Daily NewsIdentity & AccessThreat Detection & Defense

Cisco – The Five Pillars of Cybersecurity in a Hybrid World

With the rise of hybrid working models, cybersecurity has become more complex and challenging. Cybercriminals are exploiting the security gaps created by the sudden shift to remote work. From phishing scams and malware to social engineering and insider threats, organisations must be prepared to defend themselves against a wide range of cyber risks.

Leading technology company, Cisco, has introduced the five pillars of cybersecurity in a hybrid world, revealed by Tay Bee Kheng, ASEAN President of Cisco, and Koo Juan Huat, ASEAN Cybersecurity Lead for Cisco, during a recent media briefing.

According to Tay, the shift to a hybrid working environment has certainly presented companies with new challenges in cybersecurity. “As companies adopt new ways of working, it’s important to ensure that their cybersecurity strategies are updated to reflect these changes,” said Tay. “The five pillars of cybersecurity provide a framework that companies can use to strengthen their defences against cyber threats.”

The five pillars of cybersecurity in a hybrid world, as outlined by ASEAN Cisco, are identity verification, devices, networks, applications, and data. Koo explained that the entire infrastructure needs to work together as a platform for effective cybersecurity. “Visibility, automation, orchestration, and governance are essential to ensure that the infrastructure is secure,” said Koo.

Cisco has also determined, in order of significance across all five pillars, the capabilities that businesses should have in order to establish an optimal cybersecurity posture. The organisations were then categorised as either “beginner,” “formative,” “progressive,” or “mature” based on their level of development. Just 27% of the 6,700 cybersecurity leaders polled are at the mature level, which indicates they are well along in the deployment process and ready to take on security challenges.

The impact of industry on the cybersecurity readiness measure was also discussed during the meeting. “Different industries have different cybersecurity needs,” said Tay. “It’s important for companies to understand their specific risks and develop cybersecurity strategies that are tailored to their industry.”

Koo highlighted the importance of identity verification in the zero-trust model of cybersecurity. “80% of web application breaches happen due to stolen credentials,” he said. “Identity verification is critical to ensure that only authorised users can access sensitive data.”

In this new era of work, cybersecurity has become critical to the survival of businesses. Cybercriminals are becoming more sophisticated, and the risks associated with hybrid work environments are increasing. However, by leveraging the framework of the five pillars of cybersecurity, companies can develop a comprehensive security strategy that protects against cyber threats and safeguards their business operations.

With the right capabilities and strategies in place, businesses can achieve an ideal cybersecurity posture and defend themselves against the constantly evolving landscape of cyber risks.

Khairul Haqeem

Khairul is proficient in writing tech-related pieces for the Asia-Pacific region. Some of his most notable work is focused on emerging technologies, data storage, and cybersecurity. His prior experience includes stints as a writer for two iSaham sites: Crepetoast.com and Solanakit.com. Before beginning his writing career, he worked in the field of education. Aside from studying engineering at the International Islamic University Malaysia, he has also worked as a subtitler for Iyuno Global, serving clients like Netflix. His specialities are: • Disruptive Tech. • Data Storage. • Cybersecurity. • Decentralised Tech. • Blockchains.

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *