31.07.2023 Views

The Cyber Defense eMagazine August Edition for 2023

Cyber Defense eMagazine August Edition for 2023 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

Cyber Defense eMagazine August Edition for 2023 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

enter any charges or send out claims. Many of the insurance plans have timely filing clauses which, if not<br />

done, they will not pay. So, no claims were being sent out and no payment was coming in."<br />

<strong>The</strong> ransomware attack shut down the spring valley hospital computer network and ceased all web-based<br />

operations, including the patient portal. Coupled with the impacts of the COVID-19 pandemic, the attack’s<br />

cascading impacts proved insurmountable.<br />

St. Margaret’s 18-plus month recovery ef<strong>for</strong>t failed and on June 16, <strong>2023</strong>, the five facilities closed <strong>for</strong><br />

good.<br />

A Hidden Culprit – Security Data Silos<br />

One of the frustrations security practitioners experience with cyberattacks like this is that while the<br />

ransomware spread quickly, the data that could have helped the team defend against it didn’t. Threat<br />

intelligence data is often stranded – isolated in ‘data silos’ separately managed within various functional<br />

groups.<br />

<strong>The</strong> average organization of St. Margaret’s size uses dozens of discrete security tools, many of which<br />

don’t share their data or connect directly to other security tools, outside of their own application and<br />

assigned management group.<br />

Given the high volume of threats and security alerts flooding analysts, these data silos can lead to<br />

dangerously slow responses. While tools are helpful – and necessary – cybersecurity pros need more<br />

than point solutions to defend against collaborative, persistent attackers.<br />

This is where orchestration across silos, AI-driven automation, and collaboration tools can play an<br />

important part. AI and machine learning don’t replace humans, but they can pull together diverse data<br />

streams, consolidate redundant data to reduce the noise, integrate threat intelligence into SOC<br />

operations, and enable security teams to automate some responses and act immediately on others.<br />

Equally important and often overlooked is the need to automate alerts with the right in<strong>for</strong>mation, and get<br />

them to the right people as quickly as possible. <strong>The</strong> status quo <strong>for</strong> many teams is to track threats on<br />

spreadsheets and communicate by email, if at all. Best case – it can take days to weeks to alert the right<br />

people and concisely tell them what they need to know.<br />

But by automating the tedious work and sharing context-rich in<strong>for</strong>mation immediately, security experts<br />

can pinpoint attacks and take intelligent action – be<strong>for</strong>e irreparable damage occurs.<br />

<strong>The</strong> TIP-ing Point: Leveraging Existing Intel to Thwart Future Attacks<br />

<strong>The</strong> path to integrate threat intelligence plat<strong>for</strong>ms (TIP) with data orchestration and workflow automation<br />

(SOAR) seems daunting <strong>for</strong> many organizations.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2023</strong> <strong>Edition</strong> 56<br />

Copyright © <strong>2023</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!