04.01.2021 Views

Cyber Defense eMagazine January 2021 Edition

Cyber Defense eMagazine January Edition for 2021 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, US Editor-in-Chief, Pieruligi Paganini, Co-founder & International Editor-in-Chief, Stevin Miliefsky, President and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

Cyber Defense eMagazine January Edition for 2021 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, US Editor-in-Chief, Pieruligi Paganini, Co-founder & International Editor-in-Chief, Stevin Miliefsky, President and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

management, as well as monitoring collaboration technologies like Office 365, Teams, Zoom, and Slack.<br />

It is about gaining visibility and control over the users’ ICT ecosystem and understanding where to, from,<br />

and how employees are authenticating and accessing data and applications.<br />

When an intrusion is suspected, they need to be able to qualify the threat and assess its potential impact.<br />

They can only do that if they have captured a wide variety of activity occurring on their endpoints and<br />

servers in real-time. Every organization should be able to search rich forensic data to understand when<br />

and how the incident occurred, and then contain the compromise with an endpoint lockdown.<br />

Automate Everything<br />

While automating everything might not be possible today, SOC teams should be exploring automating<br />

as many processes as possible. They are capturing massive amounts of data, which has made<br />

automating security processes a necessity. Not only does it eliminate human error, it ensures that precise<br />

decisions can be made at speed. SOC automation tools reduce an organization’s time to qualify (TTQ)<br />

and mean time to respond (MTTR) to a security threat. TTQ refers to the average time it takes to<br />

determine whether an incident is benign or should be considered a threat that requires<br />

investigation. Research by the Ponemon Institute found that it took organizations an average of 280 days<br />

to identify and contain a data breach in 2020.<br />

For most private and public sector organizations, that “wait time” is way too long. In a risky and uncertain<br />

time, they can’t wait for a human to perform an action that could be executed by a Security Information<br />

and Event Management (SIEM) solution with Security Orchestration, Automation and Response (SOAR)<br />

capabilities.<br />

Reinventing the Wheel<br />

When it comes to visibility and automation, there’s no reason to reinvent the wheel. SOC teams don’t<br />

have to develop all of this themselves. Instead, they should look for one-click, out-of-the box automation<br />

solutions that help them meet local compliance requirements and quickly deliver for their organizations.<br />

In markets like the Kingdom of Saudi Arabia, predefined reports and use cases can be made immediately<br />

available to organizations so they can meet local cybersecurity controls. This can be a way to quickly<br />

enhance an organization’s security posture while being able to demonstrate compliance.<br />

It also increases cost-efficiencies and enables local organizations to bridge skills gaps in the Middle East<br />

and benefit from both local and global expertise. Pre-defined use cases and reports can make it simpler<br />

and easier to deploy and enhance security in <strong>2021</strong>.<br />

<strong>2021</strong> and Beyond<br />

Rapid digitalization across the private and public sector in the Middle East is only going to continue in<br />

<strong>2021</strong>. The digital transformation and flexible working boom that started in 2020 will accelerate. This<br />

means that cybersecurity has to continually evolve to match the needs of rapidly changing ICT<br />

ecosystems. Adaptability and agility are critical and that starts with a secure foundation. Throughout<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2021</strong> <strong>Edition</strong> 131<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!