<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>Forem: Gaurav Sengar</title>
    <description>The latest articles on Forem by Gaurav Sengar (@itsecops).</description>
    <link>https://forem.com/itsecops</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3666279%2F25e0555a-270a-47bd-be2e-0192d324271c.png</url>
      <title>Forem: Gaurav Sengar</title>
      <link>https://forem.com/itsecops</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://forem.com/feed/itsecops"/>
    <language>en</language>
    <item>
      <title>The CISO Checklist for New Zealand SMBs in 2026: What Actually Reduces Risk</title>
      <dc:creator>Gaurav Sengar</dc:creator>
      <pubDate>Wed, 17 Dec 2025 06:49:41 +0000</pubDate>
      <link>https://forem.com/itsecops/the-ciso-checklist-for-new-zealand-smbs-in-2026-what-actually-reduces-risk-35jb</link>
      <guid>https://forem.com/itsecops/the-ciso-checklist-for-new-zealand-smbs-in-2026-what-actually-reduces-risk-35jb</guid>
      <description>&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F7yvd9szi4bohyjd0mqh6.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F7yvd9szi4bohyjd0mqh6.png" alt=" " width="800" height="533"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Cybersecurity discussions in small and mid-sized organisations often revolve around tools — EDR, SIEM, MFA, backups, SOCs.&lt;/p&gt;

&lt;p&gt;But when you analyse real incidents, a different pattern emerges.&lt;/p&gt;

&lt;p&gt;Most breaches don’t happen because organisations lacked technology.&lt;br&gt;
They happen because risk ownership, readiness, and execution were unclear.&lt;/p&gt;

&lt;p&gt;For New Zealand SMBs operating with lean IT teams, increasing regulatory pressure, and global threat exposure, 2026 demands a more grounded approach.&lt;/p&gt;

&lt;p&gt;This checklist is written for CISOs, IT managers, and senior engineers who want to focus on what actually reduces risk — not what looks good on an architecture diagram.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Have You Mapped Business-Stopping Failure Scenarios?&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Vulnerability lists are useful.&lt;br&gt;
Business impact mapping is critical.&lt;/p&gt;

&lt;p&gt;Ask:&lt;/p&gt;

&lt;p&gt;Which system outage would stop operations for more than 24 hours?&lt;/p&gt;

&lt;p&gt;Which data loss would trigger legal, contractual, or reputational damage?&lt;/p&gt;

&lt;p&gt;Which compromise would force executive disclosure?&lt;/p&gt;

&lt;p&gt;If these scenarios aren’t clearly documented and aligned with leadership, security priorities will always drift toward noise instead of impact.&lt;/p&gt;

&lt;p&gt;Security should be driven by failure scenarios, not CVE counts.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Is Incident Response Practised or Just Documented?&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Many organisations have an incident response plan.&lt;br&gt;
Very few have experienced it under pressure.&lt;/p&gt;

&lt;p&gt;Common gaps during real incidents:&lt;/p&gt;

&lt;p&gt;Unclear decision authority&lt;/p&gt;

&lt;p&gt;Delays in isolating systems&lt;/p&gt;

&lt;p&gt;Confusion around legal, insurance, and communications&lt;/p&gt;

&lt;p&gt;Scrambling to locate credentials or backups&lt;/p&gt;

&lt;p&gt;Even a simple tabletop exercise exposes these gaps quickly.&lt;/p&gt;

&lt;p&gt;Practising response doesn’t just improve outcomes — it builds confidence across IT, security, and leadership.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Are Backups Tested for Recovery — Not Just Existence?&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Backups are often treated as a checkbox.&lt;/p&gt;

&lt;p&gt;Key questions:&lt;/p&gt;

&lt;p&gt;When was the last full restore tested?&lt;/p&gt;

&lt;p&gt;Are backups isolated from administrative compromise?&lt;/p&gt;

&lt;p&gt;How long would recovery realistically take?&lt;/p&gt;

&lt;p&gt;In ransomware incidents, time to recovery often matters more than time to detection.&lt;/p&gt;

&lt;p&gt;A backup that hasn’t been restored is a theory, not a control.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Is Identity Treated as a Security Boundary?&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Most modern attacks don’t “break in”.&lt;br&gt;
They authenticate.&lt;/p&gt;

