CDM-CYBER-DEFENSE-eMAGAZINE-March-2019
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Rip Off the Band-Aid<br />
This leaves us with thousands of vendors selling security solutions and companies spending<br />
record amounts on cybersecurity initiatives yet still grappling with identification and remediation<br />
of threats and attacks. This would be easier to wave off if attacks were slowing down, but they<br />
are not. This year, 46% of U.S. organizations have already experienced a data breach, which is<br />
nearly double (24%) what it was in 2017. Attacks continue to accelerate at an unprecedented<br />
rate. In fact, Cybersecurity Ventures predicts that by the end of <strong>2019</strong>, a ransomware attack will<br />
occur every 14 seconds, which is staggering when you consider that in 2016, the average was<br />
every two minutes (still pretty bad).<br />
I could throw scary stats out all day long to demonstrate the gravity of the situation, but one fact<br />
is clear: What we are currently doing is not working—despite all of the money and technology<br />
being thrown at cyberattack problems. Instead of slapping on a Band-Aid, we need to change the<br />
entire way we think about cybersecurity. The fact of the matter is that threats are changing so fast<br />
in form and function that companies can’t keep up today. Not only are the nature of attacks<br />
persistently evolving faster than enterprises can adjust, but the sheer volume of attacks leaves<br />
companies panicked and underprepared.<br />
Developing Your Cyber Defense Force<br />
The ever-changing security threat landscape has become the number one concern for endpoint<br />
security buyers according to Gartner. In this year’s Third Annual Study on the Cyber Resilient<br />
Organization, 77% of IT professionals reported that their companies do not have a formal<br />
cybersecurity response plan. This must change.<br />
Organizations have to accept that attacks will happen, that despite all of their great defenses,<br />
issues are bound to slip through. The expectation that something will infiltrate the network,<br />
infrastructure, or an employee device must become the norm, and they need to train for what<br />
happens when it does. Think of your SecOps team as your very own special forces of sorts,<br />
constantly vigilant, set to defend, and ready to respond creatively and rapidly in the event of an<br />
attack.<br />
To make identification and remediation of security vulnerabilities and issues as simple as<br />
possible, there are three key areas that must be priorities for your defense forces moving forward.<br />
While I will dive into each one specifically in subsequent articles, at a high level they are:<br />
• Peer deep: Get visibility of all endpoints—and do so at scale. You have to be able to see<br />
what’s happening all across the network. And, here’s the kicker: It needs to be in real time.<br />
If data is not current, the potential remains for a system, machine, network, or device to<br />
be compromised, and you will lose time fixing it. You also need to view and analyze<br />
historical data to identify when issues occurred and how long they impacted your<br />
organization.