CXO Insight Middle East - Digital Leadership - June 2020

Page 22

VIEWPOINT

GETTING SECURITY RIGHT STEVE RIVERS, TECHNICAL DIRECTOR INTERNATIONAL, THREATQUOTIENT, HOW TO MAKE BETTER SECURITY DECISIONS

O

ver the past twelve months enterprises continue to face further onslaught of security data from disparate systems, platforms and applications concerning the state of the network, potential threats and suspicious behaviour. This continues to challenge every Security Operations Centre (SOC) and Incident Response (IR) team as it looks to address impacts to security operations, vulnerability management and incident response with better and faster decision making. To do this, many organisations are bringing in more data feeds — both threat and vulnerability — and investing in analytic behavioural detection tools. Unfortunately, this is not driving improved decision making. Instead, it is burying staff under data. The end-result is declining decision-making capability due to alert fatigue. To combat this, organisations should

22

CXO INSIGHT ME

JUNE 2020

follow five simple steps to enable better and faster decision making. Step One: Make Prioritisation the First Priority Separating the probable from the possible with context enables analysts to ascertain one high priority alert from another, empowering them to prioritise. Prioritisation is critical and to underscore this point, the National Institute of Standards and Technology (NIST) states in its Computer Security Incident Handling Guide, “prioritising the handling of the incident is perhaps the most critical decision point in the incident handling process.” Prioritisation applies to not just incident response, but all critical alerts. The ability to prioritise gives the analysts the breathing room necessary to focus on what matters, addressing the highest priority alerts first. Step Two : Gain Context Alert triage reduces alert fatigue by

facilitating quick differentiation of one high priority alert from another. The best method to achieve this differentiation is by incorporating contextual information. Having the right context empowers analysts to separate alerts carrying immediate risk from those that carry high risk, but they can address later. One of the best means to gain context is through aggregating and authenticating internal security indicators (indicators of compromise and event data) with external threat intelligence. Unfortunately, most organisations incorporate threat intelligence only after they classify an event as suspect. We see this as a missed opportunity because threat intelligence provides valuable context long before an event is considered suspect. The right context helps the SOC and IR teams separate the possible from the probable. Otherwise, everything is possible making all high priority alerts equal. For example, an anomalous


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.