Our cyber security products span from our next gen SIEM used in the most secure government and critical infrastructure environments, to automated cyber risk reporting applications for commercial and government organisations of all sizes.
Cyber maturity assessments provide vital insights into an organisation’s ability to protect its information assets and defend itself against cyber threats. However, they are time consuming, labour intensive and often difficult to execute – particularly when most staff are working from home and site visits are restricted. This blog post explores the elements of the process that present the biggest challenges and how security audit technology can help you overcome them.
A full cyber maturity assessment involves a security audit, a comprehensive review of people, processes, technology and culture – a deep dive into how an organisation operates in its endeavours for cyber resilience. This includes interviews, questionnaires and a reliance on face-to-face time with staff on the ground. The security audit process itself involves a number of key stages:
The Audit process
In ‘normal’ operating times this is standard operating procedure, but here and now in 2020, how do you manage the technical elements of an assessment, the data collection and evidence gathering and collation of information for analysis and interpretation and then report writing. This is hard if you have one environment, but if you have multiple business units or clients to service then it becomes a logistical nightmare.
Using internal security audit technology that can systematically gather data from across the organisation provides you with the ability to either manage the data collection and evidence gathering stage of the audit process without attending a site, or manage the process on site without relying on expert staff; the outputs can then be gathered for central (or remote) analysis.
This works perfectly for large diverse networks, for any situation where there are scarce expert resources, and for all situations where there are a large number of audit targets – be that suppliers or business units. Separating the data gathering from the interpretation is a logical division of labour and expertise, especially if people are in different locations.
Internal security audit technology supports meaningful analysis and interpretation of data; collecting data in an automated way means that a whole environment can be used making the data comprehensive and representative. Where an auditor might inspect a subset/sample of systems and extrapolate the findings, a software tool can gather control metrics from the management systems and audit targets in their entirety.
Security audit technology also avoids subjectivity. In manual audits data subjects are often chosen (or excluded) to meet the needs or the assessor, for example, reporting on platforms that are known to be well maintained. An audit tool will look at all areas – good, bad or otherwise.
Essential 8 Auditor – Application Control Maturity Dashboard
The challenges in conducting cyber maturity assessments persist, whether it’s conducting a review of your own business or your client’s portfolio of business units.
By streamlining the most cumbersome elements of the security audit process, you can free up your time to focus on remediation activity and development of a road map for improving cyber maturity. Security audit technology can help with your cyber maturity assessments today. However, they can also be part of your improvement plan that involves checking progress next year, next quarter or continuously.
As cyber risks increase, organisations are encountering the longer life cycle of insurance renewals and the need to demonstrate better management of security controls and their effectiveness.Read more
Highlights and insights from the recent Managed Services Summit in London & the ISACA Central Chapter Conference on Digital Trust, in Birmingham, UK. With two recent conferences in the space of three days, some interesting challenges were very evident in the topics discussed. Being very different events, the challenges were quite different, but interestingly they […]Read more
In early August 2023, the latest joint advisory on persistent vulnerabilities was issued by the intelligence and security agencies of the “Five-eyes” community. These joint advisories are becoming more common. Perhaps recognising the growing importance of shared security information and the common nature of many of the threats faced – the weight they carry makes […]Read more
The quality of your risk assessment and the security information it provides is important; if you plan to use it to actively manage your operational and cyber resilience activities. Organisations are constantly exposed to a rapidly changing threat environment, so you really need a similarly rapid evidence-based feedback system that informs you of the ongoing […]Read more
The UK market has its own regulators, security standards and challenges. And while rulings from SEC in the US or the Australian Prudential Regulation Authority (APRA) in Australia don’t apply to UK companies, for the most part, the observations are undoubtedly relevant and the resulting advice instructive. It would be wrong to think UK financial […]Read more
<<< Part 2a: Australia’s Essential Eight: Beyond Endpoint Control <<< Part 2b: Activating UK NCSC & US NIST Guidelines: Beyond Endpoint Control Part 4: Systematic Measurement of Cyber Controls >>> As much as we invest into cyber security controls, external threats are inevitable. In a recent Notifiable Data Breaches Report from the Office of the […]Read more
Keen campers, scouts and even the Swiss Army know – that a good penknife is indispensable. This simple device has mitigated many a disaster at one point in time or another. Whether it’s to cut through a bit of string, tighten a screw or simply to solve the problem of no bottle opener in the […]Read more
Supply chain risk is an area of cyber security that demands the ongoing attention of every enterprise; because it can make the difference between being resilient or not. It’s no surprise that insurers warn that the vulnerability of supply chains is potentially a systemic risk that can quickly propagate across supply chain dominated industries. Organisations […]Read more
It took a “tripartite cyber assessment” by the Australian Prudential Regulation Authority (APRA) to identify that a sample of financial organisations had inadequate cyber security: poor security control management, a lack of business recovery planning and inadequate 3rd party risk assessment. Why were there gaps? Where is the failure? Clearly the common practice of unsubstantiated […]Read more
The discussion over data-driven vs qualitative cyber security assessment has been going for some time. Nowadays, it is at the top of the priority list for many security and senior executive teams. Managing cyber security has always been a noble ambition but without reliable measurement, the lack of actionable information makes evidence-based management decisions almost […]Read more
Read by directors, executives, and security professionals globally, operating in the most complex of security environments.