Skip to content
NGTEdu Logo

NGTEdu

A PRODUCT OF NGTECH.CO.IN

NGTEdu Logo

NGTEdu

  • Home
  • Cyber Attacks
  • Malware
  • Vulnerabilities
  • Data Breach
  • Home
  • Cyber Attacks
  • To Governance and Beyond: Cybersecurity as a Journey
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

To Governance and Beyond: Cybersecurity as a Journey

4 years ago Tripwire Guest Authors
To Governance and Beyond: Cybersecurity as a Journey

How often have you heard someone say “Cybersecurity is complicated!”?

If you’re a practitioner in the cybersecurity industry you’ll have heard these words often, probably along with “…and it’s really boring too!”

Complex, not complicated

Let’s start with the first statement.

In truth, cybersecurity is a complex topic, but that doesn’t mean it has to be complicated. Any programme of change will appear to be complex and confusing if there isn’t a clear process or project in place. I often say it’s like trying to find your way across a busy city without a map – there are many (complex) routes you can take, but it’s not complicated. You just need to find your way from A to Z, which is always a lot easier if you have a map, a guide, and the right tools for the journey.

But our (virtual) cities are increasingly complex because they have been created that way. Over many years of change and innovation, our networks and systems have been upgraded and updated to keep up with the demands of business and customer needs. This has led to a situation where we have created gaps within our infrastructure (both virtual and physical). These then become windows of opportunity for cybercriminals or for data to slip through, unguarded and unprotected.

This complexity leaves us feeling lost and out of control, and unfortunately the issue of data breaches and incidents isn’t going away any time soon.

The size of the problem

As most practitioners and casual observers are aware, cybercrime and data breaches have continued to rise throughout the COVID-19 period. Recently, Verizon released its annual Data Breach Investigations Report 2021, stating there were 1,037 incidents that affected small companies of less than 1,000 employees. The pattern of attacks included System Intrusion, Miscellaneous Errors, and Basic Web Application Attacks. These represented 80% of the breaches.

Although these statistics are interesting, they seem pretty low considering how many organisations there are and how many devices we use. What we must keep in mind is that these are the reported breaches. They are the incidents that are significant enough that organisations are aware of and therefore compelled to notify their customers or the general public about. Often, these statistics are made up of organisations who are willing (or compelled) to notify a central governing body, such as the Information Commissioners Officer (ICO), or the Financial Conduct Authority (FCA).

Therefore, I believe the true number of incidents is, in all probability a lot higher. 

But what about the organisations (large and small) who aren’t aware of the data breaches and incidents that are happening each and every day. According to IBM’s 2020 Data security report, it can take businesses up to nine months (280 days) to detect and contain a breach.

As the size of the business and organisation increases, this problem grows exponentially and leads to a lack of control.

So what can be done about this complex issue that has hidden depths and issues to resolve?

Governance and Control

To improve cybersecurity, many organisations are now turning to a more centralised Governance, Risk, and Compliance (GRC) approach. In part, this is driven by the recognition that cybersecurity is no longer seen as an IT issue, but a business risk.

A good GRC framework incorporates the majority of areas of the business and helps bring about structure and control over different areas of risk, not just IT and cybersecurity.

For example, a GRC framework can help you establish a programme that allows you to consider risks related to;

  • Business Continuity & Disaster Recovery
  • Customer Services
  • Data Protection
  • Facility Management
  • Health & Safety Management
  • Human Resource Management
  • Information Security (a.k.a. cybersecurity)
  • IT Management
  • Quality Management
  • Risk Management
  • Supplier Management

The Governance Institute defines Corporate Governance as the;

“system of rules, practices and processes by which a company is directed and controlled.”

Employing a governance framework to your security programme will ensure you make the right decisions based on clear objectives and have a clear roadmap for the journey ahead. It allows you to make coordinated decisions on appropriate tools and technologies to deploy that will help manage and monitor threats and vulnerabilities in both your virtual and physical infrastructure.

Conclusion; To Governance and Beyond

At the start of this blog I said that a common complaint about cybersecurity is that it is boring. I believe there are several reasons for this (which may be a topic for a later blog), but the primary reason is that people do not see its relevance.

