Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity NewswireTechnologies & SolutionsCyber ProductsSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceCybersecurity News

Cybersecurity founded on 3 pillars: Technology, process, and people

By Vishal Salvi
cyber-security-fp1170

Image via Freepik

October 17, 2022

As enterprises expand their IT networks and migrate workloads to the cloud, as people work and transact remotely, as billions of devices join the IoT every year, and as cybercriminals become smarter and bolder, cybersecurity professionals have to run faster just to stay in the same place. It is estimated that worldwide, cybersecurity spending will reach nearly US$ 200 billion by 2025.


Organizations would be well advised to deploy their investments in proactive defense, anticipating attacks early, responding to events in real time, and trying to contain damage rather than fixing it. The problem is that data and applications are exiting the enterprise data center and moving into the cloud, to be accessed by users who could be sitting anywhere on earth. This means that the earlier approach of securing the network perimeter is no longer effective. The new need is to protect data and applications right where they are. 


That calls for comprehensive measures, starting with building a core foundation for securing the enterprise inside out. This article looks at it from three perspectives — technology, process, and people.


Securing the enterprise with advances in technology


As digital technologies continue to proliferate, cybersecurity strategies need to factor in the increasing use of artificial intelligence (AI), robotic process automation and the Internet of Things in their threat assessments. Because neither data nor employees reside within enterprise boundaries today, cybersecurity needs to change tactics from network-centric to user-centric. This is the basic principle of zero-trust architecture (ZTA). Apart from securing users, resources, and assets where they are — rather than protecting static perimeters — ZTA supports governance by enforcing policies in a granular manner.  


Apart from ZTA, organizations can employ methods such as security as code, security as policy and security as infrastructure — bringing in hyper-automation — to protect workloads on the cloud. Like ZTA, these improve governance by defining security policies and standards as codes to automate enforcement. 


Cybersecurity teams will do well to leverage AI and machine learning to defend against attackers who are already using these technologies to perpetrate crime. Machine learning algorithms can work through massive amounts of data in real-time to identify anomalies, such as unusual behaviors or outlier patterns, alert the organization early, and even take defensive action if required.  


Securing through proactive processes


Enterprises have to constantly be on guard to anticipate threats or at least detect them before they cause too much damage. Ever-watchful security processes play a huge role here. Vulnerability management processes continually examine IT assets to check for any misconfiguration or other issues that may render them vulnerable to attack. This technique also triages vulnerabilities and remedies them in order of urgency. 


Proactive risk management is also key to establishing controls — preventive, detective, monitoring and for defense. First, organizations need to conduct a comprehensive risk analysis to understand the level of risk faced by each critical data asset and, based on that, prioritize the order of defense. One line of thinking recommends use-case-based cybersecurity, that is, identifying the most likely targets and securing those before others. Regular penetration testing — simulating an attack on your own systems and applications — also helps to ferret out weaknesses and fix them proactively. 


Many risk management processes, such as applying patches or upgrading software, may be automated in the case of low-risk assets. However, it is important to ensure that automation does not create new vulnerabilities; this is why higher-risk or more valuable assets need to be accorded greater prioritization and have some human supervision. 


Trends like remote work, hyper-connectivity, and personal devices connecting over unsecured networks are dramatically increasing enterprises’ exposure to bad actors. Identity and access management (IAM) processes ensure that only authorized users — both within and outside the organization — access data, applications and other enterprise systems without exposing them to risk. Using IAM processes, IT administrators can assign a unique digital identity to every user; authenticate users based on a username, password and additional factor; permit them to access resources based on rules or roles; and, manage their identities from end to end. 


As IoT and other technologies spread, even connected devices, robots, and APIs are being given identities. But AI technologies are increasingly becoming a part of proactive defense mechanisms, recognizing highly complex patterns at a speed and scale that is impossible manually to block miscreants before they can strike. Not only that, but AI can also consider factors such as location or user movement to fine-tune risk perception. 


Securing the people


A massive 3 million cybersecurity positions lay vacant in 2021. While AI and automation can take over some parts of the job, they are by no means a replacement for human talent. Hence organizations need to make a varied efforts to close the talent gap. For example, they should broaden their recruitment strategy to look beyond cybersecurity qualifications and experience at candidates with adjacent skill sets, natural aptitude, or interest in cybersecurity. 


It is a good idea to prioritize hiring in security functions that are critical to business operations because it maximizes value. The organization should identify the roles with the biggest impact on risk and find the right people for those jobs on priority. 


Internal human resources can be augmented with cybersecurity experts and threat intelligence specialists who can monitor a much larger landscape, including the dark web, to detect threats. 


Finally, enterprises need to nurture a security culture and mindset throughout the organization and use training and education to promote secure practices and behavior. The most important element in an organization’s security foundation is a vigilant workforce that believes security is everyone’s business.  

KEYWORDS: artificial intelligence (AI) automation cybersecurity risk management security technology

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Vishal salvi (1) (2)

Vishal Salvi is Senior Vice President, Chief Information Security Officer and Head of the Cyber Security Practice at Infosys. He is responsible for the overall information and cyber security strategy and its implementation across Infosys Group. He is additionally responsible for the Cyber Security Business Delivery, driving security strategy, delivery, business and operations enabling enterprises security and improving their overall posture. With over 25+ years of industry experience in Cybersecurity and Information Technology across different industries, Vishal has extensive management and domain experience in driving transformation Cybersecurity programs, delivery and sales in all key areas. He is part of various Advisory Councils and Boards to provide leadership and direction on various Cybersecurity frameworks and standards to drive adoption of cyber security across industry. 

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • reskilling-freepik1170.jpg

    Reskilling workers can help meet the cybersecurity staffing challenge

    See More
  • security-strategy-fp1170x658v5.jpg

    Security needs a new mindset

    See More
  • security guard freepik

    The fine line of security’s role as a deterrent: How people process and technology influence response

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • 9780367221942.jpg

    From Visual Surveillance to Internet of Things: Technology and Applications

  • 9780815378068.jpg.jpg

    Biometrics, Crime and Security

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing