E-portf 13
How should we approach the development of cyber-policy and -infrastructure given the “short arm” of predictive knowledge?
In trying to predict the trajectory of cyberthreats in the present day and age, it will be a highly challenging discussion topic. However, to protect assets and valuable information regarding the business and employees, companies, organizations, and critical infrastructures will need to have a very fluid cybersecurity policy. Cybersecurity policies are fundamental because the goal is to create a safer cyber web for smooth business operations. With a very flexible policy in place, the short arm of predictive knowledge always opens room for updates to the policies as they evolve. With these updates, the companies and industries can stay safeguarded and detect when the threat is approaching and even the new, improved ways attackers plan to launch. Also, it makes room for the day-to-day assessment of the policies in place based on how the world is faring.
The business’s sustainability hinges on what every employee does, both internally and externally, as once said by Davis Truong, Enterprise Architect for Malwarebytes. A single individual’s action can result in data being compromised throughout an organization regardless of its size and location. This can range from intellectual property to financial data. The most critical step in establishing a successful cybersecurity policy is documenting and distributing the acceptable use conditions for employees. People might consider this as overreaching or loss of trust for the employees. That is not the case; no matter how strong defenses are, users can introduce threats unknowingly into the network by falling for phishing scams, posting secured information on social media platforms, or unknowingly giving away credentials.
Cybersecurity policies must be documented, reviewed, and maintained. Cybersecurity policy should include which security policies will be implemented. How the companies’ updates and patches will be applied to information systems, and how often data will be backed up. Cybersecurity policies should clearly address an organization’s security needs and communicate best practices for users to mitigate cyber risk incidents.
https://go.kaspersky.com/rs/802-IJN-240/images/ICS%20WHITE%20PAPER.pdf
https://www.nist.gov/cyberframework/online-learning/five-functions