Feb21
Proactive vs Reactive cybersecurity strategy, which strategy is the most important? Why not both?
What does a Proactive approach look like?
Proactive cybersecurity activities focus on closing gaps and weaknesses in an environment before attackers exploit them.
Such as:
• Threat hunting and Threat Intelligence
• Cyber Risk Assessments
• Data Classification
• Managed Security Service Providers (MSSP)
• Penetration testing or red teaming
• Vulnerability scanning
• BCP
• Security awareness training
What does the Reactive approach look like?
Reactive cybersecurity activities focus on responding to security incidents after they happen.
Such as:
• Disaster recovery process
• Antivirus or endpoint detection and response (EDR)
• Intrusion detection systems (IDS)
• Email security gateways
• Firewalls
• Forensice and investigate process
• Incident response team
Absolutely that's not one-size-fits-all; diversified approaches of both Proactive and reactive have come into play with different meanings, purposes, and processes and are applicable based upon the business context requirements and where risk is associated and understand security controls deliver possible outcomes of the business and effectively managed and mitigated the risk.
By Yaroth Chhay
Keywords: Cybersecurity, Leadership, Risk Management
The Mean and the Margin: When Intelligence Is Trained on the Average, Who Does It Forget?
Governing Reputational Exposure Before It Becomes Impact
Why Governance Needs Two Standards of Rigor
The First Step in Succession Planning
Friday’s Change Reflection Quote - Leadership of Change - Change Leaders Leverage Strategic Alliances