Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity

    Seven Rules for Inclusion in the CSO’s Security Playbook

    By
    Chris Preimesberger
    -
    April 4, 2017
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      PrevNext

      1Seven Rules for Inclusion in the CSO’s Security Playbook

      1 - Seven Rules for Inclusion in the CSO's Security Playbook

      As conventional cyber-security practices continue to fall behind the sophistication of bad actors, enterprise chief security officers are scrambling to keep up. Organizations spent about $75 billion in the U.S. last year on security products and services, representing some 11 percent of total dollars spent on IT. Nonetheless, 75 percent of large enterprises are breached, and the average dwell time of the adversary from breach to detection is 99 days. In light of these challenges in such a fast-moving sector, effective enterprise security requires understanding that old techniques don’t work anymore and success comes from investing in what does work. This eWEEK slide show, based on industry information from Jamie Butler, chief technology officer at Endgame, offers tips on how chief security officers establish an effective enterprise security framework.

      2Assume You’ve Been Breached

      2 - Assume You've Been Breached

      Effective enterprise security begins by assuming you’ve been breached and that there are already bad actors in your network. To combat this, you need to proactively hunt for bad guys already in your network and have the capability to remediate the problem without damage and loss or significant downtime to your networks.

      3Target Zero Breach Tolerance

      3 - Target Zero Breach Tolerance

      Legacy endpoint detection and response (EDR) platforms are good at identifying many advanced attacks, but not in time to prevent damage and loss. Your security program fails if 1 percent of attacks succeed, so you need to invest in technologies that enable your existing teams to identify and effectively respond to the most advanced threats in the shortest amount of time. 

      4Don’t Rely on IOC Search

      4 - Don't Rely on IOC Search

      Many legacy and some leading EDR solutions are great at preventing known threats but do not account for the unknown or never-before-seen attack. The most sophisticated, state-sponsored attackers use methods that can bypass traditional indicators of compromise (IOC) search. While signatures remain an important component of detection and prevention of well-known threats, they are inadequate to defend against modern advanced threats.

      5Automate to Make It Easier on Your Team

      5 - Automate to Make It Easier on Your Team

      Security operators and analysts encounter simple tasks and actions daily while also executing their complex, higher order work. However, the elementary tasks unfortunately consume an inordinate amount of time. Using artificial intelligence-enabled assistants and bots powered by valuable analytics frees up your team from time-consuming work, such as data gathering and routine analysis, to instead focus on more complex work.

      6Consolidate Your Agents

      6 - Consolidate Your Agents

      Organizations with security budgets of $10 million or more use an average of 13 security vendors. This is too high a number for most organizations, so it is essential to integrate technologies that minimize the number of agents security operations center (SOC) teams use, as deployed by IT.

      7Study the Mitre ATT&CK Matrix

      7 - Study the Mitre ATT&CK Matrix

      The Mitre ATT&CK Matrix is a model and framework for describing the actions an adversary may take while operating within an enterprise network. CSOs need to become familiar with this impressive taxonomy of advanced techniques to ensure the solutions they buy are durable as attack techniques evolve and new ones are introduced.

      8Out With the Old, in With the New

      8 - Out With the Old, in With the New

      Near-constant change is necessary for the success of most businesses, and security is no exception. To find success, CSOs need to recognize the mistakes of the past. These include assuming they could prevent all breaches and relying on IOCs, instead looking forward to utilize AI and automation. They also need to think critically about security architecture and understand enemy threats. Your security depends on it.

      PrevNext

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×