Offensive And Defensive Risk And Security Strategies – Charles Leaver

By | August 16, 2017

Written By Roark Pollock And Presented By Charles Leaver Ziften CEO

 

Threat management and security management have long been dealt with as separate functions often performed by separate functional groups within an organization. The recognition of the need for continuous visibility and control across all assets has increased interest in looking for common ground between these disciplines and the availability of a brand-new generation of tools is allowing this effort. This conversation is really current offered the continued trouble the majority of enterprise organizations experience in drawing in and keeping certified security workers to handle and secure IT infrastructure. A marriage of activity can help to better utilize these critical personnel, lower expenses, and assist automate response.

Historically, danger management has actually been viewed as an attack mandate, and is typically the field of play for IT operations groups. Sometimes referred to as “systems management”, IT operations groups actively carry out device state posture monitoring and policy enforcement, and vulnerability management. The goal is to proactively alleviate possible dangers. Activities that further risk decreasing and that are carried out by IT operations include:

Offending Threat Mitigation – Systems Management

Asset discovery, inventory, and revitalize

Software application discovery, use tracking, and license rationalization

Mergers and acquisition (M&A) danger evaluations

Cloud work migration, tracking, and enforcement

Vulnerability assessments and patch installs

Proactive help desk or systems analysis and issue response/ repair work

On the other side of the field, security management is considered as a protective game, and is normally the field of play for security operations groups. These security operations teams are typically responsible for hazard detection, event response, and resolution. The objective is to react to a risk or a breach as rapidly as possible in order to decrease effects to the organization. Activities that fall directly under security management which are performed by security operations consist of:

Defensive Security Management – Detection and Response

Hazard detection and/or risk searching

User habits monitoring / insider hazard detection and/or searching

Malware analysis and sandboxing

Occurrence response and threat containment/ removal

Lookback forensic examinations and root cause decision

Tracing lateral risk motions, and even more danger removal

Data exfiltration identification

Successful companies, naturally, have to play both offense AND defense similarly well. This requirement is pressing organizations to acknowledge that IT operations and security operations need to be as lined up as possible. Thus, as much as possible, it helps if these two teams are playing utilizing the same playbook, or a minimum of dealing with the same data or single source of truth. This indicates both groups should aim to use a few of the exact same analytic and data collection tools and methods when it pertains to managing and securing their endpoint systems. And if organizations count on the same workers for both jobs, it definitely helps if those people can pivot between both jobs within the exact same tools, leveraging a single data set.

Each of these offensive and protective tasks is critical to protecting an organization’s copyright, credibility, and brand. In fact, managing and prioritizing these jobs is exactly what often keeps CIOs and CISOs up during the night. Organizations must acknowledge opportunities to align and consolidate teams, technologies, and policies as much as possible to ensure they are focused on the most urgent requirement along the present danger and security management spectrum.

When it pertains to managing endpoint systems, it is clear that companies are moving toward an “all the time” visibility and control model that allows continuous danger evaluations, constant threat monitoring, and even continuous efficiency management.

Hence, organizations need to look for these 3 essential capabilities when assessing new endpoint security systems:

Solutions that supply “all the time” visibility and control for both IT operations groups and security operations groups.

Solutions that supply a single source of reality that can be used both offensively for risk management, and defensively for security detection and response.

Architectures that easily integrate into current systems management and security tool environments to deliver even greater value for both IT and security groups.

Leave a Reply

Your email address will not be published. Required fields are marked *