Cybersecurity

This collaboration is crucial for successful vulnerability management

June 7, 2024 - 4 minutes reading time
Article by Serena De Pater

For us security experts and enthusiasts, the digitized world we live in today is full of surprises, challenges, and unexpected adventures. The systems we created years ago are suddenly all vulnerable to all sorts of attacks. In the news, we read stories about data breaches, malware infections, secret backdoors in long existing code databases, and so on. The news websites we follow to keep ourselves informed about spam and clickbait, are starting to look like what they are warning us about in the first place. Companies nowadays start asking their cybersecurity employees: Are we vulnerable to these attacks too? Should we be afraid to become yet another news headline in next weeks’ newspapers? Will our customers claim that we betrayed their trust, if we get hacked? These questions will lead to the very unique idea of implementing and maintaining proper vulnerability management in the organization.

The way to build and maintain proper vulnerability management all starts with getting rid of the blind spots. Before you start your journey, you need to have exclusive insights about the companies’ used or owned software, certificates, servers and cloud solutions. Armed and prepared with a solid database filled with your assets you start scanning for vulnerabilities. Scanning requires additional software, additional software requires personnel that knows how to use it. This is where implementing vulnerability management gets tricky.

A clash of perspectives

At this point, the collaboration between the security engineers and the system administrators becomes crucial to succeeding the implementation of vulnerability management. So far, the system administrators have been willing to help the security team by providing the most accurate inventory of their used and owned assets in the company. The current systems and procedures are used to create a good overview of the attack surface of the company.

But after the inventory phase, comes the scanning phase. Imagine being a dedicated system administrator who has built and maintained a company's IT infrastructure for years. Now, enter the security experts tasked with implementing vulnerability management. Their initial collaboration with you as administrator seems promising, with you and your team providing information about the environment. However, then the security engineers start to onboard new tools and software! Before you know it, the security engineers have scanned your environment, and start sending you detailed reports outlining the most scary vulnerabilities. The reports highlight how you and your team have maybe overlooked some security patches over the years. How would you feel?

Bridging the gap

For a streamlined and efficient implementation of vulnerability management in your organization, communication and collaboration between the security team and the rest of the organization is key. However, this topic is quite often overlooked, whereas the focus lies more on the fast onboarding of vulnerability scanners and getting rid of the blindspots. But not all is lost, here are a few ideas in keep in the back of your head on how to bridge the gap between security experts and system administrators to ensure optimal and comfortable collaboration and communication:

  • Give people time. Acknowledge that system administrators among others need time to absorb the vulnerability report and develop a remediation plan. Rushing the process can exacerbate resistance.
  • Security Awareness Training: Educated employees are more likely to embrace security practices in the future. The first vulnerability management reports are less scary when the system administrators have the knowledge and experience on how to read and work with them.
  • Shared Responsibility: Keeping your company secure is ultimately a shared responsibility; in the end we all want the same thing. Only by working together, security experts and system administrators can achieve a more secure organization.

It has been clear that working together is what made humans a successful species in the animal kingdom. Even though we live in a rapidly changing, sometimes scary, digitalized world, this has not changed. The best way to take the security level of your company to a higher level is by working together with everyone on board. A collaborative approach, built on mutual respect and understanding, is the foundation for a successful vulnerability management program.

Related articles
6 security tips for safe remote working
Cybersecurity
Remote working offers many advantages, but it is not without security risks. With these 6 simple security ...
Beware of Quishing: are QR codes still safe to use?
Cybersecurity
Hackers are increasingly using QR codes to trick you. 'Quishing', it’s called. Find out how this method o ...
How do you spot vulnerable IT systems?
Cybersecurity
By regularly examining your IT systems for vulnerabilities, you can prevent weaknesses from turning into ...