Cyber Security Scorecard Gives Business Real-time Understanding of Security Risks
As executives struggle to understand their organisations’ exposure to cyber-risk, Huntsman Security has launched The Security Scorecard – the first tool of its kind to give instant visibility of an organisation’s Cyber Security Posture. The Scorecard is a standalone product that gives non IT people such as auditors, risk managers and senior executives a clear understanding of an entity’s cyber security exposure.
The Scorecard technology automatically measures eight key security controls whose effectiveness determines just how secure an organisation is from a cyber-attack. Based on findings by the Australian Signals Directorate (ASD), these best practice controls can reduce the likelihood of a cyber-attack by more than 85 percent. Measuring against these, the Scorecard gives an immediate and automated understanding of risk and exposure: allowing the business to tune the effectiveness of the controls in line with its risk appetite.
Utilising the “Essential Eight” controls, the solution consists of eight processes that, together: prevent initial attacks, and limit the extent of incidents, recover data and restore systems availability.
The processes are split into a ’Top Four’ – application whitelisting, patching applications, patching operating systems and restricting admin privileges – that are critical to achieving security: plus a further four – disabling untrusted Microsoft office macros, user application hardening, multi-factor authentication and daily backup of important data. The ‘Top Four’ controls are mandatory for Australian federal government departments, and the eight controls collectively complement the best practices put in place by other Governments, such as the UK or USA.
The Security Scorecard continuously measures the performance of the controls, reporting clear metrics and red, amber, green colour-coded status that is easily understood by any audience.
Armed with this information, stakeholders have an immediate overview of their exposure and security teams know whether to focus on these essential processes or examine other ways to reduce risk further.
A standalone product, the Scorecard has a small proactive footprint that sits alongside other security technologies. Security teams can continue with their primary operations without any distraction and without significant investment in new security systems. Because of this, the Scorecard is easy to implement for any organisation.
The Scorecard can be used by organisations in a supply chain to give visibility of their security posture to partners up and down the chain.
Industry: Cyber Security News
- Outside IR 35 CONTRACT SC CLEARED Cyber Security Operations Analyst SPLUNK ES- UK REMOTE- £500 a day.
6 month contract Outside IR35 Operational Cyber Security Analyst. Hands on Splunk Security Enterprise and Security clearance is required As is someone that holds SC clearance. SOC and Vulnerability management experience. Vulnerability Analysis / Management - Tenable
- SailPoint Consultant
- Upto €80,000
SailPoint Consultant is need for this rapidly expanding global business, The business is currently in the middle of a SailPoint Deployment, they require an experienced Consultant who is able to help them on this Journey You will be responsible for helping to configure and deploy SailPoint as well as on board applications onto the platform You will also work with the business to understand workflow and process to help align the way the business works to ensure that the business gets the most from the deployment We are looking for an experienced SailPoint consultant who has experience with both Deployment and BAU work and is interested in joining a business which is at the start of an interesting IAM Journey
- SOC Manager Security Operations. SIEM, Threat / Vulnerability, IR, SOC Service- Exclusive
- United Kingdom
SOC Manager- SIEM, Threat / Vulnerability, Incident response. Exclusive Project. Management and on growth growth of Security Operations Centre capability. Managing and maturing the team, technical services line and fronting client engagements where needed. An in-depth technical background is essential, experience across SOC SIEM/ Threat Hunting (IR) tools, processes, techniques, operational is a MUST. The role will include, but not limited to; evolving the technical process, building operational capability, managing and hiring team, involved at a high level overviewing policy/playbooks, fine turning of the go-to-market collateral etc.
- Contact 12 month- Security Operations- Tanium Engineer / Analyst.
- United Kingdom
- Dependent on experience
Security Operations engineer / Analyst with Tanium for a 12 month contract. Experience configuring using, managing, supporting troubleshooting Tanium's suite of end point solutions is essential. The opportunity is due to a client expanding its international capability to a follow the sun model. To be involved in spinning up a European capability. Based in the UK. English essential and ideally being fluent in French.