The article explores a summary view of the key tips, that can assist you to protect your organization from Cyber Attacks.
TECHNOLOGY
- Backup Solution - Adequate, Offline, and Online.
- Firewalling - Network, Application, WAF
- Antivirus/ Antimalware with behavioral detection.
- Security Hardening & Right Technology Configuration
- Security solutions for monitoring and Response
- Email & Web Filtering, Data Leakage Prevention (DLP)
- Mobile security solution
- Restricted download & removable media
- Identity and Access Management, including PAM
- Technology for threat intelligence collection, correlation
- Effective SIEM with right use cases and IOC configuration.
- DoS / DDoS protection technology/ service.
- File Integrity/Change Monitoring Solution
- Right level of logging and alerting with correlation
- Encryption & Key Management
- Secure Managed File Transferring mechanism
- Sandboxing, APT Protection
- Logical/ Physical segmentation of networks/ Systems.
- Technology for timely and consistent patching
- Wireless Access Control
PEOPLE
- Right Information Security/ Cyber Security Organization Structure.
- CISO and Information Security Team with authority, total visibility, and control
- Executive management visible support and buy-in.
- A focused approach to security monitoring and threat intelligence.
- Continuous security awareness among the users, technologists, and management.
- Automated controls to support the user to follow policies
- Rewarding scheme for vigilant and security conscious user behavior
- Simplified and different channel of communication
- Business relevant and user relevant messages
- Refined, simplified and supportive security process with business enablement.
PROCESS
- Information Security/Cyber Security Strategy & Plans
- Policy and Procedure Framework covering all domains
- Inventory of Services, Processes, and Assets (including Information)
- Scheduled and Ongoing Risk Assessment
- Security embedded business and technology processes.
- Multiple levels of defense.
- Secure access provisioning, change, review, and deprovisioning
- “Need to have” & “Need to Know” basis access provisioning.
- Least privilege principles in providing controlled/ monitored access rights.
- Scenario planning
- Incident Response & Management process.
- Correlated and centralized threat intelligence collection and distribution.
- Regular, Timely and Comprehensive patching process.
- Effective backup, restoration process
- Service, Process, Asset, Data, Identification, and Classification.
- Control of data and its handling across the organization.
- Business/ IT Service Continuity Plans.
- Effective Incident Response, Crisis Management and Communication Plans.
- Change/Release Management process
- Vulnerability Assessment and Penetration Testing process

About the Author
Illyas Kooliyankal is a well-known Cyber Security Expert, currently working as the CISO at a prominent bank in UAE and serving as Vice President of ISC2 (UAE Chapter). He has won many international awards, including the IDC Middle East CISO Award, ECCouncil (USA) Global CISO Award (Runner-Up), ISACA CISO, and Emirates Airlines CISM Award. He is a well-received keynote speaker at many international conferences in the USA, UK, Singapore, Dubai, etc.