Geoff Belknap, CVP and operating CISO for Core and Enterprise, shares four key practices your business can use to be prepared for managing network security incidents.

Learn from our experience
“Knowing where devices are, who owns them, and what they’re supposed to be doing is pretty important in the middle of an incident,” Belknap says.

Key takeaways
Here are best practices you can use to secure your network:
- Build a complete inventory. Keep track of what your network devices are, who owns them, and what they do.
- Capture robust telemetry. Make sure your operational teams have the tools they need to see and analyze access and authentication logs.
- Use dynamic access control. Manage who can send packets on the corporate network by applying policies.
- Deprecate old network assets. Cyberattackers know to look for older, unpatched network devices. You can reduce the attack surface by replacing older devices.

Try it out

Related links

We’d like to hear from you!
