{"id":98584,"date":"2019-05-13T06:00:19","date_gmt":"2019-05-13T13:00:19","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=98584"},"modified":"2019-05-22T15:19:43","modified_gmt":"2019-05-22T22:19:43","slug":"greatest-risk-not-risk-assessment","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2019\/05\/greatest-risk-not-risk-assessment\/","title":{"rendered":"The Greatest Risk Is Not Doing a Risk Assessment"},"content":{"rendered":"<p><em>This article was originally published on <a href=\"https:\/\/www.securityroundtable.org\/greatest-risk-is-not-doing-a-risk-assessment\/\" rel=\"nofollow,noopener\" >SecurityRoundtable<\/a><\/em><a href=\"https:\/\/www.securityroundtable.org\/greatest-risk-is-not-doing-a-risk-assessment\/\" rel=\"nofollow,noopener\" >.<em>org.<\/em><\/a><\/p>\n<p>Recently, I had an interesting discussion with the Dutch members of Parliament about cybersecurity. The politicians wanted to know my views on 5G security and what I thought about a cybersecurity tender put out by an association of 380 government municipalities.<span class=\"Apple-converted-space\">\u00a0<\/span><\/p>\n<p>The tender aimed to acquire security products such as firewalls, endpoint protection systems, and CASB (Cloud Access Security Broker) products, possibly from three different security vendors.<span class=\"Apple-converted-space\">\u00a0<\/span><\/p>\n<p>I told them that this would be the wrong way to approach a cybersecurity tender. Protection from cyber threats is not just about buying siloed point products which provide discreet solutions to single problems. Nor does it depend on simply replacing one set of products with a slightly cheaper version.<span class=\"Apple-converted-space\">\u00a0<\/span><\/p>\n<p>Effective cybersecurity requires a holistic strategy that begins with creating a risk assessment.\u00a0<span class=\"Apple-converted-space\">\u00a0<\/span><\/p>\n<p><em><a href=\"https:\/\/www.securityroundtable.org\/greatest-risk-is-not-doing-a-risk-assessment\/\" rel=\"nofollow,noopener\" >Read the full article<\/a> on Security Roundtable.org.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Effective cybersecurity requires a holistic strategy that begins with creating a risk assessment.\u00a0\u00a0<\/p>\n","protected":false},"author":348,"featured_media":98935,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1766,6765],"tags":[6776,2669],"coauthors":[3633],"class_list":["post-98584","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cso-perspective","category-secure-the-enterprise","tag-risk-assessment","tag-security-roundtable"],"jetpack_featured_media_url":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/05\/AdobeStock_153412372-440x280.jpeg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/98584","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/348"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=98584"}],"version-history":[{"count":1,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/98584\/revisions"}],"predecessor-version":[{"id":98585,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/98584\/revisions\/98585"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/98935"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=98584"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=98584"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=98584"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=98584"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}