Emma O'ConnorMissed Our DTX London Session? Here’s What You Need to Know About Cyber Resilience and Cyber Hygiene

Maintaining cyber resilience and ensuring 100% cyber hygiene in an ever-evolving threat landscape.

At DTX London, Jon and Sunil, Information Security Officer at River Island, dove deep into one of the most pressing issues in cybersecurity today: maintaining cyber resilience and ensuring 100% cyber hygiene in an ever-evolving threat landscape.

Evolution of Cybersecurity: From RSA Tokens to AI-Powered EDR

The session kicked off with a look at how far cybersecurity has come over the last decade. Jon reminisced about the days of RSA tokens, while Sunil discussed the most advanced cybersecurity innovations he's encountered, from Quantum-Resistant Cryptography to behavioural biometrics. Yet, despite these advancements, organisations are still facing increased attacks. The paradox? Cybersecurity technology has evolved, but gaps in coverage leave businesses vulnerable.

Too Many Tools, Too Little Coverage

Jon and Sunil discussed a common issue many companies face: tool overload. While it seems like every attack vector has a tool, the real challenge is ensuring those tools are installed, functioning, and covering all devices. Even with the latest AI-powered solutions, misconfigurations and improper deployments can leave critical gaps.

The Importance of Cyber Hygiene

Sunil highlighted the foundational elements of any cybersecurity strategy: EDR, patching, authentication management, and encryption. But achieving 100% coverage in these areas is no small feat. Jon shared insights from ThreatAware’s deployments, revealing that only 70% of devices in a typical environment are fully protected, leaving a significant 30% gap in controls.

image

Measuring What Matters

The session emphasised that the key to improving cyber hygiene is accurate measurement. Sunil explained the challenges of relying on individual security consoles to measure deployment, functionality, and communication. Real-time, accurate data is essential for aligning all security controls into a single source of truth—something ThreatAware's technology is designed to deliver.

Real-Time Accuracy: The Path Forward

In closing, Jon summarised that the ultimate goal of any cybersecurity strategy is real-time accuracy. By aligning all security data into one comprehensive view, organisations can close gaps, measure progress, and ensure their cyber hygiene is robust and up to date.

Get in touch for more insights on building a cyber-resilient future.

Ready to protect all your assets?

Leveraging its proprietary timeline-matching technology, ThreatAware ensures you have a complete, accurate, and non-duplicated asset inventory in real-time. No more guesswork – spot and fix deficiencies across your entire IT estate instantly.

Onboard in less than 30 minutes.

Request a Trial
App screenshot