISOs: Be intentional about why security, why this industry, why this job, why this company, and why now, and be prepared to share it broadly—not only with your team, but with the community as a whole.

    For customers: Take advantage of vendors, and partner with them to make sure you get the most out of their tools and see how you can network with their other customers.

    Resources:

    Helen says podcasts are a great way to learn and help you gain historical context and learn from past events. And you can listen while exercising or walking your dog—excellent for me since walking my dog is my favorite exercise! Her favorite podcasts include:

    Be sure to visit Enterprise Strategy Group’s Women in Cybersecurity page, where you can view past episodes and connect with us to hear more inspiring stories in future shows.

  • Multifactor Authentication Is Not a Panacea

    GettyImages-1276687348Two recent high-profile breaches—Intercontinental Hotels Group and Uber—demonstrate the criticality of securing your identities. Both of these attacks started with a social engineering attack. One started with traditional business email compromise (BEC), and the other started with MFA push bombing. The next stage of both attacks compromised the password/secrets vault.

    (more…)

  • SOC Modernization and the Role of XDR

    Research Objectives

    Examine the people, processes, and technology supporting the modernization of security operations. Identify key value points, the metrics to back up those value points, and what’s expected from both products and managed services for XDR and SOC modernization. Determine current perception and role of XDR as a component of security operations modernization efforts. Explore strategies used to automate triage, speed investigations, and help organizations find unknown threats.

    (more…)

  • Five Ways to Improve Your Cloud Security Posture

    GettyImages-1143268590Organizations are increasingly moving applications to the cloud to better serve their customers, partners, and employees. The ability to quickly deploy applications to the cloud so employees, partners, and customers can connect to companies for business transactions and services gives organizations a competitive advantage. This makes maintaining security posture more important than ever, as  increasing the availability of products and services connected to company and customer data increases exposure to attacks. Cloud security posture management (CSPM) is key to mitigating security risk while enabling the use of innovative cloud technologies that drive better business results.

    (more…)

  • The State of Digital Ecosystems at the Edge

    The need to collect and analyze data generated at edge locations is playing an increasingly important role in enabling organizations to improve quality, deliver enhanced experiences (both customer and employee), and gather deeper insights into the business. To understand how IT organizations are leveraging and optimizing their use of important edge sites, Enterprise Strategy Group surveyed IT professionals responsible for their organization’s edge computing applications, tools, policies, and procedures.

    For more information or to discuss these findings with an analyst, please contact us.
  • DSPM: The New Kid on the Cloud Security Block

    binary_shieldThere are many different cybersecurity categories, and it seems that a new category is created every minute. If you’re paying attention to cloud security, you may have seen or heard about DSPM—data security posture management. 

    (more…)

  • Women in Cybersecurity: Wendy Thomas

    This episode of Women in Cybersecurity features Wendy Thomas, President and CEO of Secureworks, a leading cybersecurity company that helps its global customers build effective cybersecurity programs with innovative technology and professional services. With a mathematical background in economics and finance, she found that the field of cybersecurity provides a rewarding trifecta: the opportunity to work globally across cultures and geographies, intellectually stimulating work using innovative technology; and the ability to make a positive impact.

    Her leadership includes diversity and inclusion initiatives to reflect the global markets Secureworks serves, and she is an advocate for childhood cyber literacy, starting as early as elementary schools.

    Don’t miss her video below.

    Wendy’s background and education was in economics and finance, with an early career in the commodities exchange business at the Chicago Board of Trade. She pointed out that she spent time in the trading pits, which are gone now thanks to disruptive technology moving into online trading. This swiftness with which technologies are replaced in the interest of speed and productivity has driven Wendy’s career to move to areas of innovation.

    After she went to business school, Wendy saw a similar pattern at Bell South, where the business moved from land lines and telephone services into cellular and DSL technologies. She said the rapid pace of innovation, with the need to cannibalize and innovate, set her up well for cybersecurity.

    “Cybersecurity requires the same, or even faster, pace of constant innovation to stay ahead of both the threat and the adversary,” she said.

