Jony Fischbein, Check Point Software’s Chief Information Security Officer, has over 25 years of industry experience, and leads the company in maintaining a strong security posture, securing employees, securing partners, and securing customers.
In this interview, Jony Fischbein discusses how to fight cyber crime within an ever-evolving threat landscape. Get strategic threat prevention architecture recommendations that can inform your conversations, impact your strategy, and lead to stronger security outcomes. Jony Fischbein is an esteemed professional in the field, and shares impactful, high-payoff digital transformation insights.
Can you tell us a bit about significant challenges facing security practitioners today?
One of the biggest challenges facing security practitioners is Gen V attacks – the combination of a wide breadth of threats, large scale attacks, a broader attack surface and an increased level of sophistication. True comprehensive protection requires an architected approach that prevents attacks before they happen.
How can organizations foresee potential threats?
Threat intelligence is an essential tool. One of the most effective and preemptive security measures that you can take is to invest in threat intelligence. The threat intelligence must cover all attack surfaces, including cloud, mobile, network, endpoint and IoT.
Threat intelligence isn’t just data – its practice, and it should fuel the move toward a prevention-first approach, blocking attacks before they penetrate, gaining the best catch rate of known and unknown threats, and achieving a near zero false positive rate, interrupting users as little as possible.
What’s the best way to secure absolutely everything that an organization owns?
To achieve effective coverage, organizations should seek a single solution that can cover all attack surfaces and vectors. In a multi-hybrid environment, where the perimeter is now everywhere, security should be able to protect all.
The comprehensive visibility across your entire network estate, gained through consolidation, is now essential when it comes to guarding against increasingly sophisticated attacks.
Tell us about a handful of additional best practices for security practitioners:
- Patching. Organizations should strive to make sure that up-to-date security patches are maintained across all systems and software.
- Segmentation. Networks should be segmented, applying strong firewall and IPS safeguards between the network segments in order to prevent infections from propagating across the entire network. Also implement segregation of duties policy, mainly for privileged users (Domain admins).
- Employee awareness. User education has always been a key element in avoiding cyber breaches. Take the time to educate your users and ensure that, if they see something unusual, they report it to your security teams immediately.
- Review: Security products’ policies must be carefully reviewed, and incident logs and alerts should be continuously monitored to ensure security effectiveness.
- Audit: Routine audits and penetration testing should be conducted across all systems.
Get more strategic threat prevention tips from Jony Fischbein in the Cyber Attack Trends: 2022 Security Report, which presents a detailed overview of the cyber threat landscape. These findings are based on data drawn from Check Point Software’s ThreatCloud intelligence platform between January and December of 2021, and highlight the core tactics that cyber criminals use to attack organizations. In-depth analyses, best practices, and actionable take-aways complement the research findings.
Get the report here.