General, the experts agreed

Telemarketing List delivers accurate contact databases to enhance lead generation and customer outreach. Connect with the right prospects quickly and efficiently.
Post Reply
relemedf5w023
Posts: 431
Joined: Sun Dec 22, 2024 7:15 am

General, the experts agreed

Post by relemedf5w023 »

The theme with the prefix “false” was continued by Olesya Shelestova, CEO of RuSIEM, who dubbed all means of protection “false means” because “they do not provide any security in themselves; a preliminary audit and serious competencies are needed to configure and monitor them.”

In that there is no information vacuum in information security (in addition to those mentioned, this includes Palo Alto Networks information security specialist Denis Batrankov). Information security services also have access to various statistics, consultations with colleagues, analytical studies and special verification activities - audits and penetration tests, but all these tools are available primarily to managers and specialists of information security services, while enterprise management is far from always aware of the security of their enterprises.

In order to show the management the level of security and switzerland whatsapp data a certain risk appetite in the information security model, Dmitry Gadar suggests using the practices of assessing IT projects implemented in the bank, implementing vulnerability management processes, SIEM and anti-fraud systems, which together make it possible to calculate the bank's security through metrics and understand in which direction the organization's information security service should move.

In contrast, Omar "Beched" Ganiev, an information security specialist at Incsecurity, sees security systems as yet another "attack surface," "unpatched, unmanaged network nodes," and believes that security tools are of little use, especially in a large, distributed organization.

Kirill Ermakov joined Dmitry Gadar, stating that a complex security system, such as SIEM, for example, in Sberbank, needs to be implemented over years and by the time the project is completed it will already be morally and physically obsolete and irrelevant, thereby challenging Elman Beibutov from IBM Security to a verbal duel ( IBM is implementing SIEM and building a SOC in Sberbank. - Author's note ). He noted the stage-by-stage implementation of business benefits in large projects: "every quarter in large SIEM projects new functionality is rolled out and the business receives new opportunities", thereby answering the question of how to optimize investments in information security.
Post Reply