Intelligent CISO Issue 02 | Page 73

No organisation wants to be spying on their staff but they can ’ t run this risk of insiders causing havoc , either on purpose or by accident .
don ’ t think they aren ’ t trusted . This should go hand in hand with a thorough education programme highlighting the cybersecurity threats that a business faces and why such systems are needed .”
Gregory Webb , CEO , Bromium , says detection requires a patient zero ; someone must get owned and then protection begins .
He said : “ It ’ s no surprise that 63 % of the CISOs we surveyed said they ’ re worried about alert fatigue . Our customers tell us their SOC teams are drowning in alerts , many of which are false positives .

No organisation wants to be spying on their staff but they can ’ t run this risk of insiders causing havoc , either on purpose or by accident .

“ Meanwhile , advanced malware is still getting through because cybercriminals are focusing on the weak spots like email attachments , phishing links and downloads . This is why organisations have to consider the total cost of ownership when making security investments , rather than just following the detect-to-fail crowd .
“ Application isolation provides the last line of defence in the new security stack and is the only way to tame the spiralling labour costs that result from detectionbased solutions . Application isolation allows malware to fully execute , because the application is hardware isolated , www . intelligentciso . com | Issue 02
73