OPERATIONS
As CISOs review their risk radar , many are looking for solutions that give greater visibility , and most importantly , mitigation .
“ As companies think about the best way to reduce risk , the strategic approach is to minimise potential impact ,” explains Steve .
This idea of a good recovery strategy is one that has less devices to recover , is gaining steam . According to Steve , there is one thing he thinks can realise this strategy .
“ As I talk to my peers more of them are moving towards adopting a Zero Trust security framework ,” he explains . “ One where no person or device inside or outside of an organisation ’ s network should be granted access to connect to IT systems or workloads unless it is explicitly deemed necessary .”
With this new problem of a proliferation of devices outside a trusted network , Zero Trust framework is increasingly seen as the right approach to implement these controls in an industry -approved best practice framework .
Rejuvenating endpoint recovery With so many different devices connected to a network , it can be hard to keep track of just exactly who and what is allowed to be connected and what is an outlier .
“ Endpoint recovery processes in compliance with evolving data protection laws across countries also put increased focus on cyber resilience , like preemptive forecasting of device downtimes and proactive incident response planning ,” says Mathivanan Venkatachalam , Vice President at ManageEngine . cybermagazine . com 133