    Wendy originally joined SecureWorks to build out their finance and investor relations program to prep them for their IPO. She later became Chief Product Officer to align their product line with customer needs to invest in security to stay ahead of their adversaries.

    “Cybersecurity is all about risk and return. If you think about a business trying protect assets, or individuals trying to protect their identities or their bank accounts, it’s all about how much are you willing to invest to reduce that risk and that exposure. We help customers make the right investments in security.”

    Secureworks offers its Taegis XDR platform, along with managed services and vendor partnerships, to help customers build effective security strategies to keep their adversaries out.

    “We take an open approach that’s vendor-inclusive. That starts with the customer…working together with existing security point products inside their infrastructure, bringing Teagis XDR to bring it all together in a world of security working together to keep customers safe and safely evolve over time,” she said.

    As part of her dynamic leadership, Wendy promotes diversity and inclusivity at Secureworks with a number of initiatives and programs. In order to increase representation of women in their global workforce, she has set a goal to have women make up 50% of their global workforce and 40% of people leaders by 2030. In just the past year, they have gone from 26% to 34% women in their global workforce and have increased their amount of female people leaders from 20% to 24%. Be sure to listen to the podcast to learn about the efforts they are making to promote diversity and inclusivity among employees and suppliers, and check out their page on corporate responsibility.

    Here is Wendy’s list of recommended resources:

    Podcasts:

    Writers/Articles/Journals

    Be sure to check out Wendy’s video below.

    Be sure to visit Enterprise Strategy Group’s Women in Cybersecurity page, where you can view past episodes and connect with us to hear more inspiring stories in future shows.

  • The State of Digital Ecosystems at the Edge

    Research Objectives

    Organizations are distributing applications across multiple public cloud environments and edge locations. This is driven by the need to collect and analyze the data generated at these remote sites to enable organizations to improve quality, deliver enhanced experiences (both customer and employee), and gather deeper insights into the business. Because the “edge” can be defined in many ways depending on several factors, such as company size and industry, organizations employ a range of strategies and an ecosystem of partners that includes cloud service providers, telecommunication companies, colocation providers, and even traditional technology vendors to ensure robust edge computing environments that deliver critical business insights.

    (more…)

  • Distributed Cloud Series: Digital Ecosystems

    Research Objectives

    Understand the current state of the edge computing environment, including budgets and prioritization. Determine the key drivers, challenges, benefits, and use cases for edge computing. Get an accurate picture of edge infrastructure, network, security, and data environments. Identify vital players and their roles/influence for enabling edge environments.

    (more…)

  • My colleague John Grady completed a new research report on Trends in Modern Application Protection. It covers how organizations are modernizing their application architectures and the challenges they are seeing in web application and API protection platforms. In this video, we discuss some of his findings on API security. Watch the video below to learn about:

    • The growth of APIs
    • Challenges and methods to secure them
    • API incidents that organizations have experienced and their impacts
    • Methods of remediating API coding errors and their effectiveness
    • What to look for in an API protection platform

    Watch the video below, and be sure to check out the new research: Trends in Modern Application Protection.

  • Using Data Security to Defend Against Ransomware

    GettyImages-104205851As ransomware actors have gained in experience and sophistication, they’ve adopted new tactics. Before encrypting your data, they exfiltrate it. This way, they can make you pay twice–first for an encryption key, and second, an extortion fee to prevent the attacker from publishing your sensitive data.

    Data security encompasses the principles and practice of ensuring legitimate access and preventing unauthorized access to data to preserve the cybersecurity triad of confidentiality, integrity, and access (CIA). A data security platform that enables you to discover, classify, and protect your sensitive data can stop a ransomware attacker from data exfiltration and limit your exposure to extortion.

    (more…)

  • GettyImages-1366362135Easy-to-remember passwords are easy to crack. Strong passwords are hard to remember,
    leading to password reuse and the risk of password compromise that causes multiple account takeovers. Passwords are risky business.

    Multifactor authentication (MFA) is a way to combat the inherent weaknesses of passwords. Yet MFA is also susceptible to compromise. Passwordless authentication based on the FIDO standards and public key encryption is the new archetype for authentication, and is phishing- and compromise-resistant. 

    (more…)