{"id":1691,"date":"2020-04-30T01:00:00","date_gmt":"2020-04-30T01:00:00","guid":{"rendered":"http:\/\/inswwdev.azurewebsites.net\/au\/insights\/uncategorized\/the-secure-workplace-story-part-2-why-and-how-do-you-implement-a-swp\/"},"modified":"2024-11-05T06:56:04","modified_gmt":"2024-11-05T06:56:04","slug":"the-secure-workplace-story-part-2-why-and-how-do-you-implement-a-swp","status":"publish","type":"post","link":"https:\/\/www.insentragroup.com\/au\/insights\/geek-speak\/secure-workplace\/the-secure-workplace-story-part-2-why-and-how-do-you-implement-a-swp\/","title":{"rendered":"The Secure Workplace Story Part 2: Why and How Do You Implement a SWP?"},"content":{"rendered":"<p>The secure workplace\u00a0has\u00a0evolved rapidly over the past\u00a024 months\u00a0with more and more integration and continuous\u00a0development\u00a0to stay ahead\u00a0of the bad guys. Taking advantage of new\u00a0capabilities\u00a0can\u00a0help businesses\u00a0to\u00a0get into a proactive\u00a0mindset as it relates to cybersecurity\u00a0and quite\u00a0quickly reduces\u00a0the\u00a0potential\u00a0for\u00a0an\u00a0attack or breach.\u00a0As we have discussed so far, having visibility into what is going on across all facets of the business\u00a0provides\u00a0current and historical behavioural information\u00a0which can be reasoned upon to continuously develop your plan.<\/p>\n<p>Conversely, some businesses\u00a0go from day to day wondering \u201cif\u201d they will suffer a breach or data loss incident\u00a0and are prepared to accept the risk of doing nothing\u00a0when in the real world, it is\u00a0not\u00a0a case of\u00a0\u201cif\u201d\u00a0but\u00a0\u201cwhen\u201d a breach\u00a0will\u00a0occur.\u00a0A significant number of organisations\u00a0ultimately pay the price\u00a0of doing nothing further\u00a0down the line when an event occurs or audit results in personal fines and\/or reputational damage.\u00a0Being proactive and taking measurable steps towards\u00a0adoption of the secure workplace\u00a0can\u00a0reduce risk over time, increase your security maturity,\u00a0and\u00a0ultimately put you in control\u00a0whilst\u00a0dramatically reducing\u00a0the\u00a0attack surface.<\/p>\n<p>Businesses\u00a0may have\u00a0a\u00a0mandate to become ISO 27001 compliant, or if in finance PCI-DSS, or\u00a0HIPAA\u00a0for health.\u00a0To achieve compliance,\u00a0and\u00a0depending on which country you reside in,\u00a0a baseline\u00a0must\u00a0be defined using\u00a0something like the Australian Signals Directorate (ASD) essential\u00a0eight,\u00a0or\u00a0in the USA,\u00a0The Information\u00a0Security\u00a0Forum (ISF)\u00a0Standard for Good Practice, or\u00a0in the UK, the 10 steps to\u00a0cybersecurity.\u00a0Which will help in defining the\u00a0strengths and weaknesses within\u00a0the\u00a0current security strategy, and then from there, mapping\u00a0required security controls to policy\u00a0to continuously reduce risk over time and improve\u00a0the\u00a0overall security posture.<\/p>\n<p>Being proactively prepared for information governance\u00a0or compliance\u00a0audit\u00a0can help avoid significant costs associated with\u00a0the\u00a0discovery\u00a0and\u00a0collation\u00a0of\u00a0information\u00a0together with\u00a0creating manual reports.\u00a0\u00a0Having the ability to respond to an event or an audit request\u00a0promptly\u00a0can be the difference between success and failure.<\/p>\n<h3 style=\"padding-bottom: 15px; margin-bottom: 30px; margin-top: 40px; border-bottom: 1px solid #f16020;\">HOW<\/h3>\n<p>Insentra\u00a0has developed\u00a0a kick start offering called\u00a0Architect as a Service (MapOne),\u00a0which has\u00a0a roadmap\u00a0deliverable and is\u00a0outcome-focused,\u00a0including\u00a0the\u00a0time to\u00a0value,\u00a0this helps in\u00a0discovering the real cost of inaction.