article thumbnail

Measure Security Performance, Not Policy Compliance

The Falcon's View

In fact, thinking about pulling in SOAR capabilities and other monitoring and assessment capabilities and data, it's not unreasonable to think that KPIs become the tweakable dials CISOs (and up) use to balance out risk vs reward in helping provide strategic guidance for address information risk within the enterprise.

article thumbnail

Forging the Path to Continuous Audit Readiness

CyberSecurity Insiders

Second, the tasks required to ascertain control and policy compliance details, resolve violations and provide adherence proof are resource intensive and error prone. Answering this question has placed CISOs on a path towards continuous audit readiness that’s accomplished by automating audit processes, from Scope to Evidence.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Identity and Access: The Game is the Same – It Just Got Fiercer

CyberSecurity Insiders

By Gunnar Peterson, CISO, Forter. In fact, Microsoft’s CVP and CISO Bret Arsenault summarized the issue perfectly: “Hackers don’t break in, they log in.”. Access to systems should be monitored not only for policy compliance, but also for known malicious behaviors. It is a frontline perimeter for defenders.

article thumbnail

What is Vulnerability Scanning & How Does It Work?

eSecurity Planet

They are two different tools, each essential in their own way and critical for chief information security officers (CISOs) to keep their infrastructure safe. Some SCM tools can scan devices and networks for vulnerabilities, track remediation actions, and generate reports on security policy compliance.