Navigating%20the%20Budgetary%20Landscape%20Securing%20Resources%20for%20Attack%20Surface%20Management.png?profile=RESIZE_710x

 

In the ever-evolving realm of cybersecurity, securing adequate resources is paramount for organizations striving to protect their digital assets effectively. However, obtaining budgetary allocations for critical initiatives such as Attack Surface Management (ASM) can pose significant challenges. In this blog, we delve into the practical considerations and strategies employed by security organizations to secure funding for ASM initiatives, drawing insights from industry experts and observations in the cybersecurity landscape.

 

 

 

Here is the verbatim discussion:

They're learning the things they have to learn to put out the fires in that moment they don't have the expertise or the skill set that is often missing and one of the the one of the primary skill sets that's often missing in a smaller team is the ability to triage a vulnerability that's been identified and appropriately decide what priority do I need to put on this what risk what risks does it create what new risks are there and do we have anything that's already going on that will mitigate this or what are our what are our mitigating controls that's something where I see ASM coming in because uh it takes that asset list that asset inventory which you know sounds really boring it's just the asset inventory sure service now has been doing that for 20 years great and and Chris this is a kind of question which almost like every ciso is always talking about like where where do I get the budget from right so what what what are you typically observing since since you um uh as an an analyst in this space where are the security organizations getting the budget from is it like they're taking some existing budget are they creating a new budget and also like how are they justifying the budget yeah that's a a really good question because you can get really excited about a technology you can you can find all sorts of ways that it will be used in your organization you can say I hello everyone I welcome you all on behalf of ciso platform to this webinar ciso platform is the world's first online community solely dedicated for information senior security Executives ciso CIO CSO CTO directors Etc with 40,000 plus professionals globally and 5,000 Plus members today's session is on practical approach to understanding ATT tax surfice management m in 2023 our speakers are Chris Ray and Bash baray Chris is a security architect and Veteran of the cyber security domain he has written many reports on attack surface management and many more domains bash is the co-founder of CISO Platform plan and Firecompass. He is also an IIT Kharagpur alumni.

 

Highlights:

Addressing Skill Gaps: One of the primary challenges faced by security organizations, particularly smaller teams, is the lack of expertise and skill sets necessary to effectively triage vulnerabilities. ASM plays a crucial role in addressing this gap by providing insights into asset inventory and prioritizing vulnerabilities based on their potential impact and mitigating controls. By leveraging ASM tools, organizations can enhance their ability to assess risks and allocate resources more efficiently.

Budget Allocation Strategies: Securing budgetary allocations for ASM initiatives requires a strategic approach that emphasizes the alignment of security objectives with broader organizational goals. While some organizations may reallocate existing budgets to prioritize cybersecurity initiatives, others may create dedicated budgets specifically earmarked for ASM and related technologies. Additionally, justifying the budget for ASM often involves demonstrating the tangible value and return on investment (ROI) derived from enhanced security posture and risk mitigation.

Industry Insights and Best Practices: Drawing insights from industry experts and observing trends in the cybersecurity landscape can inform budget allocation strategies for ASM initiatives. Platforms like CISO Platform provide valuable resources and networking opportunities for security professionals to exchange insights and best practices related to ASM and other cybersecurity domains. By leveraging these platforms and collaborating with peers, security organizations can gain valuable perspectives on budgetary considerations and strategic approaches to ASM implementation.

 

Securing resources for Attack Surface Management is a multifaceted endeavor that requires a strategic approach, collaboration, and alignment with organizational objectives. By addressing skill gaps, leveraging budget allocation strategies, and drawing insights from industry best practices, security organizations can effectively secure the necessary resources to implement ASM initiatives. Platforms like CISO Platform serve as invaluable resources for security professionals, offering insights, networking opportunities, and practical guidance for navigating the budgetary landscape and achieving cybersecurity objectives. As organizations continue to prioritize cybersecurity in an increasingly complex threat landscape, securing adequate resources for ASM initiatives will remain a critical priority for safeguarding digital assets and mitigating risks effectively.

 

Speakers:

Chris Ray, a seasoned professional in the cybersecurity field, brings a wealth of experience from small teams to large financial institutions, as well as industries such as healthcare, financials, and tech. He has acquired an extensive amount of experience advising and consulting with security vendors, helping them find product-market fit as well as deliver cyber security services.

Bikash Barai is credited for several innovations in the domain of Network Security and Anti-Spam Technologies and has multiple patents in USPTO. Fortune recognized Bikash among India’s Top 40 Business Leaders under the age of 40 (Fortune 40-under-40).Bikash is also an active speaker and has spoken at various forums like TiE, RSA Conference USA, TEDx etc.

Earlier he founded iViZ an IDG Ventures-backed company that was later acquired by Cigital and now Synopsys. iViZ was the first company in the world to take Ethical Hacking (or Penetration Testing) to
the cloud.

https://twitter.com/bikashbarai1

https://www.linkedin.com/in/bikashbarai/

E-mail me when people leave their comments –

You need to be a member of CISO Platform to add comments!

Join CISO Platform