The Expert's View with Kartik Shahani

Governance & Risk Management , Next-Generation Technologies & Secure Development , Threat Detection

The Imperative Shift: Moving Towards Proactive Cybersecurity

Expert Shares Insights into Cyber Defense Preparedness and Vulnerability Mitigation
The Imperative Shift: Moving Towards Proactive Cybersecurity

A new white paper titled “Old Habits Die Hard: How People, Process, and Technology Challenges Are Hurting Cybersecurity Teams in India” reveals that, in the last two years, organizations were able to preventively defend against 58% of the cyberattacks they encountered. However, in today's era of highly sophisticated attacks, enterprises need to consider if this level of defense is adequate without compromising their existing cybersecurity investment.

See Also: eBook: Secure Remote Access Simplified

Organizations in India are forced to reactively mitigate 42% of attacks. The white paper also highlights that approximately 78% of the 825 cybersecurity and IT leaders surveyed believe that a preventive approach to cybersecurity is crucial.

Despite this consensus, challenges persist on the people, process, and technology fronts.

Snapshot of the Challenges

People Challenges: Cybersecurity and IT teams operate in silos, often evaluated using separate and conflicting criteria. Internal attitudes hinder coordination between these teams, making it time-consuming to collaborate effectively.

The study reveals that 64% of respondents agree that their cybersecurity teams are too preoccupied with critical incidents, leaving little time to proactively reduce their organization's cyber risk.

Process Challenges: Managing numerous third-party technologies without proper processes exposes organizations to vulnerabilities. In the era of cloud-based services, reliance on third-party programs for managing SaaS apps and services is prevalent. However, only slightly over half (54%) indicate having high visibility into these environments, posing potential blind spots for cyber attackers.

Technology Challenges: Professionals using isolated tools struggle to discern relationships among users, systems, and software. Differing metrics among tools make it challenging to accurately assess risk. Despite 78% considering user identity and access privileges when prioritizing vulnerabilities, 64% lack an effective method to integrate such data into their preventive cybersecurity practices.

Addressing these Challenges with Exposure Management

Implementing a robust exposure management program is pivotal in overcoming these hurdles. This program enables organizations to assess vulnerabilities, prioritize remediation efforts, and streamline cybersecurity operations, shifting focus from reactive to proactive strategies.

Exposure management assists in handling vulnerabilities in digital footprints, addressing unknown digital footprints, managing identity misconfigurations, and understanding all attacks.

By confronting these challenges directly and adopting a proactive cybersecurity approach, businesses can safeguard their digital assets, customer trust, and overall reputation. It's time for organizations to discard old habits, empower their teams, and embrace a future where preventive cybersecurity takes precedence.

About the Author

Kartik Shahani

Kartik Shahani

Country Manager, India

Kartik has over 30 years of experience in the IT industry, driving momentum in the enterprise security market, managing operations and spearheading channel activities in India. Kartik’s extensive experience and knowledge in sectors such as telecommunications, finance and government, along with his innovative strategies, are pivotal in narrowing the disconnect in the way business and security leaders understand and manage cyber risk.

Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing, you agree to our use of cookies.