<\/p>\n<p>MapOne is short and sharp fixed price engagement with senior stakeholders and\/or executive sponsors in a business, delivered through a series of workshops, meetings, interviews, and interactive sessions. The sessions intend to discuss the top questions, risks, concerns, and to remove as much Fear Uncertainty and Doubt (FUD) around the secure workplace as possible. The deliverables from the MapOne sessions are a prioritised, a strategic roadmap showing tasks able to be completed rapidly for the highest possible return, through to subscription consumption activities that will drive the fastest possible time to value.<\/p>\n<p>The\u00a0roadmap intends to allow executive sponsors to work collaboratively with their partners and vendors to better understand and manage\u00a0cybersecurity risk,\u00a0cloud subscription entitlements\u00a0which\u00a0could\u00a0drive\u00a0the\u00a0successful\u00a0transformation to the secure workplace.<\/p>\n<h3 style=\"padding-bottom: 15px; margin-bottom: 30px; margin-top: 40px; border-bottom: 1px solid #f16020;\">WHEN<\/h3>\n<p>Most organisations are some way\u00a0down the road to achieving a secure workplace, however,\u00a0it makes absolute sense to have an independent review of\u00a0the\u00a0current strategy to ensure\u00a0there is a\u00a0pathway to\u00a0success or\u00a0validate\u00a0critical thinking.<\/p>\n<p>Alternatively,\u00a0when\u00a0looking at\u00a0all\u00a0the components mentioned\u00a0here, sometimes it can all be a little\u00a0overwhelming\u00a0This is the perfect time to step back and\u00a0look\u00a0at how\u00a0the\u00a0business needs to evolve and take advantage of\u00a0some or\u00a0all\u00a0the components in the secure workplace.<\/p>\n<p>If\u00a0we\u00a0don\u2019t start, we\u00a0can never hope to finish.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The secure workplace\u00a0has\u00a0evolved rapidly over the past\u00a024 months\u00a0with more and more integration and continuous\u00a0development\u00a0to stay ahead\u00a0of the bad guys. Taking advantage of new\u00a0capabilities\u00a0can\u00a0help businesses\u00a0to\u00a0get into a proactive\u00a0mindset as it relates to cybersecurity\u00a0and quite\u00a0quickly reduces\u00a0the\u00a0potential\u00a0for\u00a0an\u00a0attack or breach.\u00a0As we have discussed so far, having visibility into what is going on across all facets of the business\u00a0provides\u00a0current and&hellip; <a class=\"more-link\" href=\"https:\/\/www.insentragroup.com\/au\/insights\/geek-speak\/secure-workplace\/the-secure-workplace-story-part-2-why-and-how-do-you-implement-a-swp\/\">Continue reading <span class=\"screen-reader-text\">The Secure Workplace Story Part 2: Why and How Do You Implement a SWP?<\/span><\/a><\/p>\n","protected":false},"author":55,"featured_media":1692,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[20],"tags":[],"class_list":["post-1691","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-secure-workplace","entry"],"_links":{"self":[{"href":"https:\/\/www.insentragroup.com\/au\/wp-json\/wp\/v2\/posts\/1691","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.insentragroup.com\/au\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.insentragroup.com\/au\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.insentragroup.com\/au\/wp-json\/wp\/v2\/users\/55"}],"replies":[{"embeddable":true,"href":"https:\/\/www.insentragroup.com\/au\/wp-json\/wp\/v2\/comments?post=1691"}],"version-history":[{"count":1,"href":"https:\/\/www.insentragroup.com\/au\/wp-json\/wp\/v2\/posts\/1691\/revisions"}],"predecessor-version":[{"id":16300,"href":"https:\/\/www.insentragroup.com\/au\/wp-json\/wp\/v2\/posts\/1691\/revisions\/16300"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.insentragroup.com\/au\/wp-json\/wp\/v2\/media\/1692"}],"wp:attachment":[{"href":"https:\/\/www.insentragroup.com\/au\/wp-json\/wp\/v2\/media?parent=1691"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.insentragroup.com\/au\/wp-json\/wp\/v2\/categories?post=1691"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.insentragroup.com\/au\/wp-json\/wp\/v2\/tags?post=1691"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}