Page 56 - Cyber Defense eMagazine August 2023
P. 56

enter any charges or send out claims. Many of the insurance plans have timely filing clauses which, if not
            done, they will not pay. So, no claims were being sent out and no payment was coming in."

            The ransomware attack shut down the spring valley hospital computer network and ceased all web-based
            operations, including the patient portal. Coupled with the impacts of the COVID-19 pandemic, the attack’s
            cascading impacts proved insurmountable.

            St. Margaret’s  18-plus month  recovery  effort  failed and  on June 16, 2023,  the five  facilities  closed for
            good.




            A Hidden Culprit – Security Data Silos

            One  of  the  frustrations  security  practitioners  experience  with  cyberattacks  like  this  is  that  while  the
            ransomware  spread  quickly,  the data that could  have helped  the team defend  against it didn’t.  Threat
            intelligence data is often stranded – isolated in ‘data silos’ separately managed within various functional
            groups.

            The average organization  of St. Margaret’s  size uses dozens  of discrete  security tools, many of which
            don’t  share  their  data  or connect  directly  to  other  security  tools,  outside  of  their  own  application  and
            assigned management  group.

            Given  the  high  volume  of  threats  and  security  alerts  flooding  analysts,  these  data  silos  can  lead  to
            dangerously  slow responses.  While tools are helpful – and necessary  – cybersecurity  pros need more
            than point solutions to defend against collaborative, persistent attackers.

            This  is  where  orchestration  across  silos,  AI-driven  automation,  and  collaboration  tools  can  play  an
            important  part. AI and machine  learning don’t replace humans,  but they can pull together  diverse data
            streams,  consolidate  redundant  data  to  reduce  the  noise,  integrate  threat  intelligence  into  SOC
            operations, and enable security teams to automate some responses and act immediately on others.

            Equally important and often overlooked is the need to automate alerts with the right information, and get
            them  to the right people  as quickly  as possible.  The  status quo  for many teams  is to track threats  on
            spreadsheets and communicate by email, if at all. Best case – it can take days to weeks to alert the right
            people and concisely tell them what they need to know.

            But by automating  the tedious work and sharing  context-rich  information  immediately,  security  experts
            can pinpoint attacks and take intelligent action – before irreparable damage occurs.




            The TIP-ing Point: Leveraging Existing Intel to Thwart Future Attacks

            The path to integrate threat intelligence platforms (TIP) with data orchestration and workflow automation
            (SOAR) seems daunting for many organizations.







            Cyber Defense eMagazine – August 2023 Edition                                                                                                                                                                                                               56
            Copyright © 2023, Cyber Defense Magazine. All rights reserved worldwide.
   51   52   53   54   55   56   57   58   59   60   61