Security 360° Perspective: Commonsense Planning of Security Technologies
Keeping up with the change in technology can be overwhelming, from increased business usage to the rapid advancements in the cybersecurity market. What often took 5-10 years to adopt a couple of decades ago, is in production in just a few years. This article establishes some simple next steps to address the issue. A Commonsense approach to Security Improvement is needed.
Just 2 decades ago, Gartner’s vision for Information Security program adoption captured three unique perspectives – organizational, data-centric, and technical. One leg of the program needs a view of the current security technologies and the ones being considered soon. A bit later, ISACA came to a similar conclusion. Their blueprint for The Business Model for Information Security[i] included a Technology component to address Human Factors of People, Enabling and Support of Process, and the Architecture of the Technology to be used. Without factoring all three areas, IT Security decisions end up the square peg to the round hole.
Few organizations can resource the planning of security technologies, however. Enterprises often have architecture teams and subscription services to firms like Gartner or Forester. Small-to-midsized organizations need other options. One commonsense approach leverages Value Added Resellers (VARs) to establish and maintain the client’s roadmap of security technologies.
One view of the Cybersecurity Ecosystem[ii] has eight areas supporting Cybersecurity, Privacy, and Trust: Security Operations; Data Security; Application Security; Physical Security; Infrastructure Security; Governance, Risk, and Compliance; Fraud and Transaction Security; Identity Security, and (general) Services. One or more of these perspectives best aligned to client priorities should be included in the roadmap.
The roadmap simplifies decision-making, and highlights when tasks are needed within that calendar year. A given technology may need to be in one of four states:
- CONTAIN: Further investment in a previous mainstream product may be contained.
- RETIRE: Some contained technologies may be end-of-life and need to be retired.
- EMERGING - Emerging technologies may be researched in support of future planning.
- MAINSTREAM – A green light may be given to previously defined emerging technologies.
Several factors go into the performance of a given technology. For example, Gartner demystifies the market hype in the Gartner Hype Cycle[iii]. Products may be On the Rise, At the Peak, Sliding into the Trough, Climbing the Slope, or Entering the Plateau. The annual update to the roadmap should highlight where the technologies are. Return on investment will vary based on the product’s maturity and market acceptance.
Let’s look at an example using the Governance, Risk, and Compliance part of the Cybersecurity Ecosystem and the Gartner Hype Cycle for Cyber Risk Management.[iv] Depending on client input, the roadmap might include up to 6 product categories to be Mainstream in less than 2 years or 13 to be Mainstream in 2-5 years. Business impact will also be highlighted for each category selected. Adoption prior to Mainstream has value when Transformational benefits could be realized!
While the cybersecurity market dictates the Emerging and Mainstream technologies, other factors determine what is placed in Contain or Retire. Input is solicited from the client and their cybersecurity vendors to make these determinations. Product categories become Contained when newer approaches are being adopted and dependencies still exist. Contained categories are moved to Retire when dependencies have been eliminated and/or the product is end of life.
As a result of applying this Commonsense Planning of Security Technologies, your current and near-term cybersecurity technologies in your Cybersecurity Ecosystem are defined, benefits highlighted, and next step actions are easily identified. Let your VAR assist with your IT Security Roadmap!
---------------------------------
Donald Borsay is an advisor, auditor, and instructor, with over 20 years dedicated to Cybersecurity. Borsay is a thought leader and Security Advisor for Tech City Advisors, supporting Cybersecurity program initiation, assessment, and fractional CISO managed services. Feedback is welcome at: Donald.borsay@cyberbuyer.io.
Coyote Brown offers Cybersecurity Advisory, Consulting, and Assessment Services, composed of highly experienced strategic cybersecurity advisors and consultants helping clients maintain a healthy cyber security posture.
Tech City Advisors is an IT Service Provider with specialized knowledge of information technology. They have commercial partnerships with over 300 technology vendors, enabling the resale and support to clients on behalf of our vendor partners.
[i] The Value of BMIS ISACA - https://www.isaca.org/isaca-digital-videos/archive/the-value-of-bmis--isaca
[ii] Strategy of Security, The Ecosystem Explained - https://strategyofsecurity.com/cybersecurity-ecosystem/
[iii] Gartner Hype Cycle - https://www.gartner.com/en/research/methodologies/gartner-hype-cycle
[iv] Gartner Hype Cycle for Cyber Risk Management, 2023 - https://www.gartner.com/en/documents/4564900
« Back to News & Media