02.02.2022 Views

Cyber Defense eMagazine February Edition for 2022

The view from the Publisher’s desk is very encouraging, based on celebrating 10 years of growth and success at Cyber Defense Magazine! When our tiny team began our journey at Cyber Defense Media Group (CDMG) together in January 2012, we were happy to help smaller, lesser-known innovators of infosec, get their message out there and Rise Above the noise. Now, after 10 years, we’re even helping multi-billion-dollar companies and governments around the globe with our offices in D.C., London, N.Y. and other locations in play, as we continue to scale, thanks to you – our readers, listeners, viewers and media partners. Beyond the magazine, in response to the demands of our markets, the scope of CDMG’s activities has grown into many media endeavors. They now include Cyber Defense Awards; Cyber Defense Conferences; Cyber Defense Professionals (job postings); Cyber Defense TV, Radio, and Webinars; and Cyber Defense Ventures (partnering with investors). Please check them out and see how much more CDMG has to offer! Very respectfully and with much appreciation, Gary Miliefsky, Publisher

The view from the Publisher’s desk is very encouraging, based on celebrating 10 years of growth and success at Cyber Defense Magazine! When our tiny team began our journey at Cyber Defense Media Group (CDMG) together in January 2012, we were happy to help smaller, lesser-known innovators of infosec, get their message out there and Rise Above the noise. Now, after 10 years, we’re even helping multi-billion-dollar companies and governments around the globe with our offices in D.C., London, N.Y. and other locations in play, as we continue to scale, thanks to you – our readers, listeners, viewers and media partners. Beyond the magazine, in response to the demands of our markets, the scope of CDMG’s activities has grown into many media endeavors. They now include Cyber Defense Awards; Cyber Defense Conferences; Cyber Defense Professionals (job postings); Cyber Defense TV, Radio, and Webinars; and Cyber Defense Ventures (partnering with investors).
Please check them out and see how much more CDMG has to offer!

Very respectfully and with much appreciation,
Gary Miliefsky, Publisher

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Figure 1. Three-Phase Attack Process Model<br />

What is Identity Detection and Response?<br />

The identity detection and response (IDR) strategy involves focusing on obtaining evidence during the<br />

latter two attack phases shown in Figure 1 that an adversary is traversing the targeted entity and<br />

preparing to create unwanted consequences. IDR relies on the following strategic protection activities by<br />

enterprise defenders:<br />

Establishing Identity Visibility<br />

With the dissolution of the perimeter, identities have become the new basis <strong>for</strong> access management. As<br />

a result, visibility into identity-related attack activity in<strong>for</strong>mation is now a key source of attack surface risk<br />

and an indication that security anomalies might be present. This represents a major shift in how intrusion<br />

detection can be accomplished in the enterprise.<br />

Protecting Credentials<br />

One weak or exposed credential can open the door <strong>for</strong> an attacker. Identity security starts with finding<br />

and removing exposed credentials. Policy-based controls can also bind credentials to their credential<br />

stores and prevent misuse. Used in conjunction with concealment and deception technology,<br />

organizations can also prevent theft and misuse by hiding production credentials and using deception<br />

lures and fake artifacts to trick attacker tools and divert the attack to decoys.<br />

Addressing Directory Services<br />

For many enterprise teams, their most essential identity resource is Microsoft Active Directory (AD).<br />

Through AD, administrators create new users, groups, and domains to set up policy-based en<strong>for</strong>cement<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2022</strong> <strong>Edition</strong> 86<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!