Page 20 - Cyber Defense eMagazine April 2023
P. 20

Accurately  prioritizing  alerts  lets  teams  focus  on  the  most  important  threats  first.  For  this  reason,
            streamlining the triage process is key. With the right evidence at their fingertips, analysts can prioritize
            and  process  alerts  faster  and  more  accurately.  Automation  can  help  with  this  too  –  for  example,
            prioritizing those alerts that potentially threaten important resources, or target known vulnerabilities.


            While improving detection is important, it’s also critical to ensure that when detection fails (and inevitably
            it will) your security teams can go back in time to investigate historical activity – quickly and accurately.

            Understandably, the focus of security teams is often on preventing and detecting real-time attacks. But
            the unfortunate outcome of this “real-time focus” is that putting in place the pre-requisites necessary to
            accurately reconstruct historical attacks becomes an afterthought. By the time more serious attacks –
            often not detected immediately - become apparent, the evidence of what happened in the initial stages
            of the attack often can no longer be found. Either the evidence was deleted by the attacker, or it was
            never collected in the first place.

            The only solution to this issue is to make sure that reliable evidence is continuously collected and carefully
            protected. Network flow data and packet capture data are extremely valuable sources of reliable evidence
            because it is difficult for attackers to manipulate, delete, or avoid being tracked by them. Indeed, the fact
            that this data is being collected is typically invisible to the attacker.

            By recording a complete history of what happens on the network – including all the rich, forensic evidence
            that full packet capture provides – analysts have the evidence they need to accurately reconstruct attacks
            -- even when the initial phase of the attack may have happened a week or a month ago. Let’s face it,
            almost  all  incident  investigation  is  looking  at  historical  events  that  have  already  happened  –  so  it’s
            important to have the evidence you need to be able understand exactly what took place.


            Access to reliable evidence lets analysts rapidly join the dots between what different monitoring tools
            may be showing them and quickly identify the root cause and scope of threats. The quicker you can see
            the connected phases of an attack early on, the better your chance of stopping that attack earlier in the
            kill chain and reducing the impact.



            Issue Four: Getting better ROI from your existing investment in security tools and preparing for
            an uncertain future.

            The security vendor landscape is daunting. There are hundreds, if not thousands, of solutions vying for
            your budget. All promising to remedy the shortcomings of the tools you’ve already spent money on.

            Tempting as it might be to simplify things by looking for all-in-one solutions from a single vendor, this is
            often not a feasible or sensible option, there is truth to the saying “Jack of all Trades, master of none”.
            For  one  thing,  you  have  existing  investments  in  tools  you  have  already  deployed.  For  another,  it’s
            impossible for all-in-one solutions to provide the best option across all the areas of security that you need
            to cover. Even if you managed to find a miracle solution, the cybersecurity landscape changes so quickly
            that what might be fit-for-purpose now will likely be obsolete in a year or two.

            So, what’s the alternative?





                                                                                                              20
   15   16   17   18   19   20   21   22   23   24   25