Cybersecurity guru Roger Grimes emphasizes that prioritizing cybersecurity requires a proactive approach. “Don’t wait until you’re hacked!” he urges. Instead, “assess your risks, identify vulnerabilities, and implement controls to mitigate them.” By doing so, organizations can prevent attacks before they occur.
This can be a :
The root of the problem lies in our perpetual inundation with unranked lists – haphazardly compiled checklists of mandated controls, pending repairs, and current tasks – devoid of any discernible hierarchy of risk or priority. We occasionally receive a comprehensive cybersecurity guideline (e.g., PCI-DSS, HIPAA, SOX, NIST, among numerous others) containing a multitude of actionable recommendations. These proposals offer practical recommendations that, when implemented, can significantly reduce the risk of accidents in your environment.
What’s often left unspoken is that identifying the most critical factors contributing to the greatest reduction in environmental risk can be a daunting task, as each issue has its unique impact and interplay with others. Among the numerous lots presented to you, it’s not disclosed that one, two, or three specific items pose a significantly greater risk than all the others.
[…]
The answer?
Don’t rely on unranked risk assessments. To effectively mitigate risks, require a comprehensive list of controls, threats, and defense options that can be risk-ranked according to their potential impact on reducing specific dangers in the current environment, if implemented.
[…]
The CISA documentation comprises at least 21 primary recommendations, with many yielding multiple specific suggestions that emanate from each.
The general recommends numerous suggestions that would likely require weeks or even months to implement in their entirety, assuming they are not already being addressed. Anyone who follows this documentation is expected to thoroughly evaluate and execute each of these recommendations. By taking these measures, we can significantly reduce the risk of harm.
While there are numerous recommendations that can significantly contribute to reducing cybersecurity risk, two initiatives will likely have a more profound impact than the combined effect of all other measures: ensuring that systems are regularly patched and implementing multifactor authentication (MFA) across the organization. Patching is listed third. MFA is listed eighth. There’s no concrete evidence suggesting that this approach would significantly reduce cybersecurity risks compared to other proposals. How are we supposed to gauge the effectiveness of MFA and patching when it’s unclear what constitutes a meaningful comparison or benchmark?
•