Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Tuesday, 6 June, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Tackling cyber security as a collaborative team

by The Gurus
December 8, 2015
in This Week's Gurus
Share on FacebookShare on Twitter

Tackling cyber security as a collaborative team
Matthias Maier, Security evangelist, Splunk 
Cyber security has long been seen as a technology problem. Speak to any security professional and the proverbial ‘needle in the haystack’ often comes up when sifting through the different components in the wake of an attack. Barely a week goes by without large corporations hitting the headlines as a result of a malicious attack, and in this landscape we need to be thinking not just about how we prevent threats, but how we detect and respond to them once they have got inside our organisations. Understanding what’s in front of us and turning big data into usable, contextual data, is the trick to spot the anomalies which give these threats away before they manifest into a full blown data breach.
To transform companies from sitting ducks into cyber threat experts, four simple things are needed to get a single pane of glass view across operations and respond effectively to a threat:
Collect network information from systems across your environment
Collect end point data
Understand user identity: Who’s accessing the system? How often are they logging in? And from what location? To which department do they belong?
Threat intelligence: what do we know from the bigger picture across the industry that we can identify or apply to a threat?
Responding to an attack is often overlooked as ‘the inevitable breach’ is a relatively new concept and requires wider coordination. But as businesses are trying to break down silos to be more open and inclusive to allow digital business growth at speed, the same needs to happen in security. We’re starting to see businesses dedicate resource to computer emergency response teams (CERTs), with colleagues and peers coming together when incidents occur. When it comes to security, the more data, opinions and expertise, the better. 
Security Avengers, Assemble 
Data driven security is a simple concept for businesses to grasp, but implementation is trickier. Peers need to work smarter across departments by making data accessible, usable and valuable in order to better understand the security landscape.
A modern cyber security team needs experts from different divisions. They start with the same information, but their different perspectives, when combined, paint a more detailed picture of threats. Understanding the way that a threat structures code, sits in the network and targets data are all vital in getting to grips with how it works. To get the best information, you need security, network and infrastructure analysts all working together.
But it’s not just internal collaboration that’s needed to tackle security threats. Talk with other companies on how they set up threat intelligence and what makes it work. When a threat is uncovered, information about it should be shared as widely as possible with industry peers. We’re all in the same boat and a collective ecosystem approach is far stronger than a number of isolated islands all working independently.
Investigate alerts as they happen
The speed of response when a business is hit by an attack is crucial to the ability to fend it off. First, organisations need to spot the most dangerous attacks. That means knowing what’s in front of you and what automated action can be taken. Of the millions of alerts you get, which ones need human attention, versus human interaction?
When you have a high level threat, get the emergency response team together and figure out the nature of the threat and the best course of action. Once you have diagnosed this information, you can learn from it and train your prevention solutions or even employees to spot and deal with this threat more effectively in the future.
Attacks are – or at least should be – a concern for every CEO out there. It’s they who will face calls to step down if breached and, as we’ve seen recently customers are on the verge of legal claims for compromised information. Computer Emergency Response may seem like a no-brainer, as attitudes to cyber-security shift from an isolated IT concern to a pan-industry problem. The collective intelligence of companies and experts across industries, sharing real time insights will help to stem the tide of persistent attacks.

FacebookTweetLinkedIn
ShareTweet
Previous Post

Letter to the editor: Banks, step up: sensitive data is at stake

Next Post

Top IoT concerns? Data volumes and network stress

Recent News

A Roadmap for Becoming a Penetration Tester in 2023

A Roadmap for Becoming a Penetration Tester in 2023

May 31, 2023
Electronic tablet with social media icons, hands holding screen.

Research Reveals UK Firms Plan to Embrace New Era of Digital Identity

June 1, 2023
AWS and Salt

Salt Security Attains AWS Security Competency Status 

May 31, 2023
Purple spiral circle. Text reads "Centripetal", san-serif.

Centripetal Extends Innovative CleanINTERNET® Technology to the Cloud

May 31, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information