Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity NewswireTechnologies & SolutionsCyber ProductsSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceCybersecurity News

Cybersecurity founded on 3 pillars: Technology, process, and people

By Vishal Salvi
cyber-security-fp1170

Image via Freepik

October 17, 2022

As enterprises expand their IT networks and migrate workloads to the cloud, as people work and transact remotely, as billions of devices join the IoT every year, and as cybercriminals become smarter and bolder, cybersecurity professionals have to run faster just to stay in the same place. It is estimated that worldwide, cybersecurity spending will reach nearly US$ 200 billion by 2025.


Organizations would be well advised to deploy their investments in proactive defense, anticipating attacks early, responding to events in real time, and trying to contain damage rather than fixing it. The problem is that data and applications are exiting the enterprise data center and moving into the cloud, to be accessed by users who could be sitting anywhere on earth. This means that the earlier approach of securing the network perimeter is no longer effective. The new need is to protect data and applications right where they are. 


That calls for comprehensive measures, starting with building a core foundation for securing the enterprise inside out. This article looks at it from three perspectives — technology, process, and people.


Securing the enterprise with advances in technology


As digital technologies continue to proliferate, cybersecurity strategies need to factor in the increasing use of artificial intelligence (AI), robotic process automation and the Internet of Things in their threat assessments. Because neither data nor employees reside within enterprise boundaries today, cybersecurity needs to change tactics from network-centric to user-centric. This is the basic principle of zero-trust architecture (ZTA). Apart from securing users, resources, and assets where they are — rather than protecting static perimeters — ZTA supports governance by enforcing policies in a granular manner.  


Apart from ZTA, organizations can employ methods such as security as code, security as policy and security as infrastructure — bringing in hyper-automation — to protect workloads on the cloud. Like ZTA, these improve governance by defining security policies and standards as codes to automate enforcement. 


Cybersecurity teams will do well to leverage AI and machine learning to defend against attackers who are already using these technologies to perpetrate crime. Machine learning algorithms can work through massive amounts of data in real-time to identify anomalies, such as unusual behaviors or outlier patterns, alert the organization early, and even take defensive action if required.  


Securing through proactive processes


Enterprises have to constantly be on guard to anticipate threats or at least detect them before they cause too much damage. Ever-watchful security processes play a huge role here. Vulnerability management processes continually examine IT assets to check for any misconfiguration or other issues that may render them vulnerable to attack. This technique also triages vulnerabilities and remedies them in order of urgency. 


Proactive risk management is also key to establishing controls — preventive, detective, monitoring and for defense. First, organizations need to conduct a comprehensive risk analysis to understand the level of risk faced by each critical data asset and, based on that, prioritize the order of defense. One line of thinking recommends use-case-based cybersecurity, that is, identifying the most likely targets and securing those before others. Regular penetration testing — simulating an attack on your own systems and applications — also helps to ferret out weaknesses and fix them proactively. 


Many risk management processes, such as applying patches or upgrading software, may be automated in the case of low-risk assets. However, it is important to ensure that automation does not create new vulnerabilities; this is why higher-risk or more valuable assets need to be accorded greater prioritization and have some human supervision. 


Trends like remote work, hyper-connectivity, and personal devices connecting over unsecured networks are dramatically increasing enterprises’ exposure to bad actors. Identity and access management (IAM) processes ensure that only authorized users — both within and outside the organization — access data, applications and other enterprise systems without exposing them to risk. Using IAM processes, IT administrators can assign a unique digital identity to every user; authenticate users based on a username, password and additional factor; permit them to access resources based on rules or roles; and, manage their identities from end to end. 


As IoT and other technologies spread, even connected devices, robots, and APIs are being given identities. But AI technologies are increasingly becoming a part of proactive defense mechanisms, recognizing highly complex patterns at a speed and scale that is impossible manually to block miscreants before they can strike. Not only that, but AI can also consider factors such as location or user movement to fine-tune risk perception. 


Securing the people


A massive 3 million cybersecurity positions lay vacant in 2021. While AI and automation can take over some parts of the job, they are by no means a replacement for human talent. Hence organizations need to make a varied efforts to close the talent gap. For example, they should broaden their recruitment strategy to look beyond cybersecurity qualifications and experience at candidates with adjacent skill sets, natural aptitude, or interest in cybersecurity. 


It is a good idea to prioritize hiring in security functions that are critical to business operations because it maximizes value. The organization should identify the roles with the biggest impact on risk and find the right people for those jobs on priority. 


Internal human resources can be augmented with cybersecurity experts and threat intelligence specialists who can monitor a much larger landscape, including the dark web, to detect threats. 


Finally, enterprises need to nurture a security culture and mindset throughout the organization and use training and education to promote secure practices and behavior. The most important element in an organization’s security foundation is a vigilant workforce that believes security is everyone’s business.  

KEYWORDS: artificial intelligence (AI) automation cybersecurity risk management security technology

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Vishal salvi (1) (2)

Vishal Salvi is Senior Vice President, Chief Information Security Officer and Head of the Cyber Security Practice at Infosys. He is responsible for the overall information and cyber security strategy and its implementation across Infosys Group. He is additionally responsible for the Cyber Security Business Delivery, driving security strategy, delivery, business and operations enabling enterprises security and improving their overall posture. With over 25+ years of industry experience in Cybersecurity and Information Technology across different industries, Vishal has extensive management and domain experience in driving transformation Cybersecurity programs, delivery and sales in all key areas. He is part of various Advisory Councils and Boards to provide leadership and direction on various Cybersecurity frameworks and standards to drive adoption of cyber security across industry. 

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Leadership and Management
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Security’s 2025 Women in Security

Security’s 2025 Women in Security

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

blurry multicolored text on black screen

PowerSchool Education Technology Company Announces Data Breach

Half closed laptop

Sudo Vulnerability Discovered, May Exposes Linux Systems

Person holding cellphone

Millions of Android, iPhone Users Could Be Sending Data to China

Events

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • reskilling-freepik1170.jpg

    Reskilling workers can help meet the cybersecurity staffing challenge

    See More
  • security-strategy-fp1170x658v5.jpg

    Security needs a new mindset

    See More
  • security guard freepik

    The fine line of security’s role as a deterrent: How people process and technology influence response

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • 9780367221942.jpg

    From Visual Surveillance to Internet of Things: Technology and Applications

  • 9780815378068.jpg.jpg

    Biometrics, Crime and Security

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!