IT security Q&A: Bomgar’s Stuart Facey

A padlock laid on top of a circuit board.

How are companies thinking about their security strategies differently today? Is prevention still more popular than mitigation?

The idea of “protect and prevent” is still very much alive and the testament to that is that technologies to handle these use cases are continuing to see usage and uptake.

However, we have seen an evolution in the thinking from individuals and teams responsible for an organisation’s security. As they have seen increasingly sophisticated threats from both the outside and inside, they have realised that – for deep security coverage – it is best to also have a strategy to detect issues as quickly as possible and mitigate the impact to their business and their customers.

Is there still a market for traditional IT security solutions, or will investment shift over to new approaches?

Absolutely. Multiple and even overlapping technologies to fortify an organisation’s security posture are critical to being able to detect and mitigate risks. Let’s consider antivirus; it is still an important foundational element in the same way that educating an organisation’s employees on how to avoid phishing attacks is. Most security teams still subscribe to the defense in-depth school of thought. So while some might argue that modern cyber breaching techniques can skirt antivirus technologies, it doesn’t make sense to rule them out.

It’s the same with password management and identity – there are rules and tools that can be used to improve security. At the same time, not all access and not all accounts are created equal. Recognising that privileged accounts should be protected is a new and growing market for IT security; privileged access is getting spread more widely across organisations and into their outsourcing partners, yet control over this access is often not considered until after a breach.

Do you see CIOs stuck with how to keep their existing IT running, or do they look at innovation and new investments?

Dealing with legacy IT investments is a big issue for all companies. Keeping the security lights on was potentially the biggest area of investment in the past, but that was before we entered what seems like a cycle of major security breaches.

This has highlighted a danger that certainly existed before the news coverage. However, the coverage has helped the CIO make a case to the rest of the organisation that investing in more innovative security technologies can be just as important as keeping the lights on. It’s difficult when things are abstract, but the series of breaches that have affected both private companies and public sector organisations has made it easier for CIOs and CISOs to build their business cases.

But do all the stories around security breaches and unauthorised access actually cause more harm in the long run?

Headlines around huge breaches and compliance scares do certainly cast a focus on the IT security industry. The challenge we have seen in many of the post breach details is that security technologies were either not fully implemented or were even potentially ignored. In many cases, the attacks were not technologically difficult; they succeeded due to miscommunication, failures in process or IT assets not being protected in the right ways in the first place.

Can IT be totally secure?

If a system is connected to the internet, it is likely to be a risk. The trick is to follow the fundamentals of good patching and policies, good password management and ensuring the people involved take security seriously to mitigate the risks.

In order for IT security providers to be as effective as possible, it takes a collaboration between those who are interested in positively affecting change, the software and hardware vendors who have vulnerabilities that need addressing, and the IT security providers who are working to protect the systems.

What do you think the next big problem for IT security will be?

When discussing security best practices with security professionals, we often hear that shrinking the attack surface is the most important thing an IT security team can do. We expect this to become more challenging as the threat landscape continues to evolve including the migration of legacy systems to the cloud and Infrastructure as a Service (IaaS), the expanded use of consumer technologies in the enterprise, and the rapid explosion of systems that fall into the category of Internet of Things (IoT).

The European Union is working on new Data Protection rules to unify approaches that companies have to take around protecting information. Do you see this as a big opportunity for the future?

Data Sovereignty regulations have a significant influence over customer behaviour. The potential exists for a nation state to obtain information about another nation’s citizens and there are concerns about how data is secured and governed when it is not within your direct control. The solution in most cases is to ensure that the technology deployments and good security practices align with data sovereignty regulations in the first place.

What do you think are the biggest challenges facing IT Security teams today?

The biggest challenges relate to dealing with the cultural and process changes typically involved with adopting new security solutions, and trying to balance that with productivity and user satisfaction.

The biggest opportunity here is to help ensure that an authorised person has access to the resources they need but only when needed. Many of the recent cyber-breaches have been attributed to criminals obtaining access to critical systems using authorised means, for example stolen credentials. IT security providers who can always ensure that only the authorised user is the one accessing a sensitive resource or system in a way that doesn’t impact productivity will likely see the most interest from security professionals.

Stuart Facey is VP EMEA for Bomgar

ITPro

ITPro is a global business technology website providing the latest news, analysis, and business insight for IT decision-makers. Whether it's cyber security, cloud computing, IT infrastructure, or business strategy, we aim to equip leaders with the data they need to make informed IT investments.

For regular updates delivered to your inbox and social feeds, be sure to sign up to our daily newsletter and follow on us LinkedIn and Twitter.

Latest in Security
Ransomware concept image showing a warning symbol in red with binary code in background.
Healthcare systems are rife with exploits — and ransomware gangs have noticed
Application security concept image showing a digitized padlock placed upon a digital platform.
ESET looks to ‘empower’ partners with cybersecurity portfolio updates
NHS logo displayed on a smartphone screen in white lettering on a blue background.
NHS supplier hit with £3m fine for security failings that led to attack
OpenAI logo and branding pictured at Mobile World Congress 2024 in Barcelona, Spain.
OpenAI announces five-fold increase in bug bounty reward
Cybersecurity concept image symbolizing third-party data breaches with give padlock symbols and one pictured in red, signifying a security breach.
These five countries recorded the most third-party data breaches last year
Phishing concept image showing an email symbol with fishing hook.
Have I Been Pwned owner Troy Hunt’s mailing list compromised in phishing attack
Latest in Feature
A photo of UNSW's Sunswift 7 car pictured in front of Uluru in Australia's Northern Territory.
How UNSW’s Sunswift Racing and Ericsson achieved cross-country connectivity in Australia’s outback
Matt Clifford speaking at Treasury Connect conference in 2023
Who is Matt Clifford?
Open source vulnerabilities concept image showing HTML code on a computer screen.
Open source risks threaten all business users – it’s clear we must get a better understanding of open source software
An abstract CGI image of a large green cuboid being broken in half with yellow, orange, and red cubes to represent ransomware resilience and data encryption.
Building ransomware resilience to avoid paying out
The words "How effective are AI agents?" set against a dark blue background bearing the silhouettes of flowchart rectangles and diamonds to represent the computation and decisions made by AI agents. The words "AI agents" are yellow, while the others are white. The ITPro Podcast logo is in the bottom right-hand corner.
How effective are AI agents?
An illustration showing a mouth with speech bubbles and question marks and a stylized robot alien representing an AI assistant chirping away with symbols and ticks, to represent user annoyance with AI assistants.
On-device AI assistants are meant to be helpful – why do I find them so annoying?