Story image

The definitive guide to identifying, qualifying, and responding to cyber threats

22 Nov 2017

As the chief security officer (CSO) of an organisation, the odds can often feel like they’re stacked against you.

With new ransomware, phishing, and other threats being reported every day, it can get overwhelming trying to keep your organisation safe.

In order to minimise risk, organisations need to have a cybersecurity strategy that combines comprehensive visibility, continuous monitoring, advanced analytics and efficient incident response orchestration.

This will ensure they’re well-positioned to identify and respond to the early indicators of an intruder and neutralise the threat before it can result in a material cyber incident.

When putting a strategy together, it’s difficult to know whether to commit to prevention or detection.

Karen Scarfone and Steve Piper’s e-book, the Definitive guide to security intelligence and analytics, recommends a balanced approach utilising both.

Scarfone and Piper say using preventive controls will stop less-skilled attackers, which reduces the noise and using detective controls will expedite identification of advanced attackers, preventing them from inflicting major data breaches and causing other significant damage.

Most importantly, CSOs need a robust security intelligence and analytics platform to help them make sense of the information and be able to action it quickly.

The e-book by Scarfone and Piper covers key points for CSOs like

  • Understanding a cyber attack life cycle
  • Gathering forensic data for managing cyber threats
  • Qualifying threat intelligence
  • Scoping, designing, and deploying a security intelligence and analytics platform.
Kiwis know security is important, but they're not doing much about it
Only 49% of respondents use antivirus software and even fewer – just 19% -  change their passwords regularly.
Avi Networks: Using visibility to build trust
Visibility, also referred to as observability, is a core tenet of modern application architectures for basic operation, not just for security.
Privacy: The real cost of “free” mobile apps
Sales of location targeted advertising, based on location data provided by apps, is set to reach $30 billion by 2020.
Myth-busting assumptions about identity governance - SailPoint
The identity governance space has evolved and matured over the past 10 years, changing with the world around it.
Forrester names Crowdstrike leader in incident response
The report provides an in-depth evaluation of the top 15 IR service providers across 11 criteria.
Slack doubles down on enterprise key management
EKM adds an extra layer of protection so customers can share conversations, files, and data while still meeting their own risk mitigation requirements.
Security professionals want to return fire – Venafi
Seventy-two percent of professionals surveyed believe nation-states have the right to ‘hack back’ cybercriminals.
Alcatraz AI to replace corporate badges with AI security
The Palo Alto-based startup supposedly leverages facial recognition, 3D sensing, and machine learning to enable secure access control.