Continuing on our “basketball meets cybersecurity” theme, we now find ourselves around the corner from the NBA draft. Just as with our previous #Threat16 March Madness challenge – if you adopt the right perspective, there are so many unexplored parallels between cybersecurity and sports.
First off, security professionals have to continuously prioritize their expenditures (including people, process and technology) based on what they believe will garner the best return on their investment. This is critically important when it comes to deciding which types of software to deploy to help mitigate their most important risks. It’s much the same for NBA teams at draft time, which each have a certain draft position and need to make it count in continuously evolving and improving their squads.
In cybersecurity, the “players” are the tools and solutions that we believe are game changers, or starters – the technologies that we think will provide the best ROI and strongest offense/defense against the top threats. Yet, we know that selecting the best technologies to accomplish this feat isn’t as simple as buying the latest and great solution. As with building a winning basketball team, in the end it’s all about fitment, or selecting the right tools to address your organization’s unique requirements.
Hopping back over to hoops, your team might have the 11thpick in the draft (because everyone can’t hold the number 1 and simply select Zion), but it may not desire the player ranked “11” overall by the experts. The 11thbest player might be a point guard, but your team may have a bigger need for, say, a big man!
Like a company’s cybersecurity plans, NBA teams are complex and formulated by acquiring players meant to add specific value to the team’s overall success. Properly formulated, these plans can be executed to get a “W” on the court. The Golden State Warriors’ Coach Steve Kerr’s approach in this year’s NBA Finals has been different from the Toronto Raptor’s coach, Nick Nurse. As in, bringing back Boogie Cousins in game 2. Yet, Nurse has a completely different game plan that is providing results. Despite the teams’ differences, they both really know what they’re doing. Maybe this is one reason for the current 1-1 series standing?
This month, we’ll review some of this season’s top cybersecurity “players” – from Data Loss Protection (DLP), Cloud Security Tools, EDR, Email Security, and Authentication – and the many related options that cybersecurity teams have in advancing their strategies –, much like NBA GMs and coaches e when reviewing the shooting guards, point guards, forwards, centers, and small forwards available in the NBA draft.
To add an extra twist, we’ll compare the technologies above to some of the individual basketball players that will be drafted later this month. Follow us as we aim to help you determine what technologies may work best in continuing to evolve your own plans. The countdown to #CyberDraft2019 is on!
As always, follow us on Twitter at www.twitter.com/BAYDYNAMICS, on LinkedIn at www.linkedin.com/company/bay-dynamics/to stay up to date on the action. Use hashtag #CyberDraft2019 and tell us what type of player your company needs the most.