Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and Copilots
    • Innovation & Leadership
    • Cybersecurity
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
  • Summit NA
  • Dynamics Communities
  • Ask Copilot
Twitter Instagram
  • Summit NA
  • Dynamics Communities
  • AI Copilot Summit NA
  • Ask Cloud Wars
Twitter LinkedIn
Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and CopilotsWelcome to the Acceleration Economy AI Index, a weekly segment where we cover the most important recent news in AI innovation, funding, and solutions in under 10 minutes. Our goal is to get you up to speed – the same speed AI innovation is taking place nowadays – and prepare you for that upcoming customer call, board meeting, or conversation with your colleague.
    • Innovation & Leadership
    • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
    • Login / Register
Cloud Wars
    • Login / Register
Home » 5 Valuable Areas of Cybersecurity That Are Often Overlooked
Cybersecurity

5 Valuable Areas of Cybersecurity That Are Often Overlooked

Robert WoodBy Robert WoodJune 14, 2022Updated:July 27, 20224 Mins Read
Facebook Twitter LinkedIn Email
Cybersecurity Strategies
Share
Facebook Twitter LinkedIn Email
Acceleration Economy Cybersecurity

Cybersecurity is a complex domain that continues to evolve and expand. It’s important for security teams to be keeping up with new technologies and developing trends around work, such as agile software development and value stream alignments. In my experience, working across a number of organizations directly and in a consultative capacity, there are consistent things that are often overlooked. These things may not be sexy or shiny objects, but they are foundational for many security programs to thrive and be successful.

1. Asset Management

Even though it’s a core activity in most control frameworks, getting asset management down is not typically a first-class priority. Assets also come in many shapes and sizes, depending on how detailed one wants to get, including:

  • IP addresses
  • Devices (servers, workstations, mobile, etc.)
  • Code repositories
  • Container images
  • Cloud resources (accounts, specific deployed resources, etc.)

Getting asset management right, in a way where it can be maintained and scaled, will enable other critical security functions, such as vulnerability management. Knowing whom to engage, when to engage them, and how to engage them when something happens is a huge time saver.

2. Data Organization and Access

I’ve noticed a tendency in cybersecurity teams to jump right into emerging technology trends, such as machine learning, data analytics, or even SOAR automation. To make the most out of any data-driven products, your data needs to be in a good place. To me, that means breaking down the silos that often exist in cybersecurity and organizing data. It also entails making sure that the right people and tools can get to it. Analytics or other data-related efforts will be short-changed or potentially be downright misleading if given incomplete data.

3. Decision-Making Processes

Security teams make a lot of decisions. Oftentimes, the decision-making process is highly dependent on the personalities and biases of the individuals making them at a given time.

Investing time in creating repeatable frameworks to make big and small decisions can help replace that subjectivity with more of an objective position. Teams will likely find that, as they go through this process, there’s a lot of structure needed to facilitate more repeatable decision-making.

A prime example of this is deciding whether or not a given risk is acceptable or not. How do you measure that? What do you compare it to? Who sets the threshold of acceptability?

4. Opportunities to Reduce Cognitive Load

Security training often encourages those who take it to learn a wide range of hygiene-related skills. This can include how to detect phishing emails, create and manage secure passwords, what to do when you’re on public Wi-Fi, and more.

I’ve oftentimes found security teams quick to lean on their training as a means of protecting against the things referred to within training. However, there is a missing link. Security teams are actively seeking opportunities to make something easier for end users, so much that it no longer needs to be included in the training. Everyone has another job to do that isn’t security. The more we, as a discipline, can do to reduce the cognitive load on others and focus on the things that truly matter, the better.

5. Accessibility and Approachability of the Team

“Culture eats strategy for breakfast.” You’ve probably heard that quote from management consultant and author, Peter Drucker.

Security teams need to work through other teams to mitigate risk. Patching, writing secure code, doing background checks, onboarding and off-boarding, managing security requirements in contracts, and so much more are things typically driven by non-security teams.

I firmly believe that security leaders need to be constantly thinking about the culture and accessibility of their teams. People need to be able and willing to engage with the security team. At the same time, security teams need to be actively engaging other teams. Creating and maintaining engaging conversations is an important part of a security culture.

Concluding Thoughts

Security leaders have a very diverse set of factors to consider in their strategies. The list above is by no means exhaustive; it doesn’t even scratch the surface. These things are, however, oftentimes neglected in the planning and execution of a security program. When they are neglected, they can be a drain on all the other amazing things security teams may be working on — like running a race with hurdles in your path and an anchor tied to your waist.


Want more cybersecurity insights? Visit the Cybersecurity channel:

Acceleration Economy Cybersecurity

data featured
Share. Facebook Twitter LinkedIn Email
Robert Wood

Robert Wood is an Acceleration Economy Analyst focusing on Cybersecurity. He has led the development of multiple cybersecurity programs from the ground up at startups across the healthcare, cyber security, and digital marketing industries. Between experience with startups and application security consulting he has both leadership and hands on experience across technical domains such as the cloud, containers, DevSecOps, quantitative risk assessments, and more. Robert has a deep interest in the soft skills side of cybersecurity leadership, workforce development, communication and budget and strategy alignment. He is currently a Federal Civilian for an Executive Branch Agency and his views are his own, not representing that of the U.S. Government or any agency.

Related Posts

AI Agents, Data Quality, and the Next Era of Software | Tinder on Customers

July 3, 2025

AI Agent & Copilot Podcast: AIS’ Brent Wodicka on Operationalizing AI, the Metrics That Matter

July 3, 2025

Ajay Patel Talks AI Strategy and Enterprise Adoption Trends | Cloud Wars Live

July 2, 2025

Slack API Terms Update Restricts Data Exports and LLM Usage

July 2, 2025
Add A Comment

Comments are closed.

Recent Posts
  • AI Agents, Data Quality, and the Next Era of Software | Tinder on Customers
  • AI Agent & Copilot Podcast: AIS’ Brent Wodicka on Operationalizing AI, the Metrics That Matter
  • Ajay Patel Talks AI Strategy and Enterprise Adoption Trends | Cloud Wars Live
  • Slack API Terms Update Restricts Data Exports and LLM Usage
  • Google Cloud Still World’s Hottest Cloud and AI Vendor; Oracle #2, SAP #3

  • Ask Cloud Wars AI Agent
  • Tech Guidebooks
  • Industry Reports
  • Newsletters

Join Today

Most Popular Guidebooks

Accelerating GenAI Impact: From POC to Production Success

November 1, 2024

ExFlow from SignUp Software: Streamlining Dynamics 365 Finance & Operations and Business Central with AP Automation

September 10, 2024

Delivering on the Promise of Multicloud | How to Realize Multicloud’s Full Potential While Addressing Challenges

July 19, 2024

Zero Trust Network Access | A CISO Guidebook

February 1, 2024

Advertisement
Cloud Wars
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Marketing Services
  • Do not sell my information
© 2025 Cloud Wars.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.