Story image

The definitive guide to identifying, qualifying, and responding to cyber threats

22 Nov 17

As the chief security officer (CSO) of an organisation, the odds can often feel like they’re stacked against you.

With new ransomware, phishing, and other threats being reported every day, it can get overwhelming trying to keep your organisation safe.

In order to minimise risk, organisations need to have a cybersecurity strategy that combines comprehensive visibility, continuous monitoring, advanced analytics and efficient incident response orchestration.

This will ensure they’re well-positioned to identify and respond to the early indicators of an intruder and neutralise the threat before it can result in a material cyber incident.

When putting a strategy together, it’s difficult to know whether to commit to prevention or detection.

Karen Scarfone and Steve Piper’s e-book, the Definitive guide to security intelligence and analytics, recommends a balanced approach utilising both.

Scarfone and Piper say using preventive controls will stop less-skilled attackers, which reduces the noise and using detective controls will expedite identification of advanced attackers, preventing them from inflicting major data breaches and causing other significant damage.

Most importantly, CSOs need a robust security intelligence and analytics platform to help them make sense of the information and be able to action it quickly.

The e-book by Scarfone and Piper covers key points for CSOs like

  • Understanding a cyber attack life cycle
  • Gathering forensic data for managing cyber threats
  • Qualifying threat intelligence
  • Scoping, designing, and deploying a security intelligence and analytics platform.
The secret to scaling DevOps in the digital era
"Organisations around the world have learnt at a cost that while agile DevOps methodologies can result in improved outcomes within teams and projects, they have a propensity to fail miserably."
APAC FinTech network launches to encourage cross-border innovation
Nine associations formally launched the network by signing a Statement of Intent at the Asian Financial Forum event in Hong Kong.
New blockchain solution aims to keep our food ethical
OpenSC enables anyone to scan product QR codes which automatically takes them to information about where a specific product’s journey.
Avaya expands AI offerings with new partnerships
The additions to the ecosystem will enable Avaya to add prioritisation and natural language processing to its UC solutions.
Hillstone CTO's 2019 security predictions
Hillstone Networks CTO Tim Liu shares what key developments could be expected in the areas of security compliance, cloud, security, AI and IoT.
Can it be trusted? Huawei’s founder speaks out
Ren Zhengfei spoke candidly in a recent media roundtable about security, 5G, his daughter’s detainment, the USA, and the West’s perception of Huawei.
SUSE partners with Intel and SAP to accelerate IT transformation
SUSE announced support for Intel Optane DC persistent memory with SAP HANA.
Oracle Java Card update boosts security for IoT devices
"Java Card 3.1 is very significant to the Internet of Things, bringing interoperability, security and flexibility to a fast-growing market currently lacking high-security and flexible edge security solutions."