01.03.2019 Views

CDM-CYBER-DEFENSE-eMAGAZINE-March-2019

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Rip Off the Band-Aid<br />

This leaves us with thousands of vendors selling security solutions and companies spending<br />

record amounts on cybersecurity initiatives yet still grappling with identification and remediation<br />

of threats and attacks. This would be easier to wave off if attacks were slowing down, but they<br />

are not. This year, 46% of U.S. organizations have already experienced a data breach, which is<br />

nearly double (24%) what it was in 2017. Attacks continue to accelerate at an unprecedented<br />

rate. In fact, Cybersecurity Ventures predicts that by the end of <strong>2019</strong>, a ransomware attack will<br />

occur every 14 seconds, which is staggering when you consider that in 2016, the average was<br />

every two minutes (still pretty bad).<br />

I could throw scary stats out all day long to demonstrate the gravity of the situation, but one fact<br />

is clear: What we are currently doing is not working—despite all of the money and technology<br />

being thrown at cyberattack problems. Instead of slapping on a Band-Aid, we need to change the<br />

entire way we think about cybersecurity. The fact of the matter is that threats are changing so fast<br />

in form and function that companies can’t keep up today. Not only are the nature of attacks<br />

persistently evolving faster than enterprises can adjust, but the sheer volume of attacks leaves<br />

companies panicked and underprepared.<br />

Developing Your Cyber Defense Force<br />

The ever-changing security threat landscape has become the number one concern for endpoint<br />

security buyers according to Gartner. In this year’s Third Annual Study on the Cyber Resilient<br />

Organization, 77% of IT professionals reported that their companies do not have a formal<br />

cybersecurity response plan. This must change.<br />

Organizations have to accept that attacks will happen, that despite all of their great defenses,<br />

issues are bound to slip through. The expectation that something will infiltrate the network,<br />

infrastructure, or an employee device must become the norm, and they need to train for what<br />

happens when it does. Think of your SecOps team as your very own special forces of sorts,<br />

constantly vigilant, set to defend, and ready to respond creatively and rapidly in the event of an<br />

attack.<br />

To make identification and remediation of security vulnerabilities and issues as simple as<br />

possible, there are three key areas that must be priorities for your defense forces moving forward.<br />

While I will dive into each one specifically in subsequent articles, at a high level they are:<br />

• Peer deep: Get visibility of all endpoints—and do so at scale. You have to be able to see<br />

what’s happening all across the network. And, here’s the kicker: It needs to be in real time.<br />

If data is not current, the potential remains for a system, machine, network, or device to<br />

be compromised, and you will lose time fixing it. You also need to view and analyze<br />

historical data to identify when issues occurred and how long they impacted your<br />

organization.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!