&lt;p&gt;This makes identity hygiene one of the highest-impact controls:&lt;/p&gt;

&lt;p&gt;MFA must be enforced consistently, including remote and privileged access&lt;/p&gt;

&lt;p&gt;Privileged roles should be minimal, time-bound, and audited&lt;/p&gt;

&lt;p&gt;Service accounts and legacy access paths need regular review&lt;/p&gt;

&lt;p&gt;If an attacker gets credentials, identity controls are the last meaningful barrier.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Are Logs Useful When It Actually Matters?&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Logging is often enabled but poorly scoped.&lt;/p&gt;

&lt;p&gt;High-value logging focuses on:&lt;/p&gt;

&lt;p&gt;Authentication events and privilege escalation&lt;/p&gt;

&lt;p&gt;Endpoint activity tied to user identity&lt;/p&gt;

&lt;p&gt;Administrative changes on critical systems&lt;/p&gt;

&lt;p&gt;Equally important:&lt;/p&gt;

&lt;p&gt;Retention must support investigations and insurance claims&lt;/p&gt;

&lt;p&gt;Logs must be accessible during an incident, not just stored&lt;/p&gt;

&lt;p&gt;Logs don’t prevent incidents — they determine how well you survive them.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Can Cyber Risk Be Explained in Business Terms?&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Dashboards don’t help boards.&lt;br&gt;
Clear narratives do.&lt;/p&gt;

&lt;p&gt;Leadership needs to understand:&lt;/p&gt;

&lt;p&gt;What could go wrong?&lt;/p&gt;

&lt;p&gt;How likely is it?&lt;/p&gt;

&lt;p&gt;What happens if it does?&lt;/p&gt;

&lt;p&gt;CISOs and IT leaders who translate technical risk into operational and financial impact consistently get faster decisions and stronger support.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Are Third Parties Treated as First-Class Risks?&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;SMBs rely heavily on:&lt;/p&gt;

&lt;p&gt;MSPs&lt;/p&gt;

&lt;p&gt;SaaS vendors&lt;/p&gt;

&lt;p&gt;Cloud providers&lt;/p&gt;

&lt;p&gt;Consultants&lt;/p&gt;

&lt;p&gt;Yet third-party access is often:&lt;/p&gt;

&lt;p&gt;Long-lived&lt;/p&gt;

&lt;p&gt;Poorly monitored&lt;/p&gt;

&lt;p&gt;Weakly governed&lt;/p&gt;

&lt;p&gt;Attackers increasingly pivot through trusted vendors.&lt;br&gt;
Third-party access should be reviewed with the same scrutiny as internal access.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Is Ownership Explicit During a Crisis?&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;One recurring failure pattern in incidents is shared responsibility without ownership.&lt;/p&gt;

&lt;p&gt;Effective organisations clearly define:&lt;/p&gt;

&lt;p&gt;Who detects&lt;/p&gt;

&lt;p&gt;Who decides&lt;/p&gt;

&lt;p&gt;Who communicates&lt;/p&gt;

&lt;p&gt;Who recovers&lt;/p&gt;

&lt;p&gt;Ambiguity during an incident is costly — technically, financially, and reputationally.&lt;/p&gt;

&lt;p&gt;Final Thought: Fewer Tools, Better Outcomes&lt;/p&gt;

&lt;p&gt;Security maturity isn’t measured by how many controls exist.&lt;/p&gt;

&lt;p&gt;It’s measured by how confidently an organisation can answer:&lt;/p&gt;

&lt;p&gt;“If something happens tonight, do we know exactly what to do tomorrow morning?”&lt;/p&gt;

&lt;p&gt;For New Zealand SMBs operating in a global threat environment, clarity and readiness will matter far more in 2026 than tool volume.&lt;/p&gt;

&lt;p&gt;About the Author&lt;/p&gt;

&lt;p&gt;Gaurav Sengar is a cybersecurity and infrastructure risk advisor with 8+ years of experience supporting mid-sized and regulated organisations.&lt;/p&gt;

&lt;p&gt;He works with CISOs, IT leaders, and executive teams to reduce cyber and operational risk through practical governance, incident readiness, and identity-first security strategies.&lt;/p&gt;

&lt;p&gt;Founder at ITSECOPS.&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>linux</category>
      <category>hackathon</category>
      <category>opensource</category>
    </item>
  </channel>
</rss>
