Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Operational Security

08:05 AM
Rishi Bhargava
Rishi Bhargava
News Analysis-Security Now

Cross-Functional Communication Can Better Secure Your Enterprise

Security teams are being asked to not only handle a greater threat landscape, but help the entire enterprise stay secure. Cross-functional communication can help your security work more effectively outside the InfoSec department.

When discussing the role of a company's security team, the focus of the subject often gets drilled down to "how well are we being protected?" But there's a lot more to security than just firewalls and router maintenance.

Whether it's employee training, board reporting, or press and media communications, security feeds into almost every business unit in a more nuanced fashion than many corporations admit. It is no surprise that with such cross-functional interdependencies in the corporate environment, having processes to more effectively work and communicate across departments can go a long way for security teams.

If you don't already have a cross-functional security process in place, here are some quick tips to get started.

Start at the source
First, consider the role that your security team plays in the overall structure of your company and how its responsibilities ultimately tie back to more disparate parts of the hierarchy such as HR, corporate communications and legal.

In the past two years, millions of personal records have been hacked from the databases of major corporations. Whether it was the 150 million records lost in the Equifax breach, the staggering 340 million records lost in the Exactis breach, or the almost inconceivable 1 billion records lost by Yahoo in 2016, it's clear that security is struggling to keep pace with the hackers who are putting them on the back foot day in and day out. (See House Bill Would Create Federal Standards for Data Breach Notifications.)

But why? What is it about security that's lacking? More importantly, what can be done to help other departments mitigate the damage that almost always falls back on the shoulders of the security department when a breach like this is disclosed?

Training is the key
When discussing the role that a security department can play in helping to mitigate both the risk and the impact of a potential breach, training is a key part of the conversation. For example, using cross-functional security processes to have your security department work closely with your HR team can mean employees are trained earlier and more effectively on the risks that they should be aware of when using workstations attached to the corporate network.

Similarly, if the security department gets their corporate communications team up to speed on the technical aspects of a breach, the press has the opportunity to get a clearer and more detailed picture of the exact nature of what data was lost rather than resorting to simple hyperbole to describe the attack.

Security departments can also create an open dialogue between themselves and upper management, as well as the board. This ensures that internal audits of employee practices, behaviors, and risk factors can be assessed and amended from the top down. (See Security Needs to Start Speaking the Language of Business.)

Making everyone's job easier
Security departments are often overwhelmed with the sheer number of potential hacks and attack vectors that are assaulting corporate networks every day.

Much of this comes down to the data that a specific corporation is holding onto and how valuable it is to the hackers trying to steal it. However, it's also a result of disjointed communication practices that leave much of the rest of the company out of the training necessary to know what threats to look out for.

Auditing how your security department links up with the other business units surrounding it is vital to ensuring everything from your network security to your payroll processing runs as smoothly as possible.

By incorporating more streamlined cross-functional security processes into every aspect of your company's business, you can lessen the strain felt by your security department while also increasing the guarantee that the data of your customers, clients and internal staff will remain safe from any bad actors that may come your way.

Related posts:

Rishi Bhargava is the co-founder and vice president of marketing for Demisto, a security startup that focuses on collaborative and automated security operations platforms for enterprises. Prior to founding the company, Bhargava was vice president and general manager of the Software Defined Datacenter Group at Intel Security. He has also held executive positions at McAfee.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/6/2020
Ripple20 Threatens Increasingly Connected Medical Devices
Kelly Sheridan, Staff Editor, Dark Reading,  6/30/2020
DDoS Attacks Jump 542% from Q4 2019 to Q1 2020
Dark Reading Staff 6/30/2020
Register for Dark Reading Newsletters
White Papers
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-07-07
MobileIron Core and Connector before, 10.4.x before, 10.5.x before, 10.5.2.x before, and 10.6.x before, and Sentry before 9.7.3 and 9.8.x before 9.8.1, allow remote attackers to execute arbitrary code via unspecified vectors.
PUBLISHED: 2020-07-07
MobileIron Core and Connector before, 10.4.x before, 10.5.x before, 10.5.2.x before, and 10.6.x before allow remote attackers to bypass authentication mechanisms via unspecified vectors.
PUBLISHED: 2020-07-07
MobileIron Core and Connector before, 10.4.x before, 10.5.x before, 10.5.2.x before, and 10.6.x before allow remote attackers to read files on the system via unspecified vectors.
PUBLISHED: 2020-07-07
In Electron before versions 6.1.1, 7.2.4, 8.2.4, and 9.0.0-beta21, there is a context isolation bypass, meaning that code running in the main world context in the renderer can reach into the isolated Electron context and perform privileged actions. Apps using "contextIsolation" are affecte...
PUBLISHED: 2020-07-07
In Electron before versions 7.2.4, 8.2.4, and 9.0.0-beta21, arbitrary local file read is possible by defining unsafe window options on a child window opened via window.open. As a workaround, ensure you are calling `event.preventDefault()` on all new-window events where the `url` or `options` is not ...