02.12.2019 Views

Cyber Defense eMagazine December 2019

Cyber Defense eMagazine January Edition for 2020 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group with Pierluigi Paganini, Yan Ross as International and US Editors-in-Chief and many more hard working amazing contributors!

Cyber Defense eMagazine January Edition for 2020 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group with Pierluigi Paganini, Yan Ross as International and US Editors-in-Chief and many more hard working amazing contributors!

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

89<br />

Faced with an overwhelming volume of alerts and the draining reality of false alarms at the SOC (Security<br />

Operations Center), you begin to wear down. Just like the jaded townspeople in the story of the boy who<br />

cried wolf, you become apathetic and start turning a blind eye. Similar to 31.9 percent of your security<br />

colleagues, you begin to ignore alerts due to the high number of false positives.<br />

And that’s how we get here: Of the typical 17,000 alerts received per week, only 4 percent ever get<br />

investigated. Ouch. <strong>Cyber</strong> wolves everywhere lick their virtual chops at these numbers as the odds of<br />

slipping real threats past overwhelmed, alert-fatigued defenses become quite favorable.<br />

Misconfigured detection tools are to blame for triggering many of the false positives, and with the growing<br />

security stack and increasing complexity of current defense technology, this trend doesn’t appear to be<br />

slowing. Expanding cloud and Internet of Things (IoT) adoption is only expanding the attack surface and<br />

encouraging organizations to invest in more security tools.<br />

Where does all this leave worn-out analysts and overloaded security operations centers? In desperate<br />

need of an ally. Thankfully machine-learning enabled automation is emerging as a method to streamline<br />

alert handling.<br />

Provides Context<br />

Context is a critical factor in identifying and confirming the validity of threats. Data drives these contextual<br />

relationships, and automation excels collecting, organizing and correlating data in real time. It leverages<br />

the data necessary to identify contextually related alerts, cross-references case details from multiple<br />

systems, spots trends, prioritizes cases and drives faster response.<br />

Manual workflows can’t process or analyze data fast enough to keep pace with evolving threat<br />

landscapes or deliver at scale. Besides, humans are notoriously awful at following a consistent standard.<br />

Programmed cognitive automation removes the “people risk” by adhering to a regular, repeatable<br />

standard when managing and analyzing data.<br />

Shrinks Volume<br />

Automation shrinks the pool of alerts by swiftly weeding the potentially malicious from the benign.<br />

Machine learning quickly recognize the familiar “seen-before” alerts as false positives and removes them<br />

from the queue. The smaller number of “not-seen-before” alerts can then be passed on for further<br />

investigation.<br />

This validation works a massive glut of alerts down to a manageable number for human examination.<br />

With the assistance of the right automation tools, cases can be reduced up to 80 percent. Automated<br />

triage saves time, and lets humans utilize superior cognition for higher-level tasks, rather than burn out<br />

on the mind-numbing process of examining each alert.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!