¡El futuro de Zero Trust y de SASE es ahora! Regístrese ahora

cerrar
cerrar
  • Servicio de seguridad Productos Edge chevron

    Protéjase contra las amenazas avanzadas y en la nube y salvaguarde los datos en todos los vectores.

  • Borderless SD-WAN chevron

    Proporcione con confianza un acceso seguro y de alto rendimiento a cada usuario remoto, dispositivo, sitio y nube.

  • Secure Access Service Edge chevron

    Netskope SASE proporciona una solución SASE nativa en la nube, totalmente convergente y de un único proveedor.

La plataforma del futuro es Netskope

Intelligent Security Service Edge (SSE), Cloud Access Security Broker (CASB), Cloud Firewall, Next Generation Secure Web Gateway (SWG) y Private Access for ZTNA integrados de forma nativa en una única solución para ayudar a todas las empresas en su camino hacia el Servicio de acceso seguro Arquitectura perimetral (SASE).

Todos los productos
Vídeo de Netskope
Next Gen SASE Branch es híbrida: conectada, segura y automatizada

Netskope Next Gen SASE Branch converge Context-Aware SASE Fabric, Zero-Trust Hybrid Security y SkopeAI-Powered Cloud Orchestrator en una oferta de nube unificada, marcando el comienzo de una experiencia de sucursal completamente modernizada para la empresa sin fronteras.

Obtenga más información sobre Next Gen SASE Branch
Personas en la oficina de espacios abiertos.
Diseño de una arquitectura SASE para Dummies

Obtenga un ejemplar gratuito del único manual que necesitará sobre diseño de una arquitectura SASE.

Obtenga el eBook
Adopte una arquitectura de borde de servicio de acceso seguro (SASE)

Netskope NewEdge es la nube privada de seguridad más grande y de mayor rendimiento del mundo y ofrece a los clientes una cobertura de servicio, un rendimiento y una resiliencia incomparables.

Más información sobre NewEdge
NewEdge
Tu red del mañana

Planifique su camino hacia una red más rápida, más segura y más resistente diseñada para las aplicaciones y los usuarios a los que da soporte.

Obtenga el whitepaper
Tu red del mañana
Netskope Cloud Exchange

Cloud Exchange (CE) de Netskope ofrece a sus clientes herramientas de integración eficaces para que saquen partido a su inversión en estrategias de seguridad.

Más información sobre Cloud Exchange
Vídeo de Netskope
Cambie a los servicios de seguridad en la nube líderes del mercado con una latencia mínima y una alta fiabilidad.

Más información sobre NewEdge
Lighted highway through mountainside switchbacks
Habilite de forma segura el uso de aplicaciones de IA generativa con control de acceso a aplicaciones, capacitación de usuarios en tiempo real y la mejor protección de datos de su clase.

Descubra cómo aseguramos el uso generativo de IA
Habilite de forma segura ChatGPT y IA generativa
Soluciones de confianza cero para implementaciones de SSE y SASE

Más información sobre Confianza Cero
Boat driving through open sea
Netskope logra la alta autorización FedRAMP

Elija Netskope GovCloud para acelerar la transformación de su agencia.

Más información sobre Netskope GovCloud
Netskope GovCloud
  • Recursos chevron

    Obtenga más información sobre cómo Netskope puede ayudarle a proteger su viaje hacia la nube.

  • Blog chevron

    Descubra cómo Netskope permite la transformación de la seguridad y las redes a través del servicio de seguridad (SSE).

  • Eventos & Workshops chevron

    Manténgase a la vanguardia de las últimas tendencias de seguridad y conéctese con sus pares.

  • Seguridad definida chevron

    Todo lo que necesitas saber en nuestra enciclopedia de ciberseguridad.

Podcast Security Visionaries

Galletas, no bizcochos
La anfitriona Emily Wearmouthas se sienta con los expertos David Fairman y Zohar Hod para discutir el pasado, el presente y el futuro de las cookies de Internet.

Reproducir el pódcast
Podcast: Galletas, no galletas
Últimos blogs

Cómo Netskope puede habilitar el viaje de Zero Trust y SASE a través de las capacidades del borde del servicio de seguridad (SSE).

Lea el blog
Sunrise and cloudy sky
SASE Week 2023: ¡Su viaje SASE comienza ahora!

