Experts Advise To Security Leaders For Computer Security Day – 30 November

Ahead of this year’s Computer Security Day, which takes place on 30th November,  we reached out to a number of experts and leaders to provide comments and advice to security leaders for this day. The day is designed to raise awareness of the importance of good cybersecurity practices within organisations and to promote best practices. This year, there is a focus on bringing together international and local IT and security professionals to share their experiences, acquire knowledge and gain an understanding to safeguard their organisation’s most valuable asset – information. 

Experts Comments

November 24, 2020
Chris Hodson
CISO
Tanium
My call to all CISOs on Computer Security Day is that you can’t manage what you don’t see. This simple statement sums up the reason for most security breaches -- a lack of fundamental IT hygiene. 'More tools' is not the solution. In fact, a complex patchwork of disparate tools that don’t integrate is what often causes organisational silos in the first place. It takes too long to find the threat, too long to remediate it and too long to ensure no other systems are vulnerable. CISOs need to .....Read More
My call to all CISOs on Computer Security Day is that you can’t manage what you don’t see. This simple statement sums up the reason for most security breaches -- a lack of fundamental IT hygiene. 'More tools' is not the solution. In fact, a complex patchwork of disparate tools that don’t integrate is what often causes organisational silos in the first place. It takes too long to find the threat, too long to remediate it and too long to ensure no other systems are vulnerable. CISOs need to recognise that unless they can ensure IT hygiene, investments in advanced security or operations tools are fruitless. To improve IT hygiene, organisations need to create a process to continuously identify assets, risks, and vulnerabilities across an environment and be able to fix them with speed and scale. A good place to start is by unifying the IT operations and security teams around a single source-of-truth.  Read Less

Submit Your Expert Comments

What do you think of the topic? Do you agree with expert(s) or share your expert opinion below.
Be part of our growing Information Security Expert Community (1000+), please register here.

Write Your Expert Comments *
Your Registered Email *
Notification Email (If different from your registered email)
* By using this form you agree with the storage and handling of your data by this web site.