Intelligent CIO Middle East Issue 21 | Page 84

TECH TALK “We’re starting to see a more concerted focus on improving cybersecurity across the country, which is critical as the threat landscape continues to evolve.” Deployment) pipeline to ensure that containers used by developers and pushed into the live environment don’t contain easily exploited flaws. How has the BYOD phenomenon affected how Tenable does business and how are clients best protecting their networks with BYOD becoming increasingly dominant? BYOD is dramatically changing how the world does business - by 2017, half of all employers will require BYOD in the workplace. But the growth of enterprise mobility and BYOD is increasing threats to security and privacy. How are organisations managing the risks and rewards? It is now expected that employees, contractors, partners and others have access to your network when they bring their personal devices to work. Laptops, tablets, smartphones, wearables, and other devices demand connectivity, and even help employees do their jobs more efficiently. But this constant connectivity also introduces security risks that security teams must address. Good security starts with great visibility. Security teams need visibility into all assets and devices, especially those that can instantly connect and disconnect from the corporate network, like mobile 84 INTELLIGENTCIO Gavin Millard, Technical Director, Tenable devices. It’s important that whatever tool an organisation uses to manage mobile security, it integrates with other security solutions already in place, and fits seamlessly into the overall vulnerability management programme. As networks become more open, and the perimeters eroded by the necessity of third party access or untrusted devices, it’s critically important that the vulnerabilities of the systems providing access to corporate data are understood and addressed in a timely manner. “The perception that cloud is any more vulnerable than on-premises solutions is a myth.” With increasing network speeds and data traffic across networks, are enterprises and governments adequately investing in pre-emptive security precautions and monitoring tools? Is a lag with regulation in the region enabling a lag with compliance? Monitoring and reviewing the effectiveness of security processes and controls is critical to maintaining security and compliance posture. UAE government entities and others identified as critical by NESA, are required to do so as part of the National Cyber Security Strategy. Organisations that follow these compliance requirements benefit from greater protection of assets, and a security-conscious culture, which is critical for overcoming emerging security challenges. Whilst compliance and regulatory requirements are hugely beneficial to those that follow them, they often lag behind the current threats faced. This means proactive assessment of the environment against emerging threats and attack vectors is important to ensuring organisation stay both compliant and secure. n www.intelligentcio.com