Intelligent CIO North America Issue 36 | Page 59

CASE STUDY platform ’ s RiskResponder functionality , which presets security behaviors that respond to risks in real-time .
For example , if a person enters the wrong password into an employee ’ s laptop a preset number of times , we automatically revoke all data access from that device . That automatic protection offers tremendous peace of mind for me and our compliance team .
We have had a few scares when employees could not find their laptops but ultimately found them simply misplaced somewhere safe . Thankfully , the measures we have put in place allow us to avoid going into a full panic when a device is lost or temporarily misplaced . We do not have to wonder when a device was last encrypted or if data is currently safe ; we know it is and can prove it via our management tools .
Email security is another huge concern . Over 90 % of security threats arrive via an email-based attack . We have recently implemented Check Point ’ s Avanan for email security , which I consider to be a gamechanger .
Our proof of its effectiveness – when we upgraded from a standard gateway email security product to Avanan , we reduced the number of phishing emails previously missed by thousands each month . We also use KnowBe4 to provide the crucial layer of employee security awareness and phishing training .
Managed detection and response is another essential security layer , and the tools we have in place are a huge contributor to my confidence in our data safety .
In the event that employee credentials are compromised , we have identity management , single sign-on and multifactor authentication prepared to stop anyone from getting into our systems . Our tools
can detect threats , send alerts and handle initial threat response and remediation as well . Through our managed detection and response solution , we also have a third-party SOC provider in place with 24 / 7 eyes on logging , endpoint detection and response and network security .
Strong , holistic security requires strong organizational backing
As I said , I am fortunate to work at an organization in which I have never hit a roadblock when it comes to investing in security . IT is never profitable ( in the classic sense of the term ), but unsecure IT can quickly lead to huge losses – from potential fines and legal expenses to reputational damage and downtime that interrupts business operations . When IT is on its game , when it is actively preventing data breaches and lost productivity , then it is well worth the investment several times over .
By thinking about security from a holistic perspective , rather than being pigeonholed into one solution , organizations can layer on as much protection as possible , keep their names out of breach reports and answer security inquiries with total confidence . p

I CAN PROUDLY SAY THAT ,

TO MY KNOWLEDGE , WE ’ VE NEVER HAD A SECOND CONVERSATION WITH A

CLIENT ABOUT SECURITY .

www . intelligentcio . com INTELLIGENTCIO NORTH AMERICA 59