|
In part one of this post we introduced the cyber response curve. In this post, we have outlined some observations which illustrate how different level of maturity and approaches can affect your cyber response curve:
Legacy response
Key Statistics:
The standard AV, IDS and legacy systems used by most organizations are not keeping pace with the evolving threat landscape. Many organizations only become aware of an advanced attack when they are notified by a government agency or another third party.
When investigating such an incident the technical specialists must split their time across the numerous tools, collecting small pieces of information from each, and manually piecing together the details of an attack.
Organizations operating in this manner often respond too quickly before building a good enough understanding of the situation. This can cause the attacker to increase their level of activity, whilst accidentally putting the investigating team back to the start of the response curve. The business exposure actually goes up, not down as a result of their actions.
Effective and efficient investigation
Key Statistics:
Equipping a technical team with solutions powered by the right technology dramatically compresses the cyber response curve, both in terms of the time to detect and the rate of understanding.
The full benefit to the technical team is realized by bringing together disparate data sources, linking and enriching entities with open and closed source information, pre-computing frequently asked questions and sharing collective knowledge.
Business aware decision-making
Key Statistics:
By bridging the business world with that of the technical team in the security operations center and giving them a common language, tools and understanding, allows teams to not only squeeze their cyber response curve but also to significantly raise their level of understanding, by considering more than just the technical details of an attack.
We see this as an evolution of today’s security operations center rather than a transformation. Done correctly, these benefits can be delivered to existing operational teams rather than requiring the hiring of PhDs, and can unleash the value of existing tool investments rather than requiring the wholesale replacement of technology.
What you can do today to squeeze your cyber response curve
The more preparation you do to be able to squeeze the cyber response curve, the better able you are to deal with an attack. In summary:
Are you ready to squeeze your cyber response curve?
Sponsored byWhoisXML API
Sponsored byVerisign
Sponsored byDNIB.com
Sponsored byVerisign
Sponsored byCSC
Sponsored byRadix
Sponsored byIPv4.Global