We can discuss the statistics and the chances of the breaches occurring all day long. But, if people (and organisations) don’t understand what it means to them and how it impacts them personally, then they will become disengaged. They will become bored of the same old messages on topics that they see as unimportant.  Yet, as demonstrated by the disruptive aftermaths of some of the biggest breaches, such as those that occurred in the 2017 WannaCry attack, bringing many health care facilities, as well as manufacturing, and at least one shipping organisation to a standstill, the messages can have vital importance.  These attacks are not ancient history, as more recent attacks have temporarily crippled similar business operations.

A good GRC framework brings everyone into the conversation and brings them on the journey. Ultimately it leads to a more resilient organisation, one that has the ability to anticipate, prepare for, respond, and adapt to incremental change and sudden disruptions. The purpose of GRC is to ensure that when faced with challenges, the organisation can survive and prosper.

The Governance Institute states that “good governance is important as it provides the infrastructure to improve the quality of the decisions made by those who manage businesses. Good quality, ethical decision-making builds sustainable businesses and enables them to create long-term value more effectively.”

I believe this is why successful organisations implement governance frameworks to oversee their cybersecurity and data protection processes.   It provides a structure to improve decision making based on known threats and vulnerabilities. It leads to good quality and ethical decisions surrounding the use and management of data.

Without governance and controls in place, it’s not only like trying to navigate across the city without an A-to-Z; It’s like trying to cross the ocean without a compass.

Tripwire’s full suite of security products can help your organisation to prevent, detect, and respond to cybersecurity events.  Whether it’s configuration management, file integrity monitoring, managed security from the cloud, or event log management, let Tripwire be your partner in reaching and surpassing your security goals.


About the Author: Gary Hibberd is the ‘The Professor of Communicating Cyber’ at Cyberfort and is a Cybersecurity and Data Protection specialist with 35 years in IT. He is a published author, regular blogger, and international speaker on everything from the Dark Web to Cybercrime and Cyber Psychology.

You can follow Gary on Twitter here: @AgenciGary

Editor’s Note: The opinions expressed in this guest author article are solely those of the contributor, and do not necessarily reflect those of Tripwire, Inc.

The post ” To Governance and Beyond: Cybersecurity as a Journey” appeared first on TripWire

Source:TripWire – Tripwire Guest Authors

Tags: Cloud, COVID-19, Encryption, Goverment, Low Severity, Malware, Medium Severity, Ransomware, TripWire, Vulnerability

Continue Reading

Previous ‘CryptoRom’ Crypto-Scam is Back via Side-Loaded Apps
Next New Vulnerability in CRI-O Engine Lets Attackers Escape Kubernetes Containers

More Stories

  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

Critical n8n Flaw CVE-2026-25049 Enables System Command Execution via Malicious Workflows

4 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

Malicious NGINX Configurations Enable Large-Scale Web Traffic Hijacking Campaign

5 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach

Microsoft Develops Scanner to Detect Backdoors in Open-Weight Large Language Models

16 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

DEAD#VAX Malware Campaign Deploys AsyncRAT via IPFS-Hosted VHD Phishing Files

16 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

China-Linked Amaranth-Dragon Exploits WinRAR Flaw in Espionage Campaigns

20 hours ago [email protected] (The Hacker News)
  • Data Breach

Orchid Security Introduces Continuous Identity Observability for Enterprise Applications

22 hours ago [email protected] (The Hacker News)

Recent Posts

  • Critical n8n Flaw CVE-2026-25049 Enables System Command Execution via Malicious Workflows
  • Malicious NGINX Configurations Enable Large-Scale Web Traffic Hijacking Campaign
  • Microsoft Develops Scanner to Detect Backdoors in Open-Weight Large Language Models
  • DEAD#VAX Malware Campaign Deploys AsyncRAT via IPFS-Hosted VHD Phishing Files
  • China-Linked Amaranth-Dragon Exploits WinRAR Flaw in Espionage Campaigns

Tags

Android APT Bug CERT Cloud Compliance Coronavirus COVID-19 Critical Severity Encryption Exploit Facebook Finance Google Google Chrome Goverment Hacker Hacker News High Severity Instagram iPhone Java Linux Low Severity Malware Medium Severity Microsoft Moderate Severity Mozzila Firefox Oracle Patch Tuesday Phishing Privacy QuickHeal Ransomware RAT Sim The Hacker News Threatpost TikTok TripWire VMWARE Vulnerability Whatsapp Zoom
Copyright © 2020 All rights reserved | NGTEdu.com
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Read More here.Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT