{"id":11454,"date":"2018-11-05T12:05:56","date_gmt":"2018-11-05T12:05:56","guid":{"rendered":"http:\/\/bulletins.bfconsulting.com\/?p=11454"},"modified":"2018-11-05T12:05:56","modified_gmt":"2018-11-05T12:05:56","slug":"5-principles-to-keep-your-security-strong","status":"publish","type":"post","link":"https:\/\/bulletins.bfconsulting.com\/en\/5-principles-to-keep-your-security-strong\/","title":{"rendered":"5 principles to keep your security strong"},"content":{"rendered":"<p>Most security incidents that lead to confidential data being compromised are the result of companies failing to evolve their security programs to match new technologies.&nbsp; Following these five principles will keep your business ahead of the game:<\/p>\n<ul>\n<li><strong>Encourage a partnership between engineering, product and cybersecurity teams<\/strong> \u2013 a repeatable roadmap planning process that includes engineering, product and cybersecurity teams will ensure that everyone is aware of all changes and can act proactively to avoid any potential cybersecurity breach.<\/li>\n<li><strong>Evaluate team skills, hiring additional talent as necessary <\/strong>\u2013 evaluating the technical skills of everyone on the cybersecurity team and comparing it to roadmap plans will help ensure that a forward-looking hiring and training strategy for the cybersecurity team can be adopted.<\/li>\n<li><strong>Develop a threat model for new technology<\/strong> \u2013 a threat model for new technology should be developed and updated through collaboration between cybersecurity and engineering teams.<\/li>\n<li><strong>Implement security tools designed for new technology<\/strong> \u2013 new technologies may require new tools. Security monitoring should provide a complete inventory of services, interdependencies and expected communication paths as well as alerts for when the unexpected happens.<\/li>\n<li><strong>Allocate resources to cybersecurity research<\/strong> \u2013 being reactive is an ineffective and inefficient strategy. Stay ahead of emerging threats and evolve security programs to proactively reduce the risk of a cybersecurity incident.<\/li>\n<\/ul>\n<div class=\"rpbt_shortcode\">\n\n<div id='rpbt-related-gallery-1' class='gallery related-gallery related-galleryid-11454 gallery-columns-3 gallery-size-thumbnail'><figure class='gallery-item' role='group' aria-label='11 FinTech trends to follow in 2017'>\n\t\t\t<div class='gallery-icon landscape'>\n\t\t\t\t<a href='https:\/\/bulletins.bfconsulting.com\/en\/11-fintech-trends-to-follow-in-2017\/'><img width=\"150\" height=\"150\" src=\"https:\/\/bulletins.bfconsulting.com\/wp-content\/uploads\/2017\/02\/Fintech-trends-150x150.jpg\" class=\"attachment-thumbnail size-thumbnail\" alt=\"\" decoding=\"async\" aria-describedby=\"rpbt-related-gallery-1-6991\" loading=\"lazy\" \/><\/a>\n\t\t\t<\/div>\n\t\t\t\t<figcaption class='wp-caption-text gallery-caption' id='rpbt-related-gallery-1-6991'>\n\t\t\t\t11 FinTech trends to follow in 2017\n\t\t\t\t<\/figcaption><\/figure><figure class='gallery-item' role='group' aria-label='Time for Kazakhstan to develop university-level FinTech program'>\n\t\t\t<div class='gallery-icon landscape'>\n\t\t\t\t<a href='https:\/\/bulletins.bfconsulting.com\/en\/time-for-kazakhstan-to-develop-university-level-fintech-program\/'><img width=\"150\" height=\"150\" src=\"https:\/\/bulletins.bfconsulting.com\/wp-content\/uploads\/2019\/04\/time-for-kazakhstan-to-develop-university-level-fintech-program-150x150.png\" class=\"attachment-thumbnail size-thumbnail\" alt=\"\" decoding=\"async\" aria-describedby=\"rpbt-related-gallery-1-12675\" loading=\"lazy\" \/><\/a>\n\t\t\t<\/div>\n\t\t\t\t<figcaption class='wp-caption-text gallery-caption' id='rpbt-related-gallery-1-12675'>\n\t\t\t\tTime for Kazakhstan to develop university-level FinTech program\n\t\t\t\t<\/figcaption><\/figure><figure class='gallery-item' role='group' aria-label='The drive for omnichannel banking'>\n\t\t\t<div class='gallery-icon landscape'>\n\t\t\t\t<a href='https:\/\/bulletins.bfconsulting.com\/en\/the-drive-for-omnichannel-banking\/'><img width=\"150\" height=\"150\" src=\"https:\/\/bulletins.bfconsulting.com\/wp-content\/uploads\/2020\/01\/the-drive-for-omnichannel-banking-150x150.png\" class=\"attachment-thumbnail size-thumbnail\" alt=\"\" decoding=\"async\" aria-describedby=\"rpbt-related-gallery-1-14346\" loading=\"lazy\" \/><\/a>\n\t\t\t<\/div>\n\t\t\t\t<figcaption class='wp-caption-text gallery-caption' id='rpbt-related-gallery-1-14346'>\n\t\t\t\tThe drive for omnichannel banking\n\t\t\t\t<\/figcaption><\/figure>\n\t\t<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Most security incidents that lead to confidential data being compromised are the result of companies failing to evolve their security programs to match new technologies.&nbsp; Following these five principles will keep your business ahead of the game: Encourage a partnership between engineering, product and cybersecurity teams \u2013 a repeatable roadmap planning process that includes engineering, &hellip;<\/p>\n","protected":false},"author":5,"featured_media":11516,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10],"tags":[184,193],"_links":{"self":[{"href":"https:\/\/bulletins.bfconsulting.com\/en\/wp-json\/wp\/v2\/posts\/11454"}],"collection":[{"href":"https:\/\/bulletins.bfconsulting.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/bulletins.bfconsulting.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/bulletins.bfconsulting.com\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/bulletins.bfconsulting.com\/en\/wp-json\/wp\/v2\/comments?post=11454"}],"version-history":[{"count":3,"href":"https:\/\/bulletins.bfconsulting.com\/en\/wp-json\/wp\/v2\/posts\/11454\/revisions"}],"predecessor-version":[{"id":11517,"href":"https:\/\/bulletins.bfconsulting.com\/en\/wp-json\/wp\/v2\/posts\/11454\/revisions\/11517"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/bulletins.bfconsulting.com\/en\/wp-json\/wp\/v2\/media\/11516"}],"wp:attachment":[{"href":"https:\/\/bulletins.bfconsulting.com\/en\/wp-json\/wp\/v2\/media?parent=11454"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/bulletins.bfconsulting.com\/en\/wp-json\/wp\/v2\/categories?post=11454"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bulletins.bfconsulting.com\/en\/wp-json\/wp\/v2\/tags?post=11454"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}