Current practices
How organizations manage Cyber Risk
i. Complying to broad-based standards like ISO 27001:2013 or NIST-CSF, or vertical/use-case specific ones like PCI-DSS or SOC2:
While this helps adopt a security-hygiene, it is not sufficient as:
-
It is a Point-in-time report.
-
Threats are changing on a daily basis.
-
The resultant posture is not known till the next assessment, even if the gaps are identified and fixed, which may be typically six months to a year away. Till such time, organizations are blind to the ongoing risks.
ii. Performing Vulnerability Assessments (VA): Given the diverse IT environments, across the cloud and on-premise, the VA is performed on different asset types, and issues found are many, typically numbering in the thousands which are classified as High, Medium, Low, using CVSS which is a constant.
Recent Comments