Sesiones de repetición de la cuarta SASE Week.

Explorar sesiones
SASE Week 2023
¿Qué es Security Service Edge (SSE)?

Explore el lado de la seguridad de SASE, el futuro de la red y la protección en la nube.

Más información sobre el servicio de seguridad perimetral
Four-way roundabout
Ayudamos a nuestros clientes a estar preparados para cualquier situación

Ver nuestros clientes
Woman smiling with glasses looking out window
El talentoso y experimentado equipo de servicios profesionales de Netskope proporciona un enfoque prescriptivo para su exitosa implementación.

Más información sobre servicios profesionales
Servicios profesionales de Netskope
La comunidad de Netskope puede ayudarlo a usted y a su equipo a obtener más valor de los productos y las prácticas.

Acceder a la Netskope Community
La comunidad de Netskope
Asegure su viaje de transformación digital y aproveche al máximo sus aplicaciones en la nube, web y privadas con la capacitación de Netskope.

Infórmese sobre Capacitaciones y Certificaciones
Group of young professionals working
  • Empresa chevron

    Le ayudamos a mantenerse a la vanguardia de los desafíos de seguridad de la nube, los datos y la red.

  • Por qué Netskope chevron

    La transformación de la nube y el trabajo desde cualquier lugar han cambiado la forma en que debe funcionar la seguridad.

  • Liderazgo chevron

    Nuestro equipo de liderazgo está firmemente comprometido a hacer todo lo necesario para que nuestros clientes tengan éxito.

  • Partners chevron

    Nos asociamos con líderes en seguridad para ayudarlo a asegurar su viaje a la nube.

Apoyar la sostenibilidad a través de la seguridad de los datos

Netskope se enorgullece de participar en Vision 2045: una iniciativa destinada a crear conciencia sobre el papel de la industria privada en la sostenibilidad.

Descubra más
Apoyando la sustentabilidad a través de la seguridad de los datos
La más Alta en Ejecución. Más Avanzada en Visión.

Netskope ha sido reconocido como Líder en el Gartner® Magic Quadrant™ de 2023 en SSE.

Obtenga el informe
Netskope ha sido reconocido como Líder en el Gartner® Magic Quadrant™ de 2023 en SSE.
Pensadores, constructores, soñadores, innovadores. Juntos, ofrecemos soluciones de seguridad en la nube de vanguardia para ayudar a nuestros clientes a proteger sus datos y usuarios.

Conozca a nuestro equipo
Group of hikers scaling a snowy mountain
La estrategia de venta centrada en el partner de Netskope permite a nuestros canales maximizar su expansión y rentabilidad y, al mismo tiempo, transformar la seguridad de su empresa.

Más información sobre los socios de Netskope
Group of diverse young professionals smiling

A Closer Look at Hybrid Work Environments and Cyber Insurance Coverage

Dec 29 2022

Organizations seeking cyber insurance coverage are typically required by their insurer to provide evidence of a panoply of controls around information security, disaster recovery, and related risk and technology requirements and best practices.  

When organizational data resides only on-premises, documenting, evaluating and maintaining these controls have their challenges but are fairly straightforward for the IT, security and business teams responsible for them. They may need to install certain types of locks on data center doors, add cameras for monitoring foot traffic, and implement specific protocols limiting who can access what information. Within highly regulated industries, insurance carriers’ requirements often track closely with regulatory compliance.

However, COVID-19 threw a monkey wrench into cybersecurity insurance and cyber risk management for many organizations. When a substantial proportion of the workforce began working remotely, the appropriate security control structure became less clear-cut. The challenge was exacerbated by the simultaneous increase in corporate use of Software as a Service (SaaS) solutions.

Today, perhaps the only thing more challenging than building an effective control structure is producing evidence that the structure is effectively protecting corporate applications, data and users. 

Now, corporate cybersecurity managers need to focus on understanding how their controls should be structured post COVID, as well as how they can demonstrate those controls to internal and external auditors, as well as their insurers. 

What exactly changed?

The pandemic inspired a migration of workforces around the world. Employees are still doing the same jobs they used to do in the office, but many are doing so from home or other remote locations.

