Mobile Search Mobile Menu
Jeff Multz
August 17th, 2017

Like most people I know, I always make time to read about my industry.

Not only to educate myself, but to keep on top of any emerging trends that might impact my business.  I’m not a huge hockey fan, but I do like this quote from Wayne Gretzky: “I skate to where the puck is going to be, not where it has been.” I like to think more than a few steps ahead and make sure I’m always working in that “future puck” zone.

So when I recently came across this article written by Richard Spires, it was an especially gratifying read. A lot of what it outlines – the nature of upcoming cybersecurity challenges and the suggested solutions – were pretty much what my team is already currently doing, day in and day out. Score!

The article talks about three factors that make preventing future cyberattacks extremely difficult:

  • Complexity – Not only is the IT environment complex from the perspective of protecting legacy applications and newer, SaaS applications, but the security technologies themselves that are used to protect the various applications also come in legacy and SaaS variants.And – as many in the identity management and security space like to say –  “identity is the new security perimeter.”  We cannot rely solely on perimeter protection since more and more business-critical applications no longer live within an organization’s data center.  A successful cybersecurity plan needs identity-context based security solutions.  (Solution: Simeio Solutions has four identity operations centers monitoring and managing some of the most complex identity management programs.) 
  • Adversaries – Not only are we seeing hostile and malicious attacks from the outside growing at an alarming rate, but employees and ex-employees are just as likely to take valuable intellectual property to new employers or hold their ex-employers hostage. And while the tools used for these attacks are becoming more sophisticated and more readily available, we still find many attacks come from exploiting simple human error.  (Solution: As a valued partner, Simeio Solutions helps its clients identify and protect against these various adversaries, as well as with the change management process as employees and customers adopt more secure processes.) 
  • Lack of IT professionals – If you look at the growth of the two factors above and compare that with the fact that qualified resources are scarce, you get a sense for the problem at hand. Further, in the case where organizations are able to find qualified resources, they come with an exceptional price tag, and are hard to retain long-term(Solution: Simeio Solutions has over 400 identity management and security experts providing our clients with an SLA driven model of protecting their organizations.)

It is great to see that organizations like CIS (Center for Internet Security) and NIST (National Institute of Standards and Technology) are publishing controls and frameworks to protect against threats and attack vectors, but they still require the proper people, processes, and technologies to be effective.

As a society, we rely on this model all the time. We trust the armies and police of our nations, states and governments to protect us from physical attacks – they have the people, processes, and tools to be the most effective deterrent and protector of our physical safety – this is what they do, day in and day out.  (Speaking of governments, Simeio even provides cybersecurity services to government agencies as well!)

Likewise, it is critically important for organizations to trust their cyber security to experts in this area – to deter and protect against cyberattacks.  Rely on a partner like Simeio Solutions for your security needs – we do this day in and day out.

(Many thanks to Richard Spires, who penned the article I mention for FCW Magazine.)