GRC aims to ensure an organisation manages security risks effectively, complies with regulations, and aligns its operations with its overall objectives.
Simple right?
GOVERNANCE
Processes and structures used to ensure an organisation's activities meet the needs of the business in line with policy and regulatory limitations.
It involves strategy, resource planning, and coordinating the team towards a common goal.
Microsoft published a CISO workshop covering all aspects of a comprehensive security program: strategy, roles and responsibilities, success metrics, maturity models, & more.
This workshop builds a foundation for every aspiring CISO.
Misconfigurations are the cause of a significant number of data breaches.
That’s why the NSA/CISA recently released their Top 10 Cybersecurity Misconfigurations.
Let’s dive into the Top 10 items they identify (not in priority order) 👇
Link below.
These items should come as no surprise. They’re simple in theory, complex in practice.
NIST defines a misconfiguration as: An incorrect or suboptimal configuration of an information system or system component that may lead to vulnerabilities.
1/ Default Configurations of Software and Applications
Issues such as default credentials, permissions and configurations are still a common attack vector that gets exploited.