How to Navigate the Common Pitfalls of Security Policy Management

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9
Next How to Navigate the Common Pitfalls of Security Policy Management-5 Next

Proactively Assess Risk

Once you know what changes are needed, perform a "what-if" analysis to make sure that your changes do not add any risk, violate PCI compliance requirements, conflict with your network segmentation strategy, or introduce any new vulnerabilities. With this strategy, you can mitigate risks before policies are implemented and catch major issues before they occur.

It comes as no surprise to security practitioners that managing security is becoming more and more demanding. Organizations are facing more threats, greater complexity and increased demand for both security and application connectivity. While many companies are deploying the latest and greatest technologies to fight back against cyber attacks, they often neglect their security policy management basics.

In his years of interactions with companies across pretty much every geography and industry vertical, Nimmy Reichenberg, vice president of strategy at AlgoSec, has found that going back to the basics is key when managing an effective security policy and a crucial first step in making your organization more responsive, agile, compliant and secure. In this slideshow, Reichenberg has identified seven common pitfalls organizations face and tips for how to deal with them.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

PAM PAM Solutions: Critical to Securing Privileged Access

To protect the company from those insiders who abuse their privileged access and from hackers with stolen credentials, many companies are turning to a privileged access management (PAM) solution. ...  More >>

Fake news How Can We Fix the Fake News Problem?

Is fake news a security issue? Some say yes, as it can be used as a social engineering tool to spread disinformation and conceivably to get unsuspecting users to click on malicious links. ...  More >>

blockchain The World According to Blockchain

Blockchain comes with many costs and is surrounded by confusion. Here, we examine realistic use cases, drawbacks and the potential of blockchain. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.