One Article Review

Accueil - L'article:
Source Anomali.webp Anomali
Identifiant 7692043
Date de publication 2022-10-26 18:31:00 (vue: 2022-10-26 22:06:45)
Titre Accelerating Security Resilience at a Fraction of the Cost
Texte Manage security in the current macro and help increase business revenue and EPS with a scalable SOC IMAGINE accelerating security resilience at a fraction of the cost – an operating foundation at scale to change how we play the infinite game of cybersecurity and even shift the security cost to the bad guys. Muhammed Ali was not the strongest and toughest boxer – he owned the middle of the ring, using his speed to play the infinite and shift the hard work to his adversaries – he was the greatest. Elevating Security Resilience requires focused visibility to deliver the punches – the underlying foundation must be automated to keep up with scale at a fraction of the cost. The popular mantra says, “every business is a digital business; you’re digital, or you’re dead.” This could not be truer in today’s world. While digital transformation has been an ongoing trend, Covid-19 accelerated that transformation beyond normal. Companies transformed their digital processes 20-25[1] times faster than before due to the onset of the pandemic. The changes included customer interactions, employee engagement, back-office processes, supply chain, and more. It’s a cliché to state that cyber becomes a core business risk as businesses get more digitally connected. Scan the SEC filings of any publicly listed company, and it’s amply clear that digital transformation unlocks massive growth but also expands the risk profile for most organizations. Cyber resilience is business resilience. The corollary holds equally true – cyber fragility impedes business growth. Figure 1: Digital transformation & cyber risk The traditional approach to cybersecurity has focused on a tech-centric approach to security, evolving a technology acronym soup, continuously trying to find the smarter tool to speed up and scale security operations. This approach, somewhat successful at the lower levels of digital transformation, has become unmanageable and incredibly expensive for businesses. In spending time with board directors, management teams, CIOs, and CISOs, we’ve realized that there is a dire need to pause and reset the foundational thinking with an eye on more effective delivery that can scale at a manageable cost. When an attacker targets an organization, they start by first conducting reconnaissance and understanding a company’s business model, profile, and strategy. Security needs to focus on the WHY - the business context. Why are they an interesting target, and what can they do to deter the attackers? This fusion of business context with security is critical to transforming security for the modern enterprise and helping executives answer key questions on business risk and resilience. As Einstein aptly said, “we cannot solve our problems with the same thinking we used to create them.” Sprucing up Security Operations A recent ESG survey highlighted that 52% of security professionals consider security today more complex today than two years ago[2]. There are several drivers for this, including changing threat landscape, growing attack surface, higher volume and complexity of security alerts, growing adoption of public cloud services, keeping up with operational needs of SecOps technologies, and collecting and growing more data. Elevating security necessitates a step back first to understand the goal. “The core purpose of security operations in a business is to drive operational resilience and
Envoyé Oui
Condensat “every “the “visibility “we –illuminating 11038 ability able above accelerated accelerating achieve acronym across actionable actions active address adoption advent adversaries adversary affordable ago ahead aid aiding alerts ali all alphabet also always amply analyze anomali answer answering any application approach aptly arcsight are around assessment attack attacker attackers attacks attain automate automated automating automation avail awaiting back bad based baseline battle become becomes been before behaviorally being belief below best beyond big black board both box boxer breakthrough bringing brings broader build building business business; businesses but can cannot center centric chain challenges change changes changing cios cisos claims class clear cliché cloud clouds collecting com/article/3675551/5 com/capabilities/strategy commercially companies company company’s complex complexity conducting connect connected consider considerations consistency constant constantly context continuous continuously contributors controls core corollary corporate correlate correlating cost could covid create critical crucial csoonline current customer customers customers’ cyber cybersecurity data dead decades declared defenders defensive deliver delivering delivers delivery detection deter digital digitally digitization digitized dire directors done dream drive drivers driving due each edr effective efficiency efficient efficiently einstein elements elevate elevating email embed emerging employee empowering enables enabling endpoints engagement enrichment ensuring entails enterprise entire environment eps equally esg essential etc even ever every evolution evolved evolving executives expands expensive expose exposure eye faster father feasible figure filings finally finance/our find first focus focused forever forward foundation foundational fraction fragility from full function fundamental fusion game gaping gaps gen get getting global goal gov/rules/proposed/2022/33 greatest grow growing grows growth guys hard harder has have heart help helping helps higher highlighted highly his holds hole holistic house how however html https://www hugh hugh’s identify identity imagine impact impacting impedes implemented importantly impossible improve included includes including increase increasingly incredibly industry infinite informed infrastructure inhibited innovations insights insights/how integrate intelligence intelligent interactions interesting investment investments it’s journey just keep keeping key know known landscape largest later latest leaders leading lean learning leaving levels like limited listed local logs long lost lower macro macroeconomic make makes manage manageable management mantra many market massive maximize mckinsey messaging middle minimize model modern modernize monitoring more most move muhammed must ndr necessitates need needs network never next njemanze normal not now offensive office often one ongoing only onset operating operational operations optimize organization organizational organizations original other over oversight owned pandemic part partner patterns pause pawn pdf peacetime people platform play played playing point popular posture potential prepared price proactive problem problems process processes professionals profile proprietary proud provider providing public publicly punches purpose pushed qualifying question questions reactive realized reasons recent recognition reconnaissance reduce region regulatory relevant repeatability repository required requires reset resilience respond response results return revenue revolve right ring risk risks said same says scalable scale scaling scan scarce seamlessly sec secops secure security security; seems sense services several shift siem siem/soar/xdr siems silicon simply smarter soars soc solutions solve some somewhat soup speed spend spending spent sprucing stage start started starts state step strategy strongest struggle success successful supply surface surfaces survey synthesize talent target
Tags Tool Threat Guideline
Stories
Notes
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: