Reducing The Risk Of Weak Links With Consolidation

The breadth of tools that IT teams have at their disposal to protect their organisations can be both a blessing and a curse. On the one hand, having a diverse array of products and technologies to detect threats and help protect the organisation can be seen as a good thing; but on the other, it raises the risk that there could be a weak link somewhere within this array of tools.

As the SolarWinds attack and the Log4j vulnerability make all too clear, the old adage about a chain only being as strong as its weakest link has never been more relevant. 

Consolidation of security technologies presents a way to “remove” weak links and blunt the impact of this risk. However, this approach needs to be carried out in a carefully planned manner if cybersecurity professionals hope to reduce their overall risk without creating a new set of security challenges that need to be managed.

Identify Opportunities For Consolidation - But Be Smart About It

How best to get started? Organisations need to evaluate their existing security vendors by performing a Know Your Third-Party assessment. Security vendors that were once “best of breed” might not have been keeping pace with the rapidly evolving threat landscape over the years; alternately, they might not have been consistently investing in the ongoing development of their product or the people they hire.

Once a potential “weak link” vendor has been identified, the next step is to see if there is a vendor who can provide similar functionality as part of a consolidated platform. There has been a fair amount of consolidation in the technology space in recent years - Cisco’s purchase of Splunk, for example – so this task is more easily accomplished today than it would have been ten or even five years ago.

Before moving forward with this type of consolidation, however, organisations should make sure that the vendor services that will be connecting with internal systems comply with the security requirements specified by the organisation.

If your organisation embraces zero trust principles that eliminate implicit trust, for instance, then the services need to leverage these principles as well. 

Additionally, the vendor services should only be accessing the specific resources necessary to carry out their function; providing full access to network resources increases risk. Again, the idea is not to swap out one weak link and inadvertently create a different weak link.

Another consideration: even if a single vendor provides multiple security products, do those different products seamlessly integrate with one another? To our earlier point about companies growing through acquisition and buying up smaller companies, this isn’t always a foregone conclusion. Organisations should seek out vendors that have done the work to make sure their various acquired technologies all work with one another so that security teams can easily gain a comprehensive view across them. Careful evaluation is required in this case.

The Goal: Less Complexity, Less Risk 

It can be tempting to view technology consolidation solely as a cost-cutting exercise – particularly if there is a lot of input coming from the finance side of the house. This is the wrong lens through which to view a consolidation exercise. 

There can certainly be financial benefits if an organisation chooses to consolidate multiple products or services with one vendor, but that shouldn’t be the primary consideration. The focus should be on looking at the supply chain and identifying areas to remove complexity and reduce overall risk. 

This means that CIOs and CISOs should be actively involved in any technology consolidation activities - the process should not be left solely in the hands of the finance team, who might only have a cost reduction mindset rather than the fuller security and risk management mindset.

Ultimately, supply chain complexities – and the inadvertent loopholes that they offer to bad actors – make a consolidation strategy to evaluate and adopt best-of-breed technologies more important than ever.

By taking a well thought out approach to eliminating weak links in their supply chain through consolidation, CIOs, CISOs, and other cybersecurity professionals will be able to bolster their overall security posture, allowing them to better navigate today’s challenging threat landscape. 

Manuel Sanchez is Information Security and Compliance Specialist at iManage

Image: Fill

You Might Also Read:

Misconfigured Cloud Applications Are Putting Your Data At Risk:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

 

« The Importance Of Cloud Access Security In Today's Cyber Landscape
Fast Forward - Technology Developments By 2040 »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

App-Ray

App-Ray

App-Ray provides fully automated security analysis of mobile applications to find security issues, privacy breaches and data leaking potentials.

Flexential

Flexential

Flexential helps organizations optimize their journey of IT transformation while simultaneously balancing cost, scalability, compliance and security.

Subgraph

Subgraph

Subgraph is an open source security company, committed to making secure and usable open source computing available to everyone.

ShadowDragon

ShadowDragon

ShadowDragon develops digital tools that simplify the complexities of modern investigations that involve multiple online environments and technologies.

KeyXentic

KeyXentic

KeyXentic Inc. is a professional mobile and data security service provider. We are devoted to design convenient and strong security for user’s data protection and privacy without any compromise.

HUB Security

HUB Security

Hub Security provide Ultra Secure, Military Grade HSM (Hardware Security Module) Solutions for Blockchain and Digital Assets.

Enterprise Ethereum Alliance (EEA)

Enterprise Ethereum Alliance (EEA)

EEA is a member-led industry organization whose objective is to drive the use of Ethereum blockchain technology as an open-standard to empower ALL enterprises.

Cyber Pop-Up

Cyber Pop-Up

Cyber Pop-Up provide on-demand access to top security experts. No recruiting. No onboarding. No overhead costs.

SOC.OS Cyber Security

SOC.OS Cyber Security

SOC.OS is an alert correlation and triage automation tool. It correlates and prioritises your alerts, boosting productivity, enhancing threat visibility and shortening mean time to respond.

Internet Crime Complaint Center (IC3)

Internet Crime Complaint Center (IC3)

The Internet Crime Complaint Center provide the public with a reporting mechanism to submit information to the FBI concerning suspected Internet-facilitated criminal activity.

US Army Cyber Command (ARCYBER)

US Army Cyber Command (ARCYBER)

US Army’s Cyber Command (ARCYBER) is engaged in the real-world cyberspace fight today, against near-peer adversaries, ISIS, and other global cyber threats.

ImmuneBytes

ImmuneBytes

ImmuneBytes is a cutting-edge security startup that aims to provide a secure blockchain environment for a dependable and open Web3 ecosystem.

SeeMetrics

SeeMetrics

SeeMetrics is an automated cybersecurity performance management platform that integrates security data and business objectives into a simple interface.

VISO Cyber Security

VISO Cyber Security

VISO provide Cyber Security Consulting and CISO as a Service to companies who need to augment their leadership teams with information security expertise.

SecurityLoophole

SecurityLoophole

SecurityLoophole is an independent cyber security news platform with global coverage. Latest updates, reports, news and events related to cyber security.

Verastel

Verastel

Specializing in the niche space of proactive cyber-defense, and adaptive resilience, team Verastel is bolstering enterprise digital security like never before.