sb-nz logo
Story image

The definitive guide to identifying, qualifying, and responding to cyber threats

22 Nov 2017

As the chief security officer (CSO) of an organisation, the odds can often feel like they’re stacked against you.

With new ransomware, phishing, and other threats being reported every day, it can get overwhelming trying to keep your organisation safe.

In order to minimise risk, organisations need to have a cybersecurity strategy that combines comprehensive visibility, continuous monitoring, advanced analytics and efficient incident response orchestration.

This will ensure they’re well-positioned to identify and respond to the early indicators of an intruder and neutralise the threat before it can result in a material cyber incident.

When putting a strategy together, it’s difficult to know whether to commit to prevention or detection.

Karen Scarfone and Steve Piper’s e-book, the Definitive guide to security intelligence and analytics, recommends a balanced approach utilising both.

Scarfone and Piper say using preventive controls will stop less-skilled attackers, which reduces the noise and using detective controls will expedite identification of advanced attackers, preventing them from inflicting major data breaches and causing other significant damage.

Most importantly, CSOs need a robust security intelligence and analytics platform to help them make sense of the information and be able to action it quickly.

The e-book by Scarfone and Piper covers key points for CSOs like

  • Understanding a cyber attack life cycle
  • Gathering forensic data for managing cyber threats
  • Qualifying threat intelligence
  • Scoping, designing, and deploying a security intelligence and analytics platform.
Story image
The business case for an in-house ethical hacker
Ethical hackers, also known as penetration testers or white-hat hackers, mimic the techniques used by malicious hackers to try and break into computer systems and discover vulnerabilities before the bad guys can exploit them.More
Story image
Acronis launches data centre in Auckland
It is the first of 111 planned new data centres globally, allowing for the benefits of data localisation, including regional data sovereignty. More
Story image
Cisco report: Remote working is here to stay, making cybersecurity a top priority
"With this new way of working here to stay and organisations looking to increase their investment in cybersecurity, there’s a unique opportunity to transform the way we approach security as an industry to better meet the needs of our customers and end-users.”More
Story image
Google Cloud observes spike in DDoS volumes in last two years
Google Cloud has seen an ‘exponential’ rise in distributed denial of service (DDoS) attacks over the past decade, but the biggest attacks have only occurred in the past couple of years.More
Story image
Women in cybersecurity – what is holding us back?
A robust and diverse workforce with wide-ranging skills and depth of experience is essential for providing balance, safety and continuity to both the industry and countries at large. More
Story image
Criminals scale back DDoS attacks after 'abnormal' spike in Q2
The Q2 spike seems to have been short-lived as DDoS activity returns to ‘normal’ levels over Q3, with 73% fewer attacks than seen in the previous quarter.More