It’s now much harder for traditional perimeter security methods to be effective in this hybrid environment. Even if the security team had the bandwidth to travel to each employee’s residence, installing security cameras and deadbolts on home office doors would not make sense. Nor is it feasible for a third-party auditor to travel to each disparate location to validate that the employee’s security environment is up to snuff.

Similar challenges certainly arose before COVID-19 existed. Some people traveled for their jobs, while others needed to occasionally take work home at night. Security teams required those types of remote workers to connect to the corporate network via a virtual private network (VPN). Auditors might ask how the company was protecting those connections, but when the company needed to prove that its most crucial controls were working, remote employees were typically the exception rather than the rule.

Hybrid work and cloud transformation flipped that equation on its head. The importance and effectiveness of perimeter based controls and related security technologies has unraveled. Having to connect to the corporate network before using a SaaS application or browsing the internet can be tedious and may come with poor user experience.

During the pandemic, some organizations made risky technology decisions for remote access by allowing the bypass of overwhelmed and oversubscribed remote access solutions that increased their attack surfaces. This combined with the increase of personal time spent on devices meant that the attack surface also now extended to often trusted services like Office 365, Google Suite and a host of other tools that employees use in both their professional and personal lives. This left gaps in many security technology strategies where traditional capabilities lack the ability to determine the difference between a corporate instance of Office 365 and a personal instance used at home. As a result of this quickly changing business operating environment and hybrid work landscape, cyber insurance providers’ control requirements have only intensified as the frequency of attacks and resulting losses from security incidents continue to mount. 

What are insurers’ expectations?

When an organization seeks a cyber insurance policy, the insurer is naturally going to want information about the prospective business, operating environment, cybersecurity program, and related controls. This information is typically captured through the primary application process, supplemental coverage application, and the overall assessment methodology required to support underwriting the risk. The often paper-based process of explaining controls, providing an overview of the cybersecurity/risk management program and providing supporting documentation is a common place to start — but more and more the insurer also is expecting to see proof.

Producing evidence may often be supported by attestations derived from external audits, assessments and penetration tests. However, any audit or assessment outcome is a snapshot in time and reflective of the efficacy and operating state of controls during a static time period and thus does not reflect the ebbs and flows of how an organization’s attack surface can quickly change. More and more, insurance companies are moving towards opportunities for continuously monitoring their insureds for changes to highlight emerging risks and vulnerabilities that could indicate, and better predicate, situations that may result in a claim.  

What does this mean for both the policyholder and the insurance company? 

The reality is, there is opportunity for both sides to gain insights from continuous visibility. The challenge is that with hybrid work and the impacts of continued digital transformation in business, it is crucial to look beyond just the inventory of users, identities, devices, applications and data that can be abstracted from the traditional data center operating environment. It is now critical to fully understand those key data points along with the inventory of cloud services in use: those that are sanctioned by IT; those being driven by business units (shadow IT); and those more personal services that are introduced everyday by end-users. 

While the inventory is a starting point, it is also important to understand who is accessing those services and how are they configured, as well as how much data is being sent to the services in question are all key elements that can quickly change a risk profile of an insured and often goes unchecked. Lastly, there is a need to evaluate the aforementioned cloud services from a supply chain risk and threat perspective and be able to answer questions about the organization’s cloud security posture.

The industry is certainly seeing more insurers integrate actuarial science, cybersecurity attack surface evaluation, controls and threat monitoring; basing pricing on telemetry-driven predictions of which users are most likely to experience a data breach or other security incident that leads to a claim. Regardless of whether, or when, that fully comes to pass, security teams that are transforming their environments and modernizing their architectures have the capabilities and data needed to understand their cyber risks and ultimately provide proof that they are effectively managing the risk that they wish to transfer. 

This article was originally published by Security Magazine

author image
Nathan Smolenski
Nathan es un CISO experimentado y líder tecnológico y de gestión de riesgos con más de 19 años de experiencia en servicios financieros, consultoría de gestión, seguros y verticales de la industria del software. Actualmente se desempeña como Director, Jefe de Estrategia de Seguridad Empresarial como miembro del equipo de estrategia global de Netskope, centrado en la transformación digital y los impactos en los programas y estrategias de ciberseguridad.

Stay informed!

Subscribe for the latest from the Netskope Blog