18.05.2021 Views

Cyber Defense Magazine Special Annual Edition for RSA Conference 2021

Cyber Defense Magazine Special Annual Edition for RSA Conference 2021 - the INFOSEC community's largest, most popular cybersecurity event in the world. Hosted every year in beautiful and sunny San Francisco, California, USA. This year, post COVID-19, virtually with #RESILIENCE! In addition, we're in our 9th year of the prestigious Global InfoSec Awards. This is a must read source for all things infosec.

Cyber Defense Magazine Special Annual Edition for RSA Conference 2021 - the INFOSEC community's largest, most popular cybersecurity event in the world. Hosted every year in beautiful and sunny San Francisco, California, USA. This year, post COVID-19, virtually with #RESILIENCE! In addition, we're in our 9th year of the prestigious Global InfoSec Awards. This is a must read source for all things infosec.

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

priority — enabling remote work<strong>for</strong>ces, securing cloud and video apps, setting permissions and policies,<br />

resolving user missteps, remediating COVID-19 threats, and more.<br />

When your “to do” list changes instantly, it’s tough to get back to implementing your security<br />

strategy. This is even more challenging without the right resources — yet, the fundamentals haven’t<br />

changed. A scalable security plan requires technology that provides situational awareness as well as<br />

capabilities <strong>for</strong> effective remediation and tools to continually improve your security posture.<br />

But technology is just half the battle. It’s also the people on your team, whether in-house or<br />

outsourced, who help to create a strong threat defense.<br />

The cyber security skills you need in your arsenal<br />

IT environments are more complex and varied than ever be<strong>for</strong>e — and this requires as much visibility as<br />

possible across your network, systems, applications, and devices. To gain these insights, you not only<br />

need advanced, continuously improving technology, but human intelligence as well.<br />

In fact, at the rate the cyber security industry evolves, you need security experts constantly ahead of the<br />

curve, educating themselves, and making sure they’re staying on top of the latest threats and the<br />

sophisticated offensive techniques that pose a risk to your operations.<br />

To put this into perspective, here are just a few cyber security roles needed <strong>for</strong> threat monitoring and<br />

detection:<br />

• <strong>Cyber</strong> <strong>Defense</strong> Analyst: Uses data collected from a variety of cyber defense tools (e.g., IDS<br />

alerts, firewalls, network traffic logs) to analyze events that occur within IT environments with the<br />

goal of mitigating threats.<br />

• <strong>Cyber</strong> Threat Analyst: Develops cyber indicators to maintain awareness of the status of highlydynamic<br />

operating environments. Collects, processes, analyzes, and disseminates cyber threat<br />

and warning assessments.<br />

• Vulnerability Assessment Analyst: Per<strong>for</strong>ms assessments of systems and networks within the<br />

network environment, identifying where those systems and networks deviate from acceptable<br />

configurations, enclave policy, or local policy. Measures effectiveness of defense-in-depth<br />

architecture against known vulnerabilities.<br />

75

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!