Envisioning IS Security Strategy

Reactive versus proactive Information Security

Given the existing cyberenvironment in which enterprise devices (IoT) exists, it is pertinent to adopt a defense posture that is ahead of the adversaries. Definitely deploying defense in depth and adopting controls based on attack modes are not sufficient. Concurrently, it is impossible to encapsulate assets and resources with all possible controls in proverbial and not practical. Adopting a pragmatic approach based on right strategy that consists on being ahead of adversaries and staying ahead of adversaries is critical.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s