Data-Centric Cyber Risk Management
Security leaders have long agreed that implementing a well thought-through defense-in-depth strategy can significantly reduce an organization’s risk of data loss and prevent successful cyber-attacks. A multi-layer approach to security acknowledges that a cyber-attack involves multiple stages, from getting initial access to a company’s environment, to lateral movement, privilege escalation, command and control, to finally accessing and exfiltrating data. This means that even after getting initial access to an enterprise network, an attacker needs to go through multiple stages to get to their end goal, which in most cases is data exfiltration. By placing multiple layers of defense across their internal networks and endpoints, organizations can stop attackers – if not at the perimeter, then at one of the later stages of attack.