Evolving Cyber Security Strategy and Practices

In last decade technology has played a vital role in organizations endeavor to innovate, improve and transform. Technology has become ubiquitous at most of the organization's functions from strategic decision making to normal operations, thus facilitated in achieving the competitive advantage.

However high reliance on technology has also brought forth the risk of major disruption to business activities, with the potential to severely impact the organization's ability to serve to the customer, possible revenue loss as well as the brand. In addition to this, its misuse can even put person’s safety at stake.

The rising number of Cyber-attacks and the nature of attacks clearly suggest that the risk is real. The Cyber Security community has continuously evolved to protect the organization's interest and take the attackers head on.

The following are evolution is observed in the Cyber Security practices in last decade or so.


  1. Enterprise Centric Protection Focus on Collaborative Sharing of Information    
  2. Risk-based approach focused on Crown Jewels Protection to  No trust model to minimize the attack surface
  3. Compliance-focused Strategy to Data Protection Centric Strategy

Architecture Design and Configuration

  1. Standards Driven Controls Design to Controls Design driven by Attack lifecycle and Attackers Tools Techniques and practices
  2. Prevent, Detect, Respond  to  Prevent, Deceive, Detect+ (i.e. Predictive Analytics), Automated Response
  3. Signature or Rule-based Alerts to Analytics Driven Alerts or indicators
  4. Prevention Centric Defense In Depth approach to Detection oriented Integrated Network, Endpoint and Applications approach
  5. Role-based least privilege access to context driven access

Security Operations

  1. Point in time Status to Continuous Monitoring
  2. Incident Response based on Alerts to proactive Threat Hunting
  3. Port and protocol Analysis to Application and Content level visibility
  4. In-House Competence, on-premise tools to Security as a Service
  5. Tools based Reports to reporting based on Security metrics

Authored By - Himanshu Porwal
TCS Cyber Security Practice

Rate this article: 
Average: 3.8 (12 votes)
Article category: