{"id":393,"date":"2025-04-07T03:04:21","date_gmt":"2025-04-07T03:04:21","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/jadenwalker\/?p=393"},"modified":"2025-04-07T03:04:21","modified_gmt":"2025-04-07T03:04:21","slug":"discussion-post-protecting-availability","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/jadenwalker\/2025\/04\/07\/discussion-post-protecting-availability\/","title":{"rendered":"DISCUSSION Post: Protecting Availability"},"content":{"rendered":"\n<blockquote class=\"wp-block-quote\">\n<h2 class=\"wp-block-heading\">In this\u00a0discussion post, I am the CISO for a publicly traded company. What protections would I implement to ensure availability of your systems (and why)?<\/h2>\n<\/blockquote>\n\n\n\n<p>As the Chief Information Security Officer (CISO) of a publicly traded company, ensuring system availability is critical to maintaining business continuity, customer trust, and regulatory compliance. To achieve this, I would implement the following protections:<\/p>\n\n\n\n<ol>\n<li>Redundant Infrastructure &amp; Cloud-Based Failover \u2013 Utilizing multi-region cloud services and on-premise redundancy ensures uptime during failures.<\/li>\n\n\n\n<li>DDoS Protection \u2013 Deploying Web Application Firewalls (WAF) and traffic filtering services like AWS Shield or Cloudflare mitigates large-scale attacks.<\/li>\n\n\n\n<li>Disaster Recovery &amp; Backup Plans \u2013 Implementing frequent automated backups with offsite storage protects against ransomware and system failures.<\/li>\n\n\n\n<li>Zero Trust Architecture \u2013 Restricting access through multi-factor authentication (MFA), least privilege access, and network segmentation reduces insider and external threats.<\/li>\n\n\n\n<li>Continuous Monitoring &amp; Incident Response \u2013 Utilizing SIEM tools (e.g., Splunk, Microsoft Sentinel) enables real-time threat detection and rapid response.<\/li>\n\n\n\n<li>Patch Management \u2013 Regular software updates prevent the exploitation of vulnerabilities.<\/li>\n<\/ol>\n\n\n\n<p>These measures enhance system resilience, ensuring availability and protecting stakeholders.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In this\u00a0discussion post, I am the CISO for a publicly traded company. What protections would I implement to ensure availability of your systems (and why)? As the Chief Information Security Officer (CISO) of a publicly traded company, ensuring system availability&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/jadenwalker\/2025\/04\/07\/discussion-post-protecting-availability\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":30385,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":4},"categories":[4],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/jadenwalker\/wp-json\/wp\/v2\/posts\/393"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/jadenwalker\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/jadenwalker\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jadenwalker\/wp-json\/wp\/v2\/users\/30385"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jadenwalker\/wp-json\/wp\/v2\/comments?post=393"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/jadenwalker\/wp-json\/wp\/v2\/posts\/393\/revisions"}],"predecessor-version":[{"id":394,"href":"https:\/\/sites.wp.odu.edu\/jadenwalker\/wp-json\/wp\/v2\/posts\/393\/revisions\/394"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/jadenwalker\/wp-json\/wp\/v2\/media?parent=393"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jadenwalker\/wp-json\/wp\/v2\/categories?post=393"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jadenwalker\/wp-json\/wp\/v2\/tags?post=393"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}