Category Archives: CISO

How can CISOs defend businesses from supply chain attacks?

Estimated reading time: 3 minutes

A supply chain is an omnipresent and inseparable element in every business, irrespective of its size.  Hence, when it comes to cybersecurity specific to this aspect, simply protecting an enterprise’s periphery isn’t enough.

Supply chains consist of people, logistics, systems, vendors etc. working on the inside and the outside of business frameworks. In an increasingly inter-connected world, all enterprises have some communication with such parties, and this linkage can increase the risk of a cyberattack.

Hence, it is vital for organizations all around the world to consider securing their business against the possibility of a malware attack channelized through a supply chain.

Supply chain attacks occur when an enterprise is breached through any component of a supply chain with access to an enterprise’s data and systems. This is a type of threat which is continuously evolving – the highly publicized NoPetya attack took advantage of a legitimate update mechanism to trespass.

The breach at retail giant Target in 2014 happened due to lax security at an HVAC vendor.

Cybercriminals have been quick to understand that while enterprises are getting very serious about their cybersecurity, they may not always be able to force, at least third parties, to adopt their cybersecurity rules.

This would implicitly mean that supply chains can often be the weakest link from a cybersecurity perspective for an enterprise.

The question is, how do Chief Information Security Officers (CISOs) deal with the implications of such an attack? What kind of steps can they take?

Supply chain evaluation and assessment

The first rule for any business is to evaluate and assess every aspect of their supply chain.

A CISO must take this rule to its natural conclusion when considering the threat of supply chain attacks.

This is particularly important for third party vendors as they operate with a different rulebook – before any binding contract is done with them, it is important that they agree to integrate with cybersecurity policies of the former.

Also, the history of these vendors must be looked into, before partnering with them.

Cybersecurity as an agreement

When doing business with third parties, CISOs must ensure that the working agreement also has a detailed cybersecurity framework.

Re-iterating, CISOs must input a mandatory clause for third parties to agree to the cybersecurity rules and protocols laid out by the enterprise.

Regular audits are key

Now even if all external vendors and third parties have been assessed, a CISO cannot sit back and relax thinking that the job is done.

Establishing, processes and frameworks are great but following them can decline over time and here is where audits can come in.

The CISO must ensure regular audits happen with all stakeholders and that all the parties involved are diligently following cybersecurity protocols.

Data control

The crux of data control is to understand which party has access to what kind of data? What kind of controls do they have?

These are important questions which CISOs must ask, also ensuring they have all the answers. If a vendor is required to access confidential business information, the scrutiny on them must be higher. Also, they must pass all cybersecurity hygiene checks before being approved to access company data.

Scrutiny must be continuos and CISOs must have complete visibility of how this data is being used.

Keep an Incident Response plan ready

Businesses and its CISOs may face situations of a cyberattack even after implementing optimum threat defence. Things can go awry, especially when it comes to a function as ever-evolving as cyberthreats.

CISOs must formulate and have an Incident Response Plan in place from a supply chain attack perspective. This is because, in this day and age of interconnectedness, it is difficult to plug all the holes – breaches can happen from anywhere.

An Incident Response Plan will allow a clear strategy in situations when the unexpected happens.

As for a cybersecurity solutions partner, Seqrite offers a unified, powerful solution for protection against supply chain attacks.

The Unified Threat Management (UTM) solution offers a cohesive layer of security to the enterprise while the Endpoint Security (EPS) solution provides a complete endpoint protection solution with specialized features.

Get in touch with us for a bespoke assessment of your cybersecurity architecture.

The post How can CISOs defend businesses from supply chain attacks? appeared first on Seqrite Blog.

Top five cybersecurity challenges for the CISO

Estimated reading time: 3 minutes

Thanks to increasing cyberthreats, the role of the Chief Information Security Officer (CISO) in an organization is only expanding. More and more CISOs are now part of senior leadership teams, reporting directly to the Chief Executive Officer. There is a growing awareness about the significant need to secure an enterprise from the vast number of cyber threats that attempt proliferation. CISOs are also appreciated due to high-pressure environments they operate in.

That’s exactly the reason CISOs of most organizations spend a lot of time making plans to deal with various kinds of cybersecurity challenges. All these threats use different types of vectors, affecting an organization in different ways. On top of that, the threat landscape keeps changing as cybercriminals continuously evolve in their attack methodologies.

Evidently, even now then, CISOs have to be on the lookout for invading malware threats.

Seqrite suggests CISOs watch out specifically for these five top threats –


Most CISOs all over the world were caught off guard when the WannaCry and NoPetya attacks happened.

It wasn’t just the attack itself, but also the sheer scale and simplicity by which it spread. In a matter of days, systems across disparate countries were affected, infrastructure came close to shutting down and there was utter chaos. The audacity of criminals stealing enterprise data and asking for money to release the information was unparallel. Without doubt, it represented a seminal point in cybersecurity history and hence is one of the biggest challenges which continues to plague CISOs.

The BYOD & CYOD culture

Businesses encouraging the adoption of employees working on mobile devices outside secure office networks have expanded the CISO’s work profile. From the position of cybersecurity, BYOD & CYOD policies cause immense risk. Confidential business information is carried on personal devices which are not as secure as corporate endpoints.

The CISO might work painstakingly to ensure that systems inside the company network are updated and patched without any of the latest vulnerabilities. Unfortunately, the same guarantee cannot be given for a personal device. In order for personal devices to have some level of protection will mean that CISOs explore completely new ways and processes to do so.

The CISO balancing productivity with security

CISOs nowadays are also tasked with balancing between employee productivity and security.

The millennial workforce demands more freedom and access which can open an entire channel of cyberthreats for the enterprise. On the other, clamping down too heavily on employees in the interest of information security leads to reduced motivation and hence, less productivity among employees. CISOs need to manage this very carefully as there is no one-size-fits-all mobility solution. Every organization is different and every organization’s security needs are different.

Data protection

CISOs worry about protecting enterprise data in a world where data loss is becoming excessively common. Data breaches are regularly in the news – headlines and its repercussions can often be swift. It is ultimately the CISO’s main responsibility to ensure that enterprise data is safely stored and secured. That though is easier said than done hinting CISOs to always be at the top of their cybersecurity game.

An eye on the future

Every year brings new threats – as a senior leader in an organization, it is the CISO’s responsibility to ensure that the business he/she is serving is capable enough to tackle present and future cyber dangers and that there is a contingency plan in place. These threats can be in multifold and can often be unpredictable – whether they are zero-day attacks, supply chains or threats coming through the Internet of Things (IoT).

Seqrite’s Endpoint Security (EPS) solution provides CISOs with peace of mind by integrating various advanced technologies like Anti Ransomware, Advanced DNA Scan and Behavioral Detection System to protect enterprises from advanced threats.

The post Top five cybersecurity challenges for the CISO appeared first on Seqrite Blog.